-
Software Variants for Hardware Trojan Detection and Resilience in COTS Processors
Authors:
Mahmudul Hasan,
Jonathan Cruz,
Prabuddha Chakraborty,
Swarup Bhunia,
Tamzidul Hoque
Abstract:
The commercial off-the-shelf (COTS) component based ecosystem provides an attractive system design paradigm due to the drastic reduction in development time and cost compared to custom solutions. However, it brings in a growing concern of trustworthiness arising from the possibility of embedded malicious logic, or hardware Trojans in COTS components. Existing trust-verification approaches are typi…
▽ More
The commercial off-the-shelf (COTS) component based ecosystem provides an attractive system design paradigm due to the drastic reduction in development time and cost compared to custom solutions. However, it brings in a growing concern of trustworthiness arising from the possibility of embedded malicious logic, or hardware Trojans in COTS components. Existing trust-verification approaches are typically not applicable to COTS hardware due to the absence of golden models and the lack of observability of internal signals. In this work, we propose a novel approach for runtime Trojan detection and resilience in untrusted COTS processors through judicious modifications in software. The proposed approach does not rely on any hardware redundancy or architectural modification and hence seamlessly integrates with the COTS-based system design process. Trojan resilience is achieved through the execution of multiple functionally equivalent software variants. We have developed and implemented a solution for compiler-based automatic generation of program variants, metric-guided selection of variants, and their integration in a single executable. To evaluate the proposed approach, we first analyzed the effectiveness of program variants in avoiding the activation of a random pool of Trojans. By implementing several Trojans in an OpenRISC 1000 processor, we analyzed the detectability and resilience during Trojan activation in both single and multiple variants. We also present delay and code size overhead for the automatically generated variants for several programs and discuss future research directions to reduce the overhead.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing
Authors:
Pravin Gaikwad,
Jonathan Cruz,
Prabuddha Chakraborty,
Swarup Bhunia,
Tamzidul Hoque
Abstract:
System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans to compromise the security of the fabricated SoCs. Recently, supervised machine learning (ML) techniques have shown promising capability in identifying nets of potential…
▽ More
System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans to compromise the security of the fabricated SoCs. Recently, supervised machine learning (ML) techniques have shown promising capability in identifying nets of potential Trojans in third party IPs (3PIPs). However, they bring several major challenges. First, they do not guide us to an optimal choice of features that reliably covers diverse classes of Trojans. Second, they require multiple Trojan-free/trusted designs to insert known Trojans and generate a trained model. Even if a set of trusted designs are available for training, the suspect IP could be inherently very different from the set of trusted designs, which may negatively impact the verification outcome. Third, these techniques only identify a set of suspect Trojan nets that require manual intervention to understand the potential threat. In this paper, we present VIPR, a systematic machine learning (ML) based trust verification solution for 3PIPs that eliminates the need for trusted designs for training. We present a comprehensive framework, associated algorithms, and a tool flow for obtaining an optimal set of features, training a targeted machine learning model, detecting suspect nets, and identifying Trojan circuitry from the suspect nets. We evaluate the framework on several Trust-Hub Trojan benchmarks and provide a comparative analysis of detection performance across different trained models, selection of features, and post-processing techniques. The proposed post-processing algorithms reduce false positives by up to 92.85%.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
Supertranslations at Timelike Infinity
Authors:
Sumanta Chakraborty,
Debodirna Ghosh,
Sk Jahanur Hoque,
Aniket Khairnar,
Amitabh Virmani
Abstract:
We propose a definition of asymptotic flatness at timelike infinity in four spacetime dimensions. We present a detailed study of the asymptotic equations of motion and the action of supertranslations on asymptotic fields. We show that the Lee-Wald symplectic form $Ω(g, δ_1 g, δ_2 g)$ does not get contributions from future timelike infinity with our boundary conditions. As a result, the "future cha…
▽ More
We propose a definition of asymptotic flatness at timelike infinity in four spacetime dimensions. We present a detailed study of the asymptotic equations of motion and the action of supertranslations on asymptotic fields. We show that the Lee-Wald symplectic form $Ω(g, δ_1 g, δ_2 g)$ does not get contributions from future timelike infinity with our boundary conditions. As a result, the "future charges" can be computed on any two-dimensional surface surrounding the sources at timelike infinity. We present expressions for supertranslation and Lorentz charges.
△ Less
Submitted 21 January, 2022; v1 submitted 17 November, 2021;
originally announced November 2021.
-
Distributed Learning over a Wireless Network with FSK-Based Majority Vote
Authors:
Alphan Sahin,
Bryson Everette,
Safi Shams Muhtasimul Hoque
Abstract:
In this study, we propose an over-the-air computation (AirComp) scheme for federated edge learning (FEEL). The proposed scheme relies on the concept of distributed learning by majority vote (MV) with sign stochastic gradient descend (signSGD). As compared to the state-of-the-art solutions, with the proposed method, edge devices (EDs) transmit the signs of local stochastic gradients by activating o…
▽ More
In this study, we propose an over-the-air computation (AirComp) scheme for federated edge learning (FEEL). The proposed scheme relies on the concept of distributed learning by majority vote (MV) with sign stochastic gradient descend (signSGD). As compared to the state-of-the-art solutions, with the proposed method, edge devices (EDs) transmit the signs of local stochastic gradients by activating one of two orthogonal resources, i.e., orthogonal frequency division multiplexing (OFDM) subcarriers, and the MVs at the edge server (ES) are obtained with non-coherent detectors by exploiting the energy accumulations on the subcarriers. Hence, the proposed scheme eliminates the need for channel state information (CSI) at the EDs and ES. By taking path loss, power control, cell size, and the probabilistic nature of the detected MVs in fading channel into account, we prove the convergence of the distributed learning for a non-convex function. Through simulations, we show that the proposed scheme can provide a high test accuracy in fading channels even when the time-synchronization and the power alignment at the ES are not ideal. We also provide insight into distributed learning for location-dependent data distribution for the MV-based schemes.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Comparative study on Mechanical characteristics of Functionally graded and Coreshell nanospheres: An Atomistic approach
Authors:
Prottay Malakar,
Md Al Rifat Anan,
Mahmudul Islam,
Md Shajedul Hoque Thakur,
Satyajit Mojumder
Abstract:
Functionally Graded Material (FGM) is a type of advanced material consisting of two (or more) distinct substances with a constantly changing composition profile. FGM technologies have moved from their traditional use to advanced micro and nanoscale electronics and energy conversion systems along with the advent of nanotechnology. MD simulations are used in this analysis to examine the effect of co…
▽ More
