-
An Exploration of Effects of Dark Mode on University Students: A Human Computer Interface Analysis
Authors:
Awan Shrestha,
Sabil Shrestha,
Biplov Paneru,
Bishwash Paneru,
Sansrit Paudel,
Ashish Adhikari,
Sanjog Chhetri Sapkota
Abstract:
This research dives into exploring the dark mode effects on students of a university. Research is carried out implementing the dark mode in e-Learning sites and its impact on behavior of the users. Students are spending more time in front of the screen for their studies especially after the pandemic. The blue light from the screen during late hours affects circadian rhythm of the body which negati…
▽ More
This research dives into exploring the dark mode effects on students of a university. Research is carried out implementing the dark mode in e-Learning sites and its impact on behavior of the users. Students are spending more time in front of the screen for their studies especially after the pandemic. The blue light from the screen during late hours affects circadian rhythm of the body which negatively impacts the health of humans including eye strain and headache. The difficulty that students faced during the time of interacting with various e-Learning sites especially during late hours was analyzed using different techniques of HCI like survey, interview, evaluation methods and principles of design. Dark mode is an option which creates a pseudo inverted adaptable interface by changing brighter elements of UI into a dim-lit friendly environment. It is said that using dark mode will lessen the amount of blue light emitted and benefit students who suffer from eye strain. Students' interactions with dark mode were investigated using a survey, and an e-learning site with a dark mode theme was created. Based on the students' comments, researchers looked into the effects of dark mode on HCI in e-learning sites. The findings indicate that students have a clear preference for dark mode: 79.7% of survey participants preferred dark mode on their phones, and 61.7% said they would be interested in seeing this feature added to e-learning websites.
△ Less
Submitted 17 September, 2024;
originally announced September 2024.
-
Learning Multi-Modal Whole-Body Control for Real-World Humanoid Robots
Authors:
Pranay Dugar,
Aayam Shrestha,
Fangzhou Yu,
Bart van Marum,
Alan Fern
Abstract:
The foundational capabilities of humanoid robots should include robustly standing, walking, and mimicry of whole and partial-body motions. This work introduces the Masked Humanoid Controller (MHC), which supports all of these capabilities by tracking target trajectories over selected subsets of humanoid state variables while ensuring balance and robustness against disturbances. The MHC is trained…
▽ More
The foundational capabilities of humanoid robots should include robustly standing, walking, and mimicry of whole and partial-body motions. This work introduces the Masked Humanoid Controller (MHC), which supports all of these capabilities by tracking target trajectories over selected subsets of humanoid state variables while ensuring balance and robustness against disturbances. The MHC is trained in simulation using a carefully designed curriculum that imitates partially masked motions from a library of behaviors spanning standing, walking, optimized reference trajectories, re-targeted video clips, and human motion capture data. It also allows for combining joystick-based control with partial-body motion mimicry. We showcase simulation experiments validating the MHC's ability to execute a wide variety of behaviors from partially-specified target motions. Moreover, we demonstrate sim-to-real transfer on the real-world Digit V3 humanoid robot. To our knowledge, this is the first instance of a learned controller that can realize whole-body control of a real-world humanoid for such diverse multi-modal targets.
△ Less
Submitted 16 September, 2024; v1 submitted 30 July, 2024;
originally announced August 2024.
-
Learning Decentralized Multi-Biped Control for Payload Transport
Authors:
Bikram Pandit,
Ashutosh Gupta,
Mohitvishnu S. Gadde,
Addison Johnson,
Aayam Kumar Shrestha,
Helei Duan,
Jeremy Dao,
Alan Fern
Abstract:
Payload transport over flat terrain via multi-wheel robot carriers is well-understood, highly effective, and configurable. In this paper, our goal is to provide similar effectiveness and configurability for transport over rough terrain that is more suitable for legs rather than wheels. For this purpose, we consider multi-biped robot carriers, where wheels are replaced by multiple bipedal robots at…
▽ More
Payload transport over flat terrain via multi-wheel robot carriers is well-understood, highly effective, and configurable. In this paper, our goal is to provide similar effectiveness and configurability for transport over rough terrain that is more suitable for legs rather than wheels. For this purpose, we consider multi-biped robot carriers, where wheels are replaced by multiple bipedal robots attached to the carrier. Our main contribution is to design a decentralized controller for such systems that can be effectively applied to varying numbers and configurations of rigidly attached bipedal robots without retraining. We present a reinforcement learning approach for training the controller in simulation that supports transfer to the real world. Our experiments in simulation provide quantitative metrics showing the effectiveness of the approach over a wide variety of simulated transport scenarios. In addition, we demonstrate the controller in the real-world for systems composed of two and three Cassie robots. To our knowledge, this is the first example of a scalable multi-biped payload transport system.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Emergent Dynamics in Heterogeneous Life-Like Cellular Automata
Authors:
Aarati Shrestha,
Felix Reimers,
Sanyam Jain,
Paolo Baldini,
Michele Braccini,
Andrea Roli,
Stefano Nichele
Abstract:
The Game of Life (GoL), one well known 2D cellular automaton, does not typically ensure interesting long-term phenotypic dynamics. Therefore, while being Turing complete, GoL cannot be said to be open-ended. In this work, we extend GoL with the opportunity for local mutations, thus enabling a heterogeneous life-like cellular automaton guided by an evolutionary inner loop. Additionally, we introduc…
▽ More
The Game of Life (GoL), one well known 2D cellular automaton, does not typically ensure interesting long-term phenotypic dynamics. Therefore, while being Turing complete, GoL cannot be said to be open-ended. In this work, we extend GoL with the opportunity for local mutations, thus enabling a heterogeneous life-like cellular automaton guided by an evolutionary inner loop. Additionally, we introduce the concept of cell ageing to ensure that cell aliveness (activated by inheritance with variation, and controlled by ageing) and actual cell computation (governed by life-like rules on local neighborhoods) are kept conceptually separated. We conduct an experimental campaign to identify suitable parameters that produce long-term phenotypic dynamics and favor genotypic innovations.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Spread complexity and quantum chaos for periodically driven spin chains
Authors:
Amin A. Nizami,
Ankit W. Shrestha
Abstract:
The complexity of quantum states under dynamical evolution can be investigated by studying the spread with time of the state over a pre-defined basis. It is known that this complexity is minimised by choosing the Krylov basis, thus defining the spread complexity. We study the dynamics of spread complexity for quantum maps using the Arnoldi iterative procedure. The main illustrative quantum many-bo…
▽ More
The complexity of quantum states under dynamical evolution can be investigated by studying the spread with time of the state over a pre-defined basis. It is known that this complexity is minimised by choosing the Krylov basis, thus defining the spread complexity. We study the dynamics of spread complexity for quantum maps using the Arnoldi iterative procedure. The main illustrative quantum many-body model we use is the periodically kicked Ising spin-chain with non-integrable deformations, a chaotic system where we look at both local and non-local interactions. In the various cases we find distinctive behaviour of the Arnoldi coefficients and spread complexity for regular vs. chaotic dynamics: suppressed fluctuations in the Arnoldi coefficients as well as larger saturation value in spread complexity in the chaotic case. We compare the behaviour of the Krylov measures with that of standard spectral diagnostics of chaos. We also study the effect of changing the driving frequency on the complexity saturation.
△ Less
Submitted 3 September, 2024; v1 submitted 25 May, 2024;
originally announced May 2024.
