-
Hybrid Pointer Networks for Traveling Salesman Problems Optimization
Authors:
Ahmed Stohy,
Heba-Tullah Abdelhakam,
Sayed Ali,
Mohammed Elhenawy,
Abdallah A Hassan,
Mahmoud Masoud,
Sebastien Glaser,
Andry Rakotonirainy
Abstract:
In this work, a novel idea is presented for combinatorial optimization problems, a hybrid network, which results in a superior outcome. We applied this method to graph pointer networks [1], expanding its capabilities to a higher level. We proposed a hybrid pointer network (HPN) to solve the travelling salesman problem trained by reinforcement learning. Furthermore, HPN builds upon graph pointer ne…
▽ More
In this work, a novel idea is presented for combinatorial optimization problems, a hybrid network, which results in a superior outcome. We applied this method to graph pointer networks [1], expanding its capabilities to a higher level. We proposed a hybrid pointer network (HPN) to solve the travelling salesman problem trained by reinforcement learning. Furthermore, HPN builds upon graph pointer networks which is an extension of pointer networks with an additional graph embedding layer. HPN outperforms the graph pointer network in solution quality due to the hybrid encoder, which provides our model with a verity encoding type, allowing our model to converge to a better policy. Our network significantly outperforms the original graph pointer network for small and large-scale problems increasing its performance for TSP50 from 5.959 to 5.706 without utilizing 2opt, Pointer networks, Attention model, and a wide range of models, producing results comparable to highly tuned and specialized algorithms. We make our data, models, and code publicly available [2].
△ Less
Submitted 13 October, 2021; v1 submitted 6 October, 2021;
originally announced October 2021.
-
An empirical study of question discussions on Stack Overflow
Authors:
Wenhan Zhu,
Haoxiang Zhang,
Ahmed E. Hassan,
Michael W. Godfrey
Abstract:
Stack Overflow provides a means for developers to exchange knowledge. While much previous research on Stack Overflow has focused on questions and answers (Q&A), recent work has shown that discussions in comments also contain rich information. On Stack Overflow, discussions through comments and chat rooms can be tied to questions or answers. In this paper, we conduct an empirical study that focuses…
▽ More
Stack Overflow provides a means for developers to exchange knowledge. While much previous research on Stack Overflow has focused on questions and answers (Q&A), recent work has shown that discussions in comments also contain rich information. On Stack Overflow, discussions through comments and chat rooms can be tied to questions or answers. In this paper, we conduct an empirical study that focuses on the nature of question discussions. We observe that: (1) Question discussions occur at all phases of the Q&A process, with most beginning before the first answer is received. (2) Both askers and answerers actively participate in question discussions; the likelihood of their participation increases as the number of comments increases. (3) There is a strong correlation between the number of question comments and the question answering time (i.e., more discussed questions receive answers more slowly); also, questions with a small number of comments are likely to be answered more quickly than questions with no discussion. Our findings suggest that question discussions contain a rich trove of data that is integral to the Q&A processes on Stack Overflow. We further suggest how future research can leverage the information in question discussions, along with the commonly studied Q&A information.
△ Less
Submitted 19 July, 2022; v1 submitted 27 September, 2021;
originally announced September 2021.
-
Multipartite Generalization of Geometric measure of Discord
Authors:
Ali Saif M. Hassan,
Pramod S. Joag
Abstract:
Radhakrishnan et.al [Phys. Rev. Lett. 124, 110401 (2020)] proposed a generalization of quantum discord to multipartite systems, which is consistency with the conventional definition of discord in bipartite systems and derived explicit formulae for any states. These results are significant in capturing quantum correlations for multi-qubit systems. We propose a generalization of geometric measure of…
▽ More
Radhakrishnan et.al [Phys. Rev. Lett. 124, 110401 (2020)] proposed a generalization of quantum discord to multipartite systems, which is consistency with the conventional definition of discord in bipartite systems and derived explicit formulae for any states. These results are significant in capturing quantum correlations for multi-qubit systems. We propose a generalization of geometric measure of multipartite quantum discord in the same manner. We find generic forms of the generalization of geometric measure of quantum discord in a general N-partite quantum state. Further, we obtain computable exact formulas for the generalization of geometric measure of quantum discord in an N-qubit quantum state, which include the results obtained in [arXiv:2104.12344].
△ Less
Submitted 25 July, 2024; v1 submitted 24 September, 2021;
originally announced September 2021.
-
Real-Time Trash Detection for Modern Societies using CCTV to Identifying Trash by utilizing Deep Convolutional Neural Network
Authors:
Syed Muhammad Raza,
Syed Muhammad Ghazi Hassan,
Syed Ali Hassan,
Soo Young Shin
Abstract:
To protect the environment from trash pollution, especially in societies, and to take strict action against the red-handed people who throws the trash. As modern societies are developing and these societies need a modern solution to make the environment clean. Artificial intelligence (AI) evolution, especially in Deep Learning, gives an excellent opportunity to develop real-time trash detection us…
▽ More
To protect the environment from trash pollution, especially in societies, and to take strict action against the red-handed people who throws the trash. As modern societies are developing and these societies need a modern solution to make the environment clean. Artificial intelligence (AI) evolution, especially in Deep Learning, gives an excellent opportunity to develop real-time trash detection using CCTV cameras. The inclusion of this project is real-time trash detection using a deep model of Convolutional Neural Network (CNN). It is used to obtain eight classes mask, tissue papers, shoppers, boxes, automobile parts, pampers, bottles, and juices boxes. After detecting the trash, the camera records the video of that person for ten seconds who throw trash in society. The challenging part of this paper is preparing a complex custom dataset that took too much time. The dataset consists of more than 2100 images. The CNN model was created, labeled, and trained. The detection time accuracy and average mean precision (mAP) benchmark both models' performance. In experimental phase the mAP performance and accuracy of the improved CNN model was superior in all aspects. The model is used on a CCTV camera to detect trash in real-time.
△ Less
Submitted 21 September, 2021; v1 submitted 20 September, 2021;
originally announced September 2021.
-
A Novel Cluster Detection of COVID-19 Patients and Medical Disease Conditions Using Improved Evolutionary Clustering Algorithm Star
Authors:
Bryar A. Hassan,
Tarik A. Rashid,
Hozan K. Hamarashid
Abstract:
With the increasing number of samples, the manual clustering of COVID-19 and medical disease data samples becomes time-consuming and requires highly skilled labour. Recently, several algorithms have been used for clustering medical datasets deterministically; however, these definitions have not been effective in grouping and analysing medical diseases. The use of evolutionary clustering algorithms…
▽ More
With the increasing number of samples, the manual clustering of COVID-19 and medical disease data samples becomes time-consuming and requires highly skilled labour. Recently, several algorithms have been used for clustering medical datasets deterministically; however, these definitions have not been effective in grouping and analysing medical diseases. The use of evolutionary clustering algorithms may help to effectively cluster these diseases. On this presumption, we improved the current evolutionary clustering algorithm star (ECA*), called iECA*, in three manners: (i) utilising the elbow method to find the correct number of clusters; (ii) cleaning and processing data as part of iECA* to apply it to multivariate and domain-theory datasets; (iii) using iECA* for real-world applications in clustering COVID-19 and medical disease datasets. Experiments were conducted to examine the performance of iECA* against state-of-the-art algorithms using performance and validation measures (validation measures, statistical benchmarking, and performance ranking framework). The results demonstrate three primary findings. First, iECA* was more effective than other algorithms in grouping the chosen medical disease datasets according to the cluster validation criteria. Second, iECA* exhibited the lower execution time and memory consumption for clustering all the datasets, compared to the current clustering methods analysed. Third, an operational framework was proposed to rate the effectiveness of iECA* against other algorithms in the datasets analysed, and the results indicated that iECA* exhibited the best performance in clustering all medical datasets. Further research is required on real-world multi-dimensional data containing complex knowledge fields for experimental verification of iECA* compared to evolutionary algorithms.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Artificial Intelligence Algorithms for Natural Language Processing and the Semantic Web Ontology Learning
Authors:
Bryar A. Hassan,
Tarik A. Rashid
Abstract:
Evolutionary clustering algorithms have considered as the most popular and widely used evolutionary algorithms for minimising optimisation and practical problems in nearly all fields. In this thesis, a new evolutionary clustering algorithm star (ECA*) is proposed. Additionally, a number of experiments were conducted to evaluate ECA* against five state-of-the-art approaches. For this, 32 heterogene…
▽ More
Evolutionary clustering algorithms have considered as the most popular and widely used evolutionary algorithms for minimising optimisation and practical problems in nearly all fields. In this thesis, a new evolutionary clustering algorithm star (ECA*) is proposed. Additionally, a number of experiments were conducted to evaluate ECA* against five state-of-the-art approaches. For this, 32 heterogeneous and multi-featured datasets were used to examine their performance using internal and external clustering measures, and to measure the sensitivity of their performance towards dataset features in the form of operational framework. The results indicate that ECA* overcomes its competitive techniques in terms of the ability to find the right clusters. Based on its superior performance, exploiting and adapting ECA* on the ontology learning had a vital possibility. In the process of deriving concept hierarchies from corpora, generating formal context may lead to a time-consuming process. Therefore, formal context size reduction results in removing uninterested and erroneous pairs, taking less time to extract the concept lattice and concept hierarchies accordingly. In this premise, this work aims to propose a framework to reduce the ambiguity of the formal context of the existing framework using an adaptive version of ECA*. In turn, an experiment was conducted by applying 385 sample corpora from Wikipedia on the two frameworks to examine the reduction of formal context size, which leads to yield concept lattice and concept hierarchy. The resulting lattice of formal context was evaluated to the original one using concept lattice-invariants. Accordingly, the homomorphic between the two lattices preserves the quality of resulting concept hierarchies by 89% in contrast to the basic ones, and the reduced concept lattice inherits the structural relation of the original one.
△ Less
Submitted 31 August, 2021;
originally announced August 2021.