Functionally Graded Material (FGM) is a type of advanced material consisting of two (or more) distinct substances with a constantly changing composition profile. FGM technologies have moved from their traditional use to advanced micro and nanoscale electronics and energy conversion systems along with the advent of nanotechnology. MD simulations are used in this analysis to examine the effect of compressive load on Ag-Au FGM and Core-shell nanospheres. The plasticity process is often started by the nucleation of partial dislocations from the contact surfaces, and these dislocations spread towards the nanosphere's center. Also, we have found the formation of pyramidal-shaped partial dislocations on the pseudo-plastic regime. For a given wt% range of Ag in Au, Coreshell nanospheres have stronger mechanical strength than FGM nanospheres, and we have also observed two distinct patterns in ultimate stress variation for FGM and Coreshell nanospheres. The dislocation analysis suggests a correlation between this stress variation and the Shockley & Hirth partial dislocation density.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
Large HI optical depth and Redshifted 21-cm signal from cosmic dawn
Authors:
Kanan K. Datta,
Raghunath Ghara,
Ariful Hoque,
Suman Majumdar
Abstract:
The HI 21-cm optical depth ($τ_b$) can be considerably large as the kinetic and spin temperature of the inter-galactic medium (IGM) is expected to be very low during cosmic dawn. It will be particularly higher at regions with HI over-density. We revisit the validity of the widely used linearized equation for estimating the HI 21-cm differential brightness temperature ($T_b$) which assumes…
▽ More
The HI 21-cm optical depth ($τ_b$) can be considerably large as the kinetic and spin temperature of the inter-galactic medium (IGM) is expected to be very low during cosmic dawn. It will be particularly higher at regions with HI over-density. We revisit the validity of the widely used linearized equation for estimating the HI 21-cm differential brightness temperature ($T_b$) which assumes $τ_b << 1$ and approximates $[1-\exp({-τ_b})]$ as $τ_b$. We consider two scenarios, one without any additional cooling mechanism or radio background (referred as the standard scenario) and the other (referred as the excess-cooling} scenario) assumes the EDGES-like absorption profile and an excess cooling mechanism. We find that given a measured global absorption signal, consistent with the standard (excess-cooling) scenario, the linearized equation overestimates the spin temperature by $\sim 5\%(10\%)$. Further, using numerical simulations, we study the impact that the large optical depth has on various signal statistics. We observe that the variance, skewness and kurtosis, calculated at simulation resolution ($\sim 0.5 h^{-1} \, {\rm Mpc}$), are over-predicted up to $\sim 30\%$, $30\%$ and $15\%$ respectively for the standard and up to $\sim 90\%$, $50\%$ and $50\%$ respectively for the excess-cooling scenario. Moreover, we find that the probability distribution function of $T_b$ is squeezed and becomes more Gaussian in shape if no approximation is made. The spherically averaged HI power spectrum is overpredicted by up to $\sim 25 \%$ and $80\%$ at all scales for the standard and excess-cooling scenarios respectively.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
BdSL36: A Dataset for Bangladeshi Sign Letters Recognition
Authors:
Oishee Bintey Hoque,
Mohammad Imrul Jubair,
Al-Farabi Akash,
Saiful Islam
Abstract:
Bangladeshi Sign Language (BdSL) is a commonly used medium of communication for the hearing-impaired people in Bangladesh. A real-time BdSL interpreter with no controlled lab environment has a broad social impact and an interesting avenue of research as well. Also, it is a challenging task due to the variation in different subjects (age, gender, color, etc.), complex features, and similarities of…
▽ More
Bangladeshi Sign Language (BdSL) is a commonly used medium of communication for the hearing-impaired people in Bangladesh. A real-time BdSL interpreter with no controlled lab environment has a broad social impact and an interesting avenue of research as well. Also, it is a challenging task due to the variation in different subjects (age, gender, color, etc.), complex features, and similarities of signs and clustered backgrounds. However, the existing dataset for BdSL classification task is mainly built in a lab friendly setup which limits the application of powerful deep learning technology. In this paper, we introduce a dataset named BdSL36 which incorporates background augmentation to make the dataset versatile and contains over four million images belonging to 36 categories. Besides, we annotate about 40,000 images with bounding boxes to utilize the potentiality of object detection algorithms. Furthermore, several intensive experiments are performed to establish the baseline performance of our BdSL36. Moreover, we employ beta testing of our classifiers at the user level to justify the possibilities of real-world application with this dataset. We believe our BdSL36 will expedite future research on practical sign letter classification. We make the datasets and all the pre-trained models available for further researcher.
△ Less
Submitted 2 October, 2021;
originally announced October 2021.
-
Index Modulation with Circularly-Shifted Chirps for Dual-Function Radar and Communications
Authors:
Alphan Sahin,
Safi Shams Muhtasimul Hoque,
Chao-Yu Chen
Abstract:
In this study, we propose index modulation (IM) with circularly-shifted chirps (CSCs) (CSC-IM) for dual-function radar and communication (DFRC) systems. The proposed scheme encodes the information bits with the CSC indices and the phase-shift keying (PSK) symbols. It allows the receiver to exploit the frequency selectivity naturally in fading channels by combining IM and wideband CSCs. It also lev…
▽ More
In this study, we propose index modulation (IM) with circularly-shifted chirps (CSCs) (CSC-IM) for dual-function radar and communication (DFRC) systems. The proposed scheme encodes the information bits with the CSC indices and the phase-shift keying (PSK) symbols. It allows the receiver to exploit the frequency selectivity naturally in fading channels by combining IM and wideband CSCs. It also leverages the fact that a CSC is a constant-envelope signal to achieve a controllable peak-to-mean envelope power ratio (PMEPR). For radar functionality, CSC-IM maintains the good autocorrelation (AC) properties of a chirp by ensuring that the transmitted CSCs are separated apart sufficiently in the time domain through index separation (IS). We investigate the impact of IS on spectral efficiency (SE) and obtain the corresponding mapping functions. For theoretical results, we derive the union bound (UB) of the block error rate (BLER) for arbitrary chirps and the Cramer-Rao lower bounds (CRLBs) for the range and reflection coefficients for the matched filter (MF)-based estimation. We also prove that complementary sequences (CSs) can be constructed through CSCs by linearly combining the Fourier series of CSCs. Finally, through comprehensive comparisons, we demonstrate the efficacy of the proposed scheme for DFRC scenarios.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Design, Simulation and Feasibility Analysis of Bifacial Solar PV System in Marine Drive Road, Cox's Bazar
Authors:
Abdullah Al Mehadi,
Mirza Muntasir Nishat,
Fahim Faisal,
Ahmed Raza Hasan Bhuiyan,
Mohyeu Hussain,
Md Ashraful Hoque
Abstract:
This paper proposes a design and simulation based investigative analysis of a vertically mounted bifacial solar photovoltaic model in Marine Drive Road, Cox's Bazar. Cox's bazar is a famous tourist destination which seems to be a flexible site for implementing such energy harvesting system without affecting the nearby eco-system and solves the existing land shortage problem. Moreover, the infrastr…
▽ More
