-
Maximizing Blockchain Performance: Mitigating Conflicting Transactions through Parallelism and Dependency Management
Authors:
Faisal Haque Bappy,
Tarannum Shaila Zaman,
Md Sajidul Islam Sajid,
Mir Mehedi Ahsan Pritom,
Tariqul Islam
Abstract:
While blockchains initially gained popularity in the realm of cryptocurrencies, their widespread adoption is expanding beyond conventional applications, driven by the imperative need for enhanced data security. Despite providing a secure network, blockchains come with certain tradeoffs, including high latency, lower throughput, and an increased number of transaction failures. A pivotal issue contr…
▽ More
While blockchains initially gained popularity in the realm of cryptocurrencies, their widespread adoption is expanding beyond conventional applications, driven by the imperative need for enhanced data security. Despite providing a secure network, blockchains come with certain tradeoffs, including high latency, lower throughput, and an increased number of transaction failures. A pivotal issue contributing to these challenges is the improper management of "conflicting transactions", commonly referred to as "contention". When a number of pending transactions within a blockchain collide with each other, this results in a state of contention. This situation worsens network latency, leads to the wastage of system resources, and ultimately contributes to reduced throughput and higher transaction failures. In response to this issue, in this work, we present a novel blockchain scheme that integrates transaction parallelism and an intelligent dependency manager aiming to reduce the occurrence of conflicting transactions within blockchain networks. In terms of effectiveness and efficiency, experimental results show that our scheme not only mitigates the challenges posed by conflicting transactions, but also outperforms both existing parallel and non-parallel Hyperledger Fabric blockchain networks achieving higher transaction success rate, throughput, and latency. The integration of our scheme with Hyperledger Fabric appears to be a promising solution for improving the overall performance and stability of blockchain networks in real-world applications.
△ Less
Submitted 2 July, 2024; v1 submitted 1 July, 2024;
originally announced July 2024.
-
Kinetic Inductance, Quantum Geometry, and Superconductivity in Magic-Angle Twisted Bilayer Graphene
Authors:
Miuko Tanaka,
Joel Î-j. Wang,
Thao H. Dinh,
Daniel Rodan-Legrain,
Sameia Zaman,
Max Hays,
Bharath Kannan,
Aziza Almanakly,
David K. Kim,
Bethany M. Niedzielski,
Kyle Serniak,
Mollie E. Schwartz,
Kenji Watanabe,
Takashi Taniguchi,
Jeffrey A. Grover,
Terry P. Orlando,
Simon Gustavsson,
Pablo Jarillo-Herrero,
William D. Oliver
Abstract:
The physics of superconductivity in magic-angle twisted bilayer graphene (MATBG) is a topic of keen interest in moiré systems research, and it may provide insight into the pairing mechanism of other strongly correlated materials such as high-$T_{\mathrm{c}}$ superconductors. Here, we use DC-transport and microwave circuit quantum electrodynamics (cQED) to measure directly the superfluid stiffness…
▽ More
The physics of superconductivity in magic-angle twisted bilayer graphene (MATBG) is a topic of keen interest in moiré systems research, and it may provide insight into the pairing mechanism of other strongly correlated materials such as high-$T_{\mathrm{c}}$ superconductors. Here, we use DC-transport and microwave circuit quantum electrodynamics (cQED) to measure directly the superfluid stiffness of superconducting MATBG via its kinetic inductance. We find the superfluid stiffness to be much larger than expected from conventional single-band Fermi liquid theory; rather, it aligns well with theory involving quantum geometric effects that are dominant at the magic angle. The temperature dependence of the superfluid stiffness exhibits a power-law behavior, which contraindicates an isotropic BCS model; instead, the extracted power-law exponents indicate an anisotropic superconducting gap, whether interpreted using the conventional anisotropic BCS model or a quantum geometric theory of flat-band superconductivity. Moreover, the quadratic dependence of the stiffness on both DC and microwave current is consistent with Ginzburg-Landau theory. Taken together, these findings strongly suggest a connection between quantum geometry, superfluid stiffness, and unconventional superconductivity in MATBG. Finally, the combined DC-microwave measurement platform used here is applicable to the investigation of other atomically thin superconductors.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Novel Interpretable and Robust Web-based AI Platform for Phishing Email Detection
Authors:
Abdulla Al-Subaiey,
Mohammed Al-Thani,
Naser Abdullah Alam,
Kaniz Fatema Antora,
Amith Khandakar,
SM Ashfaq Uz Zaman
Abstract:
Phishing emails continue to pose a significant threat, causing financial losses and security breaches. This study addresses limitations in existing research, such as reliance on proprietary datasets and lack of real-world application, by proposing a high-performance machine learning model for email classification. Utilizing a comprehensive and largest available public dataset, the model achieves a…
▽ More
Phishing emails continue to pose a significant threat, causing financial losses and security breaches. This study addresses limitations in existing research, such as reliance on proprietary datasets and lack of real-world application, by proposing a high-performance machine learning model for email classification. Utilizing a comprehensive and largest available public dataset, the model achieves a f1 score of 0.99 and is designed for deployment within relevant applications. Additionally, Explainable AI (XAI) is integrated to enhance user trust. This research offers a practical and highly accurate solution, contributing to the fight against phishing by empowering users with a real-time web-based application for phishing email detection.
△ Less
Submitted 19 May, 2024;
originally announced May 2024.
-
"Sorry, Come Again?" Prompting -- Enhancing Comprehension and Diminishing Hallucination with [PAUSE]-injected Optimal Paraphrasing
Authors:
Vipula Rawte,
S. M Towhidul Islam Tonmoy,
S M Mehedi Zaman,
Prachi Priya,
Aman Chadha,
Amit P. Sheth,
Amitava Das
Abstract:
Hallucination has emerged as the most vulnerable aspect of contemporary Large Language Models (LLMs). In this paper, we introduce the Sorry, Come Again (SCA) prompting, aimed to avoid LLM hallucinations by enhancing comprehension through: (i) optimal paraphrasing and (ii) injecting [PAUSE] tokens to delay LLM generation. First, we provide an in-depth analysis of linguistic nuances: formality, read…
▽ More
Hallucination has emerged as the most vulnerable aspect of contemporary Large Language Models (LLMs). In this paper, we introduce the Sorry, Come Again (SCA) prompting, aimed to avoid LLM hallucinations by enhancing comprehension through: (i) optimal paraphrasing and (ii) injecting [PAUSE] tokens to delay LLM generation. First, we provide an in-depth analysis of linguistic nuances: formality, readability, and concreteness of prompts for 21 LLMs, and elucidate how these nuances contribute to hallucinated generation. Prompts with lower readability, formality, or concreteness pose comprehension challenges for LLMs, similar to those faced by humans. In such scenarios, an LLM tends to speculate and generate content based on its imagination (associative memory) to fill these information gaps. Although these speculations may occasionally align with factual information, their accuracy is not assured, often resulting in hallucination. Recent studies reveal that an LLM often neglects the middle sections of extended prompts, a phenomenon termed as lost in the middle. While a specific paraphrase may suit one LLM, the same paraphrased version may elicit a different response from another LLM. Therefore, we propose an optimal paraphrasing technique to identify the most comprehensible paraphrase of a given prompt, evaluated using Integrated Gradient (and its variations) to guarantee that the LLM accurately processes all words. While reading lengthy sentences, humans often pause at various points to better comprehend the meaning read thus far. We have fine-tuned an LLM with injected [PAUSE] tokens, allowing the LLM to pause while reading lengthier prompts. This has brought several key contributions: (i) determining the optimal position to inject [PAUSE], (ii) determining the number of [PAUSE] tokens to be inserted, and (iii) introducing reverse proxy tuning to fine-tune the LLM for [PAUSE] insertion.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
An Efficient and Scalable Auditing Scheme for Cloud Data Storage using an Enhanced B-tree
Authors:
Tariqul Islam,
Faisal Haque Bappy,
Md Nafis Ul Haque Shifat,
Farhan Ahmad,
Kamrul Hasan,
Tarannum Shaila Zaman
Abstract:
An efficient, scalable, and provably secure dynamic auditing scheme is highly desirable in the cloud storage environment for verifying the integrity of the outsourced data. Most of the existing work on remote integrity checking focuses on static archival data and therefore cannot be applied to cases where dynamic data updates are more common. Additionally, existing auditing schemes suffer from per…
▽ More