-
A Sensitivity Matrix Approach Using Two-Stage Optimization for Voltage Regulation of LV Networks with High PV Penetration
Authors:
A. S. Jameel Hassan,
Umar Marikkar,
G. W. Kasun Prabhath,
Aranee Balachandran,
W. G. Chaminda Bandara,
Parakrama B. Ekanayake,
Roshan I. Godaliyadda,
Janaka B. Ekanayake
Abstract:
The occurrence of voltage violations are a major deterrent for absorbing more roof-top solar power to smart Low Voltage Distribution Grids (LVDG). Recent studies have focused on decentralized control methods to solve this problem due to the high computational time in performing load flows in centralized control techniques. To address this issue a novel sensitivity matrix is developed to estimate v…
▽ More
The occurrence of voltage violations are a major deterrent for absorbing more roof-top solar power to smart Low Voltage Distribution Grids (LVDG). Recent studies have focused on decentralized control methods to solve this problem due to the high computational time in performing load flows in centralized control techniques. To address this issue a novel sensitivity matrix is developed to estimate voltages of the network by replacing load flow simulations. In this paper, a Centralized Active, Reactive Power Management System (CARPMS) is proposed to optimally utilize the reactive power capability of smart photo-voltaic inverters with minimal active power curtailment to mitigate the voltage violation problem. The developed sensitivity matrix is able to reduce the time consumed by 48% compared to load flow simulations, enabling near real-time control optimization. Given the large solution space of power systems, a novel two-stage optimization is proposed, where the solution space is narrowed down by a Feasible Region Search (FRS) step, followed by Particle Swarm Optimization (PSO). The performance of the proposed methodology is analyzed in comparison to the load flow method to demonstrate the accuracy and the capability of the optimization algorithm to mitigate voltage violations in near real-time. The deviation of mean voltages of the proposed methodology from load flow method was; 6.5*10^-3 p.u for reactive power control using Q-injection, 1.02*10^-2 p.u for reactive power control using Q-absorption, and 0 p.u for active power curtailment case.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Modeling Pedagogical Learning Environment with Hybrid Model based on ICT
Authors:
Al Maruf Hassan,
Istiak Ahmed Mondal
Abstract:
Pedagogy is a method that handles the ethos and culture of instruction from educators and the learning of learners. Pedagogy of Information and Communications Technology (ICT) refers to the interactions among the teacher, children, and learning environment based on ICT. It is a discipline that deals with the theory and practice of teaching strategies, teaching actions, teaching judgments, and deci…
▽ More
Pedagogy is a method that handles the ethos and culture of instruction from educators and the learning of learners. Pedagogy of Information and Communications Technology (ICT) refers to the interactions among the teacher, children, and learning environment based on ICT. It is a discipline that deals with the theory and practice of teaching strategies, teaching actions, teaching judgments, and decisions. It is also the understanding and needs of students as well as the background and interests of an individual one. In this paper, we have designed the pedagogical learning environment from the perspective of ICT education. In our methodology of the pedagogy for ICT, education includes the interaction among different elements. The methodology improves to propagate convenience differently into the educational environment. We are also building a hybrid model for the ICT development program. The hybrid model represents the combination of standards, stages, year level, and class level as well as brings it into one umbrella. We have constructed the pedagogical learning environment theoretically from the perspective of ICT education to the consideration of outcome-based ICT learning. Outcome-based education is a fundamental element for building any nation completely around the globe.
△ Less
Submitted 27 August, 2021; v1 submitted 9 August, 2021;
originally announced August 2021.
-
Industrial Digital Twins at the Nexus of NextG Wireless Networks and Computational Intelligence: A Survey
Authors:
Shah Zeb,
Aamir Mahmood,
Syed Ali Hassan,
MD. Jalil Piran,
Mikael Gidlund,
Mohsen Guizani
Abstract:
By amalgamating recent communication and control technologies, computing and data analytics techniques, and modular manufacturing, Industry~4.0 promotes integrating cyber-physical worlds through cyber-physical systems (CPS) and digital twin (DT) for monitoring, optimization, and prognostics of industrial processes. A DT is an emerging but conceptually different construct than CPS. Like CPS, DT rel…
▽ More
By amalgamating recent communication and control technologies, computing and data analytics techniques, and modular manufacturing, Industry~4.0 promotes integrating cyber-physical worlds through cyber-physical systems (CPS) and digital twin (DT) for monitoring, optimization, and prognostics of industrial processes. A DT is an emerging but conceptually different construct than CPS. Like CPS, DT relies on communication to create a highly-consistent, synchronized digital mirror image of the objects or physical processes. DT, in addition, uses built-in models on this precise image to simulate, analyze, predict, and optimize their real-time operation using feedback. DT is rapidly diffusing in the industries with recent advances in the industrial Internet of things (IIoT), edge and cloud computing, machine learning, artificial intelligence, and advanced data analytics. However, the existing literature lacks in identifying and discussing the role and requirements of these technologies in DT-enabled industries from the communication and computing perspective. In this article, we first present the functional aspects, appeal, and innovative use of DT in smart industries. Then, we elaborate on this perspective by systematically reviewing and reflecting on recent research in next-generation (NextG) wireless technologies (e.g., 5G and beyond networks), various tools (e.g., age of information, federated learning, data analytics), and other promising trends in networked computing (e.g., edge and cloud computing). Moreover, we discuss the DT deployment strategies at different industrial communication layers to meet the monitoring and control requirements of industrial applications. We also outline several key reflections and future research challenges and directions to facilitate industrial DT's adoption.
△ Less
Submitted 10 August, 2021;
originally announced August 2021.
-
MotionInput v2.0 supporting DirectX: A modular library of open-source gesture-based machine learning and computer vision methods for interacting and controlling existing software with a webcam
Authors:
Ashild Kummen,
Guanlin Li,
Ali Hassan,
Teodora Ganeva,
Qianying Lu,
Robert Shaw,
Chenuka Ratwatte,
Yang Zou,
Lu Han,
Emil Almazov,
Sheena Visram,
Andrew Taylor,
Neil J Sebire,
Lee Stott,
Yvonne Rogers,
Graham Roberts,
Dean Mohamedally
Abstract:
Touchless computer interaction has become an important consideration during the COVID-19 pandemic period. Despite progress in machine learning and computer vision that allows for advanced gesture recognition, an integrated collection of such open-source methods and a user-customisable approach to utilising them in a low-cost solution for touchless interaction in existing software is still missing.…
▽ More
Touchless computer interaction has become an important consideration during the COVID-19 pandemic period. Despite progress in machine learning and computer vision that allows for advanced gesture recognition, an integrated collection of such open-source methods and a user-customisable approach to utilising them in a low-cost solution for touchless interaction in existing software is still missing. In this paper, we introduce the MotionInput v2.0 application. This application utilises published open-source libraries and additional gesture definitions developed to take the video stream from a standard RGB webcam as input. It then maps human motion gestures to input operations for existing applications and games. The user can choose their own preferred way of interacting from a series of motion types, including single and bi-modal hand gesturing, full-body repetitive or extremities-based exercises, head and facial movements, eye tracking, and combinations of the above. We also introduce a series of bespoke gesture recognition classifications as DirectInput triggers, including gestures for idle states, auto calibration, depth capture from a 2D RGB webcam stream and tracking of facial motions such as mouth motions, winking, and head direction with rotation. Three use case areas assisted the development of the modules: creativity software, office and clinical software, and gaming software. A collection of open-source libraries has been integrated and provide a layer of modular gesture mapping on top of existing mouse and keyboard controls in Windows via DirectX. With ease of access to webcams integrated into most laptops and desktop computers, touchless computing becomes more available with MotionInput v2.0, in a federated and locally processed method.
△ Less
Submitted 10 August, 2021;
originally announced August 2021.
-
Edge Intelligence in Softwarized 6G: Deep Learning-enabled Network Traffic Predictions
Authors:
Shah Zeb,
Muhammad Ahmad Rathore,
Aamir Mahmood,
Syed Ali Hassan,
JongWon Kim,
Mikael Gidlund
Abstract:
The 6G vision is envisaged to enable agile network expansion and rapid deployment of new on-demand microservices (e.g., visibility services for data traffic management, mobile edge computing services) closer to the network's edge IoT devices. However, providing one of the critical features of network visibility services, i.e., data flow prediction in the network, is challenging at the edge devices…
▽ More
The 6G vision is envisaged to enable agile network expansion and rapid deployment of new on-demand microservices (e.g., visibility services for data traffic management, mobile edge computing services) closer to the network's edge IoT devices. However, providing one of the critical features of network visibility services, i.e., data flow prediction in the network, is challenging at the edge devices within a dynamic cloud-native environment as the traffic flow characteristics are random and sporadic. To provide the AI-native services for the 6G vision, we propose a novel edge-native framework to provide an intelligent prognosis technique for data traffic management in this paper. The prognosis model uses long short-term memory (LSTM)-based encoder-decoder deep learning, which we train on real time-series multivariate data records collected from the edge $μ$-boxes of a selected testbed network. Our result accurately predicts the statistical characteristics of data traffic and verifies the trained model against the ground truth observations. Moreover, we validate our novel framework with two performance metrics for each feature of the multivariate data.
△ Less
Submitted 3 October, 2021; v1 submitted 31 July, 2021;
originally announced August 2021.
-
Open clusters with proper motions fully separated from the field stars using Gaia DR2
Authors:
W. A. Badawy,
A. L. Tadross,
Y. M. Hendy,
I. A. Hassan,
M. N. Ismail
Abstract:
The study of open star clusters makes us understand a lot about the composition and construction of the Milky Way Galaxy. Thanks to the Gaia DR2 database that helps us to get the genetic members of star clusters using their proper motions and parallaxes, estimating their physical properties in a very accurate way. This study aims to detect the reasons that make proper motions value of a cluster is…
▽ More
The study of open star clusters makes us understand a lot about the composition and construction of the Milky Way Galaxy. Thanks to the Gaia DR2 database that helps us to get the genetic members of star clusters using their proper motions and parallaxes, estimating their physical properties in a very accurate way. This study aims to detect the reasons that make proper motions value of a cluster is completely separated from the background field stars and not melted in. We studied a large sample of open stellar clusters taken from Dias catalog and drawing the vector point diagrams using the astrometric data of Gaia DR2. Marking the separated clusters and melted ones and study their mean parameters in each galactic quadrant.
△ Less
Submitted 22 September, 2021; v1 submitted 28 July, 2021;
originally announced July 2021.