This paper proposes a design and simulation based investigative analysis of a vertically mounted bifacial solar photovoltaic model in Marine Drive Road, Cox's Bazar. Cox's bazar is a famous tourist destination which seems to be a flexible site for implementing such energy harvesting system without affecting the nearby eco-system and solves the existing land shortage problem. Moreover, the infrastructure will provide insulation to noise related problem faced by nearby residents, arising from traffic noises. A model road of 200 meters is reconnoitered for energy harvesting by solar power using three prominent software namely PVSOL, PVsyst, and SAM where a promising mean annual yield of 70492.9 kWh is obtained, and the bifacial gain is calculated to be 12.26%. In addition, a deviation analysis is performed among each of the software and it is found that PVSOL and PVsyst have shown less deviation. Furthermore, a comprehensive financial analysis shows total installation cost to be 84759.74$.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
ThriftyDAgger: Budget-Aware Novelty and Risk Gating for Interactive Imitation Learning
Authors:
Ryan Hoque,
Ashwin Balakrishna,
Ellen Novoseller,
Albert Wilcox,
Daniel S. Brown,
Ken Goldberg
Abstract:
Effective robot learning often requires online human feedback and interventions that can cost significant human time, giving rise to the central challenge in interactive imitation learning: is it possible to control the timing and length of interventions to both facilitate learning and limit burden on the human supervisor? This paper presents ThriftyDAgger, an algorithm for actively querying a hum…
▽ More
Effective robot learning often requires online human feedback and interventions that can cost significant human time, giving rise to the central challenge in interactive imitation learning: is it possible to control the timing and length of interventions to both facilitate learning and limit burden on the human supervisor? This paper presents ThriftyDAgger, an algorithm for actively querying a human supervisor given a desired budget of human interventions. ThriftyDAgger uses a learned switching policy to solicit interventions only at states that are sufficiently (1) novel, where the robot policy has no reference behavior to imitate, or (2) risky, where the robot has low confidence in task completion. To detect the latter, we introduce a novel metric for estimating risk under the current robot policy. Experiments in simulation and on a physical cable routing experiment suggest that ThriftyDAgger's intervention criteria balances task performance and supervisor burden more effectively than prior algorithms. ThriftyDAgger can also be applied at execution time, where it achieves a 100% success rate on both the simulation and physical tasks. A user study (N=10) in which users control a three-robot fleet while also performing a concentration task suggests that ThriftyDAgger increases human and robot performance by 58% and 80% respectively compared to the next best algorithm while reducing supervisor burden.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
ConVIScope: Visual Analytics for Exploring Patient Conversations
Authors:
Raymond Li,
Enamul Hoque,
Giuseppe Carenini,
Richard Lester,
Raymond Chau
Abstract:
The proliferation of text messaging for mobile health is generating a large amount of patient-doctor conversations that can be extremely valuable to health care professionals. We present ConVIScope, a visual text analytic system that tightly integrates interactive visualization with natural language processing in analyzing patient-doctor conversations. ConVIScope was developed in collaboration wit…
▽ More
The proliferation of text messaging for mobile health is generating a large amount of patient-doctor conversations that can be extremely valuable to health care professionals. We present ConVIScope, a visual text analytic system that tightly integrates interactive visualization with natural language processing in analyzing patient-doctor conversations. ConVIScope was developed in collaboration with healthcare professionals following a user-centered iterative design. Case studies with six domain experts suggest the potential utility of ConVIScope and reveal lessons for further developments.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments
Authors:
Samaikya Valluripally,
Vaibhav Akashe,
Michael Fisher,
David Falana,
Khaza Anuarul Hoque,
Prasad Calyam
Abstract:
Social virtual reality learning environments (VRLEs) provide immersive experience to users with increased accessibility to remote learning. Lack of maintaining high-performance and secured data delivery in critical VRLE application domains (e.g., military training, manufacturing) can disrupt application functionality and induce cybersickness. In this paper, we present a novel rule-based 3QS-adapta…
▽ More
Social virtual reality learning environments (VRLEs) provide immersive experience to users with increased accessibility to remote learning. Lack of maintaining high-performance and secured data delivery in critical VRLE application domains (e.g., military training, manufacturing) can disrupt application functionality and induce cybersickness. In this paper, we present a novel rule-based 3QS-adaptation framework that performs risk and cost aware trade-off analysis to control cybersickness due to performance/security anomaly events during a VRLE session. Our framework implementation in a social VRLE viz., vSocial monitors performance/security anomaly events in network/session data. In the event of an anomaly, the framework features rule-based adaptations that are triggered by using various decision metrics. Based on our experimental results, we demonstrate the effectiveness of our rule-based 3QS-adaptation framework in reducing cybersickness levels, while maintaining application functionality. Using our key findings, we enlist suitable practices for addressing performance and security issues towards a more high-performing and robust social VRLE.
△ Less
Submitted 27 August, 2021;
originally announced August 2021.
-
Multifunctional Spin Logic Gates In Graphene Spin Circuits
Authors:
Dmitrii Khokhriakov,
Shehrin Sayed,
Anamul Md. Hoque,
Bogdan Karpiak,
Bing Zhao,
Supriyo Datta,
Saroj P. Dash
Abstract:
All-spin-based computing combining logic and nonvolatile magnetic memory is promising for emerging information technologies. However, the realization of a universal spin logic operation representing a reconfigurable building block with all-electrical spin current communication has so far remained challenging. Here, we experimentally demonstrate a reprogrammable all-electrical multifunctional spin…
▽ More
All-spin-based computing combining logic and nonvolatile magnetic memory is promising for emerging information technologies. However, the realization of a universal spin logic operation representing a reconfigurable building block with all-electrical spin current communication has so far remained challenging. Here, we experimentally demonstrate a reprogrammable all-electrical multifunctional spin logic gate in a nanoelectronic device architecture utilizing graphene buses for spin communication and multiplexing and nanomagnets for writing and reading information at room temperature. This gate realizes a multistate majority spin logic operation (sMAJ), which is reconfigured to achieve XNOR, (N)AND, and (N)OR Boolean operations depending on the magnetization of inputs. Physics-based spin circuit model is developed to understand the underlying mechanisms of the multifunctional spin logic gate and its operations. These demonstrations provide a platform for scalable all-electric spin logic and neuromorphic computing in the all-spin domain logic-in-memory architecture.
△ Less
Submitted 27 August, 2021;
originally announced August 2021.
-
The Kerr-de Sitter spacetime in Bondi coordinates
Authors:
Sk Jahanur Hoque,
Amitabh Virmani
Abstract:
We use zero angular momentum null geodesics in the Kerr-de Sitter spacetime to transform the metric in a generalised Bondi coordinate system. We write the metric components explicitly. Next, we choose the radial coordinate to be the areal coordinate and write the asymptotic metric in the Bondi-Sachs gauge.
We use zero angular momentum null geodesics in the Kerr-de Sitter spacetime to transform the metric in a generalised Bondi coordinate system. We write the metric components explicitly. Next, we choose the radial coordinate to be the areal coordinate and write the asymptotic metric in the Bondi-Sachs gauge.
△ Less
Submitted 2 August, 2021;
originally announced August 2021.
