-
Learning Spatio-Temporal Vessel Behavior using AIS Trajectory Data and Markovian Models in the Gulf of St. Lawrence
Authors:
Gabriel Spadon,
Ruixin Song,
Vaishnav Vaidheeswaran,
Md Mahbub Alam,
Floris Goerlandt,
Ronald Pelot
Abstract:
Maritime Mobility is at the center of the global economy, and analyzing and understanding such data at scale is critical for ocean conservation and governance. Accordingly, this work introduces a spatio-temporal analytical framework based on discrete-time Markov chains to analyze vessel movement patterns in the Gulf of St. Lawrence, emphasizing changes induced during the COVID-19 pandemic. We disc…
▽ More
Maritime Mobility is at the center of the global economy, and analyzing and understanding such data at scale is critical for ocean conservation and governance. Accordingly, this work introduces a spatio-temporal analytical framework based on discrete-time Markov chains to analyze vessel movement patterns in the Gulf of St. Lawrence, emphasizing changes induced during the COVID-19 pandemic. We discretize the ocean space into hexagonal cells and construct mobility signatures for individual vessel types using the frequency of cell transitions and the dwell time within each cell. These features are used to build origin-destination matrices and spatial transition probability models that characterize vessel dynamics at different temporal resolutions. Under multiple vessel types, we contribute with a temporal evolution analysis of mobility patterns during pandemic times, highlighting significant but transient changes to recurring transportation behaviors. Our findings indicate vessel-specific mobility signatures consistent across spatially disjoint regions, suggesting that those are latent behavioral invariants. Besides, we observe significant temporal deviations among passenger and fishing vessels during the pandemic, indicating a strong influence of social isolation policies and operational limitations imposed on non-essential maritime activity in this region.
△ Less
Submitted 22 May, 2025;
originally announced June 2025.
-
RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment
Authors:
Md Morshed Alam,
Lokesh Chandra Das,
Sandip Roy,
Sachin Shetty,
Weichao Wang
Abstract:
Internet of Things (IoT) platforms with trigger-action capability allow event conditions to trigger actions in IoT devices autonomously by creating a chain of interactions. Adversaries exploit this chain of interactions to maliciously inject fake event conditions into IoT hubs, triggering unauthorized actions on target IoT devices to implement remote injection attacks. Existing defense mechanisms…
▽ More
Internet of Things (IoT) platforms with trigger-action capability allow event conditions to trigger actions in IoT devices autonomously by creating a chain of interactions. Adversaries exploit this chain of interactions to maliciously inject fake event conditions into IoT hubs, triggering unauthorized actions on target IoT devices to implement remote injection attacks. Existing defense mechanisms focus mainly on the verification of event transactions using physical event fingerprints to enforce the security policies to block unsafe event transactions. These approaches are designed to provide offline defense against injection attacks. The state-of-the-art online defense mechanisms offer real-time defense, but extensive reliability on the inference of attack impacts on the IoT network limits the generalization capability of these approaches. In this paper, we propose a platform-independent multi-agent online defense system, namely RESTRAIN, to counter remote injection attacks at runtime. RESTRAIN allows the defense agent to profile attack actions at runtime and leverages reinforcement learning to optimize a defense policy that complies with the security requirements of the IoT network. The experimental results show that the defense agent effectively takes real-time defense actions against complex and dynamic remote injection attacks and maximizes the security gain with minimal computational overhead.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering
Authors:
Shihab Ahmed,
A B M Mohaimenur Rahman,
Md Morshed Alam,
Md Sajidul Islam Sajid
Abstract:
The rapid evolution of modern malware presents significant challenges to the development of effective defense mechanisms. Traditional cyber deception techniques often rely on static or manually configured parameters, limiting their adaptability to dynamic and sophisticated threats. This study leverages Generative AI (GenAI) models to automate the creation of adaptive cyber deception ploys, focusin…
▽ More
The rapid evolution of modern malware presents significant challenges to the development of effective defense mechanisms. Traditional cyber deception techniques often rely on static or manually configured parameters, limiting their adaptability to dynamic and sophisticated threats. This study leverages Generative AI (GenAI) models to automate the creation of adaptive cyber deception ploys, focusing on structured prompt engineering (PE) to enhance relevance, actionability, and deployability. We introduce a systematic framework (SPADE) to address inherent challenges large language models (LLMs) pose to adaptive deceptions, including generalized outputs, ambiguity, under-utilization of contextual information, and scalability constraints. Evaluations across diverse malware scenarios using metrics such as Recall, Exact Match (EM), BLEU Score, and expert quality assessments identified ChatGPT-4o as the top performer. Additionally, it achieved high engagement (93%) and accuracy (96%) with minimal refinements. Gemini and ChatGPT-4o Mini demonstrated competitive performance, with Llama3.2 showing promise despite requiring further optimization. These findings highlight the transformative potential of GenAI in automating scalable, adaptive deception strategies and underscore the critical role of structured PE in advancing real-world cybersecurity applications.
△ Less
Submitted 1 January, 2025;
originally announced January 2025.
-
Heat transfer in a planer diverging channel with a slot jet inlet
Authors:
Md Insiat Islam Rabby,
Mohammad Ali Rob Sharif,
Mohammad Tarequl Islam,
Md. Rakidul Islam,
Md. Mahidul Alam
Abstract:
This article delves into a numerical exploration of two-dimensional, incompressible, laminar flow within a confined diverging jet. The study aims to understand how variations in the inlet opening fraction and Reynolds number affect the heat transfer and flow patterns. The research employs the finite volume method with a collocated mesh to solve the governing equations. Across a broad spectrum of i…
▽ More
This article delves into a numerical exploration of two-dimensional, incompressible, laminar flow within a confined diverging jet. The study aims to understand how variations in the inlet opening fraction and Reynolds number affect the heat transfer and flow patterns. The research employs the finite volume method with a collocated mesh to solve the governing equations. Across a broad spectrum of inlet opening fractions (0.2, 0.4, and 0.6) and Reynolds numbers (ranging from 500 to 900), the findings reveal that increasing the inlet opening fraction of the jet in the diverging channel can lead to a remarkable (53%) improvement in heat transfer while simultaneously reducing pressure loss by 90%. This outcome holds the potential to conserve energy by requiring less pumping power. Notably, this investigation is pioneering and offers novel and valuable insights into enhancing heat transfer through the utilization of a diverging channel.
△ Less
Submitted 13 November, 2024;
originally announced November 2024.
-
UAV survey coverage path planning of complex regions containing exclusion zones
Authors:
Shadman Tajwar Shahid,
Shah Md. Ahasan Siddique,
Md. Mahidul Alam
Abstract:
This article addresses the challenge of UAV survey coverage path planning for areas that are complex concave polygons, containing exclusion zones or obstacles. While standard drone path planners typically generate coverage paths for simple convex polygons, this study proposes a method to manage more intricate regions, including boundary splits, merges, and interior holes. To achieve this, polygona…
▽ More
This article addresses the challenge of UAV survey coverage path planning for areas that are complex concave polygons, containing exclusion zones or obstacles. While standard drone path planners typically generate coverage paths for simple convex polygons, this study proposes a method to manage more intricate regions, including boundary splits, merges, and interior holes. To achieve this, polygonal decomposition techniques are used to partition the target area into convex sub-regions. The sub-polygons are then merged using a depth-first search algorithm, followed by the generation of continuous Boustrophedon paths based on connected components. Polygonal offset by the straight skeleton method was used to ensure a constant safe distance from the exclusion zones. This approach allows UAV path planning in environments with complex geometric constraints.
△ Less
Submitted 13 November, 2024; v1 submitted 11 November, 2024;
originally announced November 2024.
-
A Walsh Hadamard Derived Linear Vector Symbolic Architecture
Authors:
Mohammad Mahmudul Alam,
Alexander Oberle,
Edward Raff,
Stella Biderman,
Tim Oates,
James Holt
Abstract:
Vector Symbolic Architectures (VSAs) are one approach to developing Neuro-symbolic AI, where two vectors in $\mathbb{R}^d$ are `bound' together to produce a new vector in the same space. VSAs support the commutativity and associativity of this binding operation, along with an inverse operation, allowing one to construct symbolic-style manipulations over real-valued vectors. Most VSAs were develope…
▽ More
Vector Symbolic Architectures (VSAs) are one approach to developing Neuro-symbolic AI, where two vectors in $\mathbb{R}^d$ are `bound' together to produce a new vector in the same space. VSAs support the commutativity and associativity of this binding operation, along with an inverse operation, allowing one to construct symbolic-style manipulations over real-valued vectors. Most VSAs were developed before deep learning and automatic differentiation became popular and instead focused on efficacy in hand-designed systems. In this work, we introduce the Hadamard-derived linear Binding (HLB), which is designed to have favorable computational efficiency, and efficacy in classic VSA tasks, and perform well in differentiable systems. Code is available at https://github.com/FutureComputing4AI/Hadamard-derived-Linear-Binding
△ Less
Submitted 29 October, 2024;
originally announced October 2024.
