-
HATFormer: Historic Handwritten Arabic Text Recognition with Transformers
Authors:
Adrian Chan,
Anupam Mijar,
Mehreen Saeed,
Chau-Wai Wong,
Akram Khater
Abstract:
Arabic handwritten text recognition (HTR) is challenging, especially for historical texts, due to diverse writing styles and the intrinsic features of Arabic script. Additionally, Arabic handwriting datasets are smaller compared to English ones, making it difficult to train generalizable Arabic HTR models. To address these challenges, we propose HATFormer, a transformer-based encoder-decoder archi…
▽ More
Arabic handwritten text recognition (HTR) is challenging, especially for historical texts, due to diverse writing styles and the intrinsic features of Arabic script. Additionally, Arabic handwriting datasets are smaller compared to English ones, making it difficult to train generalizable Arabic HTR models. To address these challenges, we propose HATFormer, a transformer-based encoder-decoder architecture that builds on a state-of-the-art English HTR model. By leveraging the transformer's attention mechanism, HATFormer captures spatial contextual information to address the intrinsic challenges of Arabic script through differentiating cursive characters, decomposing visual representations, and identifying diacritics. Our customization to historical handwritten Arabic includes an image processor for effective ViT information preprocessing, a text tokenizer for compact Arabic text representation, and a training pipeline that accounts for a limited amount of historic Arabic handwriting data. HATFormer achieves a character error rate (CER) of 8.6% on the largest public historical handwritten Arabic dataset, with a 51% improvement over the best baseline in the literature. HATFormer also attains a comparable CER of 4.2% on the largest private non-historical dataset. Our work demonstrates the feasibility of adapting an English HTR method to a low-resource language with complex, language-specific challenges, contributing to advancements in document digitization, information retrieval, and cultural preservation.
△ Less
Submitted 2 October, 2024;
originally announced October 2024.
-
A Comprehensive Evaluation of Large Language Models on Mental Illnesses
Authors:
Abdelrahman Hanafi,
Mohammed Saad,
Noureldin Zahran,
Radwa J. Hanafy,
Mohammed E. Fouda
Abstract:
Large language models have shown promise in various domains, including healthcare. In this study, we conduct a comprehensive evaluation of LLMs in the context of mental health tasks using social media data. We explore the zero-shot (ZS) and few-shot (FS) capabilities of various LLMs, including GPT-4, Llama 3, Gemini, and others, on tasks such as binary disorder detection, disorder severity evaluat…
▽ More
Large language models have shown promise in various domains, including healthcare. In this study, we conduct a comprehensive evaluation of LLMs in the context of mental health tasks using social media data. We explore the zero-shot (ZS) and few-shot (FS) capabilities of various LLMs, including GPT-4, Llama 3, Gemini, and others, on tasks such as binary disorder detection, disorder severity evaluation, and psychiatric knowledge assessment. Our evaluation involved 33 models testing 9 main prompt templates across the tasks. Key findings revealed that models like GPT-4 and Llama 3 exhibited superior performance in binary disorder detection, with accuracies reaching up to 85% on certain datasets. Moreover, prompt engineering played a crucial role in enhancing model performance. Notably, the Mixtral 8x22b model showed an improvement of over 20%, while Gemma 7b experienced a similar boost in performance. In the task of disorder severity evaluation, we observed that FS learning significantly improved the model's accuracy, highlighting the importance of contextual examples in complex assessments. Notably, the Phi-3-mini model exhibited a substantial increase in performance, with balanced accuracy improving by over 6.80% and mean average error dropping by nearly 1.3 when moving from ZS to FS learning. In the psychiatric knowledge task, recent models generally outperformed older, larger counterparts, with the Llama 3.1 405b achieving an accuracy of 91.2%. Despite promising results, our analysis identified several challenges, including variability in performance across datasets and the need for careful prompt engineering. Furthermore, the ethical guards imposed by many LLM providers hamper the ability to accurately evaluate their performance, due to tendency to not respond to potentially sensitive queries.
△ Less
Submitted 23 September, 2024;
originally announced September 2024.
-
Advancements in Gesture Recognition Techniques and Machine Learning for Enhanced Human-Robot Interaction: A Comprehensive Review
Authors:
Sajjad Hussain,
Khizer Saeed,
Almas Baimagambetov,
Shanay Rab,
Md Saad
Abstract:
In recent years robots have become an important part of our day-to-day lives with various applications. Human-robot interaction creates a positive impact in the field of robotics to interact and communicate with the robots. Gesture recognition techniques combined with machine learning algorithms have shown remarkable progress in recent years, particularly in human-robot interaction (HRI). This pap…
▽ More
In recent years robots have become an important part of our day-to-day lives with various applications. Human-robot interaction creates a positive impact in the field of robotics to interact and communicate with the robots. Gesture recognition techniques combined with machine learning algorithms have shown remarkable progress in recent years, particularly in human-robot interaction (HRI). This paper comprehensively reviews the latest advancements in gesture recognition methods and their integration with machine learning approaches to enhance HRI. Furthermore, this paper represents the vision-based gesture recognition for safe and reliable human-robot-interaction with a depth-sensing system, analyses the role of machine learning algorithms such as deep learning, reinforcement learning, and transfer learning in improving the accuracy and robustness of gesture recognition systems for effective communication between humans and robots.
△ Less
Submitted 10 September, 2024;
originally announced September 2024.
-
Simulation and optimization of computed torque control 3 DOF RRR manipulator using MATLAB
Authors:
Md Saad,
Sajjad Hussain
Abstract:
Robot manipulators have become a significant tool for production industries due to their advantages in high speed, accuracy, safety, and repeatability. This paper simulates and optimizes the design of a 3-DOF articulated robotic manipulator (RRR Configuration). The forward and inverse dynamic models are utilized. The trajectory is planned using the end effector's required initial position. A torqu…
▽ More
Robot manipulators have become a significant tool for production industries due to their advantages in high speed, accuracy, safety, and repeatability. This paper simulates and optimizes the design of a 3-DOF articulated robotic manipulator (RRR Configuration). The forward and inverse dynamic models are utilized. The trajectory is planned using the end effector's required initial position. A torque compute model is used to calculate the physical end effector's trajectory, position, and velocity. The MATLAB Simulink platform is used for all simulations of the RRR manipulator. With the aid of MATLAB, we primarily focused on manipulator control of the robot using a calculated torque control strategy to achieve the required position.
△ Less
Submitted 7 September, 2024;
originally announced September 2024.
-
Conditional Image Prior for Uncertainty Quantification in Full Waveform Inversion
Authors:
Lingyun Yang,
Omar M. Saad,
Guochen Wu,
Tariq Alkhalifah
Abstract:
Full Waveform Inversion (FWI) is a technique employed to attain a high resolution subsurface velocity model. However, FWI results are effected by the limited illumination of the model domain and the quality of that illumination, which is related to the quality of the data. Additionally, the high computational cost of FWI, compounded by the high dimensional nature of the model space, complicates th…
▽ More
Full Waveform Inversion (FWI) is a technique employed to attain a high resolution subsurface velocity model. However, FWI results are effected by the limited illumination of the model domain and the quality of that illumination, which is related to the quality of the data. Additionally, the high computational cost of FWI, compounded by the high dimensional nature of the model space, complicates the evaluation of model uncertainties. Recent work on applying neural networks to represent the velocity model for FWI demonstrated the network's ability to capture the salient features of the velocity model. The question we ask here is how reliable are these features in representing the observed data contribution within the model space (the posterior distribution). To address this question, we propose leveraging a conditional Convolutional Neural Network (CNN) as image prior to quantify the neural network uncertainties. Specifically, we add to the deep image prior concept a conditional channel, enabling the generation of various models corresponding to the specified condition. We initially train the conditional CNN to learn (store) samples from the prior distribution given by Gaussian Random Fields (GRF) based perturbations of the current velocity model. Subsequently, we use FWI to update the CNN model representation of the priors so that it can generate samples from the posterior distribution. These samples can be used to measure the approximate mean and standard deviation of the posterior distribution, as well as draw samples representing the posterior distribution. We demonstrate the effectiveness of the proposed approach on the Marmousi model and in a field data application.
△ Less
Submitted 19 August, 2024;
originally announced August 2024.