-
Van der Waals Magnet based Spin-Valve Devices at Room Temperature
Authors:
Bing Zhao,
Roselle Ngaloy,
Anamul Md. Hoque,
Bogdan Karpiak,
Dmitrii Khokhriakov,
Saroj P. Dash
Abstract:
The discovery of van der Waals (vdW) magnets opened up a new paradigm for condensed matter physics and spintronic technologies. However, the operations of active spintronic devices with vdW magnets are so far limited to cryogenic temperatures, inhibiting its broader practical applications. Here, for the first time, we demonstrate room temperature spin-valve devices using vdW itinerant ferromagnet…
▽ More
The discovery of van der Waals (vdW) magnets opened up a new paradigm for condensed matter physics and spintronic technologies. However, the operations of active spintronic devices with vdW magnets are so far limited to cryogenic temperatures, inhibiting its broader practical applications. Here, for the first time, we demonstrate room temperature spin-valve devices using vdW itinerant ferromagnet Fe5GeTe2 in heterostructures with graphene. The tunnel spin polarization of the Fe5GeTe2/graphene vdW interface is detected to be significantly large ~ 45 % and negative at room temperature. Lateral spin-valve device design enables electrical control of spin signal and realization of basic building blocks for device application such as efficient spin injection, transport, precession, and detection functionalities. Furthermore, measurements with different magnetic orientations provide unique insights into the magnetic anisotropy of Fe5GeTe2 and its relation with spin polarization and dynamics in the heterostructure. These findings open opportunities for the applications of vdW magnet-based all-2D spintronic devices and integrated spin circuits at ambient temperatures.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
$N$-dimensional Smorodinsky-Winternitz model and related higher rank quadratic algebra ${\cal SW}(N)$
Authors:
Francisco Correa,
Md Fazlul Hoque,
Ian Marquette,
Yao-Zhong Zhang
Abstract:
The $N$-dimensional Smorodinsky-Winternitz system is a maximally superintegrable and exactly solvable model, being subject of study from different approaches. The model has been demonstrated to be multiseparable with wavefunctions given by Laguerre and Jacobi polynomials. In this paper we present the complete symmetry algebra ${\cal SW}(N)$ of the system, which it is a higher-rank quadratic one co…
▽ More
The $N$-dimensional Smorodinsky-Winternitz system is a maximally superintegrable and exactly solvable model, being subject of study from different approaches. The model has been demonstrated to be multiseparable with wavefunctions given by Laguerre and Jacobi polynomials. In this paper we present the complete symmetry algebra ${\cal SW}(N)$ of the system, which it is a higher-rank quadratic one containing the recently discovered Racah algebra ${\cal R}(N)$ as subalgebra. The substructures of distinct quadratic ${\cal Q}(3)$ algebras and their related Casimirs are also studied. In this way, from the constraints on the oscillator realizations of these substructures, the energy spectrum of the $N$-dimensional Smorodinsky-Winternitz system is obtained. We show that ${\cal SW}(N)$ allows different set of substructures based on the Racah algebra ${\cal R}({ N})$ which can be applied independently to algebraically derive the spectrum of the system.
△ Less
Submitted 16 June, 2021; v1 submitted 8 June, 2021;
originally announced June 2021.
-
On the Diophantine equation $dx^2+p^{2a}q^{2b}=4y^p$
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
We investigate the solvability of the Diophantine equation in the title, where $d>1$ is a square-free integer, $p, q$ are distinct odd primes and $x,y,a,b$ are unknown positive integers with $\gcd(x,y)=1$. We describe all the integer solutions of this equation, and then use the main finding to deduce some results concerning the integers solutions of some of its variants. The methods adopted here a…
▽ More
We investigate the solvability of the Diophantine equation in the title, where $d>1$ is a square-free integer, $p, q$ are distinct odd primes and $x,y,a,b$ are unknown positive integers with $\gcd(x,y)=1$. We describe all the integer solutions of this equation, and then use the main finding to deduce some results concerning the integers solutions of some of its variants. The methods adopted here are elementary in nature and are primarily based on the existence of the primitive divisors of certain Lehmer numbers.
△ Less
Submitted 10 November, 2021; v1 submitted 3 June, 2021;
originally announced June 2021.
-
On a conjecture of Iizuka
Authors:
Azizul Hoque
Abstract:
For a given odd positive integer $n$ and an odd prime $p$, we construct an infinite family of quadruples of imaginary quadratic fields $\mathbb{Q}(\sqrt{d})$, $\mathbb{Q}(\sqrt{d+1})$, $\mathbb{Q}(\sqrt{d+4})$ and $\mathbb{Q}(\sqrt{d+4p^2})$ with $d\in \mathbb{Z}$ such that the class number of each of them is divisible by $n$. Subsequently, we show that there is an infinite family of quintuples of…
▽ More
For a given odd positive integer $n$ and an odd prime $p$, we construct an infinite family of quadruples of imaginary quadratic fields $\mathbb{Q}(\sqrt{d})$, $\mathbb{Q}(\sqrt{d+1})$, $\mathbb{Q}(\sqrt{d+4})$ and $\mathbb{Q}(\sqrt{d+4p^2})$ with $d\in \mathbb{Z}$ such that the class number of each of them is divisible by $n$. Subsequently, we show that there is an infinite family of quintuples of imaginary quadratic fields $\mathbb{Q}(\sqrt{d})$, $\mathbb{Q}(\sqrt{d+1})$, $\mathbb{Q}(\sqrt{d+4})$, $\mathbb{Q}(\sqrt{d+36})$ and $\mathbb{Q}(\sqrt{d+100})$ with $d\in \mathbb{Z}$ whose class numbers are all divisible by $n$. Our results provide a complete proof of Iizuka's conjecture (in fact a generalization of it) for the case $m=1$. Our results also affirmatively answer a weaker version of (a generalization of) Iizuka's conjecture for $m\geq 4$.
△ Less
Submitted 17 August, 2021; v1 submitted 1 June, 2021;
originally announced June 2021.
-
A Multipurpose End-Station for Atomic, Molecular and Optical Sciences and Coherent Diffractive Imaging at ELI Beamlines
Authors:
Eva Klimešová,
Olena Kulyk,
Ziaul Hoque,
Andreas Hult Roos,
Krishna P. Khakurel,
Mateusz Rebarz,
Matej Jurkovič,
Martin Albrecht,
Ondřej Finke,
Roberto Lera,
Ondřej Hort,
Dong-Du Mai,
Jaroslav Nejdl,
Martin Sokol,
Rasmus Burlund Fink,
Ltaief Ben Ltaief,
Daniel Westphal,
Adam Wolf,
Tomáš Laštovička,
Fabio Frassetto,
Luca Poletto,
Jakob Andreasson,
Maria Krikunova
Abstract:
We report on the status of a users' end-station, MAC: a Multipurpose station for Atomic, molecular and optical sciences and Coherent diffractive imaging, designed for studies of structure and dynamics of matter in the femtosecond time-domain. MAC is located in the E1 experimental hall on the high harmonic generation (HHG) beamline of the ELI Beamlines facility. The extreme ultraviolet beam from th…
▽ More
We report on the status of a users' end-station, MAC: a Multipurpose station for Atomic, molecular and optical sciences and Coherent diffractive imaging, designed for studies of structure and dynamics of matter in the femtosecond time-domain. MAC is located in the E1 experimental hall on the high harmonic generation (HHG) beamline of the ELI Beamlines facility. The extreme ultraviolet beam from the HHG beamline can be used at the MAC end-station together with a synchronized pump beam (which will cover the NIR/Vis/UV or THz range) for time-resolved experiments on different samples. Sample delivery systems at the MAC end-station include a molecular beam, a source for pure or doped clusters, ultrathin cylindrical or flat liquid jets, and focused beams of substrate-free nanoparticles produced by an electrospray or a gas dynamic virtual nozzle combined with an aerodynamic lens stack. We further present the available detectors: electron/ion time-of-flight and velocity map imaging spectrometers and an X-ray camera, and discuss future upgrades: a magnetic bottle electron spectrometer, production of doped nanodroplets and the planned developments of beam capabilities at the MAC end-station.