-
Survey on Neighbor Discovery and Beam Alignment in mmWave-Enabled UAV Swarm Networks
Authors:
Muhammad Morshed Alam,
Sangman Moh
Abstract:
Millimeter wave (mmWave)-enabled unmanned aerial vehicle (UAV) swarm networks (UAVSNs) can utilize a large spectrum of resources to provide low latency and high data transmission rate. Additionally, owing to the short wavelength, UAVs equipped with large antenna arrays can form secure narrow directive beam to establish communication with less interference. However, due to the high UAV mobility, li…
▽ More
Millimeter wave (mmWave)-enabled unmanned aerial vehicle (UAV) swarm networks (UAVSNs) can utilize a large spectrum of resources to provide low latency and high data transmission rate. Additionally, owing to the short wavelength, UAVs equipped with large antenna arrays can form secure narrow directive beam to establish communication with less interference. However, due to the high UAV mobility, limited beam coverage, beam misalignment, and high path loss, it is very challenging to adopt the mmWave communication in UAVSNs. In this article, we present a comprehensive survey on neighbor discovery and beam alignment techniques for directional communication in mmWave-enabled UAVSNs. The existing techniques are reviewed and compared with each other. We also discuss key open issues and challenges with potential research direction.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
Variations in Multi-Agent Actor-Critic Frameworks for Joint Optimizations in UAV Swarm Networks: Recent Evolution, Challenges, and Directions
Authors:
Muhammad Morshed Alam,
Muhammad Yeasir Aarafat,
Tamim Hossain
Abstract:
Autonomous unmanned aerial vehicle (UAV) swarm networks (UAVSNs) can effectively execute surveillance, connectivity, and computing services to ground users (GUs). These missions require trajectory planning, UAV-GUs association, task offloading, next-hop selection, and resources such as transmit power, bandwidth, caching, and computing allocation to improve network performances. Owing to the highly…
▽ More
Autonomous unmanned aerial vehicle (UAV) swarm networks (UAVSNs) can effectively execute surveillance, connectivity, and computing services to ground users (GUs). These missions require trajectory planning, UAV-GUs association, task offloading, next-hop selection, and resources such as transmit power, bandwidth, caching, and computing allocation to improve network performances. Owing to the highly dynamic topology, limited resources, and non-availability of global knowledge, optimizing network performance in UAVSNs is very intricate. Hence, it requires an adaptive joint optimization framework that can tackle both discrete and continuous decision variables to ensure optimal network performance under dynamic constraints. Multi-agent deep reinforcement learning-based adaptive actor-critic framework can efficiently address these problems. This paper investigates the recent evolutions of actor-critic frameworks to deal with joint optimization problems in UAVSNs. In addition, challenges and potential solutions are addressed as research directions.
△ Less
Submitted 9 October, 2024;
originally announced October 2024.
-
Reconfigurable Intelligent Surfaces in Dynamic Rich Scattering Environments: BiLSTM-Based Optimization for Accurate User Localization
Authors:
Anum Umer,
Ivo Müürsepp,
Muhammad Mahtab Alam
Abstract:
The integration of reconfigurable intelligent surfaces (RIS) in wireless environments offers channel programmability and dynamic control over propagation channels, which is expected to play a crucial role in sixth generation (6G) networks. The majority of RIS-related research has focused on simpler, quasi-free-space conditions, where wireless channels are typically modeled analytically. However, m…
▽ More
The integration of reconfigurable intelligent surfaces (RIS) in wireless environments offers channel programmability and dynamic control over propagation channels, which is expected to play a crucial role in sixth generation (6G) networks. The majority of RIS-related research has focused on simpler, quasi-free-space conditions, where wireless channels are typically modeled analytically. However, many practical localization scenarios unfold in environments characterized by rich scattering that also change over time. These dynamic and complex conditions pose significant challenges in determining the optimal RIS configuration to maximize localization accuracy. In this paper, we present our approach to overcoming this challenge. This paper introduces a novel approach that leverages a bidirectional long-short term memory (biLSTM) network, trained with a simulator that accurately reflects wave physics, to capture the relationship between wireless channels and the RIS configuration under dynamic, rich-scattering conditions. We use this approach to optimize RIS configurations for enhanced user equipment (UE) localization, measured by mean squared error (MSE). Through extensive simulations, we demonstrate that our approach adapts RIS configurations to significantly improve localization accuracy in such dynamically changing rich scattering environments.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Toward Digitalization: A Secure Approach to Find a Missing Person Using Facial Recognition Technology
Authors:
Abid Faisal Ayon,
S M Maksudul Alam
Abstract:
Facial Recognition is a technique, based on machine learning technology that can recognize a human being analyzing his facial profile, and is applied in solving various types of realworld problems nowadays. In this paper, a common real-world problem, finding a missing person has been solved in a secure and effective way with the help of facial recognition technology. Although there exist a few wor…
▽ More
Facial Recognition is a technique, based on machine learning technology that can recognize a human being analyzing his facial profile, and is applied in solving various types of realworld problems nowadays. In this paper, a common real-world problem, finding a missing person has been solved in a secure and effective way with the help of facial recognition technology. Although there exist a few works on solving the problem, the proposed work is unique with respect to its security, design, and feasibility. Impeding intruders in participating in the processes and giving importance to both finders and family members of a missing person are two of the major features of this work. The proofs of the works of our system in finding a missing person have been described in the result section of the paper. The advantages that our system provides over the other existing systems can be realized from the comparisons, described in the result summary section of the paper. The work is capable of providing a worthy solution to find a missing person on the digital platform.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
Automated Virtual Product Placement and Assessment in Images using Diffusion Models
Authors:
Mohammad Mahmudul Alam,
Negin Sokhandan,
Emmett Goodman
Abstract:
In Virtual Product Placement (VPP) applications, the discrete integration of specific brand products into images or videos has emerged as a challenging yet important task. This paper introduces a novel three-stage fully automated VPP system. In the first stage, a language-guided image segmentation model identifies optimal regions within images for product inpainting. In the second stage, Stable Di…
▽ More
In Virtual Product Placement (VPP) applications, the discrete integration of specific brand products into images or videos has emerged as a challenging yet important task. This paper introduces a novel three-stage fully automated VPP system. In the first stage, a language-guided image segmentation model identifies optimal regions within images for product inpainting. In the second stage, Stable Diffusion (SD), fine-tuned with a few example product images, is used to inpaint the product into the previously identified candidate regions. The final stage introduces an "Alignment Module", which is designed to effectively sieve out low-quality images. Comprehensive experiments demonstrate that the Alignment Module ensures the presence of the intended product in every generated image and enhances the average quality of images by 35%. The results presented in this paper demonstrate the effectiveness of the proposed VPP system, which holds significant potential for transforming the landscape of virtual advertising and marketing strategies.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection
Authors:
Mohammad Mahmudul Alam,
Edward Raff,
Stella Biderman,
Tim Oates,
James Holt
Abstract:
Malware detection is an interesting and valuable domain to work in because it has significant real-world impact and unique machine-learning challenges. We investigate existing long-range techniques and benchmarks and find that they're not very suitable in this problem area. In this paper, we introduce Holographic Global Convolutional Networks (HGConv) that utilize the properties of Holographic Red…
▽ More
Malware detection is an interesting and valuable domain to work in because it has significant real-world impact and unique machine-learning challenges. We investigate existing long-range techniques and benchmarks and find that they're not very suitable in this problem area. In this paper, we introduce Holographic Global Convolutional Networks (HGConv) that utilize the properties of Holographic Reduced Representations (HRR) to encode and decode features from sequence elements. Unlike other global convolutional methods, our method does not require any intricate kernel computation or crafted kernel design. HGConv kernels are defined as simple parameters learned through backpropagation. The proposed method has achieved new SOTA results on Microsoft Malware Classification Challenge, Drebin, and EMBER malware benchmarks. With log-linear complexity in sequence length, the empirical results demonstrate substantially faster run-time by HGConv compared to other methods achieving far more efficient scaling even with sequence length $\geq 100,000$.
△ Less
Submitted 23 March, 2024;
originally announced March 2024.
-
Model, Analyze, and Comprehend User Interactions within a Social Media Platform
Authors:
Md Kaykobad Reza,
S M Maksudul Alam,
Yiran Luo,
Youzhe Liu,
Md Siam
Abstract:
In this study, we propose a novel graph-based approach to model, analyze and comprehend user interactions within a social media platform based on post-comment relationship. We construct a user interaction graph from social media data and analyze it to gain insights into community dynamics, user behavior, and content preferences. Our investigation reveals that while 56.05% of the active users are s…
▽ More
In this study, we propose a novel graph-based approach to model, analyze and comprehend user interactions within a social media platform based on post-comment relationship. We construct a user interaction graph from social media data and analyze it to gain insights into community dynamics, user behavior, and content preferences. Our investigation reveals that while 56.05% of the active users are strongly connected within the community, only 0.8% of them significantly contribute to its dynamics. Moreover, we observe temporal variations in community activity, with certain periods experiencing heightened engagement. Additionally, our findings highlight a correlation between user activity and popularity showing that more active users are generally more popular. Alongside these, a preference for positive and informative content is also observed where 82.41% users preferred positive and informative content. Overall, our study provides a comprehensive framework for understanding and managing online communities, leveraging graph-based techniques to gain valuable insights into user behavior and community dynamics.