-
Properties that allow or prohibit transferability of adversarial attacks among quantized networks
Authors:
Abhishek Shrestha,
Jürgen Großmann
Abstract:
Deep Neural Networks (DNNs) are known to be vulnerable to adversarial examples. Further, these adversarial examples are found to be transferable from the source network in which they are crafted to a black-box target network. As the trend of using deep learning on embedded devices grows, it becomes relevant to study the transferability properties of adversarial examples among compressed networks.…
▽ More
Deep Neural Networks (DNNs) are known to be vulnerable to adversarial examples. Further, these adversarial examples are found to be transferable from the source network in which they are crafted to a black-box target network. As the trend of using deep learning on embedded devices grows, it becomes relevant to study the transferability properties of adversarial examples among compressed networks. In this paper, we consider quantization as a network compression technique and evaluate the performance of transfer-based attacks when the source and target networks are quantized at different bitwidths. We explore how algorithm specific properties affect transferability by considering various adversarial example generation algorithms. Furthermore, we examine transferability in a more realistic scenario where the source and target networks may differ in bitwidth and other model-related properties like capacity and architecture. We find that although quantization reduces transferability, certain attack types demonstrate an ability to enhance it. Additionally, the average transferability of adversarial examples among quantized versions of a network can be used to estimate the transferability to quantized target networks with varying capacity and architecture.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
RT-utils: A Minimal Python Library for RT-struct Manipulation
Authors:
Asim Shrestha,
Adam Watkins,
Fereshteh Yousefirizi,
Arman Rahmim,
Carlos F. Uribe
Abstract:
Towards the need for automated and precise AI-based analysis of medical images, we present RT-utils, a specialized Python library tuned for the manipulation of radiotherapy (RT) structures stored in DICOM format. RT-utils excels in converting the polygon contours into binary masks, ensuring accuracy and efficiency. By converting DICOM RT structures into standardized formats such as NumPy arrays an…
▽ More
Towards the need for automated and precise AI-based analysis of medical images, we present RT-utils, a specialized Python library tuned for the manipulation of radiotherapy (RT) structures stored in DICOM format. RT-utils excels in converting the polygon contours into binary masks, ensuring accuracy and efficiency. By converting DICOM RT structures into standardized formats such as NumPy arrays and SimpleITK Images, RT-utils optimizes inputs for computational solutions such as AI-based automated segmentation techniques or radiomics analysis. Since its inception in 2020, RT-utils has been used extensively with a focus on simplifying complex data processing tasks. RT-utils offers researchers a powerful solution to enhance workflows and drive significant advancements in medical imaging.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Revisiting Reward Design and Evaluation for Robust Humanoid Standing and Walking
Authors:
Bart van Marum,
Aayam Shrestha,
Helei Duan,
Pranay Dugar,
Jeremy Dao,
Alan Fern
Abstract:
A necessary capability for humanoid robots is the ability to stand and walk while rejecting natural disturbances. Recent progress has been made using sim-to-real reinforcement learning (RL) to train such locomotion controllers, with approaches differing mainly in their reward functions. However, prior works lack a clear method to systematically test new reward functions and compare controller perf…
▽ More
A necessary capability for humanoid robots is the ability to stand and walk while rejecting natural disturbances. Recent progress has been made using sim-to-real reinforcement learning (RL) to train such locomotion controllers, with approaches differing mainly in their reward functions. However, prior works lack a clear method to systematically test new reward functions and compare controller performance through repeatable experiments. This limits our understanding of the trade-offs between approaches and hinders progress. To address this, we propose a low-cost, quantitative benchmarking method to evaluate and compare the real-world performance of standing and walking (SaW) controllers on metrics like command following, disturbance recovery, and energy efficiency. We also revisit reward function design and construct a minimally constraining reward function to train SaW controllers. We experimentally verify that our benchmarking framework can identify areas for improvement, which can be systematically addressed to enhance the policies. We also compare our new controller to state-of-the-art controllers on the Digit humanoid robot. The results provide clear quantitative trade-offs among the controllers and suggest directions for future improvements to the reward functions and expansion of the benchmarks.
△ Less
Submitted 30 August, 2024; v1 submitted 29 April, 2024;
originally announced April 2024.
-
Comparative Analysis on Snowmelt-Driven Streamflow Forecasting Using Machine Learning Techniques
Authors:
Ukesh Thapa,
Bipun Man Pati,
Samit Thapa,
Dhiraj Pyakurel,
Anup Shrestha
Abstract:
The rapid advancement of machine learning techniques has led to their widespread application in various domains including water resources. However, snowmelt modeling remains an area that has not been extensively explored. In this study, we propose a state-of-the-art (SOTA) deep learning sequential model, leveraging the Temporal Convolutional Network (TCN), for snowmelt-driven discharge modeling in…
▽ More
The rapid advancement of machine learning techniques has led to their widespread application in various domains including water resources. However, snowmelt modeling remains an area that has not been extensively explored. In this study, we propose a state-of-the-art (SOTA) deep learning sequential model, leveraging the Temporal Convolutional Network (TCN), for snowmelt-driven discharge modeling in the Himalayan basin of the Hindu Kush Himalayan Region. To evaluate the performance of our proposed model, we conducted a comparative analysis with other popular models including Support Vector Regression (SVR), Long Short Term Memory (LSTM), and Transformer. Furthermore, Nested cross-validation (CV) is used with five outer folds and three inner folds, and hyper-parameter tuning is performed on the inner folds. To evaluate the performance of the model mean absolute error (MAE), root mean square error (RMSE), R square ($R^{2}$), Kling-Gupta Efficiency (KGE), and Nash-Sutcliffe Efficiency (NSE) are computed for each outer fold. The average metrics revealed that TCN outperformed the other models, with an average MAE of 0.011, RMSE of 0.023, $R^{2}$ of 0.991, KGE of 0.992, and NSE of 0.991. The findings of this study demonstrate the effectiveness of the deep learning model as compared to traditional machine learning approaches for snowmelt-driven streamflow forecasting. Moreover, the superior performance of TCN highlights its potential as a promising deep learning model for similar hydrological applications.
△ Less
Submitted 23 April, 2024; v1 submitted 20 April, 2024;
originally announced April 2024.
-
AI-Assisted Cervical Cancer Screening
Authors:
Kanchan Poudel,
Lisasha Poudel,
Prabin Raj Shakya,
Atit Poudel,
Archana Shrestha,
Bishesh Khanal
Abstract:
Visual Inspection with Acetic Acid (VIA) remains the most feasible cervical cancer screening test in resource-constrained settings of low- and middle-income countries (LMICs), which are often performed screening camps or primary/community health centers by nurses instead of the preferred but unavailable expert Gynecologist. To address the highly subjective nature of the test, various handheld devi…
▽ More
Visual Inspection with Acetic Acid (VIA) remains the most feasible cervical cancer screening test in resource-constrained settings of low- and middle-income countries (LMICs), which are often performed screening camps or primary/community health centers by nurses instead of the preferred but unavailable expert Gynecologist. To address the highly subjective nature of the test, various handheld devices integrating cameras or smartphones have been recently explored to capture cervical images during VIA and aid decision-making via telemedicine or AI models. Most studies proposing AI models retrospectively use a relatively small number of already collected images from specific devices, digital cameras, or smartphones; the challenges and protocol for quality image acquisition during VIA in resource-constrained camp settings, challenges in getting gold standard, data imbalance, etc. are often overlooked. We present a novel approach and describe the end-to-end design process to build a robust smartphone-based AI-assisted system that does not require buying a separate integrated device: the proposed protocol for quality image acquisition in resource-constrained settings, dataset collected from 1,430 women during VIA performed by nurses in screening camps, preprocessing pipeline, and training and evaluation of a deep-learning-based classification model aimed to identify (pre)cancerous lesions. Our work shows that the readily available smartphones and a suitable protocol can capture the cervix images with the required details for the VIA test well; the deep-learning-based classification model provides promising results to assist nurses in VIA screening; and provides a direction for large-scale data collection and validation in resource-constrained settings.
△ Less
Submitted 4 September, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
Universal behavior in traveling wave electroosmosis
Authors:
A. Shrestha,
E. Kirkinis,
M. Olvera de la Cruz
Abstract:
Traveling wave charges lying on the insulating walls of an electrolyte-filled capillary, give rise to oscillatory modes which vanish when averaged over the period of oscillation. They also give rise to a \emph{zero mode} (a unidirectional, time-independent velocity component) which does not vanish. The latter is a nonlinear effect caused by continuous symmetry-breaking due to the quadratic nonline…
▽ More
Traveling wave charges lying on the insulating walls of an electrolyte-filled capillary, give rise to oscillatory modes which vanish when averaged over the period of oscillation. They also give rise to a \emph{zero mode} (a unidirectional, time-independent velocity component) which does not vanish. The latter is a nonlinear effect caused by continuous symmetry-breaking due to the quadratic nonlinearity associated with the electric body force in the time-dependent Stokes equations. In this paper we provide a unified view of the effects arising in traveling wave electroosmosis and establish the universal behavior exhibited by the observables. We show that the incipient velocity profiles are self-similar implying that those obtained with a single experimental configuration, can be employed again to attain further insights without the need of repeating the experiment. Certain results from the literature are recovered as special cases of our formulation and we resolve certain paradoxes having appeared in the past. We present simple theoretical expressions, depending on a single fit parameter, that reproduce these profiles, which could thus provide a rapid test of consistency between our theory and future experiment. The effect becomes more pronounced when reducing the transverse dimension of the system, relative to the velocity direction, and increasing the excitation wavelength, and can therefore be employed for unidirectional transport of electrolytes in thin and long capillaries. General relations, expressing the zero mode velocity in terms of the electric potential and the geometry of the system only, can thus be easily adopted to suit alternative experimental settings.
△ Less
Submitted 14 September, 2024; v1 submitted 27 January, 2024;
originally announced January 2024.