-
Reconfigurable Intelligent Surface-Assisted Backscatter Communication: A New Frontier for Enabling 6G IoT Networks
Authors:
Sarah Basharat,
Syed Ali Hassan,
Aamir Mahmood,
Zhiguo Ding,
Mikael Gidlund
Abstract:
Backscatter Communication (BackCom), which is based on passive reflection and modulation of an incident radio-frequency (RF) wave, has emerged as a cutting-edge technological paradigm for self-sustainable Internet-of-things (IoT). Nevertheless, the contemporary BackCom systems are limited to short-range and low data rate applications only, thus rendering them insufficient on their own to support p…
▽ More
Backscatter Communication (BackCom), which is based on passive reflection and modulation of an incident radio-frequency (RF) wave, has emerged as a cutting-edge technological paradigm for self-sustainable Internet-of-things (IoT). Nevertheless, the contemporary BackCom systems are limited to short-range and low data rate applications only, thus rendering them insufficient on their own to support pervasive connectivity among the massive number of IoT devices. Meanwhile, wireless networks are rapidly evolving towards the smart radio paradigm. In this regard, reconfigurable intelligent surfaces (RISs) have come to the forefront to transform the wireless propagation environment into a fully controllable and customizable space in a cost-effective and energy-efficient manner. Targeting the sixth-generation (6G) horizon, we anticipate the integration of RISs into BackCom systems as a new frontier for enabling 6G IoT networks. In this article, for the first time in the open literature, we provide a tutorial overview of RIS-assisted BackCom (RIS-BackCom) systems. Specifically, we introduce the four different variants of RIS-BackCom and identify the potential improvements that can be achieved by incorporating RISs into BackCom systems. In addition, owing to the unrivaled effectiveness of non-orthogonal multiple access (NOMA), we present a case study on an RIS-assisted NOMA-enhanced BackCom system. Finally, we outline the way forward for translating this disruptive concept into real-world applications.
△ Less
Submitted 16 July, 2021;
originally announced July 2021.
-
Reconfigurable Intelligent Surfaces: Potentials, Applications, and Challenges for 6G Wireless Networks
Authors:
Sarah Basharat,
Syed Ali Hassan,
Haris Pervaiz,
Aamir Mahmood,
Zhiguo Ding,
Mikael Gidlund
Abstract:
Reconfigurable intelligent surfaces (RISs), with the potential to realize a smart radio environment, have emerged as an energy-efficient and a cost-effective technology to support the services and demands foreseen for coming decades. By leveraging a large number of low-cost passive reflecting elements, RISs introduce a phase-shift in the impinging signal to create a favorable propagation channel b…
▽ More
Reconfigurable intelligent surfaces (RISs), with the potential to realize a smart radio environment, have emerged as an energy-efficient and a cost-effective technology to support the services and demands foreseen for coming decades. By leveraging a large number of low-cost passive reflecting elements, RISs introduce a phase-shift in the impinging signal to create a favorable propagation channel between the transmitter and the receiver.~\textcolor{black}{In this article, we provide a tutorial overview of RISs for sixth-generation (6G) wireless networks. Specifically, we present a comprehensive discussion on performance gains that can be achieved by integrating RISs with emerging communication technologies. We address the practical implementation of RIS-assisted networks and expose the crucial challenges, including the RIS reconfiguration, deployment and size optimization, and channel estimation. Furthermore, we explore the integration of RIS and non-orthogonal multiple access (NOMA) under imperfect channel state information (CSI). Our numerical results illustrate the importance of better channel estimation in RIS-assisted networks and indicate the various factors that impact the size of RIS. Finally, we present promising future research directions for realizing RIS-assisted networks in 6G communication.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Formal context reduction in deriving concept hierarchies from corpora using adaptive evolutionary clustering algorithm star
Authors:
Bryar A. Hassan,
Tarik A. Rashid,
Seyedali Mirjalili
Abstract:
It is beneficial to automate the process of deriving concept hierarchies from corpora since a manual construction of concept hierarchies is typically a time-consuming and resource-intensive process. As such, the overall process of learning concept hierarchies from corpora encompasses a set of steps: parsing the text into sentences, splitting the sentences and then tokenising it. After the lemmatis…
▽ More
It is beneficial to automate the process of deriving concept hierarchies from corpora since a manual construction of concept hierarchies is typically a time-consuming and resource-intensive process. As such, the overall process of learning concept hierarchies from corpora encompasses a set of steps: parsing the text into sentences, splitting the sentences and then tokenising it. After the lemmatisation step, the pairs are extracted using FCA. However, there might be some uninteresting and erroneous pairs in the formal context. Generating formal context may lead to a time-consuming process, so formal context size reduction is required to remove uninterested and erroneous pairs, taking less time to extract the concept lattice and concept hierarchies accordingly. In this premise, this study aims to propose two frameworks: (1) A framework to review the current process of deriving concept hierarchies from corpus utilising FCA; (2) A framework to decrease the formal contexts ambiguity of the first framework using an adaptive version of ECA*. Experiments are conducted by applying 385 sample corpora from Wikipedia on the two frameworks to examine the reducing size of formal context, which leads to yield concept lattice and concept hierarchy. The resulting lattice of formal context is evaluated to the standard one using concept lattice-invariants. Accordingly, the homomorphic between the two lattices preserves the quality of resulting concept hierarchies by 89% in contrast to the basic ones, and the reduced concept lattice inherits the structural relation of the standard one. The adaptive ECA* is examined against its four counterpart baseline algorithms to measure the execution time on random datasets with different densities (fill ratios). The results show that adaptive ECA* performs concept lattice faster than other mentioned competitive techniques in different fill ratios.
△ Less
Submitted 10 July, 2021;
originally announced July 2021.
-
A New Framework to Adopt Multidimensional Databases for Organizational Information System Strategies
Authors:
Bryar A. Hassan,
Shko M. Qader
Abstract:
As information becomes increasingly sizable for organizations to maintain the challenge of organizing data still remains. More importantly, the on-going process of analysing incoming data occurs on a continual basis and organizations should employ existing procedures that may not be adequate or efficient when attempting to access specific information to analyse. In these latter days of technologic…
▽ More
As information becomes increasingly sizable for organizations to maintain the challenge of organizing data still remains. More importantly, the on-going process of analysing incoming data occurs on a continual basis and organizations should employ existing procedures that may not be adequate or efficient when attempting to access specific information to analyse. In these latter days of technological advancement, organizations can offer their customers extensive data resources to utilize and thus accomplish individual objectives and maintain competitiveness; however, it remains a challenge in providing data in a format that serves each clients suited needs. For some, the complexity of a data model can be overwhelming to utilize. Furthermore, companies should secure an understanding of the purchasing power used by specific consumer groups to remain competitive and ease the operation of data analysis. This research paper is to examine the use of multi-dimensional models within a business environment and how it may provide customers and managers with generating queries that will provide accurate and relevant data for effective analysis. It also provides a new framework that can aid various types of organisations using sizable database systems to create their own multidimensional model from relational databases and present the data in multidimensional views. It also defines the requirements. Despite the availability of set tools, the complexity of utilizing the conceptions discourages customers as they may become apprehensive about exploring these options for analytical purposes. This could be done by conducting a query.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
Analysis for the Overwhelming Success of the Web Compared to Microcosm and Hyper-G Systems
Authors:
Bryar A. Hassan,
Shko M. Qader
Abstract:
Microcosm, Hyper-G, and the Web were developed and released after 1989. There were strengths and weaknesses associate with each of these hypertext systems. The architectures of these systems were relatively different from one another. Standing above its competitors, the Web became the largest and most popular information system. This paper analyses the reasons for which the Web became the first su…
▽ More
Microcosm, Hyper-G, and the Web were developed and released after 1989. There were strengths and weaknesses associate with each of these hypertext systems. The architectures of these systems were relatively different from one another. Standing above its competitors, the Web became the largest and most popular information system. This paper analyses the reasons for which the Web became the first successful hypermedia system by looking and evaluating the architecture of the Web, Hyper-G, and Microcosm systems. Three reasons will be given beyond this success with some lessons to learn. Currently, Semantic Web is a recent development of the Web to provide conceptual hypermedia. More importantly, study of the Web with its impact on technical, socio-cultural, and economical agendas is introduced as web science.
△ Less
Submitted 18 April, 2022; v1 submitted 17 May, 2021;
originally announced May 2021.
-
Performance evaluation results of evolutionary clustering algorithm star for clustering heterogeneous datasets
Authors:
Bryar A. Hassan,
TarikA. Rashid,
Seyedali Mirjalili
Abstract:
This article presents the data used to evaluate the performance of evolutionary clustering algorithm star (ECA*) compared to five traditional and modern clustering algorithms. Two experimental methods are employed to examine the performance of ECA* against genetic algorithm for clustering++ (GENCLUST++), learning vector quantisation (LVQ) , expectation maximisation (EM) , K-means++ (KM++) and K-me…
▽ More
This article presents the data used to evaluate the performance of evolutionary clustering algorithm star (ECA*) compared to five traditional and modern clustering algorithms. Two experimental methods are employed to examine the performance of ECA* against genetic algorithm for clustering++ (GENCLUST++), learning vector quantisation (LVQ) , expectation maximisation (EM) , K-means++ (KM++) and K-means (KM). These algorithms are applied to 32 heterogenous and multi-featured datasets to determine which one performs well on the three tests. For one, ther paper examines the efficiency of ECA* in contradiction of its corresponding algorithms using clustering evaluation measures. These validation criteria are objective function and cluster quality measures. For another, it suggests a performance rating framework to measurethe the performance sensitivity of these algorithms on varos dataset features (cluster dimensionality, number of clusters, cluster overlap, cluster shape and cluster structure). The contributions of these experiments are two-folds: (i) ECA* exceeds its counterpart aloriths in ability to find out the right cluster number; (ii) ECA* is less sensitive towards dataset features compared to its competitive techniques. Nonetheless, the results of the experiments performed demonstrate some limitations in the ECA*: (i) ECA* is not fully applied based on the premise that no prior knowledge exists; (ii) Adapting and utilising ECA* on several real applications has not been achieved yet.
△ Less
Submitted 30 April, 2021;
originally announced May 2021.