An efficient, scalable, and provably secure dynamic auditing scheme is highly desirable in the cloud storage environment for verifying the integrity of the outsourced data. Most of the existing work on remote integrity checking focuses on static archival data and therefore cannot be applied to cases where dynamic data updates are more common. Additionally, existing auditing schemes suffer from performance bottlenecks and scalability issues. To address these issues, in this paper, we present a novel dynamic auditing scheme for centralized cloud environments leveraging an enhanced version of the B-tree. Our proposed scheme achieves the immutable characteristic of a decentralized system (i.e., blockchain technology) while effectively addressing the synchronization and performance challenges of such systems. Unlike other static auditing schemes, our scheme supports dynamic insert, update, and delete operations. Also, by leveraging an enhanced B-tree, our scheme maintains a balanced tree after any alteration to a certain file, improving performance significantly. Experimental results show that our scheme outperforms both traditional Merkle Hash Tree-based centralized auditing and decentralized blockchain-based auditing schemes in terms of block modifications (e.g., insert, delete, update), block retrieval, and data verification time.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
The What, Why, and How of Context Length Extension Techniques in Large Language Models -- A Detailed Survey
Authors:
Saurav Pawar,
S. M Towhidul Islam Tonmoy,
S M Mehedi Zaman,
Vinija Jain,
Aman Chadha,
Amitava Das
Abstract:
The advent of Large Language Models (LLMs) represents a notable breakthrough in Natural Language Processing (NLP), contributing to substantial progress in both text comprehension and generation. However, amidst these advancements, it is noteworthy that LLMs often face a limitation in terms of context length extrapolation. Understanding and extending the context length for LLMs is crucial in enhanc…
▽ More
The advent of Large Language Models (LLMs) represents a notable breakthrough in Natural Language Processing (NLP), contributing to substantial progress in both text comprehension and generation. However, amidst these advancements, it is noteworthy that LLMs often face a limitation in terms of context length extrapolation. Understanding and extending the context length for LLMs is crucial in enhancing their performance across various NLP applications. In this survey paper, we delve into the multifaceted aspects of exploring why it is essential, and the potential transformations that superior techniques could bring to NLP applications. We study the inherent challenges associated with extending context length and present an organized overview of the existing strategies employed by researchers. Additionally, we discuss the intricacies of evaluating context extension techniques and highlight the open challenges that researchers face in this domain. Furthermore, we explore whether there is a consensus within the research community regarding evaluation standards and identify areas where further agreement is needed. This comprehensive survey aims to serve as a valuable resource for researchers, guiding them through the nuances of context length extension techniques and fostering discussions on future advancements in this evolving field.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
A Comprehensive Survey of Hallucination Mitigation Techniques in Large Language Models
Authors:
S. M Towhidul Islam Tonmoy,
S M Mehedi Zaman,
Vinija Jain,
Anku Rani,
Vipula Rawte,
Aman Chadha,
Amitava Das
Abstract:
As Large Language Models (LLMs) continue to advance in their ability to write human-like text, a key challenge remains around their tendency to hallucinate generating content that appears factual but is ungrounded. This issue of hallucination is arguably the biggest hindrance to safely deploying these powerful LLMs into real-world production systems that impact people's lives. The journey toward w…
▽ More
As Large Language Models (LLMs) continue to advance in their ability to write human-like text, a key challenge remains around their tendency to hallucinate generating content that appears factual but is ungrounded. This issue of hallucination is arguably the biggest hindrance to safely deploying these powerful LLMs into real-world production systems that impact people's lives. The journey toward widespread adoption of LLMs in practical settings heavily relies on addressing and mitigating hallucinations. Unlike traditional AI systems focused on limited tasks, LLMs have been exposed to vast amounts of online text data during training. While this allows them to display impressive language fluency, it also means they are capable of extrapolating information from the biases in training data, misinterpreting ambiguous prompts, or modifying the information to align superficially with the input. This becomes hugely alarming when we rely on language generation capabilities for sensitive applications, such as summarizing medical records, financial analysis reports, etc. This paper presents a comprehensive survey of over 32 techniques developed to mitigate hallucination in LLMs. Notable among these are Retrieval Augmented Generation (Lewis et al, 2021), Knowledge Retrieval (Varshney et al,2023), CoNLI (Lei et al, 2023), and CoVe (Dhuliawala et al, 2023). Furthermore, we introduce a detailed taxonomy categorizing these methods based on various parameters, such as dataset utilization, common tasks, feedback mechanisms, and retriever types. This classification helps distinguish the diverse approaches specifically designed to tackle hallucination issues in LLMs. Additionally, we analyze the challenges and limitations inherent in these techniques, providing a solid foundation for future research in addressing hallucinations and related phenomena within the realm of LLMs.
△ Less
Submitted 8 January, 2024; v1 submitted 2 January, 2024;
originally announced January 2024.
-
MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain
Authors:
Tariqul Islam,
Faisal Haque Bappy,
Tarannum Shaila Zaman,
Md Sajidul Islam Sajid,
Mir Mehedi Ahsan Pritom
Abstract:
The core of a blockchain network is its consensus algorithm. Starting with the Proof-of-Work, there have been various versions of consensus algorithms, such as Proof-of-Stake (PoS), Proof-of-Authority (PoA), and Practical Byzantine Fault Tolerance (PBFT). Each of these algorithms focuses on different aspects to ensure efficient and reliable processing of transactions. Blockchain operates in a dece…
▽ More
The core of a blockchain network is its consensus algorithm. Starting with the Proof-of-Work, there have been various versions of consensus algorithms, such as Proof-of-Stake (PoS), Proof-of-Authority (PoA), and Practical Byzantine Fault Tolerance (PBFT). Each of these algorithms focuses on different aspects to ensure efficient and reliable processing of transactions. Blockchain operates in a decentralized manner where there is no central authority and the network is composed of diverse users. This openness creates the potential for malicious nodes to disrupt the network in various ways. Therefore, it is crucial to embed a mechanism within the blockchain network to constantly monitor, identify, and eliminate these malicious nodes. However, there is no one-size-fits-all mechanism to identify all malicious nodes. Hence, the dynamic adaptability of the blockchain network is important to maintain security and reliability at all times. This paper introduces MRL-PoS, a Proof-of-Stake consensus algorithm based on multi-agent reinforcement learning. MRL-PoS employs reinforcement learning for dynamically adjusting to the behavior of all users. It incorporates a system of rewards and penalties to eliminate malicious nodes and incentivize honest ones. Additionally, MRL-PoS has the capability to learn and respond to new malicious tactics by continually training its agents.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
FASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication
Authors:
Sabbir Ahmed,
Md Nahiduzzaman,
Tariqul Islam,
Faisal Haque Bappy,
Tarannum Shaila Zaman,
Raiful Hasan
Abstract:
With the surge in cloud storage adoption, enterprises face challenges managing data duplication and exponential data growth. Deduplication mitigates redundancy, yet maintaining redundancy ensures high availability, incurring storage costs. Balancing these aspects is a significant research concern. We propose FASTEN, a distributed cloud storage scheme ensuring efficiency, security, and high availab…
▽ More
With the surge in cloud storage adoption, enterprises face challenges managing data duplication and exponential data growth. Deduplication mitigates redundancy, yet maintaining redundancy ensures high availability, incurring storage costs. Balancing these aspects is a significant research concern. We propose FASTEN, a distributed cloud storage scheme ensuring efficiency, security, and high availability. FASTEN achieves fault tolerance by dispersing data subsets optimally across servers and maintains redundancy for high availability. Experimental results show FASTEN's effectiveness in fault tolerance, cost reduction, batch auditing, and file and block-level deduplication. It outperforms existing systems with low time complexity, strong fault tolerance, and commendable deduplication performance.
△ Less
Submitted 13 December, 2023;
originally announced December 2023.