-
EU COST Action on future generation optical wireless communication technologies, 2nd White paper
Authors:
Z. Ghassemlooy,
M. A. Khalighi,
S. Zvanovec,
A. Shrestha,
B. Ortega,
M. Petkovic,
X. Pang,
C. Sirtori,
D. Orsucci,
A. Shrestha,
F. Moll,
G. Cossu,
V. Spirito,
M. P. Ninos,
E. Ciaramella,
J. Bas,
M. Amay,
S. Huang,
M. Safari,
T. Gutema,
W. Popoola,
Vicente Matus,
Jose Rabadan,
Rafael Perez-Jimenez,
E. Panayirci
, et al. (3 additional authors not shown)
Abstract:
NEWFOCUS is an EU COST Action targeted at exploring radical solutions that could influence the design of future wireless networks. The project aims to address some of the challenges associated with optical wireless communication (OWC) and to establish it as a complementary technology to the radio frequency (RF)-based wireless systems in order to meet the demanding requirements of the fifth generat…
▽ More
NEWFOCUS is an EU COST Action targeted at exploring radical solutions that could influence the design of future wireless networks. The project aims to address some of the challenges associated with optical wireless communication (OWC) and to establish it as a complementary technology to the radio frequency (RF)-based wireless systems in order to meet the demanding requirements of the fifth generation (5G) and the future sixth generation (6G) backhaul and access networks. Only 6G will be able to widely serve the exponential growth in connected devices (i.e., more than 500 billion) in 2030, real-time holographic communication, future virtual reality, etc. Space is emerging as the new frontier in 5 and 6G and beyond communication networks, where it offers high-speed wireless coverage to remote areas both in lands and sees. This activity is supported by the recent development of low-altitude Earth orbit satellite mega-constellations. The focus of this 2nd White Paper is on the use of OWC as an enabling technology for medium- and long-range links for deployment in (i) smart-cities and intelligent transportation systems; (ii) first- and last-mile access and backhaul/fronthaul wireless networks; (iii) hybrid free-space optics/RF adaptive wireless connections; (iv) space-to-ground, inter-satellite, ground-to-air, and air-to-air communications; and (v) underwater communications.
△ Less
Submitted 14 June, 2023;
originally announced November 2023.
-
Student Certificate Sharing System Using Blockchain and NFTs
Authors:
Prakhyat Khati,
Ajay Kumar Shrestha,
Julita Vassileva
Abstract:
In this paper, we propose a certificate sharing system based on blockchain that gives students authority and control over their academic certificates. Our strategy involves developing blockchain-based NFT certifications that can be shared with institutions or employers using blockchain addresses. Students may access the data created by each individual institute in a single platform, filter the vie…
▽ More
In this paper, we propose a certificate sharing system based on blockchain that gives students authority and control over their academic certificates. Our strategy involves developing blockchain-based NFT certifications that can be shared with institutions or employers using blockchain addresses. Students may access the data created by each individual institute in a single platform, filter the view of the relevant courses according to their requirements, and mint their certificate metadata as NFTs. This method provides accountability of access, comprehensive records that are permanently maintained in IPFS, and verifiable provenance for creating, distributing, and accessing certificates. It also makes it possible to share certificates more safely and efficiently. By incorporating trust factors through data provenance, our system provides a countermeasure against issues such as fake and duplicate certificates. It addresses the challenge of the traditional certificate verification processes, which are lengthy manual process. With this system, students can manage and validate their academic credentials from multiple institutions in one location while ensuring authenticity and confidentiality using digital signatures and hashing for data protection against unauthorized access. Overall, our suggested system ensures data safety, accountability, and confidentiality while offering a novel approach to certificate distribution.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
Enhancing Scalability and Reliability in Semi-Decentralized Federated Learning With Blockchain: Trust Penalization and Asynchronous Functionality
Authors:
Ajay Kumar Shrestha,
Faijan Ahamad Khan,
Mohammed Afaan Shaikh,
Amir Jaberzadeh,
Jason Geng
Abstract:
The paper presents an innovative approach to address the challenges of scalability and reliability in Distributed Federated Learning by leveraging the integration of blockchain technology. The paper focuses on enhancing the trustworthiness of participating nodes through a trust penalization mechanism while also enabling asynchronous functionality for efficient and robust model updates. By combinin…
▽ More
The paper presents an innovative approach to address the challenges of scalability and reliability in Distributed Federated Learning by leveraging the integration of blockchain technology. The paper focuses on enhancing the trustworthiness of participating nodes through a trust penalization mechanism while also enabling asynchronous functionality for efficient and robust model updates. By combining Semi-Decentralized Federated Learning with Blockchain (SDFL-B), the proposed system aims to create a fair, secure and transparent environment for collaborative machine learning without compromising data privacy. The research presents a comprehensive system architecture, methodologies, experimental results, and discussions that demonstrate the advantages of this novel approach in fostering scalable and reliable SDFL-B systems.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
VTON-IT: Virtual Try-On using Image Translation
Authors:
Santosh Adhikari,
Bishnu Bhusal,
Prashant Ghimire,
Anil Shrestha
Abstract:
Virtual Try-On (trying clothes virtually) is a promising application of the Generative Adversarial Network (GAN). However, it is an arduous task to transfer the desired clothing item onto the corresponding regions of a human body because of varying body size, pose, and occlusions like hair and overlapped clothes. In this paper, we try to produce photo-realistic translated images through semantic s…
▽ More
Virtual Try-On (trying clothes virtually) is a promising application of the Generative Adversarial Network (GAN). However, it is an arduous task to transfer the desired clothing item onto the corresponding regions of a human body because of varying body size, pose, and occlusions like hair and overlapped clothes. In this paper, we try to produce photo-realistic translated images through semantic segmentation and a generative adversarial architecture-based image translation network. We present a novel image-based Virtual Try-On application VTON-IT that takes an RGB image, segments desired body part, and overlays target cloth over the segmented body region. Most state-of-the-art GAN-based Virtual Try-On applications produce unaligned pixelated synthesis images on real-life test images. However, our approach generates high-resolution natural images with detailed textures on such variant images.
△ Less
Submitted 6 May, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Patterning of multicomponent elastic shells by Gaussian curvature
Authors:
Curt Waltmann,
Ahis Shrestha,
Monica Olvera de la Cruz
Abstract:
Recent findings suggest that shell protein distribution and morphology of bacterial microcompartments regulate the chemical fluxes facilitating reactions which dictate their biological function. We explore how the morphology and component patterning are coupled through the competition of mean and Gaussian bending energies in multicomponent elastic shells that form three component irregular polyhed…
▽ More
Recent findings suggest that shell protein distribution and morphology of bacterial microcompartments regulate the chemical fluxes facilitating reactions which dictate their biological function. We explore how the morphology and component patterning are coupled through the competition of mean and Gaussian bending energies in multicomponent elastic shells that form three component irregular polyhedra. We observe two softer components with lower bending rigidities allocate on the edges and vertices while the harder component occupies the faces. When subjected to a non-zero interfacial line tension, the two softer components further separate and pattern into subdomains that are mediated by the Gaussian curvature. We find that this degree of fractionation is maximized when there is a weaker line tension and when the ratio of bending rigidities between the two softer domains $\approx 2$. Our results reveal a patterning mechanism in multicomponent shells that can capture the observed morphologies of bacterial microcompartments and, moreover, can be realized in synthetic vesicles.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Blockchain-Based Federated Learning: Incentivizing Data Sharing and Penalizing Dishonest Behavior
Authors:
Amir Jaberzadeh,
Ajay Kumar Shrestha,
Faijan Ahamad Khan,
Mohammed Afaan Shaikh,
Bhargav Dave,
Jason Geng
Abstract:
With the increasing importance of data sharing for collaboration and innovation, it is becoming more important to ensure that data is managed and shared in a secure and trustworthy manner. Data governance is a common approach to managing data, but it faces many challenges such as data silos, data consistency, privacy, security, and access control. To address these challenges, this paper proposes a…
▽ More
With the increasing importance of data sharing for collaboration and innovation, it is becoming more important to ensure that data is managed and shared in a secure and trustworthy manner. Data governance is a common approach to managing data, but it faces many challenges such as data silos, data consistency, privacy, security, and access control. To address these challenges, this paper proposes a comprehensive framework that integrates data trust in federated learning with InterPlanetary File System, blockchain, and smart contracts to facilitate secure and mutually beneficial data sharing while providing incentives, access control mechanisms, and penalizing any dishonest behavior. The experimental results demonstrate that the proposed model is effective in improving the accuracy of federated learning models while ensuring the security and fairness of the data-sharing process. The research paper also presents a decentralized federated learning platform that successfully trained a CNN model on the MNIST dataset using blockchain technology. The platform enables multiple workers to train the model simultaneously while maintaining data privacy and security. The decentralized architecture and use of blockchain technology allow for efficient communication and coordination between workers. This platform has the potential to facilitate decentralized machine learning and support privacy-preserving collaboration in various domains.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