-
Modality Invariant Multimodal Learning to Handle Missing Modalities: A Single-Branch Approach
Authors:
Muhammad Saad Saeed,
Shah Nawaz,
Muhammad Zaigham Zaheer,
Muhammad Haris Khan,
Karthik Nandakumar,
Muhammad Haroon Yousaf,
Hassan Sajjad,
Tom De Schepper,
Markus Schedl
Abstract:
Multimodal networks have demonstrated remarkable performance improvements over their unimodal counterparts. Existing multimodal networks are designed in a multi-branch fashion that, due to the reliance on fusion strategies, exhibit deteriorated performance if one or more modalities are missing. In this work, we propose a modality invariant multimodal learning method, which is less susceptible to t…
▽ More
Multimodal networks have demonstrated remarkable performance improvements over their unimodal counterparts. Existing multimodal networks are designed in a multi-branch fashion that, due to the reliance on fusion strategies, exhibit deteriorated performance if one or more modalities are missing. In this work, we propose a modality invariant multimodal learning method, which is less susceptible to the impact of missing modalities. It consists of a single-branch network sharing weights across multiple modalities to learn inter-modality representations to maximize performance as well as robustness to missing modalities. Extensive experiments are performed on four challenging datasets including textual-visual (UPMC Food-101, Hateful Memes, Ferramenta) and audio-visual modalities (VoxCeleb1). Our proposed method achieves superior performance when all modalities are present as well as in the case of missing modalities during training or testing compared to the existing state-of-the-art methods.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation
Authors:
Pujan Paudel,
Mohammad Hammas Saeed,
Rebecca Auger,
Chris Wells,
Gianluca Stringhini
Abstract:
Automated soft moderation systems are unable to ascertain if a post supports or refutes a false claim, resulting in a large number of contextual false positives. This limits their effectiveness, for example undermining trust in health experts by adding warnings to their posts or resorting to vague warnings instead of granular fact-checks, which result in desensitizing users. In this paper, we prop…
▽ More
Automated soft moderation systems are unable to ascertain if a post supports or refutes a false claim, resulting in a large number of contextual false positives. This limits their effectiveness, for example undermining trust in health experts by adding warnings to their posts or resorting to vague warnings instead of granular fact-checks, which result in desensitizing users. In this paper, we propose to incorporate stance detection into existing automated soft-moderation pipelines, with the goal of ruling out contextual false positives and providing more precise recommendations for social media content that should receive warnings. We develop a textual deviation task called Contrastive Textual Deviation (CTD) and show that it outperforms existing stance detection approaches when applied to soft moderation.We then integrate CTD into the stateof-the-art system for automated soft moderation Lambretta, showing that our approach can reduce contextual false positives from 20% to 2.1%, providing another important building block towards deploying reliable automated soft moderation tools on social media.
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
From Flat to Spatial: Comparison of 4 methods constructing 3D, 2 and 1/2D Models from 2D Plans with neural networks
Authors:
Jacob Sam,
Karan Patel,
Mike Saad
Abstract:
In the field of architecture, the conversion of single images into 2 and 1/2D and 3D meshes is a promising technology that enhances design visualization and efficiency. This paper evaluates four innovative methods: "One-2-3-45," "CRM: Single Image to 3D Textured Mesh with Convolutional Reconstruction Model," "Instant Mesh," and "Image-to-Mesh." These methods are at the forefront of this technology…
▽ More
In the field of architecture, the conversion of single images into 2 and 1/2D and 3D meshes is a promising technology that enhances design visualization and efficiency. This paper evaluates four innovative methods: "One-2-3-45," "CRM: Single Image to 3D Textured Mesh with Convolutional Reconstruction Model," "Instant Mesh," and "Image-to-Mesh." These methods are at the forefront of this technology, focusing on their applicability in architectural design and visualization. They streamline the creation of 3D architectural models, enabling rapid prototyping and detailed visualization from minimal initial inputs, such as photographs or simple sketches.One-2-3-45 leverages a diffusion-based approach to generate multi-view reconstructions, ensuring high geometric fidelity and texture quality. CRM utilizes a convolutional network to integrate geometric priors into its architecture, producing detailed and textured meshes quickly and efficiently. Instant Mesh combines the strengths of multi-view diffusion and sparse-view models to offer speed and scalability, suitable for diverse architectural projects. Image-to-Mesh leverages a generative adversarial network (GAN) to produce 3D meshes from single images, focusing on maintaining high texture fidelity and geometric accuracy by incorporating image and depth map data into its training process. It uses a hybrid approach that combines voxel-based representations with surface reconstruction techniques to ensure detailed and realistic 3D models.This comparative study highlights each method's contribution to reducing design cycle times, improving accuracy, and enabling flexible adaptations to various architectural styles and requirements. By providing architects with powerful tools for rapid visualization and iteration, these advancements in 3D mesh generation are set to revolutionize architectural practices.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter
Authors:
Mohammad Hammas Saeed,
Shiza Ali,
Pujan Paudel,
Jeremy Blackburn,
Gianluca Stringhini
Abstract:
Social media platforms offer unprecedented opportunities for connectivity and exchange of ideas; however, they also serve as fertile grounds for the dissemination of disinformation. Over the years, there has been a rise in state-sponsored campaigns aiming to spread disinformation and sway public opinion on sensitive topics through designated accounts, known as troll accounts. Past works on detecti…
▽ More
Social media platforms offer unprecedented opportunities for connectivity and exchange of ideas; however, they also serve as fertile grounds for the dissemination of disinformation. Over the years, there has been a rise in state-sponsored campaigns aiming to spread disinformation and sway public opinion on sensitive topics through designated accounts, known as troll accounts. Past works on detecting accounts belonging to state-backed operations focus on a single campaign. While campaign-specific detection techniques are easier to build, there is no work done on developing systems that are campaign-agnostic and offer generalized detection of troll accounts unaffected by the biases of the specific campaign they belong to. In this paper, we identify several strategies adopted across different state actors and present a system that leverages them to detect accounts from previously unseen campaigns. We study 19 state-sponsored disinformation campaigns that took place on Twitter, originating from various countries. The strategies include sending automated messages through popular scheduling services, retweeting and sharing selective content and using fake versions of verified applications for pushing content. By translating these traits into a feature set, we build a machine learning-based classifier that can correctly identify up to 94% of accounts from unseen campaigns. Additionally, we run our system in the wild and find more accounts that could potentially belong to state-backed operations. We also present case studies to highlight the similarity between the accounts found by our system and those identified by Twitter.
△ Less
Submitted 25 July, 2024;
originally announced July 2024.
-
Chameleon: Images Are What You Need For Multimodal Learning Robust To Missing Modalities
Authors:
Muhammad Irzam Liaqat,
Shah Nawaz,
Muhammad Zaigham Zaheer,
Muhammad Saad Saeed,
Hassan Sajjad,
Tom De Schepper,
Karthik Nandakumar,
Muhammad Haris Khan Markus Schedl
Abstract:
Multimodal learning has demonstrated remarkable performance improvements over unimodal architectures. However, multimodal learning methods often exhibit deteriorated performances if one or more modalities are missing. This may be attributed to the commonly used multi-branch design containing modality-specific streams making the models reliant on the availability of a complete set of modalities. In…
▽ More
Multimodal learning has demonstrated remarkable performance improvements over unimodal architectures. However, multimodal learning methods often exhibit deteriorated performances if one or more modalities are missing. This may be attributed to the commonly used multi-branch design containing modality-specific streams making the models reliant on the availability of a complete set of modalities. In this work, we propose a robust textual-visual multimodal learning method, Chameleon, that completely deviates from the conventional multi-branch design. To enable this, we present the unification of input modalities into one format by encoding textual modality into visual representations. As a result, our approach does not require modality-specific branches to learn modality-independent multimodal representations making it robust to missing modalities. Extensive experiments are performed on four popular challenging datasets including Hateful Memes, UPMC Food-101, MM-IMDb, and Ferramenta. Chameleon not only achieves superior performance when all modalities are present at train/test time but also demonstrates notable resilience in the case of missing modalities.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Robust Secure ISAC: How RSMA and Active RIS Manage Eavesdropper's Spatial Uncertainty
Authors:
A. Abdelaziz Salem,
Saeed Abdallah,
Mohamed Saad,
Khawla Alnajjar,
Mahmoud A. Albreem
Abstract:
Incorporating rate splitting multiple access (RSMA) into integrated sensing and communication (ISAC) presents a significant security challenge, particularly in scenarios where the location of a potential eavesdropper (Eve) is unidentified. Splitting users' messages into common and private streams exposes them to eavesdropping, with the common stream dedicated for sensing and accessible to multiple…
▽ More
Incorporating rate splitting multiple access (RSMA) into integrated sensing and communication (ISAC) presents a significant security challenge, particularly in scenarios where the location of a potential eavesdropper (Eve) is unidentified. Splitting users' messages into common and private streams exposes them to eavesdropping, with the common stream dedicated for sensing and accessible to multiple users. In response to this challenge, this paper proposes a novel approach that leverages active reconfigurable intelligent surface (RIS) aided beamforming and artificial noise (AN) to enhance the security of RSMA-enabled ISAC. Specifically, we first derive the ergodic private secrecy rate (EPSR) based on mathematical approximation of the average Eve channel gain. An optimization problem is then formulated to maximize the minimum EPSR, while satisfying the minimum required thresholds on ergodic common secrecy rate, radar sensing and RIS power budget. To address this non-convex problem, a novel optimization strategy is developed, whereby we alternatively optimize the transmit beamforming matrix for the common and private streams, rate splitting, AN, RIS reflection coefficient matrix, and radar receive beamformer. Successive convex approximation (SCA) and Majorization-Minimization (MM) are employed to convexify the beamforming and RIS sub-problems. Simulations are conducted to showcase the effectiveness of the proposed framework against established benchmarks.
△ Less
Submitted 21 July, 2024;
originally announced July 2024.
-
Angular dependent measurement of electron-ion recombination in liquid argon for ionization calorimetry in the ICARUS liquid argon time projection chamber
Authors:
ICARUS collaboration,
P. Abratenko,
N. Abrego-Martinez,
A. Aduszkiewic,
F. Akbar,
L. Aliaga Soplin,
M. Artero Pons,
J. Asaadi,
W. F. Badgett,
B. Baibussinov,
B. Behera,
V. Bellini,
R. Benocci,
J. Berger,
S. Berkman,
S. Bertolucci,
M. Betancourt,
M. Bonesini,
T. Boone,
B. Bottino,
A. Braggiotti,
D. Brailsford,
S. J. Brice,
V. Brio,
C. Brizzolari
, et al. (156 additional authors not shown)
Abstract:
This paper reports on a measurement of electron-ion recombination in liquid argon in the ICARUS liquid argon time projection chamber (LArTPC). A clear dependence of recombination on the angle of the ionizing particle track relative to the drift electric field is observed. An ellipsoid modified box (EMB) model of recombination describes the data across all measured angles. These measurements are us…
▽ More
This paper reports on a measurement of electron-ion recombination in liquid argon in the ICARUS liquid argon time projection chamber (LArTPC). A clear dependence of recombination on the angle of the ionizing particle track relative to the drift electric field is observed. An ellipsoid modified box (EMB) model of recombination describes the data across all measured angles. These measurements are used for the calorimetric energy scale calibration of the ICARUS TPC, which is also presented. The impact of the EMB model is studied on calorimetric particle identification, as well as muon and proton energy measurements. Accounting for the angular dependence in EMB recombination improves the accuracy and precision of these measurements.