-
Towards Semantic Web: Challenges and Needs
Authors:
Bryar A. Hassan
Abstract:
There has been recently a growth of interest in developing the current machine-readable Web towards the next generation of machine-understandable Web - Semantic Web. The development of the Web to a global business was reasonably fast, whereas Semantic Web development has taken time from a plan to be used as the mainstream Web. It is also important to note that the use of Semantic Web would only be…
▽ More
There has been recently a growth of interest in developing the current machine-readable Web towards the next generation of machine-understandable Web - Semantic Web. The development of the Web to a global business was reasonably fast, whereas Semantic Web development has taken time from a plan to be used as the mainstream Web. It is also important to note that the use of Semantic Web would only be successful in small technologies. However, the goal of Semantic Web is to be used in big technologies and to be the mainstream Web. Some challenges may impede make further progress of Semantic Web. In this review paper, an overview of the current status and future needs of Semantic Web will be presented. Specifically, the challenges and needs of Semantic Web in the hope of shedding some light on the adoption or infusion of Semantic Web in the future will be discussed. Then, a critical evaluation of these challenges and needs will be presented. Semantic Web has a clear vision. It is moving, in line with this vision, towards overcoming the challenges and usability in real world applications.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
Evaluating e-Government Services in Kurdistan Institution for Strategic Studies and Scientific Research Using the EGOVSAT Model
Authors:
Bryar A. Hassan,
Aram M. Ahmed,
Soran A. Saeed,
Awin A. Saeed
Abstract:
Office automation is an initiative used to digitally deliver services to citizens, private and public sectors. It is used to digitally collect, store, create, and manipulate office information as a need of accomplishing basic tasks. Azya Office Automation has been implemented as a pilot project in Kurdistan Institution for Strategic Studies and Scientific Research (KISSR) since 2013. The efficienc…
▽ More
Office automation is an initiative used to digitally deliver services to citizens, private and public sectors. It is used to digitally collect, store, create, and manipulate office information as a need of accomplishing basic tasks. Azya Office Automation has been implemented as a pilot project in Kurdistan Institution for Strategic Studies and Scientific Research (KISSR) since 2013. The efficiency of governance in Kurdistan Institution for Strategic Studies and Scientific Research has been improved, thanks to its implementation. The aims of this research paper is to evaluate user satisfaction of this software and identify its significant predictors using EGOVSAT Model. The user satisfaction of this model encompasses five main parts, which are utility, reliability, efficiency, customization, and flexibility. For that purpose, a detailed survey is conducted to measure the level of user satisfaction. A total of sixteen questions have distributed among forty one users of the software in KISSR. In order to evaluate the software, three measurement have been used which are reliability test, regression analysis and correlation analysis. The results indicate that the software is successful to a decent extent based on user satisfaction feedbacks obtained by using EGOVSAT Model.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
An Optimized Framework to Adopt Computer Laboratory Administrations for Operating System and Application Installations
Authors:
Miran Hama Rahim Saeed,
Bryar A. Hassan,
Shko M. Qader
Abstract:
Nowadays, in most of the fields, task automation is area of interest and research due to that manual execution of a task is error prone, time consuming, involving more human resources and focus concerning. In the area of Computer laboratory administration, the old fashioned administration cannot run with todays growth, where the Operating System (OS) and required applications are installed on all…
▽ More
Nowadays, in most of the fields, task automation is area of interest and research due to that manual execution of a task is error prone, time consuming, involving more human resources and focus concerning. In the area of Computer laboratory administration, the old fashioned administration cannot run with todays growth, where the Operating System (OS) and required applications are installed on all the machines one by one. Therefore, a framework for automating Lab administration in regards of Operating Systems and Application installations will be proposed in this research. Affordability, simplicity, usability are taken into major consideration. All the parts of the framework are implemented and illustrated in detail which promotes a great enhancement in the area of Computer Lab Administration.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Backhaul-Aware Intelligent Positioning of UAVs and Association of Terrestrial Base Stations for Fronthaul Connectivity
Authors:
Muhammad K. Shehzad,
Arsalan Ahmad,
Syed Ali Hassan,
Haejoon Jung
Abstract:
The mushroom growth of cellular users requires novel advancements in the existing cellular infrastructure. One way to handle such a tremendous increase is to densely deploy terrestrial small-cell base stations (TSBSs) with careful management of smart backhaul/fronthaul networks. Nevertheless, terrestrial backhaul hubs significantly suffer from the dense fading environment and are difficult to inst…
▽ More
The mushroom growth of cellular users requires novel advancements in the existing cellular infrastructure. One way to handle such a tremendous increase is to densely deploy terrestrial small-cell base stations (TSBSs) with careful management of smart backhaul/fronthaul networks. Nevertheless, terrestrial backhaul hubs significantly suffer from the dense fading environment and are difficult to install in a typical urban environment. Therefore, this paper considers the idea of replacing terrestrial backhaul network with an aerial network consisting of unmanned aerial vehicles (UAVs) to provide the fronthaul connectivity between the TSBSs and the ground core-network (GCN). To this end, we focus on the joint positioning of UAVs and the association of TSBSs such that the sum-rate of the overall system is maximized. In particular, the association problem of TSBSs with UAVs is formulated under communication-related constraints, i.e., bandwidth, number of connections to a UAV, power limit, interference threshold, UAV heights, and backhaul data rate. To meet this joint objective, we take advantage of the genetic algorithm (GA) due to the offline nature of our optimization problem. The performance of the proposed approach is evaluated using the unsupervised learning-based k-means clustering algorithm. We observe that the proposed approach is highly effective to satisfy the requirements of smart fronthaul networks.
△ Less
Submitted 1 May, 2021;
originally announced May 2021.
-
TabAug: Data Driven Augmentation for Enhanced Table Structure Recognition
Authors:
Umar Khan,
Sohaib Zahid,
Muhammad Asad Ali,
Adnan ul Hassan,
Faisal Shafait
Abstract:
Table Structure Recognition is an essential part of end-to-end tabular data extraction in document images. The recent success of deep learning model architectures in computer vision remains to be non-reflective in table structure recognition, largely because extensive datasets for this domain are still unavailable while labeling new data is expensive and time-consuming. Traditionally, in computer…
▽ More
Table Structure Recognition is an essential part of end-to-end tabular data extraction in document images. The recent success of deep learning model architectures in computer vision remains to be non-reflective in table structure recognition, largely because extensive datasets for this domain are still unavailable while labeling new data is expensive and time-consuming. Traditionally, in computer vision, these challenges are addressed by standard augmentation techniques that are based on image transformations like color jittering and random cropping. As demonstrated by our experiments, these techniques are not effective for the task of table structure recognition. In this paper, we propose TabAug, a re-imagined Data Augmentation technique that produces structural changes in table images through replication and deletion of rows and columns. It also consists of a data-driven probabilistic model that allows control over the augmentation process. To demonstrate the efficacy of our approach, we perform experimentation on ICDAR 2013 dataset where our approach shows consistent improvements in all aspects of the evaluation metrics, with cell-level correct detections improving from 92.16% to 96.11% over the baseline.
△ Less
Submitted 15 May, 2021; v1 submitted 29 April, 2021;
originally announced April 2021.
-
An Exploratory Study on the Repeatedly Shared External Links on Stack Overflow
Authors:
Jiakun Liu,
Haoxiang Zhang,
Xin Xia,
David Lo,
Ying Zou,
Ahmed E. Hassan,
Shanping Li
Abstract:
On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend the crowdsourced knowledge on Stack Overflow. Some of the external links, so-called as repeated external links, can be shared for multiple times. We observe that 82.5% of the link sharing activ…
▽ More
On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend the crowdsourced knowledge on Stack Overflow. Some of the external links, so-called as repeated external links, can be shared for multiple times. We observe that 82.5% of the link sharing activities (i.e., sharing links in any question, answer, or comment) on Stack Overflow share external resources, and 57.0% of the occurrences of the external links are sharing the repeated external links. However, it is still unclear what types of external resources are repeatedly shared. To help users manage their knowledge, we wish to investigate the characteristics of the repeated external links in knowledge sharing on Stack Overflow. In this paper, we analyze the repeated external links on Stack Overflow. We observe that external links that point to the text resources (hosted in documentation websites, tutorial websites, etc.) are repeatedly shared the most. We observe that: 1) different users repeatedly share the same knowledge in the form of repeated external links, thus increasing the maintenance effort of knowledge (e.g., update invalid links in multiple posts), 2) the same users can repeatedly share the external links for the purpose of promotion, and 3) external links can point to webpages with an overload of information that is difficult for users to retrieve relevant information. Our findings provide insights to Stack Overflow moderators and researchers. For example, we encourage Stack Overflow to centrally manage the commonly occurring knowledge in the form of repeated external links in order to better maintain the crowdsourced knowledge on Stack Overflow.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Studying Ad Library Integration Strategies of Top Free-to-Download Apps
Authors:
Md Ahasanuzzaman,
Safwat Hassan,
Ahmed E. Hassan
Abstract:
In-app advertisements have become a major revenue source for app developers in the mobile app ecosystem. Ad libraries play an integral part in this ecosystem as app developers integrate these libraries into their apps to display ads. In this paper, we study ad library integration practices by analyzing 35,459 updates of 1,837 top free-to-download apps of the Google Play Store. We observe that ad l…
▽ More
In-app advertisements have become a major revenue source for app developers in the mobile app ecosystem. Ad libraries play an integral part in this ecosystem as app developers integrate these libraries into their apps to display ads. In this paper, we study ad library integration practices by analyzing 35,459 updates of 1,837 top free-to-download apps of the Google Play Store. We observe that ad libraries (e.g., Google AdMob) are not always used for serving ads -- 22.5% of the apps that integrate Google AdMob do not display ads. They instead depend on Google AdMob for analytical purposes. Among the apps that display ads, we observe that 57.9% of them integrate multiple ad libraries. We observe that such integration of multiple ad libraries occurs commonly in apps with a large number of downloads and ones in app categories with a high proportion of ad-displaying apps. We manually analyze a sample of apps and derive a set of rules to automatically identify four common strategies for integrating multiple ad libraries. Our analysis of the apps across the identified strategies shows that app developers prefer to manage their own integrations instead of using off-the-shelf features of ad libraries for integrating multiple ad libraries. Our findings are valuable for ad library developers who wish to learn first hand about the challenges of integrating ad libraries.