Capturing Emerging Complexity in Lenia
Authors:
Sanyam Jain,
Aarati Shrestha,
Stefano Nichele
Abstract:
This research project investigates Lenia, an artificial life platform that simulates ecosystems of digital creatures. Lenia's ecosystem consists of simple, artificial organisms that can move, consume, grow, and reproduce. The platform is important as a tool for studying artificial life and evolution, as it provides a scalable and flexible environment for creating a diverse range of organisms with…
▽ More
This research project investigates Lenia, an artificial life platform that simulates ecosystems of digital creatures. Lenia's ecosystem consists of simple, artificial organisms that can move, consume, grow, and reproduce. The platform is important as a tool for studying artificial life and evolution, as it provides a scalable and flexible environment for creating a diverse range of organisms with varying abilities and behaviors. Measuring complexity in Lenia is a key aspect of the study, which identifies the metrics for measuring long-term complex emerging behavior of rules, with the aim of evolving better Lenia behaviors which are yet not discovered. The Genetic Algorithm uses neighborhoods or kernels as genotype while keeping the rest of the parameters of Lenia as fixed, for example growth function, to produce different behaviors respective to the population and then measures fitness value to decide the complexity of the resulting behavior. First, we use Variation over Time as a fitness function where higher variance between the frames are rewarded. Second, we use Auto-encoder based fitness where variation of the list of reconstruction loss for the frames is rewarded. Third, we perform combined fitness where higher variation of the pixel density of reconstructed frames is rewarded. All three experiments are tweaked with pixel alive threshold and frames used. Finally, after performing nine experiments of each fitness for 500 generations, we pick configurations from all experiments such that there is a scope of further evolution, and run it for 2500 generations. Results show that the kernel's center of mass increases with a specific set of pixels and together with borders the kernel try to achieve a Gaussian distribution. Results are available at https://s4nyam.github.io/evolenia/
△ Less
Submitted 9 August, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
International time transfer between precise timing facilities secured with a quantum key distribution network
Authors:
Francesco Picciariello,
Francesco Vedovato,
Davide Orsucci,
Pablo Nahuel Dominguez,
Thomas Zechel,
Marco Avesani,
Matteo Padovan,
Giulio Foletto,
Luca Calderaro,
Daniele Dequal,
Amita Shrestha,
Ludwig Blumel,
Johann Furthner,
Giuseppe Vallone,
Paolo Villoresi,
Tobias D. Schmidt,
Florian Moll
Abstract:
Global Navigation Satellite Systems (GNSSs), such as GPS and Galileo, provide precise time and space coordinates globally and constitute part of the critical infrastructure of modern society. To reliably operate GNSS, a highly accurate and stable system time is required, such as the one provided by several independent clocks hosted in Precise Timing Facilities (PTFs) around the world. Periodically…
▽ More
Global Navigation Satellite Systems (GNSSs), such as GPS and Galileo, provide precise time and space coordinates globally and constitute part of the critical infrastructure of modern society. To reliably operate GNSS, a highly accurate and stable system time is required, such as the one provided by several independent clocks hosted in Precise Timing Facilities (PTFs) around the world. Periodically, the relative clock offset between PTFs is measured to have a fallback system to synchronize the GNSS satellite clocks. The security and integrity of the communication between PTFs is of paramount importance: if compromised, it could lead to disruptions to the GNSS service. Therefore, it is a compelling use-case for protection via Quantum Key Distribution (QKD), since this technology provides information-theoretic security. We have performed a field trial demonstration of such use-case by sharing encrypted time synchronization information between two PTFs, one located in Oberpfaffenhofen (Germany) and one in Matera (Italy) - more than 900km apart as the crow flies. To bridge this large distance, a satellite-QKD system is required, plus a "last-mile" terrestrial link to connect the optical ground station (OGS) to the actual location of the PTF. In our demonstration we have deployed two full QKD systems to protect the last-mile connection at both the locations and have shown via simulation that upcoming QKD satellites will be able to distribute keys between Oberpfaffenhofen and Matera exploiting already existing OGSs.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Enhanced phoretic self-propulsion of active colloids through surface charge asymmetry
Authors:
Ahis Shrestha,
Monica Olvera de la Cruz
Abstract:
Charged colloidal particles propel themselves through asymmetric fluxes of chemically generated ions on their surface. We show that asymmetry in the surface charge distribution introduces a new mode of self-phoretic motion for chemically active particles that produce ionic species. Particles of sizes smaller than or comparable to the Debye length achieve directed self-propulsion through surface ch…
▽ More
Charged colloidal particles propel themselves through asymmetric fluxes of chemically generated ions on their surface. We show that asymmetry in the surface charge distribution introduces a new mode of self-phoretic motion for chemically active particles that produce ionic species. Particles of sizes smaller than or comparable to the Debye length achieve directed self-propulsion through surface charge asymmetry even when ionic flux is uniform over the particle surface. Janus nanoparticles endowed with both surface charge and ionic flux asymmetries results in enhanced propulsion speeds of the order of $μ$m/s or higher. Our work provides a theoretical framework to quantitatively determine the velocity of asymmetrically charged nanoparticles undergoing ionic self-diffusiophoresis, and suggests an avenue for specifying surface properties that optimize and regulate self-propulsion in ionic media.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Krylov construction and complexity for driven quantum systems
Authors:
Amin A. Nizami,
Ankit W. Shrestha
Abstract:
Krylov complexity is an important dynamical quantity with relevance to the study of operator growth and quantum chaos, and has recently been much studied for various time-independent systems. We initiate the study of K-complexity in time-dependent (driven) quantum systems. For periodic time-dependent (Floquet) systems, we develop a natural method for doing the Krylov construction and then define (…
▽ More
Krylov complexity is an important dynamical quantity with relevance to the study of operator growth and quantum chaos, and has recently been much studied for various time-independent systems. We initiate the study of K-complexity in time-dependent (driven) quantum systems. For periodic time-dependent (Floquet) systems, we develop a natural method for doing the Krylov construction and then define (state and operator) K-complexity for such systems. Focusing on kicked systems, in particular the quantum kicked rotor on a torus, we provide a detailed numerical study of the time dependence of Arnoldi coefficients as well as of the K-complexity with the system coupling constant interpolating between the weak and strong coupling regime. We also study the growth of the Krylov subspace dimension as a function of the system coupling constant.
△ Less
Submitted 20 December, 2023; v1 submitted 29 April, 2023;
originally announced May 2023.
-
Color-based classification of EEG Signals for people with the severe locomotive disorder
Authors:
Ankit Shrestha,
Bikram Adhikari
Abstract:
The neurons in the brain produces electric signals and a collective firing of these electric signals gives rise to brainwaves. These brainwave signals are captured using EEG (Electroencephalogram) devices as micro voltages. These sequence of signals captured by EEG sensors have embedded features in them that can be used for classification. The signals can be used as an alternative input for people…
▽ More
The neurons in the brain produces electric signals and a collective firing of these electric signals gives rise to brainwaves. These brainwave signals are captured using EEG (Electroencephalogram) devices as micro voltages. These sequence of signals captured by EEG sensors have embedded features in them that can be used for classification. The signals can be used as an alternative input for people suffering from severe locomotive disorder.Classification of different colors can be mapped for many functions like directional movement. In this paper, raw EEG signals from NeuroSky Mindwave headset (a single electrode EEG sensor) have been classified with an attention based Deep Learning Network. Attention based LSTM Networks have been implemented for classification of two different colors and four different colors. An accuracy of 93.5\% was obtained for classification of two colors and an accuracy of 65.75\% was obtained for classifcation of four signals using the mentioned attention based LSTM network.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Task Ambiguity in Humans and Language Models
Authors:
Alex Tamkin,
Kunal Handa,
Avash Shrestha,
Noah Goodman
Abstract:
Language models have recently achieved strong performance across a wide range of NLP benchmarks. However, unlike benchmarks, real world tasks are often poorly specified, and agents must deduce the user's intended behavior from a combination of context, instructions, and examples. We investigate how both humans and models behave in the face of such task ambiguity by proposing AmbiBench, a new bench…
▽ More
Language models have recently achieved strong performance across a wide range of NLP benchmarks. However, unlike benchmarks, real world tasks are often poorly specified, and agents must deduce the user's intended behavior from a combination of context, instructions, and examples. We investigate how both humans and models behave in the face of such task ambiguity by proposing AmbiBench, a new benchmark of six ambiguously-specified classification tasks. We evaluate humans and models on AmbiBench by seeing how well they identify the intended task using 1) instructions with varying degrees of ambiguity, and 2) different numbers of labeled examples. We find that the combination of model scaling (to 175B parameters) and training with human feedback data enables models to approach or exceed the accuracy of human participants across tasks, but that either one alone is not sufficient. In addition, we show how to dramatically improve the accuracy of language models trained without large-scale human feedback training by finetuning on a small number of ambiguous in-context examples, providing a promising direction for teaching models to generalize well in the face of ambiguity.
△ Less
Submitted 20 December, 2022;
originally announced December 2022.