△ Less
Submitted 9 August, 2024; v1 submitted 17 July, 2024;
originally announced July 2024.
-
Calibration and simulation of ionization signal and electronics noise in the ICARUS liquid argon time projection chamber
Authors:
ICARUS collaboration,
P. Abratenko,
N. Abrego-Martinez,
A. Aduszkiewic,
F. Akbar,
L. Aliaga Soplin,
M. Artero Pons,
J. Asaadi,
W. F. Badgett,
B. Baibussinov,
B. Behera,
V. Bellini,
R. Benocci,
J. Berger,
S. Berkman,
S. Bertolucci,
M. Betancourt,
M. Bonesini,
T. Boone,
B. Bottino,
A. Braggiotti,
D. Brailsford,
S. J. Brice,
V. Brio,
C. Brizzolari
, et al. (156 additional authors not shown)
Abstract:
The ICARUS liquid argon time projection chamber (LArTPC) neutrino detector has been taking physics data since 2022 as part of the Short-Baseline Neutrino (SBN) Program. This paper details the equalization of the response to charge in the ICARUS time projection chamber (TPC), as well as data-driven tuning of the simulation of ionization charge signals and electronics noise. The equalization procedu…
▽ More
The ICARUS liquid argon time projection chamber (LArTPC) neutrino detector has been taking physics data since 2022 as part of the Short-Baseline Neutrino (SBN) Program. This paper details the equalization of the response to charge in the ICARUS time projection chamber (TPC), as well as data-driven tuning of the simulation of ionization charge signals and electronics noise. The equalization procedure removes non-uniformities in the ICARUS TPC response to charge in space and time. This work leverages the copious number of cosmic ray muons available to ICARUS at the surface. The ionization signal shape simulation applies a novel procedure that tunes the simulation to match what is measured in data. The end result of the equalization procedure and simulation tuning allows for a comparison of charge measurements in ICARUS between Monte Carlo simulation and data, showing good performance with minimal residual bias between the two.
△ Less
Submitted 5 August, 2024; v1 submitted 16 July, 2024;
originally announced July 2024.
-
Quantum cosmology as a lattice in a box
Authors:
Mustafa Saeed,
Viqar Husain
Abstract:
We describe quantization schemes for scalar field cosmology in the metric variables with fundamental discreteness imposed with a lattice. The variables chosen for quantization determine the lattice, and each lattice produces distinct effective equations derived from semiclassical states. We show that requiring a bounce at the Planck density uniquely selects the volume lattice and gives the same ef…
▽ More
We describe quantization schemes for scalar field cosmology in the metric variables with fundamental discreteness imposed with a lattice. The variables chosen for quantization determine the lattice, and each lattice produces distinct effective equations derived from semiclassical states. We show that requiring a bounce at the Planck density uniquely selects the volume lattice and gives the same effective Friedmann equation as that obtained in loop quantum cosmology. We also present conditions for the validity of the effective equations.
△ Less
Submitted 29 July, 2024; v1 submitted 10 July, 2024;
originally announced July 2024.
-
Bilinear optimal control for chemotaxis model: The case of two-sidedly degenerate diffusion with Volume-Filling Effect
Authors:
Georges Chamoun,
Mazen Saad,
Toni Sayah,
Sarah Serhal
Abstract:
In this paper, we study an optimal control problem for a coupled non-linear system of reaction-diffusion equations with degenerate diffusion, consisting of two partial differential equations representing the density of cells and the concentration of the chemotactic agent. By controlling the concentration of the chemical substrates, this study can guide the optimal growth of cells. The novelty of t…
▽ More
In this paper, we study an optimal control problem for a coupled non-linear system of reaction-diffusion equations with degenerate diffusion, consisting of two partial differential equations representing the density of cells and the concentration of the chemotactic agent. By controlling the concentration of the chemical substrates, this study can guide the optimal growth of cells. The novelty of this work lies on the direct and dual models that remain in a weak setting, which is uncommon in the recent literature for solving optimal control systems. Moreover, it is known that the adjoint problems offer a powerful approach to quantifying the uncertainty associated with model inputs. However, these systems typically lack closed-form solutions, making it challenging to obtain weak solutions. For that, the well-posedness of the direct problem is first well guaranteed. Then, the existence of an optimal control and the first-order optimality conditions are established. Finally, weak solutions for the adjoint system to the non-linear degenerate direct model, are introduced and investigated.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Protein-environment-sensitive computational epitope accessibility analysis from antibody dose-response data
Authors:
Dominik Tschimmel,
Momina Saeed,
Maria Milani,
Steffen Waldherr,
Tim Hucho
Abstract:
Antibodies are widely used in life-sciences and medical therapy. Yet, broadly applicable methods are missing to determine, in the biological system of choice, antibody specificity and its quantitative contribution to e.g. immunofluorescence stainings. Thereby, antibody-based data often needs to be seen with caution. Here, we present a simple-to-use approach to characterize and quantify antibody bi…
▽ More
Antibodies are widely used in life-sciences and medical therapy. Yet, broadly applicable methods are missing to determine, in the biological system of choice, antibody specificity and its quantitative contribution to e.g. immunofluorescence stainings. Thereby, antibody-based data often needs to be seen with caution. Here, we present a simple-to-use approach to characterize and quantify antibody binding properties directly in the system of choice. We determine an epitope accessibility distribution in the system of interest based on a computational analysis of antibody-dilution immunofluorescence stainings. This allows the selection of specific antibodies, the choice of a dilution to maximize signal-specificity, and an improvement of signal quantification. It further expands the scope of antibody-based imaging to detect changes of the subcellular nano-environment and allows for antibody multiplexing.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
ALPINE: An adaptive language-agnostic pruning method for language models for code
Authors:
Mootez Saad,
José Antonio Hernández López,
Boqi Chen,
Dániel Varró,
Tushar Sharma
Abstract:
Language models of code have demonstrated state-of-the-art performance across various software engineering and source code analysis tasks. However, their demanding computational resource requirements and consequential environmental footprint remain as significant challenges. This work introduces ALPINE, an adaptive programming language-agnostic pruning technique designed to substantially reduce th…
▽ More
Language models of code have demonstrated state-of-the-art performance across various software engineering and source code analysis tasks. However, their demanding computational resource requirements and consequential environmental footprint remain as significant challenges. This work introduces ALPINE, an adaptive programming language-agnostic pruning technique designed to substantially reduce these models' computational overhead. The proposed method offers a pluggable layer that can be integrated with all Transformer-based models. With ALPINE, input sequences undergo adaptive compression throughout the pipeline, reaching a size up to $\times 3$ less their initial size, resulting in significantly reduced computational load. Our experiments on two software engineering tasks, defect prediction and code clone detection across three language models CodeBERT, GraphCodeBERT and UniXCoder show that ALPINE achieves up to a 50% reduction in FLOPs, a 58.1% decrease in memory footprint, and a 28.1% improvement in throughput on average. This led to a reduction in CO2 by up to $44.85$%. Importantly, it achieves the reduction in computation resources while maintaining up to 98.1% of the original predictive performance. These findings highlight the potential of ALPINE in making language models of code more resource-efficient and accessible while preserving their performance, contributing to the overall sustainability of adopting language models in software development. Also, it sheds light on redundant and noisy information in source code analysis corpora, as shown by the substantial sequence compression achieved by ALPINE.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Implicit Discourse Relation Classification For Nigerian Pidgin
Authors:
Muhammed Saeed,
Peter Bourgonje,
Vera Demberg
Abstract:
Despite attempts to make Large Language Models multi-lingual, many of the world's languages are still severely under-resourced. This widens the performance gap between NLP and AI applications aimed at well-financed, and those aimed at less-resourced languages. In this paper, we focus on Nigerian Pidgin (NP), which is spoken by nearly 100 million people, but has comparatively very few NLP resources…
▽ More
Despite attempts to make Large Language Models multi-lingual, many of the world's languages are still severely under-resourced. This widens the performance gap between NLP and AI applications aimed at well-financed, and those aimed at less-resourced languages. In this paper, we focus on Nigerian Pidgin (NP), which is spoken by nearly 100 million people, but has comparatively very few NLP resources and corpora. We address the task of Implicit Discourse Relation Classification (IDRC) and systematically compare an approach translating NP data to English and then using a well-resourced IDRC tool and back-projecting the labels versus creating a synthetic discourse corpus for NP, in which we translate PDTB and project PDTB labels, and then train an NP IDR classifier. The latter approach of learning a "native" NP classifier outperforms our baseline by 13.27\% and 33.98\% in f$_{1}$ score for 4-way and 11-way classification, respectively.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Muharaf: Manuscripts of Handwritten Arabic Dataset for Cursive Text Recognition
Authors:
Mehreen Saeed,
Adrian Chan,
Anupam Mijar,
Joseph Moukarzel,
Georges Habchi,
Carlos Younes,
Amin Elias,
Chau-Wai Wong,
Akram Khater
Abstract:
We present the Manuscripts of Handwritten Arabic~(Muharaf) dataset, which is a machine learning dataset consisting of more than 1,600 historic handwritten page images transcribed by experts in archival Arabic. Each document image is accompanied by spatial polygonal coordinates of its text lines as well as basic page elements. This dataset was compiled to advance the state of the art in handwritten…
▽ More
We present the Manuscripts of Handwritten Arabic~(Muharaf) dataset, which is a machine learning dataset consisting of more than 1,600 historic handwritten page images transcribed by experts in archival Arabic. Each document image is accompanied by spatial polygonal coordinates of its text lines as well as basic page elements. This dataset was compiled to advance the state of the art in handwritten text recognition (HTR), not only for Arabic manuscripts but also for cursive text in general. The Muharaf dataset includes diverse handwriting styles and a wide range of document types, including personal letters, diaries, notes, poems, church records, and legal correspondences. In this paper, we describe the data acquisition pipeline, notable dataset features, and statistics. We also provide a preliminary baseline result achieved by training convolutional neural networks using this data.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Adaptive Control: Algorithms, Analysis and Applications
Authors:
Ioan Doré Landau,
Rogelio Lozano,
Mohammed M Saad,
Alireza Karimi
Abstract:
Adaptive control provides techniques for adjusting control parameters in real time to maintain system performance despite unknown or changing process parameters. These methods use real data to tune controllers and adjust plant models or controller parameters. The field has progressed significantly since the 1970s, helped by digital computers. Early applications offered essential feedback, and theo…
▽ More
Adaptive control provides techniques for adjusting control parameters in real time to maintain system performance despite unknown or changing process parameters. These methods use real data to tune controllers and adjust plant models or controller parameters. The field has progressed significantly since the 1970s, helped by digital computers. Early applications offered essential feedback, and theoretical advances solved many basic problems.