△ Less
Submitted 28 November, 2024; v1 submitted 23 March, 2024;
originally announced March 2024.
-
Language and Speech Technology for Central Kurdish Varieties
Authors:
Sina Ahmadi,
Daban Q. Jaff,
Md Mahfuz Ibn Alam,
Antonios Anastasopoulos
Abstract:
Kurdish, an Indo-European language spoken by over 30 million speakers, is considered a dialect continuum and known for its diversity in language varieties. Previous studies addressing language and speech technology for Kurdish handle it in a monolithic way as a macro-language, resulting in disparities for dialects and varieties for which there are few resources and tools available. In this paper,…
▽ More
Kurdish, an Indo-European language spoken by over 30 million speakers, is considered a dialect continuum and known for its diversity in language varieties. Previous studies addressing language and speech technology for Kurdish handle it in a monolithic way as a macro-language, resulting in disparities for dialects and varieties for which there are few resources and tools available. In this paper, we take a step towards developing resources for language and speech technology for varieties of Central Kurdish, creating a corpus by transcribing movies and TV series as an alternative to fieldwork. Additionally, we report the performance of machine translation, automatic speech recognition, and language identification as downstream tasks evaluated on Central Kurdish varieties. Data and models are publicly available under an open license at https://github.com/sinaahmadi/CORDI.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
A Case Study on Filtering for End-to-End Speech Translation
Authors:
Md Mahfuz Ibn Alam,
Antonios Anastasopoulos
Abstract:
It is relatively easy to mine a large parallel corpus for any machine learning task, such as speech-to-text or speech-to-speech translation. Although these mined corpora are large in volume, their quality is questionable. This work shows that the simplest filtering technique can trim down these big, noisy datasets to a more manageable, clean dataset. We also show that using this clean dataset can…
▽ More
It is relatively easy to mine a large parallel corpus for any machine learning task, such as speech-to-text or speech-to-speech translation. Although these mined corpora are large in volume, their quality is questionable. This work shows that the simplest filtering technique can trim down these big, noisy datasets to a more manageable, clean dataset. We also show that using this clean dataset can improve the model's performance, as in the case of the multilingual-to-English Speech Translation (ST) model, where, on average, we obtain a 4.65 BLEU score improvement.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
A Morphologically-Aware Dictionary-based Data Augmentation Technique for Machine Translation of Under-Represented Languages
Authors:
Md Mahfuz Ibn Alam,
Sina Ahmadi,
Antonios Anastasopoulos
Abstract:
The availability of parallel texts is crucial to the performance of machine translation models. However, most of the world's languages face the predominant challenge of data scarcity. In this paper, we propose strategies to synthesize parallel data relying on morpho-syntactic information and using bilingual lexicons along with a small amount of seed parallel data. Our methodology adheres to a real…
▽ More
The availability of parallel texts is crucial to the performance of machine translation models. However, most of the world's languages face the predominant challenge of data scarcity. In this paper, we propose strategies to synthesize parallel data relying on morpho-syntactic information and using bilingual lexicons along with a small amount of seed parallel data. Our methodology adheres to a realistic scenario backed by the small parallel seed data. It is linguistically informed, as it aims to create augmented data that is more likely to be grammatically correct. We analyze how our synthetic data can be combined with raw parallel data and demonstrate a consistent improvement in performance in our experiments on 14 languages (28 English <-> X pairs) ranging from well- to very low-resource ones. Our method leads to improvements even when using only five seed sentences and a bilingual lexicon.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks
Authors:
Md Morshed Alam,
Israt Jahan,
Weichao Wang
Abstract:
In trigger-action IoT platforms, IoT devices report event conditions to IoT hubs notifying their cyber states and let the hubs invoke actions in other IoT devices based on functional dependencies defined as rules in a rule engine. These functional dependencies create a chain of interactions that help automate network tasks. Adversaries exploit this chain to report fake event conditions to IoT hubs…
▽ More
In trigger-action IoT platforms, IoT devices report event conditions to IoT hubs notifying their cyber states and let the hubs invoke actions in other IoT devices based on functional dependencies defined as rules in a rule engine. These functional dependencies create a chain of interactions that help automate network tasks. Adversaries exploit this chain to report fake event conditions to IoT hubs and perform remote injection attacks upon a smart environment to indirectly control targeted IoT devices. Existing defense efforts usually depend on static analysis over IoT apps to develop rule-based anomaly detection mechanisms. We also see ML-based defense mechanisms in the literature that harness physical event fingerprints to determine anomalies in an IoT network. However, these methods often demonstrate long response time and lack of adaptability when facing complicated attacks. In this paper, we propose to build a deep reinforcement learning based real-time defense system for injection attacks. We define the reward functions for defenders and implement a deep Q-network based approach to identify the optimal defense policy. Our experiments show that the proposed mechanism can effectively and accurately identify and defend against injection attacks with reasonable computation overhead.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Towards Generalization in Subitizing with Neuro-Symbolic Loss using Holographic Reduced Representations
Authors:
Mohammad Mahmudul Alam,
Edward Raff,
Tim Oates
Abstract:
While deep learning has enjoyed significant success in computer vision tasks over the past decade, many shortcomings still exist from a Cognitive Science (CogSci) perspective. In particular, the ability to subitize, i.e., quickly and accurately identify the small (less than 6) count of items, is not well learned by current Convolutional Neural Networks (CNNs) or Vision Transformers (ViTs) when usi…
▽ More
While deep learning has enjoyed significant success in computer vision tasks over the past decade, many shortcomings still exist from a Cognitive Science (CogSci) perspective. In particular, the ability to subitize, i.e., quickly and accurately identify the small (less than 6) count of items, is not well learned by current Convolutional Neural Networks (CNNs) or Vision Transformers (ViTs) when using a standard cross-entropy (CE) loss. In this paper, we demonstrate that adapting tools used in CogSci research can improve the subitizing generalization of CNNs and ViTs by developing an alternative loss function using Holographic Reduced Representations (HRRs). We investigate how this neuro-symbolic approach to learning affects the subitizing capability of CNNs and ViTs, and so we focus on specially crafted problems that isolate generalization to specific aspects of subitizing. Via saliency maps and out-of-distribution performance, we are able to empirically observe that the proposed HRR loss improves subitizing generalization though it does not completely solve the problem. In addition, we find that ViTs perform considerably worse compared to CNNs in most respects on subitizing, except on one axis where an HRR-based loss provides improvement.
△ Less
Submitted 23 December, 2023;
originally announced December 2023.
-
Reconfigurable Intelligent Surfaces in 6G Radio Localization: A Survey of Recent Developments, Opportunities, and Challenges
Authors:
Anum Umer,
Ivo Müürsepp,
Muhammad Mahtab Alam,
Henk Wymeersch
Abstract:
In this survey paper, we present an extensive review of the use of RIS in 6G radio localization, highlighting their pivotal role as a low-cost, energy-efficient technology that reshapes wireless communication and localization landscapes. Investigating the versatile capabilities of RIS, we explore their dynamic control over electromagnetic wave manipulation, including reflection, refraction, and tr…
▽ More
In this survey paper, we present an extensive review of the use of RIS in 6G radio localization, highlighting their pivotal role as a low-cost, energy-efficient technology that reshapes wireless communication and localization landscapes. Investigating the versatile capabilities of RIS, we explore their dynamic control over electromagnetic wave manipulation, including reflection, refraction, and transmission, which opens new horizons in diverse applications ranging from IOT connectivity to advanced mobile communication, and various innovative applications in Industry 4.0. Our comprehensive review provides an overview of RIS use in 6G radio localization, highlighting recent progress in RIS technology assisted localization. It focuses on key aspects, including network scenarios, transmission bands, deployment environments, and near-field operations. We discuss studies to examine the state-of-the-art RIS-assisted localization and optimization techniques and their performance evaluation matrices. In addition, we present a detailed taxonomy of RIS-assisted radio localization, emphasizing the rapid evolution and potential of RIS technology in non-line-of-sight scenarios as an alternative to traditional base stations. Based on the careful investigation of the reviewed studies, the survey also sheds light on future research directions, technical challenges, and limitations, offering a clear perspective on the integration and optimization of RIS in 6G networks for enhanced localization capabilities.
△ Less
Submitted 4 February, 2025; v1 submitted 12 December, 2023;
originally announced December 2023.