-
ConChain: A Scheme for Contention-free and Attack Resilient BlockChain
Authors:
Faisal Haque Bappy,
Tariqul Islam,
Tarannum Shaila Zaman,
Md Sajidul Islam Sajid,
Mir Mehedi Ahsan Pritom
Abstract:
Although blockchains have become widely popular for their use in cryptocurrencies, they are now becoming pervasive as more traditional applications adopt blockchain to ensure data security. Despite being a secured network, blockchains have some tradeoffs such as high latency, low throughput, and transaction failures. One of the core problems behind these is improper management of "conflicting tran…
▽ More
Although blockchains have become widely popular for their use in cryptocurrencies, they are now becoming pervasive as more traditional applications adopt blockchain to ensure data security. Despite being a secured network, blockchains have some tradeoffs such as high latency, low throughput, and transaction failures. One of the core problems behind these is improper management of "conflicting transactions", which is also known as "contention". When there is a large pool of pending transactions in a blockchain and some of them are conflicting, a situation of contention occurs, and as a result, the latency of the network increases, and a substantial amount of resources are wasted which results in low throughput and transaction failures. In this paper, we proposed ConChain, a novel blockchain scheme that combines transaction parallelism and an intelligent dependency manager to minimize conflicting transactions in blockchain networks as well as improve performance. ConChain is also capable of ensuring proper defense against major attacks due to contention.
△ Less
Submitted 13 December, 2023;
originally announced December 2023.
-
STRIDE: Structure-guided Generation for Inverse Design of Molecules
Authors:
Shehtab Zaman,
Denis Akhiyarov,
Mauricio Araya-Polo,
Kenneth Chiu
Abstract:
Machine learning and especially deep learning has had an increasing impact on molecule and materials design. In particular, given the growing access to an abundance of high-quality small molecule data for generative modeling for drug design, results for drug discovery have been promising. However, for many important classes of materials such as catalysts, antioxidants, and metal-organic frameworks…
▽ More
Machine learning and especially deep learning has had an increasing impact on molecule and materials design. In particular, given the growing access to an abundance of high-quality small molecule data for generative modeling for drug design, results for drug discovery have been promising. However, for many important classes of materials such as catalysts, antioxidants, and metal-organic frameworks, such large datasets are not available. Such families of molecules with limited samples and structural similarities are especially prevalent for industrial applications. As is well-known, retraining and even fine-tuning are challenging on such small datasets. Novel, practically applicable molecules are most often derivatives of well-known molecules, suggesting approaches to addressing data scarcity. To address this problem, we introduce $\textbf{STRIDE}$, a generative molecule workflow that generates novel molecules with an unconditional generative model guided by known molecules without any retraining. We generate molecules outside of the training data from a highly specialized set of antioxidant molecules. Our generated molecules have on average 21.7% lower synthetic accessibility scores and also reduce ionization potential by 5.9% of generated molecules via guiding.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Latent Space Inference For Spatial Transcriptomics
Authors:
J. Ding,
S. N. Zaman,
P. Y. Chen,
D. Wang
Abstract:
In order to understand the complexities of cellular biology, researchers are interested in two important metrics: the genetic expression information of cells and their spatial coordinates within a tissue sample. However, state-of-the art methods, namely single-cell RNA sequencing and image based spatial transcriptomics can only recover a subset of this information, either full genetic expression w…
▽ More
In order to understand the complexities of cellular biology, researchers are interested in two important metrics: the genetic expression information of cells and their spatial coordinates within a tissue sample. However, state-of-the art methods, namely single-cell RNA sequencing and image based spatial transcriptomics can only recover a subset of this information, either full genetic expression with loss of spatial information, or spatial information with loss of resolution in sequencing data. In this project, we investigate a probabilistic machine learning method to obtain the full genetic expression information for tissues samples while also preserving their spatial coordinates. This is done through mapping both datasets to a joint latent space representation with the use of variational machine learning methods. From here, the full genetic and spatial information can be decoded and to give us greater insights on the understanding of cellular processes and pathways.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Gaze-based Learning from Demonstration In Surgical Robotics
Authors:
A. E. Abdelaal,
S. N. Zaman,
P. Y Chen,
T. Suzuki,
J. Ingleton
Abstract:
Surgical robotics is a rising field in medical technology and advanced robotics. Robot assisted surgery, or robotic surgery, allows surgeons to perform complicated surgical tasks with more precision, automation, and flexibility than is possible for traditional surgical approaches. The main type of robot assisted surgery is minimally invasive surgery, which could be automated and result in a faster…
▽ More
Surgical robotics is a rising field in medical technology and advanced robotics. Robot assisted surgery, or robotic surgery, allows surgeons to perform complicated surgical tasks with more precision, automation, and flexibility than is possible for traditional surgical approaches. The main type of robot assisted surgery is minimally invasive surgery, which could be automated and result in a faster healing time for the patient. The surgical robot we are particularly interested in is the da Vinci surgical system, which is developed and manufactured by Intuitive Surgical. In the current iteration of the system, the endoscopic camera arm on the da Vinci robot has to be manually controlled and calibrated by the surgeon during a surgical task, which interrupts the flow of the operation. The main goal of this capstone project is to automate the motion of the camera arm using a probabilistic model based on surgeon eye gaze data and da Vinci robot kinematic data.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Counter Turing Test CT^2: AI-Generated Text Detection is Not as Easy as You May Think -- Introducing AI Detectability Index
Authors:
Megha Chakraborty,
S. M Towhidul Islam Tonmoy,
S M Mehedi Zaman,
Krish Sharma,
Niyar R Barman,
Chandan Gupta,
Shreya Gautam,
Tanay Kumar,
Vinija Jain,
Aman Chadha,
Amit P. Sheth,
Amitava Das
Abstract:
With the rise of prolific ChatGPT, the risk and consequences of AI-generated text has increased alarmingly. To address the inevitable question of ownership attribution for AI-generated artifacts, the US Copyright Office released a statement stating that 'If a work's traditional elements of authorship were produced by a machine, the work lacks human authorship and the Office will not register it'.…
▽ More
With the rise of prolific ChatGPT, the risk and consequences of AI-generated text has increased alarmingly. To address the inevitable question of ownership attribution for AI-generated artifacts, the US Copyright Office released a statement stating that 'If a work's traditional elements of authorship were produced by a machine, the work lacks human authorship and the Office will not register it'. Furthermore, both the US and the EU governments have recently drafted their initial proposals regarding the regulatory framework for AI. Given this cynosural spotlight on generative AI, AI-generated text detection (AGTD) has emerged as a topic that has already received immediate attention in research, with some initial methods having been proposed, soon followed by emergence of techniques to bypass detection. This paper introduces the Counter Turing Test (CT^2), a benchmark consisting of techniques aiming to offer a comprehensive evaluation of the robustness of existing AGTD techniques. Our empirical findings unequivocally highlight the fragility of the proposed AGTD methods under scrutiny. Amidst the extensive deliberations on policy-making for regulating AI development, it is of utmost importance to assess the detectability of content generated by LLMs. Thus, to establish a quantifiable spectrum facilitating the evaluation and ranking of LLMs according to their detectability levels, we propose the AI Detectability Index (ADI). We conduct a thorough examination of 15 contemporary LLMs, empirically demonstrating that larger LLMs tend to have a higher ADI, indicating they are less detectable compared to smaller LLMs. We firmly believe that ADI holds significant value as a tool for the wider NLP community, with the potential to serve as a rubric in AI-related policy-making.
△ Less
Submitted 23 October, 2023; v1 submitted 8 October, 2023;
originally announced October 2023.