This book comprehensively treats adaptive control, guiding readers from basic problems to analytical solutions with practical applications. Presenting a unified view is challenging due to various design steps and applications. However, a coherent presentation of basic techniques is now possible. The book uses a discrete-time approach to reflect the role of digital computers and shares practical experiences and understanding of different control designs.
Mathematical aspects of synthesizing and analyzing algorithms are emphasized, though they alone may not solve practical problems. The book includes applications of control techniques but stresses that a solid mathematical understanding is crucial for creatively applying them to new challenges. Mathematical synthesis and analysis are highlighted, but they must be supplemented with practical problem-solving and algorithm modifications for specific applications.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Early Stopping Criteria for Training Generative Adversarial Networks in Biomedical Imaging
Authors:
Muhammad Muneeb Saad,
Mubashir Husain Rehmani,
Ruairi O'Reilly
Abstract:
Generative Adversarial Networks (GANs) have high computational costs to train their complex architectures. Throughout the training process, GANs' output is analyzed qualitatively based on the loss and synthetic images' diversity and quality. Based on this qualitative analysis, training is manually halted once the desired synthetic images are generated. By utilizing an early stopping criterion, the…
▽ More
Generative Adversarial Networks (GANs) have high computational costs to train their complex architectures. Throughout the training process, GANs' output is analyzed qualitatively based on the loss and synthetic images' diversity and quality. Based on this qualitative analysis, training is manually halted once the desired synthetic images are generated. By utilizing an early stopping criterion, the computational cost and dependence on manual oversight can be reduced yet impacted by training problems such as mode collapse, non-convergence, and instability. This is particularly prevalent in biomedical imagery, where training problems degrade the diversity and quality of synthetic images, and the high computational cost associated with training makes complex architectures increasingly inaccessible. This work proposes a novel early stopping criteria to quantitatively detect training problems, halt training, and reduce the computational costs associated with synthesizing biomedical images. Firstly, the range of generator and discriminator loss values is investigated to assess whether mode collapse, non-convergence, and instability occur sequentially, concurrently, or interchangeably throughout the training of GANs. Secondly, utilizing these occurrences in conjunction with the Mean Structural Similarity Index (MS-SSIM) and Fréchet Inception Distance (FID) scores of synthetic images forms the basis of the proposed early stopping criteria. This work helps identify the occurrence of training problems in GANs using low-resource computational cost and reduces training time to generate diversified and high-quality synthetic images.
△ Less
Submitted 31 May, 2024;
originally announced May 2024.
-
Design of a Rectangular Linear Microstrip Patch Antenna Array for 5G Communication
Authors:
Muhammad Asfar Saeed,
Augustine O. Nwajana
Abstract:
This paper presents the design and characterization of a rectangular microstrip patch antenna array optimized for operation within the Ku-band frequency range. The antenna array is impedance-matched to 50 Ohms and utilizes a microstrip line feeding mechanism for excitation. The design maintains compact dimensions, with the overall antenna occupying an area of 29.5x7 mm. The antenna structure is mo…
▽ More
This paper presents the design and characterization of a rectangular microstrip patch antenna array optimized for operation within the Ku-band frequency range. The antenna array is impedance-matched to 50 Ohms and utilizes a microstrip line feeding mechanism for excitation. The design maintains compact dimensions, with the overall antenna occupying an area of 29.5x7 mm. The antenna structure is modelled on an R03003 substrate material, featuring a dielectric constant of 3, a low-loss tangent of 0.0009, and a thickness of 1.574 mm. The substrate is backed by a conducting ground plane, and the array consists of six radiating patch elements positioned on top. Evaluation of the designed antenna array reveals a resonant frequency of 18GHz, with a -10 dB impedance bandwidth extending over 700MHz. The antenna demonstrates a high gain of 7.51dBi, making it well-suited for applications in 5G and future communication systems. Its compact form factor, cost-effectiveness, and broad impedance and radiation coverage further underscore its potential in these domains.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Data quality control system and long-term performance monitor of the LHAASO-KM2A
Authors:
Zhen Cao,
F. Aharonian,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
W. Bian,
A. V. Bukevich,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
H. X. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. Chen
, et al. (263 additional authors not shown)
Abstract:
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To…
▽ More
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To ensure the reliability of the LHAASO-KM2A data, a three-level quality control system has been established. It is used to monitor the status of detector units, stability of reconstructed parameters and the performance of the array based on observations of the Crab Nebula and Moon shadow. This paper will introduce the control system and its application on the LHAASO-KM2A data collected from August 2021 to July 2023. During this period, the pointing and angular resolution of the array were stable. From the observations of the Moon shadow and Crab Nebula, the results achieved using the two methods are consistent with each other. According to the observation of the Crab Nebula at energies from 25 TeV to 100 TeV, the time averaged pointing errors are estimated to be $-0.003^{\circ} \pm 0.005^{\circ}$ and $0.001^{\circ} \pm 0.006^{\circ}$ in the R.A. and Dec directions, respectively.