-
DDxT: Deep Generative Transformer Models for Differential Diagnosis
Authors:
Mohammad Mahmudul Alam,
Edward Raff,
Tim Oates,
Cynthia Matuszek
Abstract:
Differential Diagnosis (DDx) is the process of identifying the most likely medical condition among the possible pathologies through the process of elimination based on evidence. An automated process that narrows a large set of pathologies down to the most likely pathologies will be of great importance. The primary prior works have relied on the Reinforcement Learning (RL) paradigm under the intuit…
▽ More
Differential Diagnosis (DDx) is the process of identifying the most likely medical condition among the possible pathologies through the process of elimination based on evidence. An automated process that narrows a large set of pathologies down to the most likely pathologies will be of great importance. The primary prior works have relied on the Reinforcement Learning (RL) paradigm under the intuition that it aligns better with how physicians perform DDx. In this paper, we show that a generative approach trained with simpler supervised and self-supervised learning signals can achieve superior results on the current benchmark. The proposed Transformer-based generative network, named DDxT, autoregressively produces a set of possible pathologies, i.e., DDx, and predicts the actual pathology using a neural network. Experiments are performed using the DDXPlus dataset. In the case of DDx, the proposed network has achieved a mean accuracy of 99.82% and a mean F1 score of 0.9472. Additionally, mean accuracy reaches 99.98% with a mean F1 score of 0.9949 while predicting ground truth pathology. The proposed DDxT outperformed the previous RL-based approaches by a big margin. Overall, the automated Transformer-based DDx generative model has the potential to become a useful tool for a physician in times of urgency.
△ Less
Submitted 2 December, 2023;
originally announced December 2023.
-
Revisit the intrinsic features of flip-flopping flow behind side-by-side circular cylinders
Authors:
Wailing Chen,
Yuhao Yan,
Chunning Ji,
Md. Mahbub Alam,
Narakron Srinil,
Bernd R. Noack,
Nan Deng
Abstract:
As one of the most intriguing wake patterns of two side-by-side circular cylinders at an intermediate gap spacing, the flip-flopping (FF) flow has attracted great attention of fundamental research interest. This FF flow is featured by the intermittently and randomly switching gap flow with correspondingly changing forces of the two cylinders. In this paper, we first present a partition map of the…
▽ More
As one of the most intriguing wake patterns of two side-by-side circular cylinders at an intermediate gap spacing, the flip-flopping (FF) flow has attracted great attention of fundamental research interest. This FF flow is featured by the intermittently and randomly switching gap flow with correspondingly changing forces of the two cylinders. In this paper, we first present a partition map of the wake patterns behind two side-by-side circular cylinders and briefly introduce intrinsic features of each flow pattern. We focus on the FF flow aiming to explain: (i) the origin of the FF flow between laminar and turbulent regimes, (ii) their connections in different flow regimes, and (iii) mechanisms of the significantly varying flip-over time scale of the FF flows. In the laminar regime, we further divide the FF flow into the sub-classed I (FF1) and II (FF2), based on their different origins from the in-phase and anti-phase synchronized vortex shedding instabilities, respectively. By exploring the vortex interactions, we show that the FF flow in the turbulent regime has the same origin and similar vortex dynamics as the FF2 wake in the laminar regime, despite some minor disparities. Thus, a connection is established between the FF2 pattern in the laminar flow and the FF pattern in the turbulent flow. For the FF flow in the laminar regime (Re < 150-200), the mildly decreasing switching time, is several vortex shedding periods. However, for the FF flow in the weak turbulence regime (150-200 < Re < 1000-1700), the switching time scale increases significantly with Re owing to the increased vortex formation length. The FF in the strong turbulence regime (Re > 1000-1700) has a switching time scale of several orders of magnitude longer than the vortex shedding period, where the switching scale decreases gradually with Re due to the stronger Kelvin-Helmholtz vortices.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
Recasting Self-Attention with Holographic Reduced Representations
Authors:
Mohammad Mahmudul Alam,
Edward Raff,
Stella Biderman,
Tim Oates,
James Holt
Abstract:
In recent years, self-attention has become the dominant paradigm for sequence modeling in a variety of domains. However, in domains with very long sequence lengths the $\mathcal{O}(T^2)$ memory and $\mathcal{O}(T^2 H)$ compute costs can make using transformers infeasible. Motivated by problems in malware detection, where sequence lengths of $T \geq 100,000$ are a roadblock to deep learning, we re-…
▽ More
In recent years, self-attention has become the dominant paradigm for sequence modeling in a variety of domains. However, in domains with very long sequence lengths the $\mathcal{O}(T^2)$ memory and $\mathcal{O}(T^2 H)$ compute costs can make using transformers infeasible. Motivated by problems in malware detection, where sequence lengths of $T \geq 100,000$ are a roadblock to deep learning, we re-cast self-attention using the neuro-symbolic approach of Holographic Reduced Representations (HRR). In doing so we perform the same high-level strategy of the standard self-attention: a set of queries matching against a set of keys, and returning a weighted response of the values for each key. Implemented as a ``Hrrformer'' we obtain several benefits including $\mathcal{O}(T H \log H)$ time complexity, $\mathcal{O}(T H)$ space complexity, and convergence in $10\times$ fewer epochs. Nevertheless, the Hrrformer achieves near state-of-the-art accuracy on LRA benchmarks and we are able to learn with just a single layer. Combined, these benefits make our Hrrformer the first viable Transformer for such long malware classification sequences and up to $280\times$ faster to train on the Long Range Arena benchmark. Code is available at \url{https://github.com/NeuromorphicComputationResearchProgram/Hrrformer}
△ Less
Submitted 30 May, 2023;
originally announced May 2023.
-
CODET: A Benchmark for Contrastive Dialectal Evaluation of Machine Translation
Authors:
Md Mahfuz Ibn Alam,
Sina Ahmadi,
Antonios Anastasopoulos
Abstract:
Neural machine translation (NMT) systems exhibit limited robustness in handling source-side linguistic variations. Their performance tends to degrade when faced with even slight deviations in language usage, such as different domains or variations introduced by second-language speakers. It is intuitive to extend this observation to encompass dialectal variations as well, but the work allowing the…
▽ More
Neural machine translation (NMT) systems exhibit limited robustness in handling source-side linguistic variations. Their performance tends to degrade when faced with even slight deviations in language usage, such as different domains or variations introduced by second-language speakers. It is intuitive to extend this observation to encompass dialectal variations as well, but the work allowing the community to evaluate MT systems on this dimension is limited. To alleviate this issue, we compile and release CODET, a contrastive dialectal benchmark encompassing 891 different variations from twelve different languages. We also quantitatively demonstrate the challenges large MT models face in effectively translating dialectal variants. All the data and code have been released.
△ Less
Submitted 2 February, 2024; v1 submitted 26 May, 2023;
originally announced May 2023.
-
BIG-C: a Multimodal Multi-Purpose Dataset for Bemba
Authors:
Claytone Sikasote,
Eunice Mukonde,
Md Mahfuz Ibn Alam,
Antonios Anastasopoulos
Abstract:
We present BIG-C (Bemba Image Grounded Conversations), a large multimodal dataset for Bemba. While Bemba is the most populous language of Zambia, it exhibits a dearth of resources which render the development of language technologies or language processing research almost impossible. The dataset is comprised of multi-turn dialogues between Bemba speakers based on images, transcribed and translated…
▽ More
We present BIG-C (Bemba Image Grounded Conversations), a large multimodal dataset for Bemba. While Bemba is the most populous language of Zambia, it exhibits a dearth of resources which render the development of language technologies or language processing research almost impossible. The dataset is comprised of multi-turn dialogues between Bemba speakers based on images, transcribed and translated into English. There are more than 92,000 utterances/sentences, amounting to more than 180 hours of audio data with corresponding transcriptions and English translations. We also provide baselines on speech recognition (ASR), machine translation (MT) and speech translation (ST) tasks, and sketch out other potential future multimodal uses of our dataset. We hope that by making the dataset available to the research community, this work will foster research and encourage collaboration across the language, speech, and vision communities especially for languages outside the "traditionally" used high-resourced ones. All data and code are publicly available: https://github.com/csikasote/bigc.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
LIMIT: Language Identification, Misidentification, and Translation using Hierarchical Models in 350+ Languages
Authors:
Milind Agarwal,
Md Mahfuz Ibn Alam,
Antonios Anastasopoulos
Abstract:
Knowing the language of an input text/audio is a necessary first step for using almost every NLP tool such as taggers, parsers, or translation systems. Language identification is a well-studied problem, sometimes even considered solved; in reality, due to lack of data and computational challenges, current systems cannot accurately identify most of the world's 7000 languages. To tackle this bottlen…
▽ More
Knowing the language of an input text/audio is a necessary first step for using almost every NLP tool such as taggers, parsers, or translation systems. Language identification is a well-studied problem, sometimes even considered solved; in reality, due to lack of data and computational challenges, current systems cannot accurately identify most of the world's 7000 languages. To tackle this bottleneck, we first compile a corpus, MCS-350, of 50K multilingual and parallel children's stories in 350+ languages. MCS-350 can serve as a benchmark for language identification of short texts and for 1400+ new translation directions in low-resource Indian and African languages. Second, we propose a novel misprediction-resolution hierarchical model, LIMIt, for language identification that reduces error by 55% (from 0.71 to 0.32) on our compiled children's stories dataset and by 40% (from 0.23 to 0.14) on the FLORES-200 benchmark. Our method can expand language identification coverage into low-resource languages by relying solely on systemic misprediction patterns, bypassing the need to retrain large models from scratch.