-
EU cost action on future generation optical wireless communication technologies -- newfocus ca19111, a white paper
Authors:
M A Khalighi,
Z Ghassemlooy,
S Zvanovec,
N Stevens,
L N Alves,
A Shrestha,
M Uysal,
A M Vegni,
P D Diamantoulakis,
V K Papanikolaou,
G K Karagiannidis,
B Ortega,
V Almenar,
O Bouchet,
L Ladid
Abstract:
The EU COST Action NEWFOCUS is focused on investigating radical solutions with the potential to impact the design of future wireless networks. It aims to address some of the challenges in OWC and establish it as an efficient technology that can satisfy the demanding requirements of backhaul and access network levels in 5G networks. This also includes the use of hybrid links that associate OWC with…
▽ More
The EU COST Action NEWFOCUS is focused on investigating radical solutions with the potential to impact the design of future wireless networks. It aims to address some of the challenges in OWC and establish it as an efficient technology that can satisfy the demanding requirements of backhaul and access network levels in 5G networks. This also includes the use of hybrid links that associate OWC with radiofrequency or wired/fiber-based technologies. The focus of this White Paper is on the use of optical wireless communication (OWC) as enabling technology in a range of areas outlined in HE's Pillar II including Health, Manufacturing, Intelligent Transportation Systems (ITS), Unmanned Aerial Vehicles and Network and Protocol.
△ Less
Submitted 18 July, 2022;
originally announced October 2022.
-
Relativistic Tight-Binding Model for Hexagonal Lattice: Application to Graphene
Authors:
Rohin Sharma,
Amit Shrestha,
Masahiko Higuchi,
Katsuhiko Higuchi,
Dipendra B. Hamal
Abstract:
A non-perturbative relativistic tight-binding (TB) approximation method applicable to crystalline material immersed in a magnetic field was developed in 2015. To apply this method to any material in the magnetic field, the electronic structure of the material in absence of a magnetic field must be calculated. In this study, we present the relativistic TB approximation method for graphene in a zero…
▽ More
A non-perturbative relativistic tight-binding (TB) approximation method applicable to crystalline material immersed in a magnetic field was developed in 2015. To apply this method to any material in the magnetic field, the electronic structure of the material in absence of a magnetic field must be calculated. In this study, we present the relativistic TB approximation method for graphene in a zero magnetic field. The Hamiltonian and overlap matrix is constructed considering the nearest neighbouring atomic interactions between the $s$ and $p$ valence orbitals, where the relativistic hopping and overlap integrals are calculated using the relativistic version of the Slater-Koster table. The method of constructing the Hamiltonian and overlap matrix and the resulting energy-band structure of graphene in the first Brillouin zone is presented in this paper. It is found that there is an appearance of a small band-gap at the $\textbf{K}$ points (also known as the spin-orbit gap) due to the relativistic effect, whose magnitude is $25$ $μ$eV.
△ Less
Submitted 24 November, 2023; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Conformal Surface Defects in Maxwell Theory are Trivial
Authors:
Christopher P. Herzog,
Abhay Shrestha
Abstract:
We consider a free Maxwell field in four dimensions in the presence of a codimension two defect. Reflection positive, codimension two defects which preserve conformal symmetry in this context are very limited. We show only generalized free fields can appear in the defect operator product expansion of the bulk Maxwell field; in particular correlation functions of these defect operators can be evalu…
▽ More
We consider a free Maxwell field in four dimensions in the presence of a codimension two defect. Reflection positive, codimension two defects which preserve conformal symmetry in this context are very limited. We show only generalized free fields can appear in the defect operator product expansion of the bulk Maxwell field; in particular correlation functions of these defect operators can be evaluated via Wick's Theorem.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
Knowledge Management for Cloud Computing Field
Authors:
Mahdi Fahmideh,
Jun Yan,
Jun Shen,
Aakash Ahmad,
Davoud Mougouei,
Anup Shrestha
Abstract:
Migration legacy systems to cloud platforms is a knowledge intensive process. There is an ever increasing body of knowledge reporting empirical scenarios of successful and problematic cloud migration. Reusing this body of knowledge, dispersed and fragmented over the academic/multi-vocal literature, has practical values to mitigate costly risks and pitfalls in further projects of legacy to-cloud an…
▽ More
Migration legacy systems to cloud platforms is a knowledge intensive process. There is an ever increasing body of knowledge reporting empirical scenarios of successful and problematic cloud migration. Reusing this body of knowledge, dispersed and fragmented over the academic/multi-vocal literature, has practical values to mitigate costly risks and pitfalls in further projects of legacy to-cloud and cloud-to-cloud migration. In line with this, knowledge management systems/platforms pertinent to cloud migration are a prime prerequisite and a strategic imperative for an organization. We have conducted a qualitative exploratory study to understand the benefits and challenges of developing Knowledge Management Systems (KMS) for cloud migration in real trials. Whilst our prototype system demonstration supported the importance and bene-fits of developing Cloud Migration KMS (CM-KMS), our semi-structured industry interview study with 11 participants highlighted challenging impediments against developing this class of KMS. As a result, this study proposes nine significant challenges that cause the abandon of the design and maintenance of CM-KMS, including continuous changes and updates, integration of knowledge, knowledge granularity, preservation of context, automation, deconstruction of traditional knowledge, dependency on experts, hybrid knowledge of both vendor-specific and vendor-neutral cloud platforms, and parsimony. Our results inform cloud architects to pay attention to adopt CM-KMS for the legacy-to-cloud migration in their organizations.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
In-Hardware Learning of Multilayer Spiking Neural Networks on a Neuromorphic Processor
Authors:
Amar Shrestha,
Haowen Fang,
Daniel Patrick Rider,
Zaidao Mei,
Qinru Qiu
Abstract:
Although widely used in machine learning, backpropagation cannot directly be applied to SNN training and is not feasible on a neuromorphic processor that emulates biological neuron and synapses. This work presents a spike-based backpropagation algorithm with biological plausible local update rules and adapts it to fit the constraint in a neuromorphic hardware. The algorithm is implemented on Intel…
▽ More
Although widely used in machine learning, backpropagation cannot directly be applied to SNN training and is not feasible on a neuromorphic processor that emulates biological neuron and synapses. This work presents a spike-based backpropagation algorithm with biological plausible local update rules and adapts it to fit the constraint in a neuromorphic hardware. The algorithm is implemented on Intel Loihi chip enabling low power in-hardware supervised online learning of multilayered SNNs for mobile applications. We test this implementation on MNIST, Fashion-MNIST, CIFAR-10 and MSTAR datasets with promising performance and energy-efficiency, and demonstrate a possibility of incremental online learning with the implementation.
△ Less
Submitted 8 May, 2021;
originally announced May 2021.
-
Reduction of g-factor due to Rashba effect in graphene
Authors:
Amit Shrestha,
Katsuhiko Higuchi,
Shunsuke Yoshida,
Masahiko Higuchi
Abstract:
Graphene is a highly promising material in the field of spin electronics. Recent experiments on electron spin resonance have observed a reduction in the g-factor of graphene. In our previous paper [J. Phys. Soc. Jpn. 88, 094707 (2019)], we demonstrated that one of sources for this reduction is the diamagnetic property of graphene. However, the diamagnetic property by itself does not fully account…
▽ More
Graphene is a highly promising material in the field of spin electronics. Recent experiments on electron spin resonance have observed a reduction in the g-factor of graphene. In our previous paper [J. Phys. Soc. Jpn. 88, 094707 (2019)], we demonstrated that one of sources for this reduction is the diamagnetic property of graphene. However, the diamagnetic property by itself does not fully account for the magnitude of the reduction observed in the experiments. In this paper, we focus on the Rashba effect, which is caused by the work function existing near the surface of graphene. The Rashba effect tilts the spin magnetic moment to the in-plane direction of the graphene sheet, potentially reducing the g-factor. We evaluate this reduction using a simple model system incorporating the Rashba and spin Zeeman effects. We then demonstrate that the resultant g-factor is in close agreement with that observed in the prior experiments, indicating that the Rashba effect is able to account for the remaining reduction in the g-factor of graphene.
△ Less
Submitted 14 July, 2021; v1 submitted 21 October, 2020;
originally announced October 2020.
-
DeepAveragers: Offline Reinforcement Learning by Solving Derived Non-Parametric MDPs
Authors:
Aayam Shrestha,
Stefan Lee,
Prasad Tadepalli,
Alan Fern
Abstract:
We study an approach to offline reinforcement learning (RL) based on optimally solving finitely-represented MDPs derived from a static dataset of experience. This approach can be applied on top of any learned representation and has the potential to easily support multiple solution objectives as well as zero-shot adjustment to changing environments and goals. Our main contribution is to introduce t…
▽ More
We study an approach to offline reinforcement learning (RL) based on optimally solving finitely-represented MDPs derived from a static dataset of experience. This approach can be applied on top of any learned representation and has the potential to easily support multiple solution objectives as well as zero-shot adjustment to changing environments and goals. Our main contribution is to introduce the Deep Averagers with Costs MDP (DAC-MDP) and to investigate its solutions for offline RL. DAC-MDPs are a non-parametric model that can leverage deep representations and account for limited data by introducing costs for exploiting under-represented parts of the model. In theory, we show conditions that allow for lower-bounding the performance of DAC-MDP solutions. We also investigate the empirical behavior in a number of environments, including those with image-based observations. Overall, the experiments demonstrate that the framework can work in practice and scale to large complex offline RL problems.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
Two Point Functions in Defect CFTs
Authors:
Christopher P. Herzog,
Abhay Shrestha
Abstract:
This paper is designed to be a practical tool for constructing and investigating two-point correlation functions in defect conformal field theory, directly in physical space, between any two bulk primaries or between a bulk primary and a defect primary, with arbitrary spin. Although geometrically elegant and ultimately a more powerful approach, the embedding space formalism gets rather cumbersome…
▽ More
This paper is designed to be a practical tool for constructing and investigating two-point correlation functions in defect conformal field theory, directly in physical space, between any two bulk primaries or between a bulk primary and a defect primary, with arbitrary spin. Although geometrically elegant and ultimately a more powerful approach, the embedding space formalism gets rather cumbersome when dealing with mixed symmetry tensors, especially in the projection to physical space. The results in this paper provide an alternative method for studying two-point correlation functions for a generic $d$-dimensional conformal field theory with a flat $p$-dimensional defect and $d-p=q$ co-dimensions. We tabulate some examples of correlation functions involving a conserved current, an energy momentum tensor and a Maxwell field strength, while analysing the constraints arising from conservation and the equations of motion. A method for obtaining bulk-to-defect correlators is also explained. Some explicit examples are considered: free scalar theory on $\mathbb{R}^p \times ({\mathbb R}^q / {\mathbb Z}_2)$ and a free four dimensional Maxwell theory on a wedge.