△ Less
Submitted 31 March, 2021;
originally announced April 2021.
-
An Empirical Study of the Characteristics of Popular Minecraft Mods
Authors:
Daniel Lee,
Gopi Krishnan Rajbahadur,
Dayi Lin,
Mohammed Sayagh,
Cor-Paul Bezemer,
Ahmed E. Hassan
Abstract:
It is becoming increasingly difficult for game developers to manage the cost of developing a game, while meeting the high expectations of gamers. One way to balance the increasing gamer expectation and development stress is to build an active modding community around the game. There exist several examples of games with an extremely active and successful modding community, with the Minecraft game b…
▽ More
It is becoming increasingly difficult for game developers to manage the cost of developing a game, while meeting the high expectations of gamers. One way to balance the increasing gamer expectation and development stress is to build an active modding community around the game. There exist several examples of games with an extremely active and successful modding community, with the Minecraft game being one of the most notable ones.
This paper reports on an empirical study of 1,114 popular and 1,114 unpopular Minecraft mods from the CurseForge mod distribution platform, one of the largest distribution platforms for Minecraft mods. We analyzed the relationship between 33 features across 5 dimensions of mod characteristics and the popularity of mods (i.e., mod category, mod documentation, environmental context of the mod, remuneration for the mod, and community contribution for the mod), to understand the characteristics of popular Minecraft mods. We firstly verify that the studied dimensions have significant explanatory power in distinguishing the popularity of the studied mods. Then we evaluated the contribution of each of the 33 features across the 5 dimensions. We observed that popular mods tend to have a high quality description and promote community contribution.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
Privacy-Aware Load Ensemble Control: A Linearly-Solvable MDP Approach
Authors:
Ali Hassan,
Deepjyoti Deka,
Yury Dvorkin
Abstract:
Demand response (DR) programs engage distributed demand-side resources, e.g., controllable residential and commercial loads, in providing ancillary services for electric power systems. Ensembles of these resources can help reducing system load peaks and meeting operational limits by adjusting their electric power consumption. To equip utilities or load aggregators with adequate decision-support to…
▽ More
Demand response (DR) programs engage distributed demand-side resources, e.g., controllable residential and commercial loads, in providing ancillary services for electric power systems. Ensembles of these resources can help reducing system load peaks and meeting operational limits by adjusting their electric power consumption. To equip utilities or load aggregators with adequate decision-support tools for ensemble dispatch, we develop a Markov Decision Process (MDP) approach to optimally control load ensembles in a privacy-preserving manner. To this end, the concept of differential privacy is internalized into the MDP routine to protect transition probabilities and, thus, privacy of DR participants. The proposed approach also provides a trade-off between solution optimality and privacy guarantees, and is analyzed using real-world data from DR events in the New York University microgrid in New York, NY.
△ Less
Submitted 30 July, 2021; v1 submitted 19 March, 2021;
originally announced March 2021.
-
Building the perfect game -- an empirical study of game modifications
Authors:
Daniel Lee,
Dayi Lin,
Cor-Paul Bezemer,
Ahmed E. Hassan
Abstract:
Game developers cannot always meet the growing and changing needs of the gaming community, due to the often already overloaded schedules of developers. So-called modders can potentially assist game developers with addressing gamers' needs. Modders are enthusiasts who provide modifications or completely new content for a game. By supporting modders, game developers can meet the rapidly growing and…
▽ More
Game developers cannot always meet the growing and changing needs of the gaming community, due to the often already overloaded schedules of developers. So-called modders can potentially assist game developers with addressing gamers' needs. Modders are enthusiasts who provide modifications or completely new content for a game. By supporting modders, game developers can meet the rapidly growing and varying needs of their gamer base. Modders have the potential to play a role in extending the life expectancy of a game, thereby saving game developers time and money, and leading to a better overall gaming experience for their gamer base.
In this paper, we empirically study the metadata of 9,521 mods of the 20 most-modded games on the Nexus Mods distribution platform. Our goal is to provide useful insights into the modding community of the Nexus Mods distribution platform from a quantitative perspective, and to provide researchers with a solid foundation for future exploration of game mods. In doing so, game developers can potentially reduce development time and cost due to the increased replayability of their games through mods. We find that providing official support for mods can be beneficial for the perceived quality of the mods of a game. In addition, mod users are willing to submit bug reports for a mod. However, they often fail to do this in a systematic manner using the bug reporting tool of the Nexus Mods platform, resulting in low-quality bug reports which are difficult to resolve. Based on our findings, we recommend that game developers who desire an active modding community for their own games provide the modding community with an officially-supported modding tool. In addition, we recommend that mod distribution platforms, such as Nexus Mods, improve their bug reporting system to receive higher quality bug reports.
△ Less
Submitted 12 March, 2021;
originally announced March 2021.
-
Determinants of ICT Adoption Among Small Scale Agribusiness Enterprises In Somalia
Authors:
Husein Osman Abdullahi,
Abdikarim Abi Hassan,
Murni Mahmud,
Abdifatah Farah Ali
Abstract:
The use of Information and Communication Technology (ICT) can advance the Agricultural Business sector, particularly in a country seeking opportunities to explore the sector. There is evidence that ICT has made significant contributions to agribusiness because it allows enterprises to manage their operations, and it has major impacts on the business. However, the critical factors that motivate the…
▽ More
The use of Information and Communication Technology (ICT) can advance the Agricultural Business sector, particularly in a country seeking opportunities to explore the sector. There is evidence that ICT has made significant contributions to agribusiness because it allows enterprises to manage their operations, and it has major impacts on the business. However, the critical factors that motivate the adoption of new innovative technology by agribusiness enterprises are underexplored. The literature has indicated ICT adoption among small-scale agribusiness enterprises in Somalia is not fully understood. Nevertheless, this study addresses this gap by investigating the adoption of ICT among small-scale agribusiness enterprises in Somalia. The paper reports the use of the Technology, Organization, Environment (TOE) framework. An online survey has been conducted with random sampling for data collection, with 107 respondents. The respondents are from agribusiness staff and farmers from various agricultural companies in Somalia. After quantitative data analysis, the results indicated that relative advantage, complexity, top management support, and competitive pressure factors are significant contributors to ICT adoption in Somalian agribusiness enterprises, while ICT costs and vendor support are not significantly related to the adoption of ICT in agricultural business. This study concludes that ICT adoption in Somalia is inspired by insight and motivation rather than financial and external support. Understanding these factors leads to a better understanding of ICT adoption in Somalia. Additionally, it enriches the literature about the agriculture business on the African continent
Keywords: Determinants, ICT Adoption, Agribusiness, Small Scale, TOE framework
△ Less
Submitted 24 February, 2021;
originally announced March 2021.
-
A Differential Testing Approach for Evaluating Abstract Syntax Tree Mapping Algorithms
Authors:
Yuanrui Fan,
Xin Xia,
David Lo,
Ahmed E. Hassan,
Yuan Wang,
Shanping Li
Abstract:
Abstract syntax tree (AST) mapping algorithms are widely used to analyze changes in source code. Despite the foundational role of AST mapping algorithms, little effort has been made to evaluate the accuracy of AST mapping algorithms, i.e., the extent to which an algorihtm captures the evolution of code. We observe that a program element often has only one best-mapped program element. Based on this…
▽ More
Abstract syntax tree (AST) mapping algorithms are widely used to analyze changes in source code. Despite the foundational role of AST mapping algorithms, little effort has been made to evaluate the accuracy of AST mapping algorithms, i.e., the extent to which an algorihtm captures the evolution of code. We observe that a program element often has only one best-mapped program element. Based on this observation, we propose a hierarchical approach to automatically compare the similarity of mapped statements and tokens by different algorithms. By performing the comparison, we determine if each of the compared algorithms generates inaccurate mappings for a statement or its tokens. We invite 12 external experts to determine if three commonly used AST mapping algorithms generate accurate mappings for a statement and its tokens for 200 statements. Based on the experts' feedback,we observe that our approach achieves a precision of 0.98--1.00 and a recall of 0.65--0.75. Furthermore, we conduct a large-scale study with a dataset of ten Java projects, containing a total of 263,165 file revisions. Our approach determines that GumTree, MTDiff and IJM generate inaccurate mappings for 20%--29%, 25%--36% and 21%--30% of the file revisions, respectively. Our experimental results show that state-of-art AST mapping agorithms still need improvements.
△ Less
Submitted 27 February, 2021;
originally announced March 2021.
-
A Multi-disciplinary Ensemble Algorithm for Clustering Heterogeneous Datasets
Authors:
Bryar A. Hassan,
Tarik A. Rashid
Abstract:
Clustering is a commonly used method for exploring and analysing data where the primary objective is to categorise observations into similar clusters. In recent decades, several algorithms and methods have been developed for analysing clustered data. We notice that most of these techniques deterministically define a cluster based on the value of the attributes, distance, and density of homogenous…
▽ More
Clustering is a commonly used method for exploring and analysing data where the primary objective is to categorise observations into similar clusters. In recent decades, several algorithms and methods have been developed for analysing clustered data. We notice that most of these techniques deterministically define a cluster based on the value of the attributes, distance, and density of homogenous and single-featured datasets. However, these definitions are not successful in adding clear semantic meaning to the clusters produced. Evolutionary operators and statistical and multi-disciplinary techniques may help in generating meaningful clusters. Based on this premise, we propose a new evolutionary clustering algorithm (ECAStar) based on social class ranking and meta-heuristic algorithms for stochastically analysing heterogeneous and multiple-featured datasets. The ECAStar is integrated with recombinational evolutionary operators, Levy flight optimisation, and some statistical techniques, such as quartiles and percentiles, as well as the Euclidean distance of the K-means algorithm. Experiments are conducted to evaluate the ECAStar against five conventional approaches: K-means (KM), K-meansPlusPlus (KMPlusPlus), expectation maximisation (EM), learning vector quantisation (LVQ), and the genetic algorithm for clusteringPlusPlus (GENCLUSTPlusPlus).
△ Less
Submitted 1 January, 2021;
originally announced February 2021.