△ Less
Submitted 6 November, 2023; v1 submitted 23 May, 2023;
originally announced May 2023.
-
GMNLP at SemEval-2023 Task 12: Sentiment Analysis with Phylogeny-Based Adapters
Authors:
Md Mahfuz Ibn Alam,
Ruoyu Xie,
Fahim Faisal,
Antonios Anastasopoulos
Abstract:
This report describes GMU's sentiment analysis system for the SemEval-2023 shared task AfriSenti-SemEval. We participated in all three sub-tasks: Monolingual, Multilingual, and Zero-Shot. Our approach uses models initialized with AfroXLMR-large, a pre-trained multilingual language model trained on African languages and fine-tuned correspondingly. We also introduce augmented training data along wit…
▽ More
This report describes GMU's sentiment analysis system for the SemEval-2023 shared task AfriSenti-SemEval. We participated in all three sub-tasks: Monolingual, Multilingual, and Zero-Shot. Our approach uses models initialized with AfroXLMR-large, a pre-trained multilingual language model trained on African languages and fine-tuned correspondingly. We also introduce augmented training data along with original training data. Alongside finetuning, we perform phylogeny-based adapter tuning to create several models and ensemble the best models for the final submission. Our system achieves the best F1-score on track 5: Amharic, with 6.2 points higher F1-score than the second-best performing system on this track. Overall, our system ranks 5th among the 10 systems participating in all 15 tracks.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
Retention Is All You Need
Authors:
Karishma Mohiuddin,
Mirza Ariful Alam,
Mirza Mohtashim Alam,
Pascal Welke,
Michael Martin,
Jens Lehmann,
Sahar Vahdati
Abstract:
Skilled employees are the most important pillars of an organization. Despite this, most organizations face high attrition and turnover rates. While several machine learning models have been developed to analyze attrition and its causal factors, the interpretations of those models remain opaque. In this paper, we propose the HR-DSS approach, which stands for Human Resource (HR) Decision Support Sys…
▽ More
Skilled employees are the most important pillars of an organization. Despite this, most organizations face high attrition and turnover rates. While several machine learning models have been developed to analyze attrition and its causal factors, the interpretations of those models remain opaque. In this paper, we propose the HR-DSS approach, which stands for Human Resource (HR) Decision Support System, and uses explainable AI for employee attrition problems. The system is designed to assist HR departments in interpreting the predictions provided by machine learning models. In our experiments, we employ eight machine learning models to provide predictions. We further process the results achieved by the best-performing model by the SHAP explainability process and use the SHAP values to generate natural language explanations which can be valuable for HR. Furthermore, using "What-if-analysis", we aim to observe plausible causes for attrition of an individual employee. The results show that by adjusting the specific dominant features of each individual, employee attrition can turn into employee retention through informative business decisions.
△ Less
Submitted 26 August, 2023; v1 submitted 6 April, 2023;
originally announced April 2023.
-
Cost of Implementation of Basel III reforms in Bangladesh -- A Panel data analysis
Authors:
Dipti Rani Hazra,
Md. Shah Naoaj,
Mohammed Mahinur Alam,
Abdul Kader
Abstract:
Inspired by the recent debate on the macroeconomic implications of the new bank regulatory standards known as Basel III, we tried to find out in this study that the impact of Basel III liquidity and capital requirements in Bangladesh proposed by Basel Committee on Banking Supervision (BCBS, 2010a). A small set of macro variables, using a sample of 22 private commercial banks operating in Banglades…
▽ More
Inspired by the recent debate on the macroeconomic implications of the new bank regulatory standards known as Basel III, we tried to find out in this study that the impact of Basel III liquidity and capital requirements in Bangladesh proposed by Basel Committee on Banking Supervision (BCBS, 2010a). A small set of macro variables, using a sample of 22 private commercial banks operating in Bangladesh for the period of 2010-2014, are used to estimate long-run relationships among the variables. The macroeconomic variables are included The profitability of banks, GDP, banks' lending to private sector, Net Stable Funding Ratio, Tier 1 capital Ratio, Interest rate spread, real interest rate. The cost is quantified using Driscoll and Kraay panel data models with fixed effect. Impact of higher capital and liquidity requirement on Interest rate spread and lending to private sector of banks were considered as the cost to the economy as a whole whereas impact of higher capital and liquidity requirement on profitability of banks(ROE) was considered as the cost of banks. Here it is found that, the interest rate level is positively affected by the tighter liquidity and capital requirements which driven toward lessen of the private sector lending of banks. The return on equity of banks varies negatively with the liquidity and capital. The economic costs are considerably below the estimated positive benefit that the reform should have by reducing the probability of banking crises and the associated banking losses (BCBS, 2010b).
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Lempel-Ziv Networks
Authors:
Rebecca Saul,
Mohammad Mahmudul Alam,
John Hurwitz,
Edward Raff,
Tim Oates,
James Holt
Abstract:
Sequence processing has long been a central area of machine learning research. Recurrent neural nets have been successful in processing sequences for a number of tasks; however, they are known to be both ineffective and computationally expensive when applied to very long sequences. Compression-based methods have demonstrated more robustness when processing such sequences -- in particular, an appro…
▽ More
Sequence processing has long been a central area of machine learning research. Recurrent neural nets have been successful in processing sequences for a number of tasks; however, they are known to be both ineffective and computationally expensive when applied to very long sequences. Compression-based methods have demonstrated more robustness when processing such sequences -- in particular, an approach pairing the Lempel-Ziv Jaccard Distance (LZJD) with the k-Nearest Neighbor algorithm has shown promise on long sequence problems (up to $T=200,000,000$ steps) involving malware classification. Unfortunately, use of LZJD is limited to discrete domains. To extend the benefits of LZJD to a continuous domain, we investigate the effectiveness of a deep-learning analog of the algorithm, the Lempel-Ziv Network. While we achieve successful proof of concept, we are unable to improve meaningfully on the performance of a standard LSTM across a variety of datasets and sequence processing tasks. In addition to presenting this negative result, our work highlights the problem of sub-par baseline tuning in newer research areas.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
Integrating Knowledge Graph embedding and pretrained Language Models in Hypercomplex Spaces
Authors:
Mojtaba Nayyeri,
Zihao Wang,
Mst. Mahfuja Akter,
Mirza Mohtashim Alam,
Md Rashad Al Hasan Rony,
Jens Lehmann,
Steffen Staab
Abstract:
Knowledge Graphs, such as Wikidata, comprise structural and textual knowledge in order to represent knowledge. For each of the two modalities dedicated approaches for graph embedding and language models learn patterns that allow for predicting novel structural knowledge. Few approaches have integrated learning and inference with both modalities and these existing ones could only partially exploit…
▽ More
Knowledge Graphs, such as Wikidata, comprise structural and textual knowledge in order to represent knowledge. For each of the two modalities dedicated approaches for graph embedding and language models learn patterns that allow for predicting novel structural knowledge. Few approaches have integrated learning and inference with both modalities and these existing ones could only partially exploit the interaction of structural and textual knowledge. In our approach, we build on existing strong representations of single modalities and we use hypercomplex algebra to represent both, (i), single-modality embedding as well as, (ii), the interaction between different modalities and their complementary means of knowledge representation. More specifically, we suggest Dihedron and Quaternion representations of 4D hypercomplex numbers to integrate four modalities namely structural knowledge graph embedding, word-level representations (e.g.\ Word2vec, Fasttext), sentence-level representations (Sentence transformer), and document-level representations (sentence transformer, Doc2vec). Our unified vector representation scores the plausibility of labelled edges via Hamilton and Dihedron products, thus modeling pairwise interactions between different modalities. Extensive experimental evaluation on standard benchmark datasets shows the superiority of our two new models using abundant textual information besides sparse structural knowledge to enhance performance in link prediction tasks.
△ Less
Submitted 16 August, 2023; v1 submitted 4 August, 2022;
originally announced August 2022.
-
Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations
Authors:
Mohammad Mahmudul Alam,
Edward Raff,
Tim Oates,
James Holt
Abstract:
Due to the computational cost of running inference for a neural network, the need to deploy the inferential steps on a third party's compute environment or hardware is common. If the third party is not fully trusted, it is desirable to obfuscate the nature of the inputs and outputs, so that the third party can not easily determine what specific task is being performed. Provably secure protocols fo…
▽ More
Due to the computational cost of running inference for a neural network, the need to deploy the inferential steps on a third party's compute environment or hardware is common. If the third party is not fully trusted, it is desirable to obfuscate the nature of the inputs and outputs, so that the third party can not easily determine what specific task is being performed. Provably secure protocols for leveraging an untrusted party exist but are too computational demanding to run in practice. We instead explore a different strategy of fast, heuristic security that we call Connectionist Symbolic Pseudo Secrets. By leveraging Holographic Reduced Representations (HRR), we create a neural network with a pseudo-encryption style defense that empirically shows robustness to attack, even under threat models that unrealistically favor the adversary.