-
Exploring the Relationship between LLM Hallucinations and Prompt Linguistic Nuances: Readability, Formality, and Concreteness
Authors:
Vipula Rawte,
Prachi Priya,
S. M Towhidul Islam Tonmoy,
S M Mehedi Zaman,
Amit Sheth,
Amitava Das
Abstract:
As Large Language Models (LLMs) have advanced, they have brought forth new challenges, with one of the prominent issues being LLM hallucination. While various mitigation techniques are emerging to address hallucination, it is equally crucial to delve into its underlying causes. Consequently, in this preliminary exploratory investigation, we examine how linguistic factors in prompts, specifically r…
▽ More
As Large Language Models (LLMs) have advanced, they have brought forth new challenges, with one of the prominent issues being LLM hallucination. While various mitigation techniques are emerging to address hallucination, it is equally crucial to delve into its underlying causes. Consequently, in this preliminary exploratory investigation, we examine how linguistic factors in prompts, specifically readability, formality, and concreteness, influence the occurrence of hallucinations. Our experimental results suggest that prompts characterized by greater formality and concreteness tend to result in reduced hallucination. However, the outcomes pertaining to readability are somewhat inconclusive, showing a mixed pattern.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
AstroLLaMA: Towards Specialized Foundation Models in Astronomy
Authors:
Tuan Dung Nguyen,
Yuan-Sen Ting,
Ioana Ciucă,
Charlie O'Neill,
Ze-Chang Sun,
Maja Jabłońska,
Sandor Kruk,
Ernest Perkowski,
Jack Miller,
Jason Li,
Josh Peek,
Kartheik Iyer,
Tomasz Różański,
Pranav Khetarpal,
Sharaf Zaman,
David Brodrick,
Sergio J. Rodríguez Méndez,
Thang Bui,
Alyssa Goodman,
Alberto Accomazzi,
Jill Naiman,
Jesse Cranney,
Kevin Schawinski,
UniverseTBD
Abstract:
Large language models excel in many human-language tasks but often falter in highly specialized domains like scholarly astronomy. To bridge this gap, we introduce AstroLLaMA, a 7-billion-parameter model fine-tuned from LLaMA-2 using over 300,000 astronomy abstracts from arXiv. Optimized for traditional causal language modeling, AstroLLaMA achieves a 30% lower perplexity than Llama-2, showing marke…
▽ More
Large language models excel in many human-language tasks but often falter in highly specialized domains like scholarly astronomy. To bridge this gap, we introduce AstroLLaMA, a 7-billion-parameter model fine-tuned from LLaMA-2 using over 300,000 astronomy abstracts from arXiv. Optimized for traditional causal language modeling, AstroLLaMA achieves a 30% lower perplexity than Llama-2, showing marked domain adaptation. Our model generates more insightful and scientifically relevant text completions and embedding extraction than state-of-the-arts foundation models despite having significantly fewer parameters. AstroLLaMA serves as a robust, domain-specific model with broad fine-tuning potential. Its public release aims to spur astronomy-focused research, including automatic paper summarization and conversational agent development.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
The Quiet Eye Phenomenon in Minimally Invasive Surgery
Authors:
Alaa Eldin Abdelaal,
Rachelle Van Rumpt,
Sayem Nazmuz Zaman,
Irene Tong,
Anthony Jarc,
Gary L. Gallia,
Masaru Ishii,
Gregory D. Hager,
Septimiu E. Salcudean
Abstract:
In this paper, we report our discovery of a gaze behavior called Quiet Eye (QE) in minimally invasive surgery. The QE behavior has been extensively studied in sports training and has been associated with higher level of expertise in multiple sports. We investigated the QE behavior in two independently collected data sets of surgeons performing tasks in a sinus surgery setting and a robotic surgery…
▽ More
In this paper, we report our discovery of a gaze behavior called Quiet Eye (QE) in minimally invasive surgery. The QE behavior has been extensively studied in sports training and has been associated with higher level of expertise in multiple sports. We investigated the QE behavior in two independently collected data sets of surgeons performing tasks in a sinus surgery setting and a robotic surgery setting, respectively. Our results show that the QE behavior is more likely to occur in successful task executions and in performances of surgeons of high level of expertise. These results open the door to use the QE behavior in both training and skill assessment in minimally invasive surgery.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
CompTLL-UNet: Compressed Domain Text-Line Localization in Challenging Handwritten Documents using Deep Feature Learning from JPEG Coefficients
Authors:
Bulla Rajesh,
Sk Mahafuz Zaman,
Mohammed Javed,
P. Nagabhushan
Abstract:
Automatic localization of text-lines in handwritten documents is still an open and challenging research problem. Various writing issues such as uneven spacing between the lines, oscillating and touching text, and the presence of skew become much more challenging when the case of complex handwritten document images are considered for segmentation directly in their respective compressed representati…
▽ More
Automatic localization of text-lines in handwritten documents is still an open and challenging research problem. Various writing issues such as uneven spacing between the lines, oscillating and touching text, and the presence of skew become much more challenging when the case of complex handwritten document images are considered for segmentation directly in their respective compressed representation. This is because, the conventional way of processing compressed documents is through decompression, but here in this paper, we propose an idea that employs deep feature learning directly from the JPEG compressed coefficients without full decompression to accomplish text-line localization in the JPEG compressed domain. A modified U-Net architecture known as Compressed Text-Line Localization Network (CompTLL-UNet) is designed to accomplish it. The model is trained and tested with JPEG compressed version of benchmark datasets including ICDAR2017 (cBAD) and ICDAR2019 (cBAD), reporting the state-of-the-art performance with reduced storage and computational costs in the JPEG compressed domain.
△ Less
Submitted 11 August, 2023;
originally announced August 2023.
-
Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control
Authors:
Faisal Haque Bappy,
Saklain Zaman,
Tariqul Islam,
Redwan Ahmed Rizvee,
Joon S. Park,
Kamrul Hasan
Abstract:
Although wide-scale integration of cloud services with myriad applications increases quality of services (QoS) for enterprise users, verifying the existence and manipulation of stored cloud information remains an open research problem. Decentralized blockchain-based solutions are becoming more appealing for cloud auditing environments because of the immutable nature of blockchain. However, the dec…
▽ More
Although wide-scale integration of cloud services with myriad applications increases quality of services (QoS) for enterprise users, verifying the existence and manipulation of stored cloud information remains an open research problem. Decentralized blockchain-based solutions are becoming more appealing for cloud auditing environments because of the immutable nature of blockchain. However, the decentralized structure of blockchain results in considerable synchronization and communication overhead, which increases maintenance costs for cloud service providers (CSP). This paper proposes a Merkle Hash Tree based architecture named Entangled Merkle Forest to support version control and dynamic auditing of information in centralized cloud environments. We utilized a semi-trusted third-party auditor to conduct the auditing tasks with minimal privacy-preserving file metadata. To the best of our knowledge, we are the first to design a node sharing Merkle Forest to offer a cost-effective auditing framework for centralized cloud infrastructures while achieving the immutable feature of blockchain, mitigating the synchronization and performance challenges of the decentralized architectures. Our proposed scheme outperforms it's equivalent Blockchain-based schemes by ensuring time and storage efficiency with minimum overhead as evidenced by performance analysis.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
A Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User Behaviors
Authors:
Faisal Haque Bappy,
Tariqul Islam,
Tarannum Shaila Zaman,
Raiful Hasan,
Carlos Caicedo
Abstract:
Large-scale cloud data centers have gained popularity due to their high availability, rapid elasticity, scalability, and low cost. However, current data centers continue to have high failure rates due to the lack of proper resource utilization and early failure detection. To maximize resource efficiency and reduce failure rates in large-scale cloud data centers, it is crucial to understand the wor…
▽ More
Large-scale cloud data centers have gained popularity due to their high availability, rapid elasticity, scalability, and low cost. However, current data centers continue to have high failure rates due to the lack of proper resource utilization and early failure detection. To maximize resource efficiency and reduce failure rates in large-scale cloud data centers, it is crucial to understand the workload and failure characteristics. In this paper, we perform a deep analysis of the 2019 Google Cluster Trace Dataset, which contains 2.4TiB of workload traces from eight different clusters around the world. We explore the characteristics of failed and killed jobs in Google's production cloud and attempt to correlate them with key attributes such as resource usage, job priority, scheduling class, job duration, and the number of task resubmissions. Our analysis reveals several important characteristics of failed jobs that contribute to job failure and hence, could be used for developing an early failure prediction system. Also, we present a novel usage analysis to identify heterogeneity in jobs and tasks submitted by users. We are able to identify specific users who control more than half of all collection events on a single cluster. We contend that these characteristics could be useful in developing an early job failure prediction system that could be utilized for dynamic rescheduling of the job scheduler and thus improving resource utilization in large-scale cloud data centers while reducing failure rates.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Atmospheric Influence on the Path Loss at High Frequencies for Deployment of 5G Cellular Communication Networks
Authors:
Rashed Hasan Ratul,
S M Mehedi Zaman,
Hasib Arman Chowdhury,
Md. Zayed Hassan Sagor,
Mohammad Tawhid Kawser,
Mirza Muntasir Nishat
Abstract:
Over the past few decades, the development of cellular communication technology has spanned several generations in order to add sophisticated features in the updated versions. Moreover, different high-frequency bands are considered for advanced cellular generations. The presence of updated generations like 4G and 5G is driven by the rising demand for a greater data rate and a better experience for…
▽ More
Over the past few decades, the development of cellular communication technology has spanned several generations in order to add sophisticated features in the updated versions. Moreover, different high-frequency bands are considered for advanced cellular generations. The presence of updated generations like 4G and 5G is driven by the rising demand for a greater data rate and a better experience for end users. However, because 5G-NR operates at a high frequency and has significant propagation, atmospheric fluctuations like temperature, humidity, and rain rate might result in poorer signal reception, and higher path loss effects unlike the prior generation, which employed frequencies below 6 GHz. This paper makes an attempt to provide a comparative analysis about the influence of different relative atmospheric conditions on 5G cellular communication for various operating frequencies in any urban microcell (UMi) environment maintaining the real outdoor propagation conditions. In addition, the simulation dataset based on environmental factors has been validated by the prediction of path loss using multiple regression techniques. Consequently, this study also aims to address the performance analysis of regression techniques for stable estimations of path loss at high frequencies for different atmospheric conditions for 5G mobile generations due to various possible radio link quality issues and fluctuations in different seasons in South Asia. Furthermore, in comparison to contemporary studies, the Machine Learning models have outperformed in predicting the path loss for the four seasons in South Asian regions.