△ Less
Submitted 21 December, 2020; v1 submitted 10 October, 2020;
originally announced October 2020.
-
Multivariate Time Series Classification Using Spiking Neural Networks
Authors:
Haowen Fang,
Amar Shrestha,
Qinru Qiu
Abstract:
There is an increasing demand to process streams of temporal data in energy-limited scenarios such as embedded devices, driven by the advancement and expansion of Internet of Things (IoT) and Cyber-Physical Systems (CPS). Spiking neural network has drawn attention as it enables low power consumption by encoding and processing information as sparse spike events, which can be exploited for event-dri…
▽ More
There is an increasing demand to process streams of temporal data in energy-limited scenarios such as embedded devices, driven by the advancement and expansion of Internet of Things (IoT) and Cyber-Physical Systems (CPS). Spiking neural network has drawn attention as it enables low power consumption by encoding and processing information as sparse spike events, which can be exploited for event-driven computation. Recent works also show SNNs' capability to process spatial temporal information. Such advantages can be exploited by power-limited devices to process real-time sensor data. However, most existing SNN training algorithms focus on vision tasks and temporal credit assignment is not addressed. Furthermore, widely adopted rate encoding ignores temporal information, hence it's not suitable for representing time series. In this work, we present an encoding scheme to convert time series into sparse spatial temporal spike patterns. A training algorithm to classify spatial temporal patterns is also proposed. Proposed approach is evaluated on multiple time series datasets in the UCR repository and achieved performance comparable to deep neural networks.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
MAGNet: Multi-Region Attention-Assisted Grounding of Natural Language Queries at Phrase Level
Authors:
Amar Shrestha,
Krittaphat Pugdeethosapol,
Haowen Fang,
Qinru Qiu
Abstract:
Grounding free-form textual queries necessitates an understanding of these textual phrases and its relation to the visual cues to reliably reason about the described locations. Spatial attention networks are known to learn this relationship and focus its gaze on salient objects in the image. Thus, we propose to utilize spatial attention networks for image-level visual-textual fusion preserving loc…
▽ More
Grounding free-form textual queries necessitates an understanding of these textual phrases and its relation to the visual cues to reliably reason about the described locations. Spatial attention networks are known to learn this relationship and focus its gaze on salient objects in the image. Thus, we propose to utilize spatial attention networks for image-level visual-textual fusion preserving local (word) and global (phrase) information to refine region proposals with an in-network Region Proposal Network (RPN) and detect single or multiple regions for a phrase query. We focus only on the phrase query - ground truth pair (referring expression) for a model independent of the constraints of the datasets i.e. additional attributes, context etc. For such referring expression dataset ReferIt game, our Multi-region Attention-assisted Grounding network (MAGNet) achieves over 12\% improvement over the state-of-the-art. Without the context from image captions and attribute information in Flickr30k Entities, we still achieve competitive results compared to the state-of-the-art.
△ Less
Submitted 6 June, 2020;
originally announced June 2020.
-
Customer Data Sharing Platform: A Blockchain-Based Shopping Cart
Authors:
Ajay Kumar Shrestha,
Sandhya Joshi,
Julita Vassileva
Abstract:
We propose a new free eCommerce platform with blockchains that allows customers to connect to the seller directly, share personal data without losing control and ownership of it and apply it to the domain of shopping cart. Our new platform provides a solution to four important problems: private payment, ensuring privacy and user control, and incentives for sharing. It allows the trade to be open,…
▽ More
We propose a new free eCommerce platform with blockchains that allows customers to connect to the seller directly, share personal data without losing control and ownership of it and apply it to the domain of shopping cart. Our new platform provides a solution to four important problems: private payment, ensuring privacy and user control, and incentives for sharing. It allows the trade to be open, transparent with immutable transactions that can be used for settling any disputes. The paper presents a case study of applying the framework for a shopping cart as one of the enterprise nodes of MultiChain which provides trading in ethers controlled by smart contracts and also collects user profile data and allows them to receive rewards for sharing their data with other business enterprises. It tracks who shared what, with whom, when, by what means and for what purposes in a verifiable fashion. The user data from the repository is converted into an open data format and shared via stream in the blockchain so that other nodes can efficiently process and use the data. The smart contract verifies and executes the agreed terms of use of the data and transfers digital tokens as a reward to the customer. The smart contract imposes double deposit collateral to ensure that all participants act honestly.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Exploiting Neuron and Synapse Filter Dynamics in Spatial Temporal Learning of Deep Spiking Neural Network
Authors:
Haowen Fang,
Amar Shrestha,
Ziyi Zhao,
Qinru Qiu
Abstract:
The recent discovered spatial-temporal information processing capability of bio-inspired Spiking neural networks (SNN) has enabled some interesting models and applications. However designing large-scale and high-performance model is yet a challenge due to the lack of robust training algorithms. A bio-plausible SNN model with spatial-temporal property is a complex dynamic system. Each synapse and n…
▽ More
The recent discovered spatial-temporal information processing capability of bio-inspired Spiking neural networks (SNN) has enabled some interesting models and applications. However designing large-scale and high-performance model is yet a challenge due to the lack of robust training algorithms. A bio-plausible SNN model with spatial-temporal property is a complex dynamic system. Each synapse and neuron behave as filters capable of preserving temporal information. As such neuron dynamics and filter effects are ignored in existing training algorithms, the SNN downgrades into a memoryless system and loses the ability of temporal signal processing. Furthermore, spike timing plays an important role in information representation, but conventional rate-based spike coding models only consider spike trains statistically, and discard information carried by its temporal structures. To address the above issues, and exploit the temporal dynamics of SNNs, we formulate SNN as a network of infinite impulse response (IIR) filters with neuron nonlinearity. We proposed a training algorithm that is capable to learn spatial-temporal patterns by searching for the optimal synapse filter kernels and weights. The proposed model and training algorithm are applied to construct associative memories and classifiers for synthetic and public datasets including MNIST, NMNIST, DVS 128 etc.; and their accuracy outperforms state-of-art approaches.
△ Less
Submitted 25 July, 2020; v1 submitted 18 February, 2020;
originally announced March 2020.
-
High-Level Plan for Behavioral Robot Navigation with Natural Language Directions and R-NET
Authors:
Amar Shrestha,
Krittaphat Pugdeethosapol,
Haowen Fang,
Qinru Qiu
Abstract:
When the navigational environment is known, it can be represented as a graph where landmarks are nodes, the robot behaviors that move from node to node are edges, and the route is a set of behavioral instructions. The route path from source to destination can be viewed as a class of combinatorial optimization problems where the path is a sequential subset from a set of discrete items. The pointer…
▽ More
When the navigational environment is known, it can be represented as a graph where landmarks are nodes, the robot behaviors that move from node to node are edges, and the route is a set of behavioral instructions. The route path from source to destination can be viewed as a class of combinatorial optimization problems where the path is a sequential subset from a set of discrete items. The pointer network is an attention-based recurrent network that is suitable for such a task. In this paper, we utilize a modified R-NET with gated attention and self-matching attention translating natural language instructions to a high-level plan for behavioral robot navigation by developing an understanding of the behavioral navigational graph to enable the pointer network to produce a sequence of behaviors representing the path. Tests on the navigation graph dataset show that our model outperforms the state-of-the-art approach for both known and unknown environments.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM Based Study
Authors:
Ajay Kumar Shrestha,
Julita Vassileva
Abstract:
Blockchain technology has evolved as a promising means to transform data management models in many domains including healthcare, agricultural research, tourism domains etc. In the research community, a usable blockchain-based system can allow users to create a proof of ownership and provenance of the research work, share research data without losing control and ownership of it, provide incentives…
▽ More
Blockchain technology has evolved as a promising means to transform data management models in many domains including healthcare, agricultural research, tourism domains etc. In the research community, a usable blockchain-based system can allow users to create a proof of ownership and provenance of the research work, share research data without losing control and ownership of it, provide incentives for sharing and give users full transparency and control over who access their data, when and for what purpose. The initial adoption of such blockchain-based systems is necessary for continued use of the services, but their user acceptance behavioral model has not been well investigated in the literature. In this paper, we take the Technology Acceptance Model (TAM) as a foundation and extend the external constructs to uncover how the perceived ease of use, perceived usability, quality of the system and perceived enjoyment influence the intention to use the blockchain-based system. We based our study on user evaluation of a prototype of a blockchain-based research data sharing framework using a TAM validated questionnaire. Our results show that, overall, all the individual constructs of the behavior model significantly influence the intention to use the system while their collective effect is found to be insignificant. The quality of the system and the perceived enjoyment have stronger influence on the perceived usefulness. However, the effect of perceived ease of use on the perceived usefulness is not supported. Finally, we discuss the implications of our findings.