-
Engineering Interaction Dynamics in Active Resonant Photonic Structures
Authors:
Yuzhou G. N. Liu,
Omid Hemmatyar,
Absar U. Hassan,
Pawel S. Jung,
Jae-Hyuck Choi,
Demetrios N. Christodoulides,
Mercedeh Khajavikhan
Abstract:
The collective response of a system is profoundly shaped by the interaction dynamics between its constituent elements. In physics, tailoring these interactions can enable the observation of unusual phenomena that are otherwise inaccessible in standard settings, ranging from the possibility of a Kramer's degeneracy even in the absence of spin to the breakdown of the bulkboundary correspondence. Her…
▽ More
The collective response of a system is profoundly shaped by the interaction dynamics between its constituent elements. In physics, tailoring these interactions can enable the observation of unusual phenomena that are otherwise inaccessible in standard settings, ranging from the possibility of a Kramer's degeneracy even in the absence of spin to the breakdown of the bulkboundary correspondence. Here, we show how such tailored asymmetric coupling terms can be realized in photonic integrated platforms by exploiting non-Hermitian concepts. In this regard, we introduce a generalized photonic molecule composed of a pair of microring resonators with internal S-bends connected via two directional couplers and a link waveguide. By judiciously designing the parameters of this system, namely the length of the links and the power division ratio of the directional couplers, we experimentally show the emergence of Hermitian and non-Hermitian type exchange interactions. The ramifications of such coupling dynamics are then studied in 1D chain and ring-type active lattices. Our findings establish the proposed structure as a promising building block for the realization of a variety of phenomena, especially those associated with phase locking in laser arrays and non-Hermitian topological lattices.
△ Less
Submitted 7 February, 2021;
originally announced February 2021.
-
TaNTIN: Terrestrial and Non-Terrestrial Integrated Networks-A collaborative technologies perspective for beyond 5G and 6G
Authors:
Muhammad Waseem Akhtar,
Syed Ali Hassan
Abstract:
The world is moving toward globalization rapidly. Everybody has easy access to information with the spread of Internet technology. Businesses are growing beyond national borders. Internationalization affects every aspect of life. In this scenario, by dispersing functions and tasks across organizational borders, time and space, global organizations have higher requirements for collaboration. In ord…
▽ More
The world is moving toward globalization rapidly. Everybody has easy access to information with the spread of Internet technology. Businesses are growing beyond national borders. Internationalization affects every aspect of life. In this scenario, by dispersing functions and tasks across organizational borders, time and space, global organizations have higher requirements for collaboration. In order to allow decision-makers and knowledge workers, situated at different times and spaces, to work more efficiently, collaborative technologies are needed. In this paper, we give an overview of potential collaborative technologies, their benefits, risks and challenges, types, and elements. Based on the conceptualization of terrestrial and non-terrestrial integrated networks (TaNTIN), we highlight artificial intelligence (AI), blockchains, tactile Internet, mobile edge computing (MEC)/fog computing, augmented reality and virtual reality, and so forth as the key features to ensure quality-of-service (QoS) guarantee of futuristic collaborative services such as telemedicine, e-education, online gaming, online businesses, the entertainment industry. We also discuss how these technologies will impact human life in the near future.
△ Less
Submitted 20 January, 2021;
originally announced January 2021.
-
Bundled References: An Abstraction for Highly-Concurrent Linearizable Range Queries
Authors:
Jacob Nelson,
Ahmed Hassan,
Roberto Palmieri
Abstract:
We present bundled references, a new building block to provide linearizable range query operations for highly concurrent linked data structures. Bundled references allow range queries to traverse a path through the data structure that is consistent with the target atomic snapshot and is made of the minimal amount of nodes that should be accessed to preserve linearizability. We implement our techni…
▽ More
We present bundled references, a new building block to provide linearizable range query operations for highly concurrent linked data structures. Bundled references allow range queries to traverse a path through the data structure that is consistent with the target atomic snapshot and is made of the minimal amount of nodes that should be accessed to preserve linearizability. We implement our technique into a skip list, a binary search tree, and a linked list data structure. Our evaluation reveals that in mixed workloads, our design improves upon the state-of-the-art techniques by 3.9x for a skip list and 2.1x for a binary search tree. We also integrate our bundled data structure into the DBx1000 in-memory database, yielding up to 20% gain over the same competitors.
△ Less
Submitted 30 December, 2020;
originally announced December 2020.
-
Structural, optical and magnetic properties of nanostructured Cr-substituted Ni-Zn spinel ferrites synthesized by a microwave combustion method
Authors:
Abdulaziz Abu El-Fadl,
Azza M. Hassan,
Mohamed A. Kassem
Abstract:
Nanoparticles of Cr3+-substituted Ni-Zn ferrites with a general formula Ni0.4Zn0.6-xCrxFe2O4 (x = 0.0 - 0.6) have been synthesized via a facile microwave combustion route. The crystalline phase has been characterized by XRD, TEM, FT-I and XPS revealing the spinel ferrite structure without extra phases. Crystallite sizes of 23 - 32 nm as estimated by XRD analyses, after corrections for crystal stai…
▽ More
Nanoparticles of Cr3+-substituted Ni-Zn ferrites with a general formula Ni0.4Zn0.6-xCrxFe2O4 (x = 0.0 - 0.6) have been synthesized via a facile microwave combustion route. The crystalline phase has been characterized by XRD, TEM, FT-I and XPS revealing the spinel ferrite structure without extra phases. Crystallite sizes of 23 - 32 nm as estimated by XRD analyses, after corrections for crystal stains by Williamson-Hall method, are comparable to the average particle sizes observed by TEM which indicates successfully synthesized nanocrystals. Rietveld refinement analyses of the XRD patterns have inferred a monotonic decrease behavior of the lattice parameter with Cr doping in agreement with Vegard's law of solid solution series. Furthermore, cations distribution with an increased inversion factor indicate the B-site preference of Cr3+ ions. The oxidation states and cations distribution indicated by XPS results imply the Cr3+ doping on the account of Zn2+ ions and a partial reduction of Fe3+ to Fe2+ to keep the charge balance in a composition series of (Ni2+)0.4(Zn2+, Cr3+)0.6(Fe2+, Fe3+)2(O2-)4. The optical properties were explored by optical UV-Vis spectroscopy indicating allowed direct transitions with band gap energy that decreases from 3.9 eV to 3.7 eV with Cr doping. Furthermore, the photocatalytic activity for the degradation of methyl orange (MO) dye was investigated showing largely enhanced photodecomposition up to 30% of MO dye over Ni0.4Cr0.6Fe2O4 for 6 hours. A vibrating sample magnetometry (VSM) measurements at room temperature show further enhancement in the saturation magnetization of Ni0.4Zn0.6Fe2O4 , the highest in Ni-Zn ferrites, from about 60 to 70 emu/g with the increase of Cr concentration up to x = 0.1, while the coercivity shows a general increase in the whole range of Cr doping.
△ Less
Submitted 28 December, 2020;
originally announced December 2020.
-
Structure and soft magnetic properties of single-domain Mg$_{1-x}$Ni$_x$Fe$_2$O$_4$ ($0 \le x \le 1.0$) nanocrystals
Authors:
M. A. Kassem,
A. Abu El-Fadl,
A. M. Hassan,
A. M. Gismelssed,
H. Nakamura
Abstract:
The effects of Ni$^{2+}$ substitution on the structure (lattice parameters, cations distribution, average cations radii, cation-cation/anion bond lengths and angles) and the soft magnetic properties of Mg$_{1-x}$Ni$_x$Fe$_2$O$_4$ ($0 \le x \le 1.0$) nanocrystals have been studied by x-ray diffraction with Rietveld refinement, transmittance electron microscopy, Mossbauer spectroscopy and magnetizat…
▽ More
The effects of Ni$^{2+}$ substitution on the structure (lattice parameters, cations distribution, average cations radii, cation-cation/anion bond lengths and angles) and the soft magnetic properties of Mg$_{1-x}$Ni$_x$Fe$_2$O$_4$ ($0 \le x \le 1.0$) nanocrystals have been studied by x-ray diffraction with Rietveld refinement, transmittance electron microscopy, Mossbauer spectroscopy and magnetization measurements. The mostly inverse spinel structure was found in MgFe$_2$O$_4$ nanoparticles and the inversion factor is further increased by Ni-substitution up to a complete inversion in NiFe$_2$O$_4$. The synthesized ferrites with a small particle size (20 - 30 nm) exhibit soft magnetic properties of a single-domain behavior with critical domain size about 30 - 40 nm. An observed monotonic increase in magnetization and drastic decrease in coercivity at 5 K by Ni-substitution result in a lowest anisotropy constant Ku (2.8 kJ/m3) for x = 0.5. We discuss the evolution of magnetic properties by Ni-substitution in a correlation with a subsequent cations-redistribution between sites of the two sublattices and corresponding structural changes in the inter-ionic distances.
△ Less
Submitted 26 December, 2020;
originally announced December 2020.
-
Recent Developments in Detection of Central Serous Retinopathy through Imaging and Artificial Intelligence Techniques A Review
Authors:
Syed Ale Hassan,
Shahzad Akbar,
Amjad Rehman,
Tanzila Saba,
Hoshang Kolivand,
Saeed Ali Bahaj
Abstract:
Central Serous Retinopathy (CSR) or Central Serous Chorioretinopathy (CSC) is a significant disease that causes blindness and vision loss among millions of people worldwide. It transpires as a result of accumulation of watery fluids behind the retina. Therefore, detection of CSR at early stages allows preventive measures to avert any impairment to the human eye. Traditionally, several manual metho…
▽ More
Central Serous Retinopathy (CSR) or Central Serous Chorioretinopathy (CSC) is a significant disease that causes blindness and vision loss among millions of people worldwide. It transpires as a result of accumulation of watery fluids behind the retina. Therefore, detection of CSR at early stages allows preventive measures to avert any impairment to the human eye. Traditionally, several manual methods for detecting CSR have been developed in the past; however, they have shown to be imprecise and unreliable. Consequently, Artificial Intelligence (AI) services in the medical field, including automated CSR detection, are now possible to detect and cure this disease. This review assessed a variety of innovative technologies and researches that contribute to the automatic detection of CSR. In this review, various CSR disease detection techniques, broadly classified into two categories: a) CSR detection based on classical imaging technologies, and b) CSR detection based on Machine/Deep Learning methods, have been reviewed after an elaborated evaluation of 29 different relevant articles. Additionally, it also goes over the advantages, drawbacks and limitations of a variety of traditional imaging techniques, such as Optical Coherence Tomography Angiography (OCTA), Fundus Imaging and more recent approaches that utilize Artificial Intelligence techniques. Finally, it is concluded that the most recent Deep Learning (DL) classifiers deliver accurate, fast, and reliable CSR detection. However, more research needs to be conducted on publicly available datasets to improve computation complexity for the reliable detection and diagnosis of CSR disease.