△ Less
Submitted 27 July, 2023; v1 submitted 2 June, 2023;
originally announced June 2023.
-
Automatic Aortic Valve Pathology Detection from 3-Chamber Cine MRI with Spatio-Temporal Attention Maps
Authors:
Y. On,
K. Vimalesvaran,
C. Galazis,
S. Zaman,
J. Howard,
N. Linton,
N. Peters,
G. Cole,
A. A. Bharath,
M. Varela
Abstract:
The assessment of aortic valve pathology using magnetic resonance imaging (MRI) typically relies on blood velocity estimates acquired using phase contrast (PC) MRI. However, abnormalities in blood flow through the aortic valve often manifest by the dephasing of blood signal in gated balanced steady-state free precession (bSSFP) scans (Cine MRI). We propose a 3D classification neural network (NN) t…
▽ More
The assessment of aortic valve pathology using magnetic resonance imaging (MRI) typically relies on blood velocity estimates acquired using phase contrast (PC) MRI. However, abnormalities in blood flow through the aortic valve often manifest by the dephasing of blood signal in gated balanced steady-state free precession (bSSFP) scans (Cine MRI). We propose a 3D classification neural network (NN) to automatically identify aortic valve pathology (aortic regurgitation, aortic stenosis, mixed valve disease) from Cine MR images. We train and test our approach on a retrospective clinical dataset from three UK hospitals, using single-slice 3-chamber cine MRI from N = 576 patients. Our classification model accurately predicts the presence of aortic valve pathology (AVD) with an accuracy of 0.85 +/- 0.03 and can also correctly discriminate the type of AVD pathology (accuracy: 0.75 +/- 0.03). Gradient-weighted class activation mapping (Grad-CAM) confirms that the blood pool voxels close to the aortic root contribute the most to the classification. Our approach can be used to improve the diagnosis of AVD and optimise clinical CMR protocols for accurate and efficient AVD detection.
△ Less
Submitted 14 April, 2023; v1 submitted 12 April, 2023;
originally announced April 2023.
-
OOG- Optuna Optimized GAN Sampling Technique for Tabular Imbalanced Malware Data
Authors:
S. M Towhidul Islam Tonmoy,
S. M Mehedi Zaman
Abstract:
Cyberspace occupies a large portion of people's life in the age of modern technology, and while there are those who utilize it for good, there are also those who do not. Malware is an application whose construction was not motivated by a benign goal and it can harm, steal, or even alter personal information and secure applications and software. Thus, there are numerous techniques to avoid malware,…
▽ More
Cyberspace occupies a large portion of people's life in the age of modern technology, and while there are those who utilize it for good, there are also those who do not. Malware is an application whose construction was not motivated by a benign goal and it can harm, steal, or even alter personal information and secure applications and software. Thus, there are numerous techniques to avoid malware, one of which is to develop samples of malware so that the system can be updated with the growing number of malwares, allowing it to recognize when malwares attempt to enter. The Generative Adversarial Network (GAN) sampling technique has been used in this study to generate new malware samples. GANs have multiple variants, and in order to determine which variant is optimal for a given dataset sample, their parameters must be modified. This study employs Optuna, an autonomous hyperparameter tuning algorithm, to determine the optimal settings for the dataset under consideration. In this study, the architecture of the Optuna Optimized GAN (OOG) method is shown, along with scores of 98.06%, 99.00%, 97.23%, and 98.04% for accuracy, precision, recall and f1 score respectively. After tweaking the hyperparameters of five supervised boosting algorithms, XGBoost, LightGBM, CatBoost, Extra Trees Classifier, and Gradient Boosting Classifier, the methodology of this paper additionally employs the weighted ensemble technique to acquire this result. In addition to comparing existing efforts in this domain, the study demonstrates how promising GAN is in comparison to other sampling techniques such as SMOTE.
△ Less
Submitted 25 November, 2022;
originally announced December 2022.
-
ParticleGrid: Enabling Deep Learning using 3D Representation of Materials
Authors:
Shehtab Zaman,
Ethan Ferguson,
Cecile Pereira,
Denis Akhiyarov,
Mauricio Araya-Polo,
Kenneth Chiu
Abstract:
From AlexNet to Inception, autoencoders to diffusion models, the development of novel and powerful deep learning models and learning algorithms has proceeded at breakneck speeds. In part, we believe that rapid iteration of model architecture and learning techniques by a large community of researchers over a common representation of the underlying entities has resulted in transferable deep learning…
▽ More
From AlexNet to Inception, autoencoders to diffusion models, the development of novel and powerful deep learning models and learning algorithms has proceeded at breakneck speeds. In part, we believe that rapid iteration of model architecture and learning techniques by a large community of researchers over a common representation of the underlying entities has resulted in transferable deep learning knowledge. As a result, model scale, accuracy, fidelity, and compute performance have dramatically increased in computer vision and natural language processing. On the other hand, the lack of a common representation for chemical structure has hampered similar progress. To enable transferable deep learning, we identify the need for a robust 3-dimensional representation of materials such as molecules and crystals. The goal is to enable both materials property prediction and materials generation with 3D structures. While computationally costly, such representations can model a large set of chemical structures. We propose $\textit{ParticleGrid}$, a SIMD-optimized library for 3D structures, that is designed for deep learning applications and to seamlessly integrate with deep learning frameworks. Our highly optimized grid generation allows for generating grids on the fly on the CPU, reducing storage and GPU compute and memory requirements. We show the efficacy of 3D grids generated via $\textit{ParticleGrid}$ and accurately predict molecular energy properties using a 3D convolutional neural network. Our model is able to get 0.006 mean square error and nearly match the values calculated using computationally costly density functional theory at a fraction of the time.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Few-shot Generation of Personalized Neural Surrogates for Cardiac Simulation via Bayesian Meta-Learning
Authors:
Xiajun Jiang,
Zhiyuan Li,
Ryan Missel,
Md Shakil Zaman,
Brian Zenger,
Wilson W. Good,
Rob S. MacLeod,
John L. Sapp,
Linwei Wang
Abstract:
Clinical adoption of personalized virtual heart simulations faces challenges in model personalization and expensive computation. While an ideal solution is an efficient neural surrogate that at the same time is personalized to an individual subject, the state-of-the-art is either concerned with personalizing an expensive simulation model, or learning an efficient yet generic surrogate. This paper…
▽ More
Clinical adoption of personalized virtual heart simulations faces challenges in model personalization and expensive computation. While an ideal solution is an efficient neural surrogate that at the same time is personalized to an individual subject, the state-of-the-art is either concerned with personalizing an expensive simulation model, or learning an efficient yet generic surrogate. This paper presents a completely new concept to achieve personalized neural surrogates in a single coherent framework of meta-learning (metaPNS). Instead of learning a single neural surrogate, we pursue the process of learning a personalized neural surrogate using a small amount of context data from a subject, in a novel formulation of few-shot generative modeling underpinned by: 1) a set-conditioned neural surrogate for cardiac simulation that, conditioned on subject-specific context data, learns to generate query simulations not included in the context set, and 2) a meta-model of amortized variational inference that learns to condition the neural surrogate via simple feed-forward embedding of context data. As test time, metaPNS delivers a personalized neural surrogate by fast feed-forward embedding of a small and flexible number of data available from an individual, achieving -- for the first time -- personalization and surrogate construction for expensive simulations in one end-to-end learning framework. Synthetic and real-data experiments demonstrated that metaPNS was able to improve personalization and predictive accuracy in comparison to conventionally-optimized cardiac simulation models, at a fraction of computation.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
A Survey: Credit Sentiment Score Prediction
Authors:
A. N. M. Sajedul Alam,
Junaid Bin Kibria,
Arnob Kumar Dey,
Zawad Alam,
Shifat Zaman,
Motahar Mahtab,
Mohammed Julfikar Ali Mahbub,
Annajiat Alim Rasel
Abstract:
Manual approvals are still used by banks and other NGOs to approve loans. It takes time and is prone to mistakes because it is controlled by a bank employee. Several fields of machine learning mining technologies have been utilized to enhance various areas of credit rating forecast. A major goal of this research is to look at current sentiment analysis techniques that are being used to generate cr…
▽ More
Manual approvals are still used by banks and other NGOs to approve loans. It takes time and is prone to mistakes because it is controlled by a bank employee. Several fields of machine learning mining technologies have been utilized to enhance various areas of credit rating forecast. A major goal of this research is to look at current sentiment analysis techniques that are being used to generate creditworthiness.