△ Less
Submitted 13 June, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
Signal Enhancement in Distributed Acoustic Sensing Data Using a Guided Unsupervised Deep Learning Network
Authors:
Omar M. Saad,
Matteo Ravasi,
Tariq Alkhalifah
Abstract:
Distributed Acoustic Sensing (DAS) is a promising technology introducing a new paradigm in the acquisition of high-resolution seismic data. However, DAS data often show weak signals compared to the background noise, especially in tough installation environments. In this study, we propose a new approach to denoise DAS data that leverages an unsupervised deep learning (DL) model, eliminating the nee…
▽ More
Distributed Acoustic Sensing (DAS) is a promising technology introducing a new paradigm in the acquisition of high-resolution seismic data. However, DAS data often show weak signals compared to the background noise, especially in tough installation environments. In this study, we propose a new approach to denoise DAS data that leverages an unsupervised deep learning (DL) model, eliminating the need for labeled training data. The DL model aims to reconstruct the DAS signal while simultaneously attenuating DAS noise. The input DAS data undergo band-pass filtering to eliminate high-frequency content. Subsequently, a continuous wavelet transform (CWT) is performed, and the finest scale is used to guide the DL model in reconstructing the DAS signal. First, we extract 2D patches from both the band-pass filtered data and the CWT scale of the data. Then, these patches are converted using an unrolling mechanism into 1D vectors to form the input of the DL model. The architecture of the proposed DL network is composed of several fully-connected layers. A self-attention layer is further included in each layer to extract the spatial relation between the band-pass filtered data and the CWT scale. Through an iterative process, the DL model tunes its parameters to suppress DAS noise, with the band-pass filtered data serving as the target for the network. We employ the log cosh as a loss function for the DL model, enhancing its robustness against erratic noise. The denoising performance of the proposed framework is validated using field examples from the San Andreas Fault Observatory at Depth (SAFOD) and Frontier Observatory for Research in Geothermal Energy (FORGE) datasets, where the data are recorded by a fiber-optic cable. Comparative analyses against three benchmark methods reveal the robust denoising performance of the proposed framework.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Pilot Contamination in Massive MIMO Systems: Challenges and Future Prospects
Authors:
Muhammad Kamran Saeed,
Ashfaq Khokhar,
Shakil Ahmed
Abstract:
Massive multiple input multiple output (M-MIMO) technology plays a pivotal role in fifth-generation (5G) and beyond communication systems, offering a wide range of benefits, from increased spectral efficiency (SE) to enhanced energy efficiency and higher reliability. However, these advantages are contingent upon precise channel state information (CSI) availability at the base station (BS). Ensurin…
▽ More
Massive multiple input multiple output (M-MIMO) technology plays a pivotal role in fifth-generation (5G) and beyond communication systems, offering a wide range of benefits, from increased spectral efficiency (SE) to enhanced energy efficiency and higher reliability. However, these advantages are contingent upon precise channel state information (CSI) availability at the base station (BS). Ensuring precise CSI is challenging due to the constrained size of the coherence interval and the resulting limitations on pilot sequence length. Therefore, reusing pilot sequences in adjacent cells introduces pilot contamination, hindering SE enhancement. This paper reviews recent advancements and addresses research challenges in mitigating pilot contamination and improving channel estimation, categorizing the existing research into three broader categories: pilot assignment schemes, advanced signal processing methods, and advanced channel estimation techniques. Salient representative pilot mitigation/assignment techniques are analyzed and compared in each category. Lastly, possible future research directions are discussed.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Modeling Orthographic Variation Improves NLP Performance for Nigerian Pidgin
Authors:
Pin-Jie Lin,
Merel Scholman,
Muhammed Saeed,
Vera Demberg
Abstract:
Nigerian Pidgin is an English-derived contact language and is traditionally an oral language, spoken by approximately 100 million people. No orthographic standard has yet been adopted, and thus the few available Pidgin datasets that exist are characterised by noise in the form of orthographic variations. This contributes to under-performance of models in critical NLP tasks. The current work is the…
▽ More
Nigerian Pidgin is an English-derived contact language and is traditionally an oral language, spoken by approximately 100 million people. No orthographic standard has yet been adopted, and thus the few available Pidgin datasets that exist are characterised by noise in the form of orthographic variations. This contributes to under-performance of models in critical NLP tasks. The current work is the first to describe various types of orthographic variations commonly found in Nigerian Pidgin texts, and model this orthographic variation. The variations identified in the dataset form the basis of a phonetic-theoretic framework for word editing, which is used to generate orthographic variations to augment training data. We test the effect of this data augmentation on two critical NLP tasks: machine translation and sentiment analysis. The proposed variation generation framework augments the training data with new orthographic variants which are relevant for the test set but did not occur in the training set originally. Our results demonstrate the positive effect of augmenting the training data with a combination of real texts from other corpora as well as synthesized orthographic variation, resulting in performance improvements of 2.1 points in sentiment analysis and 1.4 BLEU points in translation to English.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Smart Pilot Assignment for IoT in Massive MIMO Systems: A Path Towards Scalable IoT Infrastructure
Authors:
Muhammad Kamran Saeed,
Ashfaq Khokhar
Abstract:
5G sets the foundation for an era of creativity with its faster speeds, increased data throughput, reduced latency, and enhanced IoT connectivity, all enabled by Massive MIMO (M-MIMO) technology. M-MIMO boosts network efficiency and enhances user experience by employing intelligent user scheduling. This paper presents a user scheduling scheme and pilot assignment strategy designed for IoT devices,…
▽ More
5G sets the foundation for an era of creativity with its faster speeds, increased data throughput, reduced latency, and enhanced IoT connectivity, all enabled by Massive MIMO (M-MIMO) technology. M-MIMO boosts network efficiency and enhances user experience by employing intelligent user scheduling. This paper presents a user scheduling scheme and pilot assignment strategy designed for IoT devices, emphasizing mitigating pilot contamination, a key obstacle to improving spectral efficiency (SE) and system scalability in M-MIMO networks. We utilize a user clustering-based pilot allocation scheme to boost IoT device scalability in M-MIMO systems. Additionally, our smart pilot allocation minimizes interference and enhances SE by treating pilot assignment as a graph coloring problem, optimizing it through integer linear programming (ILP). Recognizing the computational complexity of ILP, we introduced a binary search-based heuristic predicated on interference threshold to expedite the computation, while maintaining a near-optimal solution. The simulation results show a significant decrease in the required pilot overhead (about 17%), and substantial enhancement in SE (about 8-14%).
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Face-voice Association in Multilingual Environments (FAME) Challenge 2024 Evaluation Plan
Authors:
Muhammad Saad Saeed,
Shah Nawaz,
Muhammad Salman Tahir,
Rohan Kumar Das,
Muhammad Zaigham Zaheer,
Marta Moscati,
Markus Schedl,
Muhammad Haris Khan,
Karthik Nandakumar,
Muhammad Haroon Yousaf
Abstract:
The advancements of technology have led to the use of multimodal systems in various real-world applications. Among them, the audio-visual systems are one of the widely used multimodal systems. In the recent years, associating face and voice of a person has gained attention due to presence of unique correlation between them. The Face-voice Association in Multilingual Environments (FAME) Challenge 2…
▽ More
The advancements of technology have led to the use of multimodal systems in various real-world applications. Among them, the audio-visual systems are one of the widely used multimodal systems. In the recent years, associating face and voice of a person has gained attention due to presence of unique correlation between them. The Face-voice Association in Multilingual Environments (FAME) Challenge 2024 focuses on exploring face-voice association under a unique condition of multilingual scenario. This condition is inspired from the fact that half of the world's population is bilingual and most often people communicate under multilingual scenario. The challenge uses a dataset namely, Multilingual Audio-Visual (MAV-Celeb) for exploring face-voice association in multilingual environments. This report provides the details of the challenge, dataset, baselines and task details for the FAME Challenge.
△ Less
Submitted 22 July, 2024; v1 submitted 14 April, 2024;
originally announced April 2024.
-
Differential Privacy for Anomaly Detection: Analyzing the Trade-off Between Privacy and Explainability
Authors:
Fatima Ezzeddine,
Mirna Saad,
Omran Ayoub,
Davide Andreoletti,
Martin Gjoreski,
Ihab Sbeity,
Marc Langheinrich,
Silvia Giordano
Abstract:
Anomaly detection (AD), also referred to as outlier detection, is a statistical process aimed at identifying observations within a dataset that significantly deviate from the expected pattern of the majority of the data. Such a process finds wide application in various fields, such as finance and healthcare. While the primary objective of AD is to yield high detection accuracy, the requirements of…
▽ More
Anomaly detection (AD), also referred to as outlier detection, is a statistical process aimed at identifying observations within a dataset that significantly deviate from the expected pattern of the majority of the data. Such a process finds wide application in various fields, such as finance and healthcare. While the primary objective of AD is to yield high detection accuracy, the requirements of explainability and privacy are also paramount. The first ensures the transparency of the AD process, while the second guarantees that no sensitive information is leaked to untrusted parties. In this work, we exploit the trade-off of applying Explainable AI (XAI) through SHapley Additive exPlanations (SHAP) and differential privacy (DP). We perform AD with different models and on various datasets, and we thoroughly evaluate the cost of privacy in terms of decreased accuracy and explainability. Our results show that the enforcement of privacy through DP has a significant impact on detection accuracy and explainability, which depends on both the dataset and the considered AD model. We further show that the visual interpretation of explanations is also influenced by the choice of the AD algorithm.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
Quasicrystalline Spin Liquid
Authors:
Sunghoon Kim,
Mohammad Saad,
Dan Mao,
Adhip Agarwala,
Debanjan Chowdhury
Abstract:
The interplay of electronic interactions and frustration in crystalline systems leads to a panoply of correlated phases, including exotic Mott insulators with non-trivial patterns of entanglement. Disorder introduces additional quantum interference effects that can drive localization phenomena. Quasicrystals, which are neither disordered nor perfectly crystalline, are interesting playgrounds for s…
▽ More
The interplay of electronic interactions and frustration in crystalline systems leads to a panoply of correlated phases, including exotic Mott insulators with non-trivial patterns of entanglement. Disorder introduces additional quantum interference effects that can drive localization phenomena. Quasicrystals, which are neither disordered nor perfectly crystalline, are interesting playgrounds for studying the effects of interaction, frustration, and quantum interference. Here we consider a solvable example of a quantum spin liquid on a tri-coordinated quasicrystal. We extend Kitaev's original construction for the spin model to our quasicrystalline setting and perform a large scale flux-sampling to find the ground-state configuration in terms of the emergent majorana fermions and flux excitations. This reveals a fully gapped quantum spin liquid, regardless of the exchange anisotropies, accompanied by a tendency towards non-trivial (de-)localization at the edge and the bulk. The advent of moiré materials and a variety of quantum simulators provide a new platform to bring phases of quasicrystalline quantum matter to life in a controlled fashion.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
CONCORD: Towards a DSL for Configurable Graph Code Representation
Authors:
Mootez Saad,
Tushar Sharma
Abstract:
Deep learning is widely used to uncover hidden patterns in large code corpora. To achieve this, constructing a format that captures the relevant characteristics and features of source code is essential. Graph-based representations have gained attention for their ability to model structural and semantic information. However, existing tools lack flexibility in constructing graphs across different pr…
▽ More
Deep learning is widely used to uncover hidden patterns in large code corpora. To achieve this, constructing a format that captures the relevant characteristics and features of source code is essential. Graph-based representations have gained attention for their ability to model structural and semantic information. However, existing tools lack flexibility in constructing graphs across different programming languages, limiting their use. Additionally, the output of these tools often lacks interoperability and results in excessively large graphs, making graph-based neural networks training slower and less scalable.