△ Less
Submitted 25 August, 2021; v1 submitted 20 December, 2020;
originally announced December 2020.
-
Modified Auto Regressive Technique for Univariate Time Series Prediction of Solar Irradiance
Authors:
Umar Marikkar,
A. S. Jameel Hassan,
Mihitha S. Maithripala,
Roshan I. Godaliyadda,
Parakrama B. Ekanayake,
Janaka B. Ekanayake
Abstract:
The integration of renewable resources has increased in power generation as a means to reduce the fossil fuel usage and mitigate its adverse effects on the environment. However, renewables like solar energy are stochastic in nature due to its high dependency on weather patterns. This uncertainty vastly diminishes the benefit of solar panel integration and increases the operating costs due to large…
▽ More
The integration of renewable resources has increased in power generation as a means to reduce the fossil fuel usage and mitigate its adverse effects on the environment. However, renewables like solar energy are stochastic in nature due to its high dependency on weather patterns. This uncertainty vastly diminishes the benefit of solar panel integration and increases the operating costs due to larger energy reserve requirement. To address this issue, a Modified Auto Regressive model, a Convolutional Neural Network and a Long Short Term Memory neural network that can accurately predict the solar irradiance are proposed. The proposed techniques are compared against each other by means of multiple error metrics of validation. The Modified Auto Regressive model has a mean absolute percentage error of 14.2%, 19.9% and 22.4% for 10 minute, 30 minute and 1 hour prediction horizons. Therefore, the Modified Auto Regressive model is proposed as the most robust method, assimilating the state of the art neural networks for the solar forecasting problem.
△ Less
Submitted 9 December, 2020; v1 submitted 6 December, 2020;
originally announced December 2020.
-
Adjoint-Based Sensitivity Analysis of Steady Char Burnout
Authors:
Ahmed Hassan,
Taraneh Sayadi,
Vincent LeChenadec,
Heinz Pitsch,
Antonio Attili
Abstract:
Simulations of pulverised coal combustion rely on various models, required in order to correctly approximate the flow, chemical reactions, and behavior of solid particles. These models, in turn, rely on multiple model parameters, which are determined through experiments or small-scale simulations and contain a certain level of uncertainty. The competing effects of transport, particle physics, and…
▽ More
Simulations of pulverised coal combustion rely on various models, required in order to correctly approximate the flow, chemical reactions, and behavior of solid particles. These models, in turn, rely on multiple model parameters, which are determined through experiments or small-scale simulations and contain a certain level of uncertainty. The competing effects of transport, particle physics, and chemistry give rise to various scales and disparate dynamics, making it a very challenging problem to analyse. Therefore, the steady combustion process of a single solid particle is considered as a starting point for this study. As an added complication, the large number of parameters present in such simulations makes a purely forward approach to sensitivity analysis very expensive and almost infeasible. Therefore, the use of adjoint-based algorithms, to identify and quantify the underlying sensitivities and uncertainties, is proposed. This adjoint framework bears a great advantage in this case, where a large input space is analysed, since a single forward and backward sweep provides sensitivity information with respect to all parameters of interest. In order to investigate the applicability of such methods, both discrete and continuous adjoints are considered, and compared to the conventional approaches, such as finite differences, and forward sensitivity analysis. Various quantities of interest are considered, and sensitivities with respect to the relevant combustion parameters are reported for two different freestream compositions, describing air and oxy-atmospheres. This study serves as a benchmark for future research, where unsteady and finally turbulent cases will be considered.
△ Less
Submitted 24 September, 2020;
originally announced December 2020.
-
CSCF: a chaotic sine cosine firefly Algorithm for practical application problems
Authors:
Bryar A. Hassan
Abstract:
Recently, numerous meta-heuristic based approaches are deliberated to reduce the computational complexities of several existing approaches that include tricky derivations, very large memory space requirement, initial value sensitivity etc. However, several optimization algorithms namely firefly algorithm, sine cosine algorithm, particle swarm optimization algorithm have few drawbacks such as compu…
▽ More
Recently, numerous meta-heuristic based approaches are deliberated to reduce the computational complexities of several existing approaches that include tricky derivations, very large memory space requirement, initial value sensitivity etc. However, several optimization algorithms namely firefly algorithm, sine cosine algorithm, particle swarm optimization algorithm have few drawbacks such as computational complexity, convergence speed etc. So to overcome such shortcomings, this paper aims in developing a novel Chaotic Sine Cosine Firefly (CSCF) algorithm with numerous variants to solve optimization problems. Here, the chaotic form of two algorithms namely the sine cosine algorithm (SCA) and the Firefly (FF) algorithms are integrated to improve the convergence speed and efficiency thus minimizing several complexity issues. Moreover, the proposed CSCF approach is operated under various chaotic phases and the optimal chaotic variants containing the best chaotic mapping is selected. Then numerous chaotic benchmark functions are utilized to examine the system performance of the CSCF algorithm. Finally, the simulation results for the problems based on engineering design are demonstrated to prove the efficiency, robustness and effectiveness of the proposed algorithm.
△ Less
Submitted 20 November, 2020;
originally announced November 2020.
-
SENSAR: A Visual Tool for Intelligent Robots for Collaborative Human-Robot Interaction
Authors:
Andre Cleaver,
Faizan Muhammad,
Amel Hassan,
Elaine Short,
Jivko Sinapov
Abstract:
Establishing common ground between an intelligent robot and a human requires communication of the robot's intention, behavior, and knowledge to the human to build trust and assure safety in a shared environment. This paper introduces SENSAR (Seeing Everything iN Situ with Augmented Reality), an augmented reality robotic system that enables robots to communicate their sensory and cognitive data in…
▽ More
Establishing common ground between an intelligent robot and a human requires communication of the robot's intention, behavior, and knowledge to the human to build trust and assure safety in a shared environment. This paper introduces SENSAR (Seeing Everything iN Situ with Augmented Reality), an augmented reality robotic system that enables robots to communicate their sensory and cognitive data in context over the real-world with rendered graphics, allowing a user to understand, correct, and validate the robot's perception of the world. Our system aims to support human-robot interaction research by establishing common ground where the perceptions of the human and the robot align.
△ Less
Submitted 9 November, 2020;
originally announced November 2020.
-
Studying the Similarity of COVID-19 Sounds based on Correlation Analysis of MFCC
Authors:
Mohamed Bader,
Ismail Shahin,
Abdelfatah Hassan
Abstract:
Recently there has been a formidable work which has been put up from the people who are working in the frontlines such as hospitals, clinics, and labs alongside researchers and scientists who are also putting tremendous efforts in the fight against COVID-19 pandemic. Due to the preposterous spread of the virus, the integration of the artificial intelligence has taken a considerable part in the hea…
▽ More
Recently there has been a formidable work which has been put up from the people who are working in the frontlines such as hospitals, clinics, and labs alongside researchers and scientists who are also putting tremendous efforts in the fight against COVID-19 pandemic. Due to the preposterous spread of the virus, the integration of the artificial intelligence has taken a considerable part in the health sector, by implementing the fundamentals of Automatic Speech Recognition (ASR) and deep learning algorithms. In this paper, we illustrate the importance of speech signal processing in the extraction of the Mel-Frequency Cepstral Coefficients (MFCCs) of the COVID-19 and non-COVID-19 samples and find their relationship using Pearson correlation coefficients. Our results show high similarity in MFCCs between different COVID-19 cough and breathing sounds, while MFCC of voice is more robust between COVID-19 and non-COVID-19 samples. Moreover, our results are preliminary, and there is a possibility to exclude the voices of COVID-19 patients from further processing in diagnosing the disease.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
The Shift to 6G Communications: Vision and Requirements
Authors:
Muhammad Waseem Akhtar,
Syed Ali Hassan,
Rizwan Ghaffar,
Haejoon Jung,
Sahil Garg,
M. Shamim Hossain
Abstract:
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies such as artificial intelligence (AI)/machine learning…
▽ More
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies such as artificial intelligence (AI)/machine learning (ML), quantum communication/quantum machine learning (QML), blockchain, tera-Hertz and millimeter waves communication, tactile Internet, non-orthogonal multiple access (NOMA), small cells communication, fog/edge computing, etc., as the key technologies in the realization of beyond 5G (B5G) and 6G communications. In this article, we provide a detailed overview of the 6G network dimensions with air interface and associated potential technologies. More specifically, we highlight the use cases and applications of the proposed 6G networks in various dimensions. Furthermore, we also discuss the key performance indicators (KPI) for the B5G/6G network, challenges, and future research opportunities in this domain.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Broken External Links on Stack Overflow
Authors:
Jiakun Liu,
Xin Xia,
David Lo,
Haoxiang Zhang,
Ying Zou,
Ahmed E. Hassan,
Shanping Li
Abstract:
Stack Overflow hosts valuable programming-related knowledge with 11,926,354 links that reference to the third-party websites. The links that reference to the resources hosted outside the Stack Overflow websites extend the Stack Overflow knowledge base substantially. However, with the rapid development of programming-related knowledge, many resources hosted on the Internet are not available anymore…
▽ More
Stack Overflow hosts valuable programming-related knowledge with 11,926,354 links that reference to the third-party websites. The links that reference to the resources hosted outside the Stack Overflow websites extend the Stack Overflow knowledge base substantially. However, with the rapid development of programming-related knowledge, many resources hosted on the Internet are not available anymore. Based on our analysis of the Stack Overflow data that was released on Jun. 2, 2019, 14.2% of the links on Stack Overflow are broken links. The broken links on Stack Overflow can obstruct viewers from obtaining desired programming-related knowledge, and potentially damage the reputation of the Stack Overflow as viewers might regard the posts with broken links as obsolete. In this paper, we characterize the broken links on Stack Overflow. 65% of the broken links in our sampled questions are used to show examples, e.g., code examples. 70% of the broken links in our sampled answers are used to provide supporting information, e.g., explaining a certain concept and describing a step to solve a problem. Only 1.67% of the posts with broken links are highlighted as such by viewers in the posts' comments. Only 5.8% of the posts with broken links removed the broken links. Viewers cannot fully rely on the vote scores to detect broken links, as broken links are common across posts with different vote scores. The websites that host resources that can be maintained by their users are referenced by broken links the most on Stack Overflow -- a prominent example of such websites is GitHub. The posts and comments related to the web technologies, i.e., JavaScript, HTML, CSS, and jQuery, are associated with more broken links. Based on our findings, we shed lights for future directions and provide recommendations for practitioners and researchers.