△ Less
Submitted 12 June, 2022;
originally announced June 2022.
-
WEcharge: democratizing EV charging infrastructure
Authors:
Md Umar Hashmi,
Mohammad Meraj Alam,
Ony Lalaina Valerie Ramarozatovo,
Mohammad Shadab Alam
Abstract:
The sustainable growth of EVs will have to be met with proportional growth in EV charging infrastructure. With limited urban spaces to place new charging stations, shrinking profitability, privately owned charging facilities need to be shared. WEcharge will allow privately owned charging infrastructure to be shared with public EV owners using a business model. We propose a resource matching algori…
▽ More
The sustainable growth of EVs will have to be met with proportional growth in EV charging infrastructure. With limited urban spaces to place new charging stations, shrinking profitability, privately owned charging facilities need to be shared. WEcharge will allow privately owned charging infrastructure to be shared with public EV owners using a business model. We propose a resource matching algorithm that takes into account incoming EV preferences, hard constraints for such EV, and provides the best suited resource for charging. We demonstrate the applicability of the matching model by showing a realistic case study with a Nissan Leaf 40 kW EV and 25 company and publicly owned charging stations (DC fast charger, AC rapid charger, level 1 and level 2 charger) in Hasselt, Belgium. The case study shows that consumer preferences will govern resource matching.
△ Less
Submitted 25 March, 2022;
originally announced April 2022.
-
LEMON: LanguagE ModeL for Negative Sampling of Knowledge Graph Embeddings
Authors:
Md Rashad Al Hasan Rony,
Mirza Mohtashim Alam,
Semab Ali,
Jens Lehmann,
Sahar Vahdati
Abstract:
Knowledge Graph Embedding models have become an important area of machine learning.Those models provide a latent representation of entities and relations in a knowledge graph which can then be used in downstream machine learning tasks such as link prediction. The learning process of such models can be performed by contrasting positive and negative triples. While all triples of a KG are considered…
▽ More
Knowledge Graph Embedding models have become an important area of machine learning.Those models provide a latent representation of entities and relations in a knowledge graph which can then be used in downstream machine learning tasks such as link prediction. The learning process of such models can be performed by contrasting positive and negative triples. While all triples of a KG are considered positive, negative triples are usually not readily available. Therefore, the choice of the sampling method to obtain the negative triples play a crucial role in the performance and effectiveness of Knowledge Graph Embedding models. Most of the current methods fetch negative samples from a random distribution of entities in the underlying Knowledge Graph which also often includes meaningless triples. Other known methods use adversarial techniques or generative neural networks which consequently reduce the efficiency of the process. In this paper, we propose an approach for generating informative negative samples considering available complementary knowledge about entities. Particularly, Pre-trained Language Models are used to form neighborhood clusters by utilizing the distances between entities to obtain representations of symbolic entities via their textual information. Our comprehensive evaluations demonstrate the effectiveness of the proposed approach on benchmark Knowledge Graphs with textual information for the link prediction task.
△ Less
Submitted 15 October, 2022; v1 submitted 9 March, 2022;
originally announced March 2022.
-
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms
Authors:
Md Morshed Alam,
Md Sajidul Islam Sajid,
Weichao Wang,
Jinpeng Wei
Abstract:
With the emergence and fast development of trigger-action platforms in IoT settings, security vulnerabilities caused by the interactions among IoT devices become more prevalent. The event occurrence at one device triggers an action in another device, which may eventually contribute to the creation of a chain of events in a network. Adversaries exploit the chain effect to compromise IoT devices and…
▽ More
With the emergence and fast development of trigger-action platforms in IoT settings, security vulnerabilities caused by the interactions among IoT devices become more prevalent. The event occurrence at one device triggers an action in another device, which may eventually contribute to the creation of a chain of events in a network. Adversaries exploit the chain effect to compromise IoT devices and trigger actions of interest remotely just by injecting malicious events into the chain. To address security vulnerabilities caused by trigger-action scenarios, existing research efforts focus on the validation of the security properties of devices or verification of the occurrence of certain events based on their physical fingerprints on a device. We propose IoTMonitor, a security analysis system that discerns the underlying chain of event occurrences with the highest probability by observing a chain of physical evidence collected by sensors. We use the Baum-Welch algorithm to estimate transition and emission probabilities and the Viterbi algorithm to discern the event sequence. We can then identify the crucial nodes in the trigger-action sequence whose compromise allows attackers to reach their final goals. The experiment results of our designed system upon the PEEVES datasets show that we can rebuild the event occurrence sequence with high accuracy from the observations and identify the crucial nodes on the attack paths.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Impact of subsidy on profitability of residential photovoltaics, battery and inverter in Flanders
Authors:
Md Umar Hashmi,
Mohammed Meraj Alam
Abstract:
The sustained future growth of renewable energy in the distribution network is governed by its financial viability. The recent subsidies in Flanders for photovoltaic (PV) and battery are used to calculate the payback period on prosumer investment in residential PV, battery and inverter installations. Realistic scenario of PV, battery and inverter are created based on the market catalogue of one ma…
▽ More
The sustained future growth of renewable energy in the distribution network is governed by its financial viability. The recent subsidies in Flanders for photovoltaic (PV) and battery are used to calculate the payback period on prosumer investment in residential PV, battery and inverter installations. Realistic scenario of PV, battery and inverter are created based on the market catalogue of one manufacturer per product. Using these scenarios, one-year simulations for a residential prosumer are conducted in a rolling horizon. Luminus, an energy service provider in Limburg, time-of-use and feed-in-tariff contract rates are utilized. The numerical evaluation indicates that the policies prefer new PV installations. The subsidy comparison for 2021 to 2024 is also conducted. Oversizing PV compared to inverter size increases profitability. Batteries performing only arbitrage may not attract much investment, as the payback period is high. This shows the need to maximize the value addition of prosumer investment on residential batteries by participating in multiple goals.
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
SD-QA: Spoken Dialectal Question Answering for the Real World
Authors:
Fahim Faisal,
Sharlina Keshava,
Md Mahfuz ibn Alam,
Antonios Anastasopoulos
Abstract:
Question answering (QA) systems are now available through numerous commercial applications for a wide variety of domains, serving millions of users that interact with them via speech interfaces. However, current benchmarks in QA research do not account for the errors that speech recognition models might introduce, nor do they consider the language variations (dialects) of the users. To address thi…
▽ More
Question answering (QA) systems are now available through numerous commercial applications for a wide variety of domains, serving millions of users that interact with them via speech interfaces. However, current benchmarks in QA research do not account for the errors that speech recognition models might introduce, nor do they consider the language variations (dialects) of the users. To address this gap, we augment an existing QA dataset to construct a multi-dialect, spoken QA benchmark on five languages (Arabic, Bengali, English, Kiswahili, Korean) with more than 68k audio prompts in 24 dialects from 255 speakers. We provide baseline results showcasing the real-world performance of QA systems and analyze the effect of language variety and other sensitive speaker attributes on downstream performance. Last, we study the fairness of the ASR and QA models with respect to the underlying user populations. The dataset, model outputs, and code for reproducing all our experiments are available: https://github.com/ffaisal93/SD-QA.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
A Probit Estimation of Urban Bases of Environmental Awareness: Evidence from Sylhet City, Bangladesh
Authors:
Mohammad Masud Alam,
AFM Zakaria
Abstract:
This paper evaluates the significant factors contributing to environmental awareness among individuals living in the urban area of Sylhet, Bangladesh. Ordered Probit(OPM) estimation is applied on the value of ten measures of individual environmental concern. The estimated results of OPM reveal the dominance of higher education, higher income, and full-employment status on environmental concern and…
▽ More
This paper evaluates the significant factors contributing to environmental awareness among individuals living in the urban area of Sylhet, Bangladesh. Ordered Probit(OPM) estimation is applied on the value of ten measures of individual environmental concern. The estimated results of OPM reveal the dominance of higher education, higher income, and full-employment status on environmental concern and environmentally responsible behavior. Younger and more educated respondents tended to be more knowledgeable and concerned than older and less educated respondents. The marginal effect of household size, middle-income level income, and part-time employment status of the survey respondents played a less significant role in the degree of environmental awareness. Findings also validate the "age hypothesis" proposed by Van Liere and Dunlap (1980), and the gender effect reveals an insignificant role in determining the degree of environmental concern. Environmental awareness among urban individuals with higher income increased linearly with environmental awareness programs which may have significant policy importance, such as environmental awareness programs for old-aged and less-educated individuals, and may lead to increased taxation on higher income groups to mitigate city areas' pollution problems.
△ Less
Submitted 28 September, 2021; v1 submitted 17 July, 2021;
originally announced July 2021.