We introduce CONCORD, a domain-specific language to build customizable graph representations. It implements reduction heuristics to reduce graphs' size complexity. We demonstrate its effectiveness in code smell detection as an illustrative use case and show that: first, CONCORD can produce code representations automatically per the specified configuration, and second, our heuristics can achieve comparable performance with significantly reduced size. CONCORD will help researchers a) create and experiment with customizable graph-based code representations for different software engineering tasks involving DL, b) reduce the engineering work to generate graph representations, c) address the issue of scalability in GNN models, and d) enhance the reproducibility of experiments in research through a standardized approach to code representation and analysis.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
A feasibility study of a thorium fueled molten salt micro modular subcritical reactor using an electron accelerator
Authors:
A. Rummana,
R. Barlow,
G. Myneni,
S. M. Saad
Abstract:
We present a design for a small subcritical molten salt thorium breeder reactor driven by an electron accelerator. Such a reactor could provide a safe and simple power source fuelled by thorium, without generating long-lived minor actinides. We use both Geant4 and MCNPX simulations to study the production of photons and photoneutrons, the criticality and the breeding in a simple conceptual design.…
▽ More
We present a design for a small subcritical molten salt thorium breeder reactor driven by an electron accelerator. Such a reactor could provide a safe and simple power source fuelled by thorium, without generating long-lived minor actinides. We use both Geant4 and MCNPX simulations to study the production of photons and photoneutrons, the criticality and the breeding in a simple conceptual design. We show that the concept is on the edge of viability.
△ Less
Submitted 25 March, 2024; v1 submitted 22 January, 2024;
originally announced January 2024.
-
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
Authors:
Bhupendra Acharya,
Muhammad Saad,
Antonio Emanuele Cinà,
Lea Schönherr,
Hoang Dai Nguyen,
Adam Oest,
Phani Vadrevu,
Thorsten Holz
Abstract:
The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrency-based technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing wallet-related issues.
In this paper, we perform a compre…
▽ More
The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrency-based technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing wallet-related issues.
In this paper, we perform a comprehensive study of cryptocurrency-based technical support scams. We present an analysis apparatus called HoneyTweet to analyze this kind of scam. Through HoneyTweet, we lure over 9K scammers by posting 25K fake wallet support tweets (so-called honey tweets). We then deploy automated systems to interact with scammers to analyze their modus operandi. In our experiments, we observe that scammers use Twitter as a starting point for the scam, after which they pivot to other communication channels (eg email, Instagram, or Telegram) to complete the fraud activity. We track scammers across those communication channels and bait them into revealing their payment methods. Based on the modes of payment, we uncover two categories of scammers that either request secret key phrase submissions from their victims or direct payments to their digital wallets. Furthermore, we obtain scam confirmation by deploying honey wallet addresses and validating private key theft. We also collaborate with the prominent payment service provider by sharing scammer data collections. The payment service provider feedback was consistent with our findings, thereby supporting our methodology and results. By consolidating our analysis across various vantage points, we provide an end-to-end scam lifecycle analysis and propose recommendations for scam mitigation.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
ArabIcros: AI-Powered Arabic Crossword Puzzle Generation for Educational Applications
Authors:
Kamyar Zeinalipour,
Mohamed Zaky Saad,
Marco Maggini,
Marco Gori
Abstract:
This paper presents the first Arabic crossword puzzle generator driven by advanced AI technology. Leveraging cutting-edge large language models including GPT4, GPT3-Davinci, GPT3-Curie, GPT3-Babbage, GPT3-Ada, and BERT, the system generates distinctive and challenging clues. Based on a dataset comprising over 50,000 clue-answer pairs, the generator employs fine-tuning, few/zero-shot learning strat…
▽ More
This paper presents the first Arabic crossword puzzle generator driven by advanced AI technology. Leveraging cutting-edge large language models including GPT4, GPT3-Davinci, GPT3-Curie, GPT3-Babbage, GPT3-Ada, and BERT, the system generates distinctive and challenging clues. Based on a dataset comprising over 50,000 clue-answer pairs, the generator employs fine-tuning, few/zero-shot learning strategies, and rigorous quality-checking protocols to enforce the generation of high-quality clue-answer pairs. Importantly, educational crosswords contribute to enhancing memory, expanding vocabulary, and promoting problem-solving skills, thereby augmenting the learning experience through a fun and engaging approach, reshaping the landscape of traditional learning methods. The overall system can be exploited as a powerful educational tool that amalgamates AI and innovative learning techniques, heralding a transformative era for Arabic crossword puzzles and the intersection of technology and education.
△ Less
Submitted 26 January, 2024; v1 submitted 3 December, 2023;
originally announced December 2023.
-
A Comparative Study of Watering Hole Attack Detection Using Supervised Neural Network
Authors:
Mst. Nishita Aktar,
Sornali Akter,
Md. Nusaim Islam Saad,
Jakir Hosen Jisun,
Kh. Mustafizur Rahman,
Md. Nazmus Sakib
Abstract:
The state of security demands innovative solutions to defend against targeted attacks due to the growing sophistication of cyber threats. This study explores the nefarious tactic known as "watering hole attacks using supervised neural networks to detect and prevent these attacks. The neural network identifies patterns in website behavior and network traffic associated with such attacks. Testing on…
▽ More
The state of security demands innovative solutions to defend against targeted attacks due to the growing sophistication of cyber threats. This study explores the nefarious tactic known as "watering hole attacks using supervised neural networks to detect and prevent these attacks. The neural network identifies patterns in website behavior and network traffic associated with such attacks. Testing on a dataset of confirmed attacks shows a 99% detection rate with a mere 0.1% false positive rate, demonstrating the model's effectiveness. In terms of prevention, the model successfully stops 95% of attacks, providing robust user protection. The study also suggests mitigation strategies, including web filtering solutions, user education, and security controls. Overall, this research presents a promising solution for countering watering hole attacks, offering strong detection, prevention, and mitigation strategies.
△ Less
Submitted 12 February, 2024; v1 submitted 25 November, 2023;
originally announced November 2023.
-
Naturalness of Attention: Revisiting Attention in Code Language Models
Authors:
Mootez Saad,
Tushar Sharma
Abstract:
Language models for code such as CodeBERT offer the capability to learn advanced source code representation, but their opacity poses barriers to understanding of captured properties. Recent attention analysis studies provide initial interpretability insights by focusing solely on attention weights rather than considering the wider context modeling of Transformers. This study aims to shed some ligh…
▽ More
Language models for code such as CodeBERT offer the capability to learn advanced source code representation, but their opacity poses barriers to understanding of captured properties. Recent attention analysis studies provide initial interpretability insights by focusing solely on attention weights rather than considering the wider context modeling of Transformers. This study aims to shed some light on the previously ignored factors of the attention mechanism beyond the attention weights. We conduct an initial empirical study analyzing both attention distributions and transformed representations in CodeBERT. Across two programming languages, Java and Python, we find that the scaled transformation norms of the input better capture syntactic structure compared to attention weights alone. Our analysis reveals characterization of how CodeBERT embeds syntactic code properties. The findings demonstrate the importance of incorporating factors beyond just attention weights for rigorously understanding neural code models. This lays the groundwork for developing more interpretable models and effective uses of attention mechanisms in program analysis.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Emulating Human Cognitive Processes for Expert-Level Medical Question-Answering with Large Language Models
Authors:
Khushboo Verma,
Marina Moore,
Stephanie Wottrich,
Karla Robles López,
Nishant Aggarwal,
Zeel Bhatt,
Aagamjit Singh,
Bradford Unroe,
Salah Basheer,
Nitish Sachdeva,
Prinka Arora,
Harmanjeet Kaur,
Tanupreet Kaur,
Tevon Hood,
Anahi Marquez,
Tushar Varshney,
Nanfu Deng,
Azaan Ramani,
Pawanraj Ishwara,
Maimoona Saeed,
Tatiana López Velarde Peña,
Bryan Barksdale,
Sushovan Guha,
Satwant Kumar
Abstract:
In response to the pressing need for advanced clinical problem-solving tools in healthcare, we introduce BooksMed, a novel framework based on a Large Language Model (LLM). BooksMed uniquely emulates human cognitive processes to deliver evidence-based and reliable responses, utilizing the GRADE (Grading of Recommendations, Assessment, Development, and Evaluations) framework to effectively quantify…
▽ More
In response to the pressing need for advanced clinical problem-solving tools in healthcare, we introduce BooksMed, a novel framework based on a Large Language Model (LLM). BooksMed uniquely emulates human cognitive processes to deliver evidence-based and reliable responses, utilizing the GRADE (Grading of Recommendations, Assessment, Development, and Evaluations) framework to effectively quantify evidence strength. For clinical decision-making to be appropriately assessed, an evaluation metric that is clinically aligned and validated is required. As a solution, we present ExpertMedQA, a multispecialty clinical benchmark comprised of open-ended, expert-level clinical questions, and validated by a diverse group of medical professionals. By demanding an in-depth understanding and critical appraisal of up-to-date clinical literature, ExpertMedQA rigorously evaluates LLM performance. BooksMed outperforms existing state-of-the-art models Med-PaLM 2, Almanac, and ChatGPT in a variety of medical scenarios. Therefore, a framework that mimics human cognitive stages could be a useful tool for providing reliable and evidence-based responses to clinical inquiries.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
Multi-parameter study for a new Ground-Based telescope in Egypt
Authors:
Mohamed S. Darwish,
Hazem Badreldin,
Nasser M. Ahmed,
Mostafa Morsy,
E. E. Kohil,
Hany M. Hassan,
I. Helmy,
Ahmed shokry,
M. A. Hassan,
S. M. Saad,
G. M. Hamed,
Z. F. Ghatass,
S. A. Ata
Abstract:
A multi-parameter analysis was conducted to evaluate the impact of meteorological parameters, night sky brightness and seismic hazard on proposed sites for the new optical/infrared Egyptian astronomical telescope. The ERA5 reanalysis data set is used to get the following meteorological parameters: Total cloud coverage fraction, precipitable water vapor, relative humidity, wind speed & direction an…
▽ More
A multi-parameter analysis was conducted to evaluate the impact of meteorological parameters, night sky brightness and seismic hazard on proposed sites for the new optical/infrared Egyptian astronomical telescope. The ERA5 reanalysis data set is used to get the following meteorological parameters: Total cloud coverage fraction, precipitable water vapor, relative humidity, wind speed & direction and Air temperature. To estimate the aerosol optical depth we used the Modern-Era Retrospective analysis for Research and Applications version 2 (MERRA-2). Light pollution over the candidate sites was measured from Visible Infrared Imaging Radiometer Suite (VIIRS) Day Night Band (DNB). The seismic input in terms of maximum acceleration and response spectra were computed using a physics-based ground motion approach to assess the seismic hazards and consequently the designation of seismic resistant structure for the proposed sites to be able to assess the seismic hazards for the candidate sites. Of the seven nominated sites, two sites are found to have the best measurements and might be considered future sites for the new Egyptian Astronomical telescope. The first site is located in the south of the Sinai peninsula, while the second one is located in the Red Sea mountains region.