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
Gravitational multipole moments for asymptotically de Sitter spacetimes
Authors:
Sumanta Chakraborty,
Sk Jahanur Hoque,
Roberto Oliveri
Abstract:
We provide a prescription to compute the gravitational multipole moments of compact objects for asymptotically de Sitter spacetimes. Our prescription builds upon a recent definition of the gravitational multipole moments in terms of Noether charges associated to specific vector fields, within the residual harmonic gauge, dubbed multipole symmetries. We first derive the multipole symmetries for spa…
▽ More
We provide a prescription to compute the gravitational multipole moments of compact objects for asymptotically de Sitter spacetimes. Our prescription builds upon a recent definition of the gravitational multipole moments in terms of Noether charges associated to specific vector fields, within the residual harmonic gauge, dubbed multipole symmetries. We first derive the multipole symmetries for spacetimes which are asymptotically de Sitter; we also show that these symmetry vector fields eliminate the non-propagating degrees of freedom from the linearized gravitational wave equation in a suitable gauge. We then apply our prescription to the Kerr-de Sitter black hole and compute its multipole structure. Our result recovers the Geroch-Hansen moments of the Kerr black hole in the limit of vanishing cosmological constant.
△ Less
Submitted 11 September, 2021; v1 submitted 20 May, 2021;
originally announced May 2021.
-
On the Lebesgue-Ramanujan-Nagell type equation $x^2+17^k41^\ell 59^m =2^δy^n$
Authors:
Azizul Hoque
Abstract:
We consider the Diophantine equation $x^2+17^k41^\ell 59^m =2^δy^n$ in unknown integer $x\geq 1, y>1, k, \ell, m, δ\geq 0$ and $n\geq 3$ with $\gcd(x,y)=1$, and we find all its solutions. We use the prominent result of Bilu, Hanrot and Voutier on existence of primitive divisors in Lehmer sequences in combination with elementary number theoretic argument and computer search.
We consider the Diophantine equation $x^2+17^k41^\ell 59^m =2^δy^n$ in unknown integer $x\geq 1, y>1, k, \ell, m, δ\geq 0$ and $n\geq 3$ with $\gcd(x,y)=1$, and we find all its solutions. We use the prominent result of Bilu, Hanrot and Voutier on existence of primitive divisors in Lehmer sequences in combination with elementary number theoretic argument and computer search.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
Complete solutions of a Lebesgue-Ramanujan-Nagell type equation
Authors:
Priyanka Baruah,
Anup Das,
Azizul Hoque
Abstract:
We consider the Lebesgue-Ramanujan-Nagell type equation $x^2+5^a13^b17^c=2^m y^n$, where $a,b,c, m\geq 0, n \geq 3$ and $x, y\geq 1$ are unknown integers with $\gcd(x,y)=1$. We determine all integer solutions to the above equation. The proof depends on the classical results of Bilu, Hanrot and Voutier on primitive divisors in Lehmer sequences, and finding all $S$-integral points on a class of elli…
▽ More
We consider the Lebesgue-Ramanujan-Nagell type equation $x^2+5^a13^b17^c=2^m y^n$, where $a,b,c, m\geq 0, n \geq 3$ and $x, y\geq 1$ are unknown integers with $\gcd(x,y)=1$. We determine all integer solutions to the above equation. The proof depends on the classical results of Bilu, Hanrot and Voutier on primitive divisors in Lehmer sequences, and finding all $S$-integral points on a class of elliptic curves.
△ Less
Submitted 25 February, 2024; v1 submitted 26 April, 2021;
originally announced April 2021.
-
Emotion Classification in a Resource Constrained Language Using Transformer-based Approach
Authors:
Avishek Das,
Omar Sharif,
Mohammed Moshiul Hoque,
Iqbal H. Sarker
Abstract:
Although research on emotion classification has significantly progressed in high-resource languages, it is still infancy for resource-constrained languages like Bengali. However, unavailability of necessary language processing tools and deficiency of benchmark corpora makes the emotion classification task in Bengali more challenging and complicated. This work proposes a transformer-based technique…
▽ More
Although research on emotion classification has significantly progressed in high-resource languages, it is still infancy for resource-constrained languages like Bengali. However, unavailability of necessary language processing tools and deficiency of benchmark corpora makes the emotion classification task in Bengali more challenging and complicated. This work proposes a transformer-based technique to classify the Bengali text into one of the six basic emotions: anger, fear, disgust, sadness, joy, and surprise. A Bengali emotion corpus consists of 6243 texts is developed for the classification task. Experimentation carried out using various machine learning (LR, RF, MNB, SVM), deep neural networks (CNN, BiLSTM, CNN+BiLSTM) and transformer (Bangla-BERT, m-BERT, XLM-R) based approaches. Experimental outcomes indicate that XLM-R outdoes all other techniques by achieving the highest weighted $f_1$-score of $69.73\%$ on the test data. The dataset is publicly available at https://github.com/omar-sharif03/NAACL-SRW-2021.
△ Less
Submitted 17 April, 2021;
originally announced April 2021.
-
LazyDAgger: Reducing Context Switching in Interactive Imitation Learning
Authors:
Ryan Hoque,
Ashwin Balakrishna,
Carl Putterman,
Michael Luo,
Daniel S. Brown,
Daniel Seita,
Brijen Thananjeyan,
Ellen Novoseller,
Ken Goldberg
Abstract:
Corrective interventions while a robot is learning to automate a task provide an intuitive method for a human supervisor to assist the robot and convey information about desired behavior. However, these interventions can impose significant burden on a human supervisor, as each intervention interrupts other work the human is doing, incurs latency with each context switch between supervisor and auto…
▽ More
Corrective interventions while a robot is learning to automate a task provide an intuitive method for a human supervisor to assist the robot and convey information about desired behavior. However, these interventions can impose significant burden on a human supervisor, as each intervention interrupts other work the human is doing, incurs latency with each context switch between supervisor and autonomous control, and requires time to perform. We present LazyDAgger, which extends the interactive imitation learning (IL) algorithm SafeDAgger to reduce context switches between supervisor and autonomous control. We find that LazyDAgger improves the performance and robustness of the learned policy during both learning and execution while limiting burden on the supervisor. Simulation experiments suggest that LazyDAgger can reduce context switches by an average of 60% over SafeDAgger on 3 continuous control tasks while maintaining state-of-the-art policy performance. In physical fabric manipulation experiments with an ABB YuMi robot, LazyDAgger reduces context switches by 60% while achieving a 60% higher success rate than SafeDAgger at execution time.
△ Less
Submitted 20 July, 2021; v1 submitted 31 March, 2021;
originally announced April 2021.