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Fast Posterior Estimation of Cardiac Electrophysiological Model Parameters via Bayesian Active Learning
Authors:
Md Shakil Zaman,
Jwala Dhamala,
Pradeep Bajracharya,
John L. Sapp,
B. Milan Horacek,
Katherine C. Wu,
Natalia A. Trayanova,
Linwei Wang
Abstract:
Probabilistic estimation of cardiac electrophysiological model parameters serves an important step towards model personalization and uncertain quantification. The expensive computation associated with these model simulations, however, makes direct Markov Chain Monte Carlo (MCMC) sampling of the posterior probability density function (pdf) of model parameters computationally intensive. Approximated…
▽ More
Probabilistic estimation of cardiac electrophysiological model parameters serves an important step towards model personalization and uncertain quantification. The expensive computation associated with these model simulations, however, makes direct Markov Chain Monte Carlo (MCMC) sampling of the posterior probability density function (pdf) of model parameters computationally intensive. Approximated posterior pdfs resulting from replacing the simulation model with a computationally efficient surrogate, on the other hand, have seen limited accuracy. In this paper, we present a Bayesian active learning method to directly approximate the posterior pdf function of cardiac model parameters, in which we intelligently select training points to query the simulation model in order to learn the posterior pdf using a small number of samples. We integrate a generative model into Bayesian active learning to allow approximating posterior pdf of high-dimensional model parameters at the resolution of the cardiac mesh. We further introduce new acquisition functions to focus the selection of training points on better approximating the shape rather than the modes of the posterior pdf of interest. We evaluated the presented method in estimating tissue excitability in a 3D cardiac electrophysiological model in a range of synthetic and real-data experiments. We demonstrated its improved accuracy in approximating the posterior pdf compared to Bayesian active learning using regular acquisition functions, and substantially reduced computational cost in comparison to existing standard or accelerated MCMC sampling.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Survival Prediction of Heart Failure Patients using Stacked Ensemble Machine Learning Algorithm
Authors:
S. M Mehedi Zaman,
Wasay Mahmood Qureshi,
Md. Mohsin Sarker Raihan,
Ocean Monjur,
Abdullah Bin Shams
Abstract:
Cardiovascular disease, especially heart failure is one of the major health hazard issues of our time and is a leading cause of death worldwide. Advancement in data mining techniques using machine learning (ML) models is paving promising prediction approaches. Data mining is the process of converting massive volumes of raw data created by the healthcare institutions into meaningful information tha…
▽ More
Cardiovascular disease, especially heart failure is one of the major health hazard issues of our time and is a leading cause of death worldwide. Advancement in data mining techniques using machine learning (ML) models is paving promising prediction approaches. Data mining is the process of converting massive volumes of raw data created by the healthcare institutions into meaningful information that can aid in making predictions and crucial decisions. Collecting various follow-up data from patients who have had heart failures, analyzing those data, and utilizing several ML models to predict the survival possibility of cardiovascular patients is the key aim of this study. Due to the imbalance of the classes in the dataset, Synthetic Minority Oversampling Technique (SMOTE) has been implemented. Two unsupervised models (K-Means and Fuzzy C-Means clustering) and three supervised classifiers (Random Forest, XGBoost and Decision Tree) have been used in our study. After thorough investigation, our results demonstrate a superior performance of the supervised ML algorithms over unsupervised models. Moreover, we designed and propose a supervised stacked ensemble learning model that can achieve an accuracy, precision, recall and F1 score of 99.98%. Our study shows that only certain attributes collected from the patients are imperative to successfully predict the surviving possibility post heart failure, using supervised ML algorithms.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Authors:
Arafat Rahman,
Muhammad E. H. Chowdhury,
Amith Khandakar,
Serkan Kiranyaz,
Kh Shahriya Zaman,
Mamun Bin Ibne Reaz,
Mohammad Tariqul Islam,
Muhammad Abdul Kadir
Abstract:
With the rapid advancement of technology, different biometric user authentication, and identification systems are emerging. Traditional biometric systems like face, fingerprint, and iris recognition, keystroke dynamics, etc. are prone to cyber-attacks and suffer from different disadvantages. Electroencephalography (EEG) based authentication has shown promise in overcoming these limitations. Howeve…
▽ More
With the rapid advancement of technology, different biometric user authentication, and identification systems are emerging. Traditional biometric systems like face, fingerprint, and iris recognition, keystroke dynamics, etc. are prone to cyber-attacks and suffer from different disadvantages. Electroencephalography (EEG) based authentication has shown promise in overcoming these limitations. However, EEG-based authentication is less accurate due to signal variability at different psychological and physiological conditions. On the other hand, keystroke dynamics-based identification offers high accuracy but suffers from different spoofing attacks. To overcome these challenges, we propose a novel multimodal biometric system combining EEG and keystroke dynamics. Firstly, a dataset was created by acquiring both keystroke dynamics and EEG signals from 10 users with 500 trials per user at 10 different sessions. Different statistical, time, and frequency domain features were extracted and ranked from the EEG signals and key features were extracted from the keystroke dynamics. Different classifiers were trained, validated, and tested for both individual and combined modalities for two different classification strategies - personalized and generalized. Results show that very high accuracy can be achieved both in generalized and personalized cases for the combination of EEG and keystroke dynamics. The identification and authentication accuracies were found to be 99.80% and 99.68% for Extreme Gradient Boosting (XGBoost) and Random Forest classifiers, respectively which outperform the individual modalities with a significant margin (around 5 percent). We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. The proposed method is secured and reliable for any kind of biometric authentication.
△ Less
Submitted 25 June, 2021; v1 submitted 10 March, 2021;
originally announced March 2021.