△ Less
Submitted 14 December, 2019;
originally announced January 2020.
-
User Data Sharing Frameworks: A Blockchain-Based Incentive Solution
Authors:
Ajay Kumar Shrestha,
Julita Vassileva
Abstract:
Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A platform that allows data owners to control, delete, and get rewards from sharing their data would be an important enabler of user data-sharing. We propose a usable blockchain- and smart contracts-based framework that allow…
▽ More
Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A platform that allows data owners to control, delete, and get rewards from sharing their data would be an important enabler of user data-sharing. We propose a usable blockchain- and smart contracts-based framework that allows users to store research data locally and share without losing control and ownership of it. We have created smart contracts for building automatic verification of the conditions for data access that also naturally supports building up a verifiable record of the provenance, incentives for users to share their data and accountability of access. The paper presents a review of the existing work of research data sharing, the proposed blockchain-based framework and an evaluation of the framework by measuring the transaction cost for smart contracts deployment. The results show that nodes responded quickly in all tested cases with a befitting transaction cost.
△ Less
Submitted 25 October, 2019;
originally announced October 2019.
-
Fine-grained Sentiment Classification using BERT
Authors:
Manish Munikar,
Sushil Shakya,
Aakash Shrestha
Abstract:
Sentiment classification is an important process in understanding people's perception towards a product, service, or topic. Many natural language processing models have been proposed to solve the sentiment classification problem. However, most of them have focused on binary sentiment classification. In this paper, we use a promising deep learning model called BERT to solve the fine-grained sentime…
▽ More
Sentiment classification is an important process in understanding people's perception towards a product, service, or topic. Many natural language processing models have been proposed to solve the sentiment classification problem. However, most of them have focused on binary sentiment classification. In this paper, we use a promising deep learning model called BERT to solve the fine-grained sentiment classification task. Experiments show that our model outperforms other popular models for this task without sophisticated architecture. We also demonstrate the effectiveness of transfer learning in natural language processing in the process.
△ Less
Submitted 4 October, 2019;
originally announced October 2019.
-
Performance Analysis of Spatial and Transform Filters for Efficient Image Noise Reduction
Authors:
Santosh Paudel,
Ajay Kumar Shrestha,
Pradip Singh Maharjan,
Rameshwar Rijal
Abstract:
During the acquisition of an image from its source, noise always becomes an integral part of it. Various algorithms have been used in past to denoise the images. Image denoising still has scope for improvement. Visual information transmitted in the form of digital images has become a considerable method of communication in the modern age, but the image obtained after the transmission is often corr…
▽ More
During the acquisition of an image from its source, noise always becomes an integral part of it. Various algorithms have been used in past to denoise the images. Image denoising still has scope for improvement. Visual information transmitted in the form of digital images has become a considerable method of communication in the modern age, but the image obtained after the transmission is often corrupted due to noise. In this paper, we review the existing denoising algorithms such as filtering approach and wavelets based approach and then perform their comparative study with bilateral filters. We use different noise models to describe additive and multiplicative noise in an image. Based on the samples of degraded pixel neighbourhoods as inputs, the output of an efficient filtering approach has shown a better image denoising performance. This yields promising qualitative and quantitative results of the degraded noisy images in terms of Peak Signal to Noise Ratio, Mean Square Error and Universal Quality Identifier.
△ Less
Submitted 13 September, 2019;
originally announced September 2019.
-
User-Controlled Privacy-Preserving User Profile Data Sharing based on Blockchain
Authors:
Ajay Kumar Shrestha,
Ralph Deters,
Julita Vassileva
Abstract:
The tremendous technological advancement in the last few decades has brought many enterprises to collaborate in a better way while making intelligent decisions. The use of Information Technology tools in obtaining data of people's everyday life from various autonomous data sources allowing unrestricted access to user data has emerged as an important practical issue and has given rise to legal impl…
▽ More
The tremendous technological advancement in the last few decades has brought many enterprises to collaborate in a better way while making intelligent decisions. The use of Information Technology tools in obtaining data of people's everyday life from various autonomous data sources allowing unrestricted access to user data has emerged as an important practical issue and has given rise to legal implications. Various innovative models for data sharing and management have privacy and centrality issues. To alleviate these limitations, we have incorporated blockchain in user modeling. In this paper, we constructed a decentralized data sharing architecture with MultiChain blockchain in the travel domain, which is also applicable to other similar domains including education, health, and sports. Businesses that operate in the tourism industries including travel and tour agencies, hotels and resorts, shopping malls are connected to the MultiChain and they share their user profile data via stream in the MultiChain. The paper presents the hotel booking service for an imaginary hotel as one of the enterprise nodes, which collects user profile data with proper validation and will allow users to decide which of their data to be shared thus ensuring user control over their data and the preservation of privacy. The data from the repository is converted into an open data format while sharing via stream in the blockchain so that other enterprise nodes, after receiving the data, can easily convert them and store into their own repositories. The paper presents an evaluation of the performance of the model by measuring the latency and memory consumption with three test scenarios that mostly affect the user experience. The node responded quickly in all of these cases.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Image Steganography: Protection of Digital Properties against Eavesdropping
Authors:
Ramita Maharjan,
Ajay Kumar Shrestha,
Rejina Basnet
Abstract:
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Different types of carrier file formats can be used, but digital images are the most popular ones because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others a…
▽ More
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Different types of carrier file formats can be used, but digital images are the most popular ones because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points. Many applications may require absolute invisibility of the secret information. This paper intends to give an overview of image steganography, it's usage and techniques, basically, to store the confidential information within images such as details of working strategy, secret missions, criminal and confidential information in various organizations that work for the national security such as army, police, FBI, secret service etc. We develop a desktop application that incorporates Advanced Encryption Standard for encryption of the original message, and Spatially Desynchronized Steganography Algorithm for hiding the text file inside the image.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Towards Realizing the Smart Product Traceability System
Authors:
Dharmendra Kumar Mishra,
Aicha Sekhari,
Sébastien Henry,
Dharmendra Mishra,
Yacine Ouzrout,
Ajay Shrestha,
Abdelaziz Bouras
Abstract:
The rapid technological enhancement and innovations in current days have changed people's thought. The use of Information Technology tools in people's daily life has changed their life style completely. The advent of various innovative smart products in the market has tremendous impact on people's lifestyle. They want to know their heart beat while they run, they need a smart car which makes them…
▽ More
The rapid technological enhancement and innovations in current days have changed people's thought. The use of Information Technology tools in people's daily life has changed their life style completely. The advent of various innovative smart products in the market has tremendous impact on people's lifestyle. They want to know their heart beat while they run, they need a smart car which makes them alert when they become sleepy while driving, and they need an IT tool which can make their home safer when they are out. These quests of people to the very extent have been fulfilled by development of many Meta products like wearables, smart phones, smart car etc. The concept of Meta product is based on the fact that they need to offer intelligent services to the users. In present day's Meta products market, the manufacturers have their own cloud based platform which is used by the products for which it is developed. The other products cannot use the common platform. In this paper, we propose a common cloud based platform that will be used by any Meta product's user to get different services.
△ Less
Submitted 7 November, 2018;
originally announced November 2018.
-
Scalable NoC-based Neuromorphic Hardware Learning and Inference
Authors:
Haowem Fang,
Amar Shrestha,
De Ma,
Qinru Qiu
Abstract:
Bio-inspired neuromorphic hardware is a research direction to approach brain's computational power and energy efficiency. Spiking neural networks (SNN) encode information as sparsely distributed spike trains and employ spike-timing-dependent plasticity (STDP) mechanism for learning. Existing hardware implementations of SNN are limited in scale or do not have in-hardware learning capability. In thi…
▽ More
Bio-inspired neuromorphic hardware is a research direction to approach brain's computational power and energy efficiency. Spiking neural networks (SNN) encode information as sparsely distributed spike trains and employ spike-timing-dependent plasticity (STDP) mechanism for learning. Existing hardware implementations of SNN are limited in scale or do not have in-hardware learning capability. In this work, we propose a low-cost scalable Network-on-Chip (NoC) based SNN hardware architecture with fully distributed in-hardware STDP learning capability. All hardware neurons work in parallel and communicate through the NoC. This enables chip-level interconnection, scalability and reconfigurability necessary for deploying different applications. The hardware is applied to learn MNIST digits as an evaluation of its learning capability. We explore the design space to study the trade-offs between speed, area and energy. How to use this procedure to find optimal architecture configuration is also discussed.