-
DBATES: DataBase of Audio features, Text, and visual Expressions in competitive debate Speeches
Authors:
Taylan K. Sen,
Gazi Naven,
Luke Gerstner,
Daryl Bagley,
Raiyan Abdul Baten,
Wasifur Rahman,
Kamrul Hasan,
Kurtis G. Haut,
Abdullah Mamun,
Samiha Samrose,
Anne Solbu,
R. Eric Barnes,
Mark G. Frank,
Ehsan Hoque
Abstract:
In this work, we present a database of multimodal communication features extracted from debate speeches in the 2019 North American Universities Debate Championships (NAUDC). Feature sets were extracted from the visual (facial expression, gaze, and head pose), audio (PRAAT), and textual (word sentiment and linguistic category) modalities of raw video recordings of competitive collegiate debaters (N…
▽ More
In this work, we present a database of multimodal communication features extracted from debate speeches in the 2019 North American Universities Debate Championships (NAUDC). Feature sets were extracted from the visual (facial expression, gaze, and head pose), audio (PRAAT), and textual (word sentiment and linguistic category) modalities of raw video recordings of competitive collegiate debaters (N=717 6-minute recordings from 140 unique debaters). Each speech has an associated competition debate score (range: 67-96) from expert judges as well as competitor demographic and per-round reflection surveys. We observe the fully multimodal model performs best in comparison to models trained on various compositions of modalities. We also find that the weights of some features (such as the expression of joy and the use of the word we) change in direction between the aforementioned models. We use these results to highlight the value of a multimodal dataset for studying competitive, collegiate debate.
△ Less
Submitted 25 March, 2021;
originally announced March 2021.
-
On the canonical energy of weak gravitational fields with a cosmological constant $Λ\in \mathbb{R}$
Authors:
P. T. Chruściel,
Sk J. Hoque,
M. Maliborski,
T. Smołka
Abstract:
We analyse the canonical energy of vacuum linearised gravitational fields on light cones on a de Sitter, Minkowski, and Anti de Sitter backgrounds in Bondi gauge. We derive the associated asymptotic symmetries. When $Λ>0$ the energy diverges, but a renormalised formula with well defined flux is obtained. We show that the renormalised energy in the asymptotically off-diagonal gauge coincides with t…
▽ More
We analyse the canonical energy of vacuum linearised gravitational fields on light cones on a de Sitter, Minkowski, and Anti de Sitter backgrounds in Bondi gauge. We derive the associated asymptotic symmetries. When $Λ>0$ the energy diverges, but a renormalised formula with well defined flux is obtained. We show that the renormalised energy in the asymptotically off-diagonal gauge coincides with the quadratisation of the generalisation of the Trautman-Bondi mass proposed in [13].
△ Less
Submitted 14 July, 2021; v1 submitted 10 March, 2021;
originally announced March 2021.
-
WordBias: An Interactive Visual Tool for Discovering Intersectional Biases Encoded in Word Embeddings
Authors:
Bhavya Ghai,
Md Naimul Hoque,
Klaus Mueller
Abstract:
Intersectional bias is a bias caused by an overlap of multiple social factors like gender, sexuality, race, disability, religion, etc. A recent study has shown that word embedding models can be laden with biases against intersectional groups like African American females, etc. The first step towards tackling such intersectional biases is to identify them. However, discovering biases against differ…
▽ More
Intersectional bias is a bias caused by an overlap of multiple social factors like gender, sexuality, race, disability, religion, etc. A recent study has shown that word embedding models can be laden with biases against intersectional groups like African American females, etc. The first step towards tackling such intersectional biases is to identify them. However, discovering biases against different intersectional groups remains a challenging task. In this work, we present WordBias, an interactive visual tool designed to explore biases against intersectional groups encoded in static word embeddings. Given a pretrained static word embedding, WordBias computes the association of each word along different groups based on race, age, etc. and then visualizes them using a novel interactive interface. Using a case study, we demonstrate how WordBias can help uncover biases against intersectional groups like Black Muslim Males, Poor Females, etc. encoded in word embedding. In addition, we also evaluate our tool using qualitative feedback from expert interviews. The source code for this tool can be publicly accessed for reproducibility at github.com/bhavyaghai/WordBias.
△ Less
Submitted 6 September, 2021; v1 submitted 5 March, 2021;
originally announced March 2021.
-
NLP-CUET@DravidianLangTech-EACL2021: Investigating Visual and Textual Features to Identify Trolls from Multimodal Social Media Memes
Authors:
Eftekhar Hossain,
Omar Sharif,
Mohammed Moshiul Hoque
Abstract:
In the past few years, the meme has become a new way of communication on the Internet. As memes are the images with embedded text, it can quickly spread hate, offence and violence. Classifying memes are very challenging because of their multimodal nature and region-specific interpretation. A shared task is organized to develop models that can identify trolls from multimodal social media memes. Thi…
▽ More
In the past few years, the meme has become a new way of communication on the Internet. As memes are the images with embedded text, it can quickly spread hate, offence and violence. Classifying memes are very challenging because of their multimodal nature and region-specific interpretation. A shared task is organized to develop models that can identify trolls from multimodal social media memes. This work presents a computational model that we have developed as part of our participation in the task. Training data comes in two forms: an image with embedded Tamil code-mixed text and an associated caption given in English. We investigated the visual and textual features using CNN, VGG16, Inception, Multilingual-BERT, XLM-Roberta, XLNet models. Multimodal features are extracted by combining image (CNN, ResNet50, Inception) and text (Long short term memory network) features via early fusion approach. Results indicate that the textual approach with XLNet achieved the highest weighted $f_1$-score of $0.58$, which enabled our model to secure $3^{rd}$ rank in this task.
△ Less
Submitted 28 February, 2021;
originally announced March 2021.
-
NLP-CUET@LT-EDI-EACL2021: Multilingual Code-Mixed Hope Speech Detection using Cross-lingual Representation Learner
Authors:
Eftekhar Hossain,
Omar Sharif,
Mohammed Moshiul Hoque
Abstract:
In recent years, several systems have been developed to regulate the spread of negativity and eliminate aggressive, offensive or abusive contents from the online platforms. Nevertheless, a limited number of researches carried out to identify positive, encouraging and supportive contents. In this work, our goal is to identify whether a social media post/comment contains hope speech or not. We propo…
▽ More
In recent years, several systems have been developed to regulate the spread of negativity and eliminate aggressive, offensive or abusive contents from the online platforms. Nevertheless, a limited number of researches carried out to identify positive, encouraging and supportive contents. In this work, our goal is to identify whether a social media post/comment contains hope speech or not. We propose three distinct models to identify hope speech in English, Tamil and Malayalam language to serve this purpose. To attain this goal, we employed various machine learning (support vector machine, logistic regression, ensemble), deep learning (convolutional neural network + long short term memory) and transformer (m-BERT, Indic-BERT, XLNet, XLM-Roberta) based methods. Results indicate that XLM-Roberta outdoes all other techniques by gaining a weighted $f_1$-score of $0.93$, $0.60$ and $0.85$ respectively for English, Tamil and Malayalam language. Our team has achieved $1^{st}$, $2^{nd}$ and $1^{st}$ rank in these three tasks respectively.
△ Less
Submitted 28 February, 2021;
originally announced March 2021.