△ Less
Submitted 7 October, 2023;
originally announced October 2023.
-
Mitigating Pilot Contamination and Enabling IoT Scalability in Massive MIMO Systems
Authors:
Muhammad Kamran Saeed,
Ahmed E. Kamal,
Ashfaq Khokhar
Abstract:
Massive MIMO is expected to play an important role in the development of 5G networks. This paper addresses the issue of pilot contamination and scalability in massive MIMO systems. The current practice of reusing orthogonal pilot sequences in adjacent cells leads to difficulty in differentiating incoming inter- and intra-cell pilot sequences. One possible solution is to increase the number of orth…
▽ More
Massive MIMO is expected to play an important role in the development of 5G networks. This paper addresses the issue of pilot contamination and scalability in massive MIMO systems. The current practice of reusing orthogonal pilot sequences in adjacent cells leads to difficulty in differentiating incoming inter- and intra-cell pilot sequences. One possible solution is to increase the number of orthogonal pilot sequences, which results in dedicating more space of coherence block to pilot transmission than data transmission. This, in turn, also hinders the scalability of massive MIMO systems, particularly in accommodating a large number of IoT devices within a cell. To overcome these challenges, this paper devises an innovative pilot allocation scheme based on the data transfer patterns of IoT devices. The scheme assigns orthogonal pilot sequences to clusters of devices instead of individual devices, allowing multiple devices to utilize the same pilot for periodically transmitting data. Moreover, we formulate the pilot assignment problem as a graph coloring problem and use the max k-cut graph partitioning approach to overcome the pilot contamination in a multicell massive MIMO system. The proposed scheme significantly improves the spectral efficiency and enables the scalability of massive MIMO systems; for instance, by using ten orthogonal pilot sequences, we are able to accommodate 200 devices with only a 12.5% omission rate.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Spherical Rolling Robots Design, Modeling, and Control: A Systematic Literature Review
Authors:
Aminata Diouf,
Bruno Belzile,
Maarouf Saad,
David St-Onge
Abstract:
Spherical robots have garnered increasing interest for their applications in exploration, tunnel inspection, and extraterrestrial missions. Diverse designs have emerged, including barycentric configurations, pendulum-based mechanisms, etc. In addition, a wide spectrum of control strategies has been proposed, ranging from traditional PID approaches to cutting-edge neural networks. Our systematic re…
▽ More
Spherical robots have garnered increasing interest for their applications in exploration, tunnel inspection, and extraterrestrial missions. Diverse designs have emerged, including barycentric configurations, pendulum-based mechanisms, etc. In addition, a wide spectrum of control strategies has been proposed, ranging from traditional PID approaches to cutting-edge neural networks. Our systematic review aims to comprehensively identify and categorize locomotion systems and control schemes employed by spherical robots, spanning the years 1996 to 2023. A meticulous search across five databases yielded a dataset of 3189 records. As a result of our exhaustive analysis, we identified a collection of novel designs and control strategies. Leveraging the insights garnered, we provide valuable recommendations for optimizing the design and control aspects of spherical robots, supporting both novel design endeavors and the advancement of field deployments. Furthermore, we illuminate key research directions that hold the potential to unlock the full capabilities of spherical robots
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
Adaptive Input-image Normalization for Solving the Mode Collapse Problem in GAN-based X-ray Images
Authors:
Muhammad Muneeb Saad,
Mubashir Husain Rehmani,
Ruairi O'Reilly
Abstract:
Biomedical image datasets can be imbalanced due to the rarity of targeted diseases. Generative Adversarial Networks play a key role in addressing this imbalance by enabling the generation of synthetic images to augment datasets. It is important to generate synthetic images that incorporate a diverse range of features to accurately represent the distribution of features present in the training imag…
▽ More
Biomedical image datasets can be imbalanced due to the rarity of targeted diseases. Generative Adversarial Networks play a key role in addressing this imbalance by enabling the generation of synthetic images to augment datasets. It is important to generate synthetic images that incorporate a diverse range of features to accurately represent the distribution of features present in the training imagery. Furthermore, the absence of diverse features in synthetic images can degrade the performance of machine learning classifiers. The mode collapse problem impacts Generative Adversarial Networks' capacity to generate diversified images. Mode collapse comes in two varieties: intra-class and inter-class. In this paper, both varieties of the mode collapse problem are investigated, and their subsequent impact on the diversity of synthetic X-ray images is evaluated. This work contributes an empirical demonstration of the benefits of integrating the adaptive input-image normalization with the Deep Convolutional GAN and Auxiliary Classifier GAN to alleviate the mode collapse problems. Synthetically generated images are utilized for data augmentation and training a Vision Transformer model. The classification performance of the model is evaluated using accuracy, recall, and precision scores. Results demonstrate that the DCGAN and the ACGAN with adaptive input-image normalization outperform the DCGAN and ACGAN with un-normalized X-ray images as evidenced by the superior diversity scores and classification scores.
△ Less
Submitted 29 April, 2024; v1 submitted 21 September, 2023;
originally announced September 2023.
-
TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities
Authors:
Mohammad Hammas Saeed,
Kostantinos Papadamou,
Jeremy Blackburn,
Emiliano De Cristofaro,
Gianluca Stringhini
Abstract:
Alas, coordinated hate attacks, or raids, are becoming increasingly common online. In a nutshell, these are perpetrated by a group of aggressors who organize and coordinate operations on a platform (e.g., 4chan) to target victims on another community (e.g., YouTube). In this paper, we focus on attributing raids to their source community, paving the way for moderation approaches that take the conte…
▽ More
Alas, coordinated hate attacks, or raids, are becoming increasingly common online. In a nutshell, these are perpetrated by a group of aggressors who organize and coordinate operations on a platform (e.g., 4chan) to target victims on another community (e.g., YouTube). In this paper, we focus on attributing raids to their source community, paving the way for moderation approaches that take the context (and potentially the motivation) of an attack into consideration. We present TUBERAIDER, an attribution system achieving over 75% accuracy in detecting and attributing coordinated hate attacks on YouTube videos. We instantiate it using links to YouTube videos shared on 4chan's /pol/ board, r/The_Donald, and 16 Incels-related subreddits. We use a peak detector to identify a rise in the comment activity of a YouTube video, which signals that an attack may be occurring. We then train a machine learning classifier based on the community language (i.e., TF-IDF scores of relevant keywords) to perform the attribution. We test TUBERAIDER in the wild and present a few case studies of actual aggression attacks identified by it to showcase its effectiveness.
△ Less
Submitted 22 June, 2024; v1 submitted 9 August, 2023;
originally announced August 2023.
-
Assessing Intra-class Diversity and Quality of Synthetically Generated Images in a Biomedical and Non-biomedical Setting
Authors:
Muhammad Muneeb Saad,
Mubashir Husain Rehmani,
Ruairi O'Reilly
Abstract:
In biomedical image analysis, data imbalance is common across several imaging modalities. Data augmentation is one of the key solutions in addressing this limitation. Generative Adversarial Networks (GANs) are increasingly being relied upon for data augmentation tasks. Biomedical image features are sensitive to evaluating the efficacy of synthetic images. These features can have a significant impa…
▽ More
In biomedical image analysis, data imbalance is common across several imaging modalities. Data augmentation is one of the key solutions in addressing this limitation. Generative Adversarial Networks (GANs) are increasingly being relied upon for data augmentation tasks. Biomedical image features are sensitive to evaluating the efficacy of synthetic images. These features can have a significant impact on metric scores when evaluating synthetic images across different biomedical imaging modalities. Synthetically generated images can be evaluated by comparing the diversity and quality of real images. Multi-scale Structural Similarity Index Measure and Cosine Distance are used to evaluate intra-class diversity, while Frechet Inception Distance is used to evaluate the quality of synthetic images. Assessing these metrics for biomedical and non-biomedical imaging is important to investigate an informed strategy in evaluating the diversity and quality of synthetic images. In this work, an empirical assessment of these metrics is conducted for the Deep Convolutional GAN in a biomedical and non-biomedical setting. The diversity and quality of synthetic images are evaluated using different sample sizes. This research intends to investigate the variance in diversity and quality across biomedical and non-biomedical imaging modalities. Results demonstrate that the metrics scores for diversity and quality vary significantly across biomedical-to-biomedical and biomedical-to-non-biomedical imaging modalities.