-
Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare
Authors:
Shakila Zaman,
Muhammad R. A. Khandaker,
Risala T. Khan,
Faisal Tariq,
Kai-Kit Wong
Abstract:
The Internet-of-Things (IoT) is an emerging and cognitive technology which connects a massive number of smart physical devices with virtual objects operating in diverse platforms through the internet. IoT is increasingly being implemented in distributed settings, making footprints in almost every sector of our life. Unfortunately, for healthcare systems, the entities connected to the IoT networks…
▽ More
The Internet-of-Things (IoT) is an emerging and cognitive technology which connects a massive number of smart physical devices with virtual objects operating in diverse platforms through the internet. IoT is increasingly being implemented in distributed settings, making footprints in almost every sector of our life. Unfortunately, for healthcare systems, the entities connected to the IoT networks are exposed to an unprecedented level of security threats. Relying on a huge volume of sensitive and personal data, IoT healthcare systems are facing unique challenges in protecting data security and privacy. Although blockchain has posed to be the solution in this scenario thanks to its inherent distributed ledger technology (DLT), it suffers from major setbacks of increasing storage and computation requirements with the network size. This paper proposes a holochain-based security and privacy-preserving framework for IoT healthcare systems that overcomes these challenges and is particularly suited for resource constrained IoT scenarios. The performance and thorough security analyses demonstrate that a holochain-based IoT healthcare system is significantly better compared to blockchain and other existing systems.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Graph Neural Network for Metal Organic Framework Potential Energy Approximation
Authors:
Shehtab Zaman,
Christopher Owen,
Kenneth Chiu,
Michael Lawler
Abstract:
Metal-organic frameworks (MOFs) are nanoporous compounds composed of metal ions and organic linkers. MOFs play an important role in industrial applications such as gas separation, gas purification, and electrolytic catalysis. Important MOF properties such as potential energy are currently computed via techniques such as density functional theory (DFT). Although DFT provides accurate results, it is…
▽ More
Metal-organic frameworks (MOFs) are nanoporous compounds composed of metal ions and organic linkers. MOFs play an important role in industrial applications such as gas separation, gas purification, and electrolytic catalysis. Important MOF properties such as potential energy are currently computed via techniques such as density functional theory (DFT). Although DFT provides accurate results, it is computationally costly. We propose a machine learning approach for estimating the potential energy of candidate MOFs, decomposing it into separate pair-wise atomic interactions using a graph neural network. Such a technique will allow high-throughput screening of candidates MOFs. We also generate a database of 50,000 spatial configurations and high-quality potential energy values using DFT.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
A Case Study to Identify the Hindrances to Widespread Adoption of Electric Vehicles in Qatar
Authors:
Amith Khandakar,
Annaufal Rizqullah,
Anas Ashraf Abdou Berbar,
Mohammad Rafi Ahmed,
Atif Iqbal,
Muhammad E. H. Chowdhury,
S. M. Ashfaq Uz Zaman
Abstract:
The adoption of electric vehicles (EVs) have proven to be a crucial factor to decreasing the emission of greenhouse gases (GHG) into the atmosphere. However, there are various hurdles that impede people from purchasing EVs. For example, long charging time, short driving range, cost and insufficient charging infrastructures available, etc. This article reports the public perception of EV-adoption u…
▽ More
The adoption of electric vehicles (EVs) have proven to be a crucial factor to decreasing the emission of greenhouse gases (GHG) into the atmosphere. However, there are various hurdles that impede people from purchasing EVs. For example, long charging time, short driving range, cost and insufficient charging infrastructures available, etc. This article reports the public perception of EV-adoption using statistical analyses and proposes some recommendations for improving EV-adoption in Qatar. User perspectives on EV-adoption barriers in Qatar were investigated based on survey questionnaires. The survey questionnaires were based on similar studies done in other regions of the world. The study attempted to look at different perspectives of the adoption of EV, when asked to a person who is aware of EVs or a person who may or may not be aware of EVs. Cumulative survey responses from the two groups were compared and analyzed using a two sample t-test statistical analysis. Detailed analyses showed that among various major hindrances raising of public awareness of such greener modes of transportation, the availability of charging options in more places and policy incentives towards EVs would play a major role in EV-adoption. The authors provide recommendations that along with government incentives could help make a gradual shift to a greater number of EVs convenient for people of Qatar. The proposed systematic approach for such a study and analysis may help in streamlining research on policies, infrastructures and technologies for efficient penetration of EVs in Qatar.
△ Less
Submitted 27 June, 2020;
originally announced June 2020.
-
Towards Run Time Estimation of the Gaussian Chemistry Code for SEAGrid Science Gateway
Authors:
Angel Beltre,
Shehtab Zaman,
Kenneth Chiu,
Sudhakar Pamidighantam,
Xingye Qiao,
Madhusudhan Govindaraju
Abstract:
Accurate estimation of the run time of computational codes has a number of significant advantages for scientific computing. It is required information for optimal resource allocation, improving turnaround times and utilization of science gateways. Furthermore, it allows users to better plan and schedule their research, streamlining workflows and improving the overall productivity of cyberinfrastru…
▽ More
Accurate estimation of the run time of computational codes has a number of significant advantages for scientific computing. It is required information for optimal resource allocation, improving turnaround times and utilization of science gateways. Furthermore, it allows users to better plan and schedule their research, streamlining workflows and improving the overall productivity of cyberinfrastructure. Predicting run time is challenging, however. The inputs to scientific codes can be complex and high dimensional. Their relationship to the run time may be highly non-linear, and, in the most general case is completely arbitrary and thus unpredictable (i.e., simply a random mapping from inputs to run time). Most codes are not so arbitrary, however, and there has been significant prior research on predicting the run time of applications and workloads. Such predictions are generally application-specific, however. In this paper, we focus on the Gaussian computational chemistry code. We characterize a data set of runs from the SEAGrid science gateway with a number of different studies. We also explore a number of different potential regression methods and present promising future directions.
△ Less
Submitted 7 June, 2019;
originally announced June 2019.
-
X-Ray Image Compression Using Convolutional Recurrent Neural Networks
Authors:
Asif Shahriyar Sushmit,
Shakib Uz Zaman,
Ahmed Imtiaz Humayun,
Taufiq Hasan,
Mohammed Imamul Hassan Bhuiyan
Abstract:
In the advent of a digital health revolution, vast amounts of clinical data are being generated, stored and processed on a daily basis. This has made the storage and retrieval of large volumes of health-care data, especially, high-resolution medical images, particularly challenging. Effective image compression for medical images thus plays a vital role in today's healthcare information system, par…
▽ More
In the advent of a digital health revolution, vast amounts of clinical data are being generated, stored and processed on a daily basis. This has made the storage and retrieval of large volumes of health-care data, especially, high-resolution medical images, particularly challenging. Effective image compression for medical images thus plays a vital role in today's healthcare information system, particularly in teleradiology. In this work, an X-ray image compression method based on a Convolutional Recurrent Neural Networks RNN-Conv is presented. The proposed architecture can provide variable compression rates during deployment while it requires each network to be trained only once for a specific dimension of X-ray images. The model uses a multi-level pooling scheme that learns contextualized features for effective compression. We perform our image compression experiments on the National Institute of Health (NIH) ChestX-ray8 dataset and compare the performance of the proposed architecture with a state-of-the-art RNN based technique and JPEG 2000. The experimental results depict improved compression performance achieved by the proposed method in terms of Structural Similarity Index (SSIM) and Peak Signal-to-Noise Ratio (PSNR) metrics. To the best of our knowledge, this is the first reported evaluation on using a deep convolutional RNN for medical image compression.
△ Less
Submitted 9 May, 2019; v1 submitted 28 April, 2019;
originally announced April 2019.
-
Real-Space Visualization of Quantum Phase Transition by Network Topology
Authors:
Shehtab Zaman,
Wei-Cheng Lee
Abstract:
We demonstrate that with appropriate quantum correlation function, a real-space network model can be constructed to study the phase transitions in quantum systems. For the three-dimensional bosonic system, the single-particle density matrix is adopted to construct the adjacency matrix. We show that the Bose-Einstein condensate transition can be interpreted as the transition into a small-world netw…
▽ More
We demonstrate that with appropriate quantum correlation function, a real-space network model can be constructed to study the phase transitions in quantum systems. For the three-dimensional bosonic system, the single-particle density matrix is adopted to construct the adjacency matrix. We show that the Bose-Einstein condensate transition can be interpreted as the transition into a small-world network, which is accurately captured by the small-world coefficient. For the one-dimensional disordered system, using the electron diffusion operator to build the adjacency matrix, we find that the Anderson localized states create many weakly-linked subgraphs, which significantly reduces the clustering coefficient and lengthens the shortest path. We show that the crossover from delocalized to localized regimes as a function of the disorder strength can be identified as the loss of global connection, which is revealed by the small-world coefficient as well as other independent measures like the robustness, the efficiency, and the algebraic connectivity. Our results suggest that the quantum phase transitions can be visualized in real space and characterized by the network analysis with suitable choices of quantum correlation functions.
△ Less
Submitted 11 July, 2019; v1 submitted 8 April, 2019;
originally announced April 2019.