-
NLP-CUET@DravidianLangTech-EACL2021: Offensive Language Detection from Multilingual Code-Mixed Text using Transformers
Authors:
Omar Sharif,
Eftekhar Hossain,
Mohammed Moshiul Hoque
Abstract:
The increasing accessibility of the internet facilitated social media usage and encouraged individuals to express their opinions liberally. Nevertheless, it also creates a place for content polluters to disseminate offensive posts or contents. Most of such offensive posts are written in a cross-lingual manner and can easily evade the online surveillance systems. This paper presents an automated sy…
▽ More
The increasing accessibility of the internet facilitated social media usage and encouraged individuals to express their opinions liberally. Nevertheless, it also creates a place for content polluters to disseminate offensive posts or contents. Most of such offensive posts are written in a cross-lingual manner and can easily evade the online surveillance systems. This paper presents an automated system that can identify offensive text from multilingual code-mixed data. In the task, datasets provided in three languages including Tamil, Malayalam and Kannada code-mixed with English where participants are asked to implement separate models for each language. To accomplish the tasks, we employed two machine learning techniques (LR, SVM), three deep learning (LSTM, LSTM+Attention) techniques and three transformers (m-BERT, Indic-BERT, XLM-R) based methods. Results show that XLM-R outperforms other techniques in Tamil and Malayalam languages while m-BERT achieves the highest score in the Kannada language. The proposed models gained weighted $f_1$ score of $0.76$ (for Tamil), $0.93$ (for Malayalam), and $0.71$ (for Kannada) with a rank of $3^{rd}$, $5^{th}$ and $4^{th}$ respectively.
△ Less
Submitted 28 February, 2021;
originally announced March 2021.
-
Thermal conductivity measurements of sub-surface buried substrates by steady-state thermoreflectance
Authors:
Md Shafkat Bin Hoque,
Yee Rui Koh,
Kiumars Aryana,
Eric Hoglund,
Jeffrey L. Braun,
David H. Olson,
John T. Gaskins,
Habib Ahmad,
Mirza Mohammad Mahbube Elahi,
Jennifer K. Hite,
Zayd C. Leseman,
W. Alan Doolittle,
Patrick E. Hopkins
Abstract:
Measuring the thermal conductivity of sub-surface buried substrates are of significant practical interests. However, this remains challenging with traditional pump-probe spectroscopies due to their limited thermal penetration depths (TPD). Here, we experimentally and numerically investigate the TPD of recently developed optical pump-probe technique steady-state thermoreflectance (SSTR) and explore…
▽ More
Measuring the thermal conductivity of sub-surface buried substrates are of significant practical interests. However, this remains challenging with traditional pump-probe spectroscopies due to their limited thermal penetration depths (TPD). Here, we experimentally and numerically investigate the TPD of recently developed optical pump-probe technique steady-state thermoreflectance (SSTR) and explore its capability for measuring the thermal properties of buried substrates. The conventional definition of the TPD does not truly represent the upper limit of how far beneath the surface SSTR can probe. For estimating the uncertainty of SSTR measurements of a buried substrate a priori, sensitivity calculations provide the best means. Thus, detailed sensitivity calculations are provided to guide future measurements. Due to the steady-state nature of SSTR, it can measure the thermal conductivity of buried substrates typically inaccessible by traditional pump-probe techniques, exemplified by measuring three control samples. We also discuss the required criteria for SSTR to isolate the thermal properties of a buried film. Our study establishes SSTR as a suitable technique for thermal characterizations of sub-surface buried substrates in typical device geometries.
△ Less
Submitted 25 February, 2021;
originally announced February 2021.
-
VisuoSpatial Foresight for Physical Sequential Fabric Manipulation
Authors:
Ryan Hoque,
Daniel Seita,
Ashwin Balakrishna,
Aditya Ganapathi,
Ajay Kumar Tanwani,
Nawid Jamali,
Katsu Yamane,
Soshi Iba,
Ken Goldberg
Abstract:
Robotic fabric manipulation has applications in home robotics, textiles, senior care and surgery. Existing fabric manipulation techniques, however, are designed for specific tasks, making it difficult to generalize across different but related tasks. We build upon the Visual Foresight framework to learn fabric dynamics that can be efficiently reused to accomplish different sequential fabric manipu…
▽ More
Robotic fabric manipulation has applications in home robotics, textiles, senior care and surgery. Existing fabric manipulation techniques, however, are designed for specific tasks, making it difficult to generalize across different but related tasks. We build upon the Visual Foresight framework to learn fabric dynamics that can be efficiently reused to accomplish different sequential fabric manipulation tasks with a single goal-conditioned policy. We extend our earlier work on VisuoSpatial Foresight (VSF), which learns visual dynamics on domain randomized RGB images and depth maps simultaneously and completely in simulation. In this earlier work, we evaluated VSF on multi-step fabric smoothing and folding tasks against 5 baseline methods in simulation and on the da Vinci Research Kit (dVRK) surgical robot without any demonstrations at train or test time. A key finding was that depth sensing significantly improves performance: RGBD data yields an 80% improvement in fabric folding success rate in simulation over pure RGB data. In this work, we vary 4 components of VSF, including data generation, visual dynamics model, cost function, and optimization procedure. Results suggest that training visual dynamics models using longer, corner-based actions can improve the efficiency of fabric folding by 76% and enable a physical sequential fabric folding task that VSF could not previously perform with 90% reliability. Code, data, videos, and supplementary material are available at https://sites.google.com/view/fabric-vsf/.
△ Less
Submitted 20 July, 2021; v1 submitted 19 February, 2021;
originally announced February 2021.