△ Less
Submitted 23 July, 2023;
originally announced August 2023.
-
Lifetimes of Fine Levels of Li Atom for 20 < n < 31 by Extended Ritz Formula
Authors:
Muhammad Saeed,
Zaheer Uddin
Abstract:
Lithium and lithium-like elements look like hydrogen atoms if their two electrons and the nucleus are considered a core around which a single electron is orbiting. The energy and radii expressions for hydrogen atoms can be used for lithium and lithium-like elements; an important modification is introducing an effective principal quantum number. The effective principal quantum number differs from t…
▽ More
Lithium and lithium-like elements look like hydrogen atoms if their two electrons and the nucleus are considered a core around which a single electron is orbiting. The energy and radii expressions for hydrogen atoms can be used for lithium and lithium-like elements; an important modification is introducing an effective principal quantum number. The effective principal quantum number differs from the principal quantum number of hydrogen by the quantum defect. Quantum defect has respective values for various levels of lithium and lithium ions. In this study, we used extended Ritz formulas to calculate quantum defects required to calculate energies of ns, np, nd, and nf series. Using these energies, we calculated transition probabilities and then the lifetimes of the lithium levels. The lifetimes were calculated with the published data; an excellent agreement was recorded. The work also extended the available list of lifetimes. Forty lifetimes are new and presented for the first time. a polynomial for each of the ns, np, nd, and nf series lifetimes has been produced that fits well the lifetime values
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Mechanism of pressure sensitive adhesion in nematic elastomers
Authors:
Hongye Guo,
Mohand O. Saed,
Eugene M. Terentjev
Abstract:
Nematic liquid crystal elastomers (LCEs) have anomalously high vibration damping, and it has been assumed this is the cause of their anomalously high pressure-sensitive adhesion (PSA). Here we investigate the mechanism behind this enhanced PSA by first preparing thin adhesive tapes with LCE of varying crosslinking density, characterizing their material and surface properties, and then studying the…
▽ More
Nematic liquid crystal elastomers (LCEs) have anomalously high vibration damping, and it has been assumed this is the cause of their anomalously high pressure-sensitive adhesion (PSA). Here we investigate the mechanism behind this enhanced PSA by first preparing thin adhesive tapes with LCE of varying crosslinking density, characterizing their material and surface properties, and then studying the adhesion characteristics with a standard set of 90-deg peel, lap shear, and probe tack tests. The study confirms that the enhanced PSA is only present in (and due to) the nematic phase of the elastomer, and the strength of bonding takes over 24 hours to fully reach its maximum value. Such a long saturation time is caused by the slow relaxation of local stress and director orientation in nematic domains after pressing against the surface. We confirm this mechanism by showing that a freshly pressed and annealed tape reaches the same maximum bonding strength on cooling, when the returning nematic order is forming in its optimal configuration in the pressed film.
△ Less
Submitted 27 July, 2023;
originally announced July 2023.
-
Low-Resource Cross-Lingual Adaptive Training for Nigerian Pidgin
Authors:
Pin-Jie Lin,
Muhammed Saeed,
Ernie Chang,
Merel Scholman
Abstract:
Developing effective spoken language processing systems for low-resource languages poses several challenges due to the lack of parallel data and limited resources for fine-tuning models. In this work, we target on improving upon both text classification and translation of Nigerian Pidgin (Naija) by collecting a large-scale parallel English-Pidgin corpus and further propose a framework of cross-lin…
▽ More
Developing effective spoken language processing systems for low-resource languages poses several challenges due to the lack of parallel data and limited resources for fine-tuning models. In this work, we target on improving upon both text classification and translation of Nigerian Pidgin (Naija) by collecting a large-scale parallel English-Pidgin corpus and further propose a framework of cross-lingual adaptive training that includes both continual and task adaptive training so as to adapt a base pre-trained model to low-resource languages. Our studies show that English pre-trained language models serve as a stronger prior than multilingual language models on English-Pidgin tasks with up to 2.38 BLEU improvements; and demonstrate that augmenting orthographic data and using task adaptive training with back-translation can have a significant impact on model performance.
△ Less
Submitted 1 July, 2023;
originally announced July 2023.
-
Ising-like models on Euclidean black holes
Authors:
Mustafa Saeed,
Viqar Husain
Abstract:
We study spin models on Euclidean black hole backgrounds. These resemble the Ising model, but are inhomogeneous with two parameters, the black hole mass and the cosmological constant. We use Monte-Carlo methods to study macroscopic properties of these systems for Schwarzschild and anti-deSitter black holes in four and five dimensions for spin-1/2 and spin-1. We find in every case that increasing t…
▽ More
We study spin models on Euclidean black hole backgrounds. These resemble the Ising model, but are inhomogeneous with two parameters, the black hole mass and the cosmological constant. We use Monte-Carlo methods to study macroscopic properties of these systems for Schwarzschild and anti-deSitter black holes in four and five dimensions for spin-1/2 and spin-1. We find in every case that increasing the black hole mass causes the spins to undergo a second order phase transition from disorder to order and that the phase transition occurs at sub-Planckian black hole mass.
△ Less
Submitted 14 June, 2023;
originally announced June 2023.
-
Covariance Adaptive Best Arm Identification
Authors:
El Mehdi Saad,
Gilles Blanchard,
Nicolas Verzelen
Abstract:
We consider the problem of best arm identification in the multi-armed bandit model, under fixed confidence. Given a confidence input $δ$, the goal is to identify the arm with the highest mean reward with a probability of at least 1 -- $δ$, while minimizing the number of arm pulls. While the literature provides solutions to this problem under the assumption of independent arms distributions, we pro…
▽ More
We consider the problem of best arm identification in the multi-armed bandit model, under fixed confidence. Given a confidence input $δ$, the goal is to identify the arm with the highest mean reward with a probability of at least 1 -- $δ$, while minimizing the number of arm pulls. While the literature provides solutions to this problem under the assumption of independent arms distributions, we propose a more flexible scenario where arms can be dependent and rewards can be sampled simultaneously. This framework allows the learner to estimate the covariance among the arms distributions, enabling a more efficient identification of the best arm. The relaxed setting we propose is relevant in various applications, such as clinical trials, where similarities between patients or drugs suggest underlying correlations in the outcomes. We introduce new algorithms that adapt to the unknown covariance of the arms and demonstrate through theoretical guarantees that substantial improvement can be achieved over the standard setting. Additionally, we provide new lower bounds for the relaxed setting and present numerical simulations that support their theoretical findings.
△ Less
Submitted 20 December, 2023; v1 submitted 5 June, 2023;
originally announced June 2023.
-
Active Ranking of Experts Based on their Performances in Many Tasks
Authors:
El Mehdi Saad,
Nicolas Verzelen,
Alexandra Carpentier
Abstract:
We consider the problem of ranking n experts based on their performances on d tasks. We make a monotonicity assumption stating that for each pair of experts, one outperforms the other on all tasks. We consider the sequential setting where in each round, the learner has access to noisy evaluations of actively chosen pair of expert-task, given the information available up to the actual round. Given…
▽ More
We consider the problem of ranking n experts based on their performances on d tasks. We make a monotonicity assumption stating that for each pair of experts, one outperforms the other on all tasks. We consider the sequential setting where in each round, the learner has access to noisy evaluations of actively chosen pair of expert-task, given the information available up to the actual round. Given a confidence parameter $δ$ $\in$ (0, 1), we provide strategies allowing to recover the correct ranking of experts and develop a bound on the total number of queries made by our algorithm that hold with probability at least 1 -- $δ$. We show that our strategy is adaptive to the complexity of the problem (our bounds are instance dependent), and develop matching lower bounds up to a poly-logarithmic factor. Finally, we adapt our strategy to the relaxed problem of best expert identification and provide numerical simulation consistent with our theoretical results.
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
Softening of the Hertz indentation contact in nematic elastomers
Authors:
Ameneh Maghsoodi,
Mohand O. Saed,
Eugene M. Terentjev,
Kaushik Bhattacharya
Abstract:
Polydomain liquid crystalline (nematic) elastomers have highly unusual mechanical properties, dominated by the dramatically non-linear stress-strain response that reflects stress-induced evolution of domain patterns. Here, we study the classical Hertz indentation problem in such a material. Experimentally, we find that polydomain nematic elastomers display a smaller exponent than the classical 3/2…
▽ More
Polydomain liquid crystalline (nematic) elastomers have highly unusual mechanical properties, dominated by the dramatically non-linear stress-strain response that reflects stress-induced evolution of domain patterns. Here, we study the classical Hertz indentation problem in such a material. Experimentally, we find that polydomain nematic elastomers display a smaller exponent than the classical 3/2 in the load vs. indentation depth response. This is puzzling: asymptotically a softer stress-strain response requires a larger exponent at small loads. We resolve this by theory where three regimes are identified -- an initial elastic regime for shallow indentation that is obscured in experiment, an intermediate regime where local domain pattern evolution leads to a smaller scaling in agreement with experiments, and a final stiffening regime where the completion of local domain evolution returns the response to elastic. This three-regime structure is universal, but the intermediate exponent is not. We discuss how our work reveals a new mechanism of enhanced adhesion for pressure-sensitive adhesion of nematic elastomers.
△ Less
Submitted 29 April, 2023;
originally announced May 2023.