△ Less
Submitted 9 October, 2020;
originally announced October 2020.
-
What Makes a Popular Academic AI Repository?
Authors:
Yuanrui Fan,
Xin Xia,
David Lo,
Ahmed E. Hassan,
Shanping Li
Abstract:
Many AI researchers are publishing code, data and other resources that accompany their papers in GitHub repositories. In this paper, we refer to these repositories as academic AI repositories. Our preliminary study shows that highly cited papers are more likely to have popular academic AI repositories (and vice versa). Hence, in this study, we perform an empirical study on academic AI repositories…
▽ More
Many AI researchers are publishing code, data and other resources that accompany their papers in GitHub repositories. In this paper, we refer to these repositories as academic AI repositories. Our preliminary study shows that highly cited papers are more likely to have popular academic AI repositories (and vice versa). Hence, in this study, we perform an empirical study on academic AI repositories to highlight good software engineering practices of popular academic AI repositories for AI researchers.
We collect 1,149 academic AI repositories, in which we label the top 20% repositories that have the most number of stars as popular, and we label the bottom 70% repositories as unpopular. The remaining 10% repositories are set as a gap between popular and unpopular academic AI repositories. We propose 21 features to characterize the software engineering practices of academic AI repositories. Our experimental results show that popular and unpopular academic AI repositories are statistically significantly different in 11 of the studied features---indicating that the two groups of repositories have significantly different software engineering practices. Furthermore, we find that the number of links to other GitHub repositories in the README file, the number of images in the README file and the inclusion of a license are the most important features for differentiating the two groups of academic AI repositories. Our dataset and code are made publicly available to share with the community.
△ Less
Submitted 9 October, 2020; v1 submitted 6 October, 2020;
originally announced October 2020.
-
Optimal probabilistic forecasts: When do they work?
Authors:
Gael M. Martin,
Rubén Loaiza-Maya,
David T. Frazier,
Worapree Maneesoonthorn,
Andrés Ramírez Hassan
Abstract:
Proper scoring rules are used to assess the out-of-sample accuracy of probabilistic forecasts, with different scoring rules rewarding distinct aspects of forecast performance. Herein, we re-investigate the practice of using proper scoring rules to produce probabilistic forecasts that are `optimal' according to a given score, and assess when their out-of-sample accuracy is superior to alternative f…
▽ More
Proper scoring rules are used to assess the out-of-sample accuracy of probabilistic forecasts, with different scoring rules rewarding distinct aspects of forecast performance. Herein, we re-investigate the practice of using proper scoring rules to produce probabilistic forecasts that are `optimal' according to a given score, and assess when their out-of-sample accuracy is superior to alternative forecasts, according to that score. Particular attention is paid to relative predictive performance under misspecification of the predictive model. Using numerical illustrations, we document several novel findings within this paradigm that highlight the important interplay between the true data generating process, the assumed predictive model and the scoring rule. Notably, we show that only when a predictive model is sufficiently compatible with the true process to allow a particular score criterion to reward what it is designed to reward, will this approach to forecasting reap benefits. Subject to this compatibility however, the superiority of the optimal forecast will be greater, the greater is the degree of misspecification. We explore these issues under a range of different scenarios, and using both artificially simulated and empirical data.
△ Less
Submitted 20 September, 2020;
originally announced September 2020.
-
Corrosion Resistance of Sulfur-Selenium Alloy Coatings
Authors:
Sandhya Susarla,
Govind Chilkoor,
Yufei Cui,
Taib Arif,
Thierry Tsafack,
Anand Puthirath,
Parambath M. Sudeep,
Jawahar R. Kalimuthu,
Aly Hassan,
Samuel Castro-Pardo,
Morgan Barnes,
Rafael Verduzco,
Tobin Filleter,
Nikhil Koratkar,
Venkataramana Gadhamshetty,
Muhammad M Rahman,
Pulickel M. Ajayan
Abstract:
Despite decades of research, metallic corrosion remains a long-standing challenge in many engineering applications. Specifically, designing a material that can resist corrosion both in abiotic as well as biotic environments remains elusive. Here we design a lightweight sulfur-selenium (S-Se) alloy with high stiffness and ductility that can serve as a universal corrosion-resistant coating with prot…
▽ More
Despite decades of research, metallic corrosion remains a long-standing challenge in many engineering applications. Specifically, designing a material that can resist corrosion both in abiotic as well as biotic environments remains elusive. Here we design a lightweight sulfur-selenium (S-Se) alloy with high stiffness and ductility that can serve as a universal corrosion-resistant coating with protection efficiency of ~99.9% for steel in a wide range of diverse environments. S-Se coated mild steel shows a corrosion rate that is 6-7 orders of magnitude lower than bare metal in abiotic (simulated seawater and sodium sulfate solution) and biotic (sulfate-reducing bacterial medium) environments. The coating is strongly adhesive and mechanically robust. We attribute the high corrosion resistance of the alloy in diverse environments to its semi-crystalline, non-porous, anti-microbial, and viscoelastic nature with superior mechanical performance, enabling it to successfully block a variety of diffusing species.
△ Less
Submitted 4 September, 2020;
originally announced September 2020.
-
New Normal: Cooperative Paradigm for Covid-19 Timely Detection and Containment using Internet of Things and Deep Learning
Authors:
Farooque Hassan Kumbhar,
Syed Ali Hassan,
Soo Young Shin
Abstract:
The spread of the novel coronavirus (COVID-19) has caused trillions of dollars in damages to the governments and health authorities by affecting the global economies. The purpose of this study is to introduce a connected smart paradigm that not only detects the possible spread of viruses but also helps to restart businesses/economies, and resume social life. We are proposing a connected Internet o…
▽ More
The spread of the novel coronavirus (COVID-19) has caused trillions of dollars in damages to the governments and health authorities by affecting the global economies. The purpose of this study is to introduce a connected smart paradigm that not only detects the possible spread of viruses but also helps to restart businesses/economies, and resume social life. We are proposing a connected Internet of Things ( IoT) based paradigm that makes use of object detection based on convolution neural networks (CNN), smart wearable and connected e-health to avoid current and future outbreaks. First, connected surveillance cameras feed continuous video stream to the server where we detect the inter-object distance to identify any social distancing violations. A violation activates area-based monitoring of active smartphone users and their current state of illness. In case a confirmed patient or a person with high symptoms is present, the system tracks exposed and infected people and appropriate measures are put into actions. We evaluated the proposed scheme for social distancing violation detection using YOLO (you only look once) v2 and v3, and for infection spread tracing using Python simulation.
△ Less
Submitted 15 August, 2020;
originally announced August 2020.
-
Squeezing and Entanglement of two-modes Quantum $\mathrm{X}$ Waves
Authors:
Ali Saif M. Hassan,
Waleed S. A. Hasan,
M. A. Shukri
Abstract:
quantum theory of generalized $\mathrm{X}$ waves with orbital angular momentum in dispersive media, and the interaction of quantized $\mathrm{X}$ waves in quadratic nonlinear media were studied in (J. opt,20,065201(2018)). We present a kind of phase matching, which is called velocity phase matching, and this phase matching can be used for determining the length of the nonlinear crystal or the inte…
▽ More
quantum theory of generalized $\mathrm{X}$ waves with orbital angular momentum in dispersive media, and the interaction of quantized $\mathrm{X}$ waves in quadratic nonlinear media were studied in (J. opt,20,065201(2018)). We present a kind of phase matching, which is called velocity phase matching, and this phase matching can be used for determining the length of the nonlinear crystal or the interaction time in the experiment setup, to produce $\mathrm{X}$ waves with particular velocity $v$. Moreover, we introduce more analysis for the dependence of squeezing of $\mathrm{X}$ waves on its spectral order, and for spectral orders $j>0$, we predict the existence of a characteristic axicon aperture for maximal squeezing. Then we find the quantum squeezed state of down-converted state generated by the $χ^{2}$-nonlinear process. Finally, we detect their entanglement using a criterion of separability.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
A Deep Convolutional Neural Network for the Detection of Polyps in Colonoscopy Images
Authors:
Tariq Rahim,
Syed Ali Hassan,
Soo Young Shin
Abstract:
Computerized detection of colonic polyps remains an unsolved issue because of the wide variation in the appearance, texture, color, size, and presence of the multiple polyp-like imitators during colonoscopy. In this paper, we propose a deep convolutional neural network based model for the computerized detection of polyps within colonoscopy images. The proposed model comprises 16 convolutional laye…
▽ More
Computerized detection of colonic polyps remains an unsolved issue because of the wide variation in the appearance, texture, color, size, and presence of the multiple polyp-like imitators during colonoscopy. In this paper, we propose a deep convolutional neural network based model for the computerized detection of polyps within colonoscopy images. The proposed model comprises 16 convolutional layers with 2 fully connected layers, and a Softmax layer, where we implement a unique approach using different convolutional kernels within the same hidden layer for deeper feature extraction. We applied two different activation functions, MISH and rectified linear unit activation functions for deeper propagation of information and self regularized smooth non-monotonicity. Furthermore, we used a generalized intersection of union, thus overcoming issues such as scale invariance, rotation, and shape. Data augmentation techniques such as photometric and geometric distortions are adapted to overcome the obstacles faced in polyp detection. Detailed benchmarked results are provided, showing better performance in terms of precision, sensitivity, F1- score, F2- score, and dice-coefficient, thus proving the efficacy of the proposed model.
△ Less
Submitted 15 August, 2020;
originally announced August 2020.