-
First Results from the AMoRE-Pilot neutrinoless double beta decay experiment
Authors:
V. Alenkov,
H. W. Bae,
J. Beyer,
R. S. Boiko,
K. Boonin,
O. Buzanov,
N. Chanthima,
M. K. Cheoun,
D. M. Chernyak,
J. S. Choe,
S. Choi,
F. A. Danevich,
M. Djamal,
D. Drung,
C. Enss,
A. Fleischmann,
A. M. Gangapshev,
L. Gastaldo,
Yu. M. Gavriljuk,
A. M. Gezhaev,
V. D. Grigoryeva,
V. I. Gurentsov,
O. Gylova,
C. Ha,
D. H. Ha
, et al. (84 additional authors not shown)
Abstract:
The Advanced Molybdenum-based Rare process Experiment (AMoRE) aims to search for neutrinoless double beta decay (0$νββ$) of $^{100}$Mo with $\sim$100 kg of $^{100}$Mo-enriched molybdenum embedded in cryogenic detectors with a dual heat and light readout. At the current, pilot stage of the AMoRE project we employ six calcium molybdate crystals with a total mass of 1.9 kg, produced from $^{48}$Ca-de…
▽ More
The Advanced Molybdenum-based Rare process Experiment (AMoRE) aims to search for neutrinoless double beta decay (0$νββ$) of $^{100}$Mo with $\sim$100 kg of $^{100}$Mo-enriched molybdenum embedded in cryogenic detectors with a dual heat and light readout. At the current, pilot stage of the AMoRE project we employ six calcium molybdate crystals with a total mass of 1.9 kg, produced from $^{48}$Ca-depleted calcium and $^{100}$Mo-enriched molybdenum ($^{48\textrm{depl}}$Ca$^{100}$MoO$_4$). The simultaneous detection of heat(phonon) and scintillation (photon) signals is realized with high resolution metallic magnetic calorimeter sensors that operate at milli-Kelvin temperatures. This stage of the project is carried out in the Yangyang underground laboratory at a depth of 700 m. We report first results from the AMoRE-Pilot $0νββ$ search with a 111 kg$\cdot$d live exposure of $^{48\textrm{depl}}$Ca$^{100}$MoO$_4$ crystals. No evidence for $0νββ$ decay of $^{100}$Mo is found, and a upper limit is set for the half-life of 0$νββ$ of $^{100}$Mo of $T^{0ν}_{1/2} > 9.5\times10^{22}$ y at 90% C.L.. This limit corresponds to an effective Majorana neutrino mass limit in the range $\langle m_{ββ}\rangle\le(1.2-2.1)$ eV.
△ Less
Submitted 7 May, 2019; v1 submitted 22 March, 2019;
originally announced March 2019.
-
Dust-acoustic rogue waves in an opposite polarity dusty plasma featuring non-extensive statistics
Authors:
D. M. S. Zaman,
A. Mannan,
A. A. Mamun
Abstract:
Modulational instability (MI) of dust acoustic waves (DAWs), which propagates in an opposite polarity dusty plasma system, containing inertial warm negatively and positively charged dust particles as well as non-extensive q-distributed elec- trons and ions, has been theoretically investigated. The nonlinear Schrodinger (NLS) equation is derived by employing the reductive perturbation method. The…
▽ More
Modulational instability (MI) of dust acoustic waves (DAWs), which propagates in an opposite polarity dusty plasma system, containing inertial warm negatively and positively charged dust particles as well as non-extensive q-distributed elec- trons and ions, has been theoretically investigated. The nonlinear Schrodinger (NLS) equation is derived by employing the reductive perturbation method. The NLS equation leads to the MI of DAWs as well as to the formation of DAW rogue waves (DARWs), which are formed due to the effects of nonlinearity in the propagation of DAWs. Both stable and unstable regions are revealed from the analysis of the NLS equation. It is observed that the basic features of the DAWs (viz. stability of the wave profile, MI growth rate, amplitude, and width of DARWs) are significantly modified by the various plasma parameters such as non-extensive parameter, electron number density, and electron temperature. The existence of the non-extensive electron/ion distribution creates an influence on the MI of the waves. It is observed that non-extensive distributed ions have more effect on the MI of the DAWs than electrons.
△ Less
Submitted 27 December, 2017;
originally announced December 2017.
-
Nucleus-acoustic solitons in self-gravitating magnetized quantum plasmas
Authors:
D. M. S. Zaman,
M. Amina,
A. A. Mamun
Abstract:
The basic properties of the nucleus-acoustic (NA) solitary waves (SWs) are investigated in a super-dense self-gravitating magnetized quantum plasma (SDSGMQP) system in the presence of an external magnetic field, whose constituents are the non-degenerate light (heavy) nuclei, and non/ultra-relativistically degenerate electrons. The Korteweg-de Vries (KdV) equation has been derived by employing the…
▽ More
The basic properties of the nucleus-acoustic (NA) solitary waves (SWs) are investigated in a super-dense self-gravitating magnetized quantum plasma (SDSGMQP) system in the presence of an external magnetic field, whose constituents are the non-degenerate light (heavy) nuclei, and non/ultra-relativistically degenerate electrons. The Korteweg-de Vries (KdV) equation has been derived by employing the reductive perturbation method. The NA SWs are formed with negative (positive) electrostatic (self-gravitational) potential. It is also observed that the effects of non/ultra-relativistically degenerate electron pressure, and the obliqueness of the external magnetic field significantly change the basic properties (e.g. amplitude, width, and speed) of NA SWs. The findings of our present analysis can be very helpful to explain the physics behind the formation of the NA SWs in astrophysical compact objects, specially neutron stars, which are briefly discussed.
△ Less
Submitted 7 October, 2017;
originally announced October 2017.
-
A Review Study of NIST Statistical Test Suite: Development of an indigenous Computer Package
Authors:
J K M Sadique Uz Zaman,
Ranjan Ghosh
Abstract:
A review study of NIST Statistical Test Suite is undertaken with a motivation to understand all its test algorithms and to write their C codes independently without looking at various sites mentioned in the NIST document. All the codes are tested with the test data given in the NIST document and excellent agreements have been found. The codes have been put together in a package executable in MS Wi…
▽ More
A review study of NIST Statistical Test Suite is undertaken with a motivation to understand all its test algorithms and to write their C codes independently without looking at various sites mentioned in the NIST document. All the codes are tested with the test data given in the NIST document and excellent agreements have been found. The codes have been put together in a package executable in MS Windows platform. Based on the package, exhaustive test runs are executed on three PRNGs, e.g. LCG by Park & Miller, LCG by Knuth and BBSG. Our findings support the present belief that BBSG is a better PRNG than the other two.
△ Less
Submitted 28 August, 2012;
originally announced August 2012.
-
A simple 1-byte 1-clock RC4 design and its efficient implementation in FPGA coprocessor for secured ethernet communication
Authors:
Rourab Paul,
Sangeet Saha,
Jkm Sadique Uz Zaman,
Suman Das,
Amlan Chakrabarti,
Ranjan Ghosh
Abstract:
In the field of cryptography till date the 1-byte in 1-clock is the best known RC4 hardware design [1], while the 1-byte in 3clocks is the best known implementation [2,3]. The design algorithm in [1] considers two consecutive bytes together and processes them in 2 clocks. The design of 1-byte in 3-clocks is too much modular and clock hungry. In this paper considering the RC4 algorithm, as it is, a…
▽ More
In the field of cryptography till date the 1-byte in 1-clock is the best known RC4 hardware design [1], while the 1-byte in 3clocks is the best known implementation [2,3]. The design algorithm in [1] considers two consecutive bytes together and processes them in 2 clocks. The design of 1-byte in 3-clocks is too much modular and clock hungry. In this paper considering the RC4 algorithm, as it is, a simpler RC4 hardware design providing higher throughput is proposed in which 1-byte is processed in 1-clock. In the design two sequential tasks are executed as two independent events during rising and falling edges of the same clock and the swapping is directly executed using a MUX-DEMUX combination. The power consumed in behavioral and structural designs of RC4 are estimated and a power optimization technique is proposed. The NIST statistical test suite is run on RC4 key streams in order to know its randomness property. The encryption and decryption designs are respectively embedded on two FPGA boards with RC4 in a custom coprocessor followed by Ethernet communication.
△ Less
Submitted 27 July, 2012; v1 submitted 8 May, 2012;
originally announced May 2012.