-
A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement
Authors:
Md Morshed Alam,
Weichao Wang
Abstract:
Data provenance collects comprehensive information about the events and operations in a computer system at both application and system levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are…
▽ More
Data provenance collects comprehensive information about the events and operations in a computer system at both application and system levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT networks. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.
△ Less
Submitted 4 July, 2021;
originally announced July 2021.
-
On the Evaluation of Machine Translation for Terminology Consistency
Authors:
Md Mahfuz ibn Alam,
Antonios Anastasopoulos,
Laurent Besacier,
James Cross,
Matthias Gallé,
Philipp Koehn,
Vassilina Nikoulina
Abstract:
As neural machine translation (NMT) systems become an important part of professional translator pipelines, a growing body of work focuses on combining NMT with terminologies. In many scenarios and particularly in cases of domain adaptation, one expects the MT output to adhere to the constraints provided by a terminology. In this work, we propose metrics to measure the consistency of MT output with…
▽ More
As neural machine translation (NMT) systems become an important part of professional translator pipelines, a growing body of work focuses on combining NMT with terminologies. In many scenarios and particularly in cases of domain adaptation, one expects the MT output to adhere to the constraints provided by a terminology. In this work, we propose metrics to measure the consistency of MT output with regards to a domain terminology. We perform studies on the COVID-19 domain over 5 languages, also performing terminology-targeted human evaluation. We open-source the code for computing all proposed metrics: https://github.com/mahfuzibnalam/terminology_evaluation
△ Less
Submitted 24 June, 2021; v1 submitted 22 June, 2021;
originally announced June 2021.
-
Fluid Flow along the Riga Plate with the Influence of Magnetic Force in a Rotating System
Authors:
Muhammad Minarul Islam,
Sheela Khatun,
Md. Tusher Mollah,
Md. Mahmud Alam
Abstract:
The fluid flow along the Riga plate with the influence of magnetic force in a rotating system has been investigated numerically. The governing equations have been derived from Navier-Stokes equations. Applying the boundary layer approximation, the appropriate boundary layer equations have been obtained. By using usual transformation, the obtained governing equations have been transformed into a co…
▽ More
The fluid flow along the Riga plate with the influence of magnetic force in a rotating system has been investigated numerically. The governing equations have been derived from Navier-Stokes equations. Applying the boundary layer approximation, the appropriate boundary layer equations have been obtained. By using usual transformation, the obtained governing equations have been transformed into a coupled dimensionless non-linear partial differential equation. The obtained dimensionless equations have been solved numerically by explicit finite difference scheme. The simulated results have been obtained by using MATLAB R2015a. Also the stability and convergence criteria have been analyzed. The effect of several parameters on the primary velocity, secondary velocity, temperature distributions as well as local shear stress and Nusselt number have been shown graphically.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
Hall Effects on Casson Fluid Flow along a Vertical Plate
Authors:
Mst. Sonia Akter,
Mohammad Rafiqul Islam,
Md. Tusher Mollah,
Md. Mahmud Alam
Abstract:
The Hall effects on Casson fluid flow along a vertical plate has been investigated numerically. The governing equations have been derived from Navier-Stokes' equation and boundary layer approximation has been employed. By using usual transformations, the obtained non-linear coupled partial differential equations have been transformed into dimensionless governing equations. These equations have bee…
▽ More
The Hall effects on Casson fluid flow along a vertical plate has been investigated numerically. The governing equations have been derived from Navier-Stokes' equation and boundary layer approximation has been employed. By using usual transformations, the obtained non-linear coupled partial differential equations have been transformed into dimensionless governing equations. These equations have been solved by applying the explicit finite difference method. The MATLAB R2015a tool has been used for numerical simulation. The stability and convergence criteria have been analyzed. The effect of some important parameters on the primary velocity, secondary velocity, temperature and concentration distributions as well as local shear stress, Nusselt number and Sherwood number have been shown graphically.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
Bingham Fluid Flow through Oscillatory Porous Plate with Ion-Slip and Hall Current
Authors:
Md. Tusher Mollah,
Muhammad Minarul Islam,
Mohammad Ferdows,
Md. Mahmud Alam
Abstract:
The numerical approach has been performed to study the Bingham fluid flow through an oscillatory porous plate with Ion-Slip and Hall current. Initially, at time; t = 0 both the fluid and the upper plate are at rest. At time; t > 0 the upper plate begins to oscillate in its own plane while the lower plate is stationary. The lower plate temperature is constant while the upper plate temperature has o…
▽ More
The numerical approach has been performed to study the Bingham fluid flow through an oscillatory porous plate with Ion-Slip and Hall current. Initially, at time; t = 0 both the fluid and the upper plate are at rest. At time; t > 0 the upper plate begins to oscillate in its own plane while the lower plate is stationary. The lower plate temperature is constant while the upper plate temperature has oscillated. A uniform magnetic field is applied perpendicular to the plates. To obtain the dimensionless equations from the governing non-linear partial differential equations, the usual transformations have been used. The explicit finite difference technique has been applied to solve the obtained dimensionless equations. The MATLAB R2015a has been used for numerical simulation. For the accuracy of the numerical technique, the stability and convergence criteria have been discussed and the system has found to be converged for P_r>=0.08, Beta_i>=2, H_a<=20, K_o<=8 (k~=2) and R_e>=0.011 with Beta_e=0.10, E_c=0.10, Delta(Y)=0.05 and Delta(Tau)=0.0001. The steady-state solution has achieved at the dimensionless time=2.00. At the steady-state time, the effect of several parameters on the flow patterns, local shear stress and the Nusselt number have been shown graphically.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
A Survey on Spatio-temporal Data Analytics Systems
Authors:
Md Mahbub Alam,
Luis Torgo,
Albert Bifet
Abstract:
Due to the surge of spatio-temporal data volume, the popularity of location-based services and applications, and the importance of extracted knowledge from spatio-temporal data to solve a wide range of real-world problems, a plethora of research and development work has been done in the area of spatial and spatio-temporal data analytics in the past decade. The main goal of existing works was to de…
▽ More
Due to the surge of spatio-temporal data volume, the popularity of location-based services and applications, and the importance of extracted knowledge from spatio-temporal data to solve a wide range of real-world problems, a plethora of research and development work has been done in the area of spatial and spatio-temporal data analytics in the past decade. The main goal of existing works was to develop algorithms and technologies to capture, store, manage, analyze, and visualize spatial or spatio-temporal data. The researchers have contributed either by adding spatio-temporal support with existing systems, by developing a new system from scratch for processing spatio-temporal data, or by implementing algorithms for mining spatio-temporal data. The existing ecosystem of spatial and spatio-temporal data analytics can be categorized into three groups, (1) spatial databases (SQL and NoSQL), (2) big spatio-temporal data processing infrastructures, and (3) programming languages and software tools for processing spatio-temporal data. Since existing surveys mostly investigated big data infrastructures for processing spatial data, this survey has explored the whole ecosystem of spatial and spatio-temporal analytics along with an up-to-date review of big spatial data processing systems. This survey also portrays the importance and future of spatial and spatio-temporal data analytics.
△ Less
Submitted 17 March, 2021;
originally announced March 2021.
-
Unified Learning Approach for Egocentric Hand Gesture Recognition and Fingertip Detection
Authors:
Mohammad Mahmudul Alam,
Mohammad Tariqul Islam,
S. M. Mahbubur Rahman
Abstract:
Head-mounted device-based human-computer interaction often requires egocentric recognition of hand gestures and fingertips detection. In this paper, a unified approach of egocentric hand gesture recognition and fingertip detection is introduced. The proposed algorithm uses a single convolutional neural network to predict the probabilities of finger class and positions of fingertips in one forward…
▽ More
Head-mounted device-based human-computer interaction often requires egocentric recognition of hand gestures and fingertips detection. In this paper, a unified approach of egocentric hand gesture recognition and fingertip detection is introduced. The proposed algorithm uses a single convolutional neural network to predict the probabilities of finger class and positions of fingertips in one forward propagation. Instead of directly regressing the positions of fingertips from the fully connected layer, the ensemble of the position of fingertips is regressed from the fully convolutional network. Subsequently, the ensemble average is taken to regress the final position of fingertips. Since the whole pipeline uses a single network, it is significantly fast in computation. Experimental results show that the proposed method outperforms the existing fingertip detection approaches including the Direct Regression and the Heatmap-based framework. The effectiveness of the proposed method is also shown in-the-wild scenario as well as in a use-case of virtual reality.