△ Less
Submitted 18 September, 2018;
originally announced October 2018.
-
Who is Really Affected by Fraudulent Reviews? An analysis of shilling attacks on recommender systems in real-world scenarios
Authors:
Anu Shrestha,
Francesca Spezzano,
Maria Soledad Pera
Abstract:
We present the results of an initial analysis conducted on a real-life setting to quantify the effect of shilling attacks on recommender systems. We focus on both algorithm performance as well as the types of users who are most affected by these attacks.
We present the results of an initial analysis conducted on a real-life setting to quantify the effect of shilling attacks on recommender systems. We focus on both algorithm performance as well as the types of users who are most affected by these attacks.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
DeepWalking: Enabling Smartphone-based Walking Speed Estimation Using Deep Learning
Authors:
Aawesh Shrestha,
Myounggyu Won
Abstract:
Walking speed estimation is an essential component of mobile apps in various fields such as fitness, transportation, navigation, and health-care. Most existing solutions are focused on specialized medical applications that utilize body-worn motion sensors. These approaches do not serve effectively the general use case of numerous apps where the user holding a smartphone tries to find his or her wa…
▽ More
Walking speed estimation is an essential component of mobile apps in various fields such as fitness, transportation, navigation, and health-care. Most existing solutions are focused on specialized medical applications that utilize body-worn motion sensors. These approaches do not serve effectively the general use case of numerous apps where the user holding a smartphone tries to find his or her walking speed solely based on smartphone sensors. However, existing smartphone-based approaches fail to provide acceptable precision for walking speed estimation. This leads to a question: is it possible to achieve comparable speed estimation accuracy using a smartphone over wearable sensor based obtrusive solutions?
We find the answer from advanced neural networks. In this paper, we present DeepWalking, the first deep learning-based walking speed estimation scheme for smartphone. A deep convolutional neural network (DCNN) is applied to automatically identify and extract the most effective features from the accelerometer and gyroscope data of smartphone and to train the network model for accurate speed estimation. Experiments are performed with 10 participants using a treadmill. The average root-mean-squared-error (RMSE) of estimated walking speed is 0.16m/s which is comparable to the results obtained by state-of-the-art approaches based on a number of body-worn sensors (i.e., RMSE of 0.11m/s). The results indicate that a smartphone can be a strong tool for walking speed estimation if the sensor data are effectively calibrated and supported by advanced deep learning techniques.
△ Less
Submitted 5 March, 2019; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Decoupling GPU Programming Models from Resource Management for Enhanced Programming Ease, Portability, and Performance
Authors:
Nandita Vijaykumar,
Kevin Hsieh,
Gennady Pekhimenko,
Samira Khan,
Ashish Shrestha,
Saugata Ghose,
Adwait Jog,
Phillip B. Gibbons,
Onur Mutlu
Abstract:
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of modern GPU programming models. This specification determines the parallelism, and hence performance, of the application during execution because the corresponding on-chip hardware resources are allocated a…
▽ More
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of modern GPU programming models. This specification determines the parallelism, and hence performance, of the application during execution because the corresponding on-chip hardware resources are allocated and managed based on this specification. This tight-coupling between the software-provided resource specification and resource management in hardware leads to significant challenges in programming ease, portability, and performance. Zorua is a new resource virtualization framework, that decouples the programmer-specified resource usage of a GPU application from the actual allocation in the on-chip hardware resources. Zorua enables this decoupling by virtualizing each resource transparently to the programmer.
We demonstrate that by providing the illusion of more resources than physically available via controlled and coordinated virtualization, Zorua offers several important benefits: (i) Programming Ease. Zorua eases the burden on the programmer to provide code that is tuned to efficiently utilize the physically available on-chip resources. (ii) Portability. Zorua alleviates the necessity of re-tuning an application's resource usage when porting the application across GPU generations. (iii) Performance. By dynamically allocating resources and carefully oversubscribing them when necessary, Zorua improves or retains the performance of applications that are already highly tuned to best utilize the resources.
△ Less
Submitted 2 May, 2018;
originally announced May 2018.
-
SaferCross: Enhancing Pedestrian Safety Using Embedded Sensors of Smartphone
Authors:
Myounggyu Won,
Aawesh Shrestha,
Kyung-Joon Park,
Yongsoon Eun
Abstract:
The number of pedestrian accidents continues to keep climbing. Distraction from smartphone is one of the biggest causes for pedestrian fatalities. In this paper, we develop SaferCross, a mobile system based on the embedded sensors of smartphone to improve pedestrian safety by preventing distraction from smartphone. SaferCross adopts a holistic approach by identifying and developing essential syste…
▽ More
The number of pedestrian accidents continues to keep climbing. Distraction from smartphone is one of the biggest causes for pedestrian fatalities. In this paper, we develop SaferCross, a mobile system based on the embedded sensors of smartphone to improve pedestrian safety by preventing distraction from smartphone. SaferCross adopts a holistic approach by identifying and developing essential system components that are missing in existing systems and integrating the system components into a "fully-functioning" mobile system for pedestrian safety. Specifically, we create algorithms for improving the accuracy and energy efficiency of pedestrian positioning, effectiveness of phone activity detection, and real-time risk assessment. We demonstrate that SaferCross, through systematic integration of the developed algorithms, performs situation awareness effectively and provides a timely warning to the pedestrian based on the information obtained from smartphone sensors and Direct Wi-Fi-based peer-to-peer communication with approaching cars. Extensive experiments are conducted in a department parking lot for both component-level and integrated testing. The results demonstrate that the energy efficiency and positioning accuracy of SaferCross are improved by 52% and 72% on average compared with existing solutions with missing support for positioning accuracy and energy efficiency, and the phone-viewing event detection accuracy is over 90%. The integrated test results show that SaferCross alerts the pedestrian timely with an average error of 1.6sec in comparison with the ground truth data, which can be easily compensated by configuring the system to fire an alert message a couple of seconds early.
△ Less
Submitted 26 April, 2020; v1 submitted 20 April, 2018;
originally announced May 2018.
-
Zorua: Enhancing Programming Ease, Portability, and Performance in GPUs by Decoupling Programming Models from Resource Management
Authors:
Nandita Vijaykumar,
Kevin Hsieh,
Gennady Pekhimenko,
Samira Khan,
Ashish Shrestha,
Saugata Ghose,
Phillip B. Gibbons,
Onur Mutlu
Abstract:
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of the existing GPU programming models. This specification determines the performance of the application during execution because the corresponding on-chip hardware resources are allocated and managed purely…
▽ More
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of the existing GPU programming models. This specification determines the performance of the application during execution because the corresponding on-chip hardware resources are allocated and managed purely based on this specification. This tight coupling between the software-provided resource specification and resource management in hardware leads to significant challenges in programming ease, portability, and performance, as we demonstrate in this work.
Our goal in this work is to reduce the dependence of performance on the software-provided resource specification to simultaneously alleviate the above challenges. To this end, we introduce Zorua, a new resource virtualization framework, that decouples the programmer-specified resource usage of a GPU application from the actual allocation in the on-chip hardware resources. Zorua enables this decoupling by virtualizing each resource transparently to the programmer.
We demonstrate that by providing the illusion of more resources than physically available, Zorua offers several important benefits: (i) Programming Ease: Zorua eases the burden on the programmer to provide code that is tuned to efficiently utilize the physically available on-chip resources. (ii) Portability: Zorua alleviates the necessity of re-tuning an application's resource usage when porting the application across GPU generations. (iii) Performance: By dynamically allocating resources and carefully oversubscribing them when necessary, Zorua improves or retains the performance of applications that are already highly tuned to best utilize the resources. The holistic virtualization provided by Zorua has many other potential uses which we describe in this paper.
△ Less
Submitted 7 February, 2018;
originally announced February 2018.
-
Finite subgroups of the extended modular group
Authors:
Gregory Dresden,
Prakriti Panthi,
Anukriti Shrestha,
Jiahao Zhang
Abstract:
We show that in the extended modular group PGL(2,Z) there are exactly seven finite subgroups up to conjugacy; three subgroups of size 2, one subgroup each of size 3, 4, and 6, and the trivial subgroup of size 1.
We show that in the extended modular group PGL(2,Z) there are exactly seven finite subgroups up to conjugacy; three subgroups of size 2, one subgroup each of size 3, 4, and 6, and the trivial subgroup of size 1.
△ Less
Submitted 8 February, 2019; v1 submitted 6 February, 2018;
originally announced February 2018.