△ Less
Submitted 22 July, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications
Authors:
A K M Mubashwir Alam,
Sagar Sharma,
Keke Chen
Abstract:
Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. However, the access patterns of SGX-based programs can still be observed by adversaries, which may leak important information for successful attacks. Researchers have been experimenting with Oblivious RAM (ORAM) to address t…
▽ More
Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. However, the access patterns of SGX-based programs can still be observed by adversaries, which may leak important information for successful attacks. Researchers have been experimenting with Oblivious RAM (ORAM) to address the privacy of access patterns. ORAM is a powerful low-level primitive that provides application-agnostic protection for any I/O operations, however, at a high cost. We find that some application-specific access patterns, such as sequential block I/O, do not provide additional information to adversaries. Others, such as sorting, can be replaced with specific oblivious algorithms that are more efficient than ORAM. The challenge is that developers may need to look into all the details of application-specific access patterns to design suitable solutions, which is time-consuming and error-prone. In this paper, we present the lightweight SGX based MapReduce (SGX-MR) approach that regulates the dataflow of data-intensive SGX applications for easier application-level access-pattern analysis and protection. It uses the MapReduce framework to cover a large class of data-intensive applications, and the entire framework can be implemented with a small memory footprint. With this framework, we have examined the stages of data processing, identified the access patterns that need protection, and designed corresponding efficient protection methods. Our experiments show that SGX-MR based applications are much more efficient than ORAM-based implementations.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Comparative Mathematical Study of Blood Flow Through Stenotic and Aneurysmatic Artery with the Presence and Absence of Blood clots
Authors:
Mohammed Nasir Uddin,
M. Monir Uddin,
Md. Monjarul Alam
Abstract:
Numerical predictions of blood flow and hemodynamic properties through a stenotic and aneurysmal rigid artery are studied in the presence of blood clot at constricted area. Finite element method has been used to solve the steady partial differential equations of continuity, momentum, Oldroyd-B and bioheat transport in two dimensional cartesian coordinates system.The present investigation carries t…
▽ More
Numerical predictions of blood flow and hemodynamic properties through a stenotic and aneurysmal rigid artery are studied in the presence of blood clot at constricted area. Finite element method has been used to solve the steady partial differential equations of continuity, momentum, Oldroyd-B and bioheat transport in two dimensional cartesian coordinates system.The present investigation carries the potential to compute blood velocity, pressure and drag coefficient with major significance at the throat of stenosis and aneurysm. The models are also employed to study of simulation, influence of blood clot and hemodynamical characteristics for all modifications. The back flow and recirculation zones are found at stenotic and aneurysmal region for the model. The quantitative analysis is completed by numerical calculation having physiological significance of hemodynamical factors of blood flow depends on the dimensionless parameters which show the validity of present model.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
Mild solutions of time fractional Navier-Stokes equations driven by finite delayed external forces
Authors:
Md Mansur Alam,
Shruti Dubey
Abstract:
In this work, we consider time-fractional Navier-Stokes equations (NSE) with the external forces involving finite delay. Equations are considered on a bounded domain in 3-D space having sufficiently smooth boundary. We transform the system of equations (NSE) to an abstract Cauchy problem and then investigate local existence and uniqueness of the mild solutions. In particular, with some suitable co…
▽ More
In this work, we consider time-fractional Navier-Stokes equations (NSE) with the external forces involving finite delay. Equations are considered on a bounded domain in 3-D space having sufficiently smooth boundary. We transform the system of equations (NSE) to an abstract Cauchy problem and then investigate local existence and uniqueness of the mild solutions. In particular, with some suitable condition on initial datum we establish the global continuation and regularity of the mild solutions. We use semigroup theory, tools of fractional calculus and Banach contraction mapping principle to establish our results.
△ Less
Submitted 8 August, 2019; v1 submitted 31 May, 2019;
originally announced May 2019.
-
Data Dissemination Strategies for Emerging Wireless Body-to-Body Networks based Internet of Humans
Authors:
Dhafer Ben Arbia,
Muhammad Mahtab Alam,
Rabah Attia,
Elyes Hamida
Abstract:
With the recent advent of Internet of Humans (IoH), wireless body-to-body networks (WBBNs) are emerging as the fundamental part of this new paradigm. In particular with reference to newly emerging applications, the research trends on data routing and dissemination strategies have gained a great interest in WBBN. In this paper, we present the performance evaluation of the clustered and distributed…
▽ More
With the recent advent of Internet of Humans (IoH), wireless body-to-body networks (WBBNs) are emerging as the fundamental part of this new paradigm. In particular with reference to newly emerging applications, the research trends on data routing and dissemination strategies have gained a great interest in WBBN. In this paper, we present the performance evaluation of the clustered and distributed data dissemination approaches in tactical WBBN. We used a realistic radio-link and biomechanical mobility model for on-body motions, and group mobility model for WBBN to effectively realize rescue and emergency management application scenario. In this regard, we are using the newly proposed IEEE 802.15.6 standard targeted for body area networks. Extensive (IEEE 802.15.6 standard compliance) network level, packet oriented simulations are conducted in WSNet simulator. During the simulations, various payloads, frequencies (narrow-band) and modulation techniques are exploited. We based our performance evaluation on relevant metrics according to the operational requirements for tactical networks such as packet reception ratio, latency, energy consumption and hop count. The results showed a trade-offs between clustered-based and distributed-based dissemination approaches. With regards to packet delay, distributed approach provided the best performance. However, in terms of average packet reception ratio (PRR), clustered-based approach achieves up to 97% reception and remained the best strategy. Whereas, the results of the hop count and energy consumption are almost comparable in both schemes.
△ Less
Submitted 29 November, 2017;
originally announced November 2017.
-
Behavior of Wireless Body-to-Body Networks Routing Strategies for Public Protection and Disaster Relief
Authors:
Dhafer Ben Arbia,
Muhammad Mahtab Alam,
Rabah Attia,
Elyes Hamida
Abstract:
Critical and public safety operations require real-time data transfer from the incident area(s) to the distant operations command center going through the evacuation and medical support areas. Any delay in communication may cause significant loss. In some cases, it is anticipated that the existing communication infrastructures can be damaged or out-of-service. It is thus required to deploy tactica…
▽ More
Critical and public safety operations require real-time data transfer from the incident area(s) to the distant operations command center going through the evacuation and medical support areas. Any delay in communication may cause significant loss. In some cases, it is anticipated that the existing communication infrastructures can be damaged or out-of-service. It is thus required to deploy tactical ad-hoc networks to cover the operation zones. Routing data over the deployed network is a significant challenge with consideration to the operations conditions. In this paper we evaluate the performance of mutli-hop routing protocols while using different wireless technologies in an urban critical and emergency scenario. Using a realistic mobility model, Mobile Ad hoc, geographic based and data-centric routing protocols are evaluated with different communication technologies (i.e. WiFi IEEE 802.11; WSN IEEE 802.15.4; WBAN IEEE 802.15.6). It is concluded that, WiFi IEEE 802.11 is the best wireless technology with consideration to the packet reception rate and the energy consumption. Whereas, in terms of delay, WBAN IEEE 802.15.6 is the most efficient. With regards to the routing protocols, assuming that the location information is available, geographical based routing protocol with WiFi IEEE 802.11 performed much better compared to the others routing protocols. In case where the location information is unavailable, gradient based routing protocol with WBAN IEEE 802.15.6 seems the best combination.
△ Less
Submitted 29 November, 2017;
originally announced November 2017.
-
Combining extrapolation with ghost interaction correction in range-separated ensemble density functional theory for excited states
Authors:
Md. Mehboob Alam,
Killian Deur,
Stefan Knecht,
Emmanuel Fromager
Abstract:
The extrapolation technique of Savin [J. Chem. Phys. 140, 18A509 (2014)], which was initially applied to range-separated ground-state-density-functional Hamiltonians, is adapted in this work to ghost-interaction-corrected (GIC) range-separated ensemble density-functional theory (eDFT) for excited states. While standard extrapolations rely on energies that decay as $μ^{-2}$ in the large range-separ…
▽ More
The extrapolation technique of Savin [J. Chem. Phys. 140, 18A509 (2014)], which was initially applied to range-separated ground-state-density-functional Hamiltonians, is adapted in this work to ghost-interaction-corrected (GIC) range-separated ensemble density-functional theory (eDFT) for excited states. While standard extrapolations rely on energies that decay as $μ^{-2}$ in the large range-separation-parameter $μ$ limit, we show analytically that (approximate) range-separated GIC ensemble energies converge more rapidly (as $μ^{-3}$) towards their pure wavefunction theory values ($μ\rightarrow+\infty$ limit), thus requiring a different extrapolation correction. The purpose of such a correction is to further improve on the convergence and, consequently, to obtain more accurate excitation energies for a finite (and, in practice, relatively small) $μ$ value. As a proof of concept, we apply the extrapolation method to He and small molecular systems (viz. H$_{2}$, HeH$^{+}$ and LiH), thus considering different types of excitations like Rydberg, charge transfer and double excitations. Potential energy profiles of the first three and four singlet $Σ^+$ excitation energies in HeH$^{+}$ and H$_{2}$, respectively, are studied with a particular focus on avoided crossings for the latter. Finally, the extraction of individual state energies from the ensemble energy is discussed in the context of range-separated eDFT, as a perspective.
△ Less
Submitted 16 October, 2017; v1 submitted 11 August, 2017;
originally announced August 2017.