-
Could you become more credible by being White? Assessing Impact of Race on Credibility with Deepfakes
Authors:
Kurtis Haut,
Caleb Wohn,
Victor Antony,
Aidan Goldfarb,
Melissa Welsh,
Dillanie Sumanthiran,
Ji-ze Jang,
Md. Rafayet Ali,
Ehsan Hoque
Abstract:
Computer mediated conversations (e.g., videoconferencing) is now the new mainstream media. How would credibility be impacted if one could change their race on the fly in these environments? We propose an approach using Deepfakes and a supporting GAN architecture to isolate visual features and alter racial perception. We then crowd-sourced over 800 survey responses to measure how credibility was in…
▽ More
Computer mediated conversations (e.g., videoconferencing) is now the new mainstream media. How would credibility be impacted if one could change their race on the fly in these environments? We propose an approach using Deepfakes and a supporting GAN architecture to isolate visual features and alter racial perception. We then crowd-sourced over 800 survey responses to measure how credibility was influenced by changing the perceived race. We evaluate the effect of showing a still image of a Black person versus a still image of a White person using the same audio clip for each survey. We also test the effect of showing either an original video or an altered video where the appearance of the person in the original video is modified to appear more White. We measure credibility as the percent of participant responses who believed the speaker was telling the truth. We found that changing the race of a person in a static image has negligible impact on credibility. However, the same manipulation of race on a video increases credibility significantly (61\% to 73\% with p $<$ 0.05). Furthermore, a VADER sentiment analysis over the free response survey questions reveals that more positive sentiment is used to justify the credibility of a White individual in a video.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
A Mental Trespass? Unveiling Truth, Exposing Thoughts and Threatening Civil Liberties with Non-Invasive AI Lie Detection
Authors:
Taylan Sen,
Kurtis Haut,
Denis Lomakin,
Ehsan Hoque
Abstract:
Imagine an app on your phone or computer that can tell if you are being dishonest, just by processing affective features of your facial expressions, body movements, and voice. People could ask about your political preferences, your sexual orientation, and immediately determine which of your responses are honest and which are not. In this paper we argue why artificial intelligence-based, non-invasi…
▽ More
Imagine an app on your phone or computer that can tell if you are being dishonest, just by processing affective features of your facial expressions, body movements, and voice. People could ask about your political preferences, your sexual orientation, and immediately determine which of your responses are honest and which are not. In this paper we argue why artificial intelligence-based, non-invasive lie detection technologies are likely to experience a rapid advancement in the coming years, and that it would be irresponsible to wait any longer before discussing its implications. Legal and popular perspectives are reviewed to evaluate the potential for these technologies to cause societal harm. To understand the perspective of a reasonable person, we conducted a survey of 129 individuals, and identified consent and accuracy as the major factors in their decision-making process regarding the use of these technologies. In our analysis, we distinguish two types of lie detection technology, accurate truth metering and accurate thought exposing. We generally find that truth metering is already largely within the scope of existing US federal and state laws, albeit with some notable exceptions. In contrast, we find that current regulation of thought exposing technologies is ambiguous and inadequate to safeguard civil liberties. In order to rectify these shortcomings, we introduce the legal concept of mental trespass and use this concept as the basis for proposed regulation.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
On the Diophantine equation $cx^2+p^{2m}=4y^n$
Authors:
Kalyan Chakraborty,
Azizul Hoque,
Kotyada Srinivas
Abstract:
Let $c$ be a square-free positive integer and $p$ a prime satisfying $p\nmid c$. Let $h(-c)$ denote the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{-c})$. In this paper, we consider the Diophantine equation $$cx^2+p^{2m}=4y^n,~~x,y\geq 1, m\geq 0, n\geq 3, \gcd(x,y)=1, \gcd(n,2h(-c))=1,$$ and we describe all its integer solutions. Our main tool here is the prominent result of B…
▽ More
Let $c$ be a square-free positive integer and $p$ a prime satisfying $p\nmid c$. Let $h(-c)$ denote the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{-c})$. In this paper, we consider the Diophantine equation $$cx^2+p^{2m}=4y^n,~~x,y\geq 1, m\geq 0, n\geq 3, \gcd(x,y)=1, \gcd(n,2h(-c))=1,$$ and we describe all its integer solutions. Our main tool here is the prominent result of Bilu, Hanrot and Voutier on existence of primitive divisors in Lehmer sequences.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
Combating Hostility: Covid-19 Fake News and Hostile Post Detection in Social Media
Authors:
Omar Sharif,
Eftekhar Hossain,
Mohammed Moshiul Hoque
Abstract:
This paper illustrates a detail description of the system and its results that developed as a part of the participation at CONSTRAINT shared task in AAAI-2021. The shared task comprises two tasks: a) COVID19 fake news detection in English b) Hostile post detection in Hindi. Task-A is a binary classification problem with fake and real class, while task-B is a multi-label multi-class classification…
▽ More
This paper illustrates a detail description of the system and its results that developed as a part of the participation at CONSTRAINT shared task in AAAI-2021. The shared task comprises two tasks: a) COVID19 fake news detection in English b) Hostile post detection in Hindi. Task-A is a binary classification problem with fake and real class, while task-B is a multi-label multi-class classification task with five hostile classes (i.e. defame, fake, hate, offense, non-hostile). Various techniques are used to perform the classification task, including SVM, CNN, BiLSTM, and CNN+BiLSTM with tf-idf and Word2Vec embedding techniques. Results indicate that SVM with tf-idf features achieved the highest 94.39% weighted $f_1$ score on the test set in task-A. Label powerset SVM with n-gram features obtained the maximum coarse-grained and fine-grained $f_1$ score of 86.03% and 50.98% on the task-B test set respectively.
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
Predicting Individual Substance Abuse Vulnerability using Machine Learning Techniques
Authors:
Uwaise Ibna Islam,
Iqbal H. Sarker,
Enamul Haque,
Mohammed Moshiul Hoque
Abstract:
Substance abuse is the unrestrained and detrimental use of psychoactive chemical substances, unauthorized drugs, and alcohol. Continuous use of these substances can ultimately lead a human to disastrous consequences. As patients display a high rate of relapse, prevention at an early stage can be an effective restraint. We therefore propose a binary classifier to identify any individual's present v…
▽ More
Substance abuse is the unrestrained and detrimental use of psychoactive chemical substances, unauthorized drugs, and alcohol. Continuous use of these substances can ultimately lead a human to disastrous consequences. As patients display a high rate of relapse, prevention at an early stage can be an effective restraint. We therefore propose a binary classifier to identify any individual's present vulnerability towards substance abuse by analyzing subjects' socio-economic environment. We have collected data by a questionnaire which is created after carefully assessing the commonly involved factors behind substance abuse. Pearson's chi-squared test of independence is used to identify key feature variables influencing substance abuse. Later we build the predictive classifiers using machine learning classification algorithms on those variables. Logistic regression classifier trained with 18 features can predict individual vulnerability with the best accuracy.
△ Less
Submitted 9 December, 2020;
originally announced January 2021.
-
An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies
Authors:
Rony Chowdhury Ripan,
Iqbal H. Sarker,
Md Musfique Anwar,
Md. Hasan Furhad,
Fazle Rahat,
Mohammed Moshiul Hoque,
Muhammad Sarfraz
Abstract:
Cybersecurity has recently gained considerable interest in today's security issues because of the popularity of the Internet-of-Things (IoT), the considerable growth of mobile networks, and many related apps. Therefore, detecting numerous cyber-attacks in a network and creating an effective intrusion detection system plays a vital role in today's security. In this paper, we present an Isolation Fo…
▽ More
Cybersecurity has recently gained considerable interest in today's security issues because of the popularity of the Internet-of-Things (IoT), the considerable growth of mobile networks, and many related apps. Therefore, detecting numerous cyber-attacks in a network and creating an effective intrusion detection system plays a vital role in today's security. In this paper, we present an Isolation Forest Learning-Based Outlier Detection Model for effectively classifying cyber anomalies. In order to evaluate the efficacy of the resulting Outlier Detection model, we also use several conventional machine learning approaches, such as Logistic Regression (LR), Support Vector Machine (SVM), AdaBoost Classifier (ABC), Naive Bayes (NB), and K-Nearest Neighbor (KNN). The effectiveness of our proposed Outlier Detection model is evaluated by conducting experiments on Network Intrusion Dataset with evaluation metrics such as precision, recall, F1-score, and accuracy. Experimental results show that the classification accuracy of cyber anomalies has been improved after removing outliers.
△ Less
Submitted 9 December, 2020;
originally announced January 2021.
-
An Efficient K-means Clustering Algorithm for Analysing COVID-19
Authors:
Md. Zubair,
MD. Asif Iqbal,
Avijeet Shil,
Enamul Haque,
Mohammed Moshiul Hoque,
Iqbal H. Sarker
Abstract:
COVID-19 hits the world like a storm by arising pandemic situations for most of the countries around the world. The whole world is trying to overcome this pandemic situation. A better health care quality may help a country to tackle the pandemic. Making clusters of countries with similar types of health care quality provides an insight into the quality of health care in different countries. In the…
▽ More
COVID-19 hits the world like a storm by arising pandemic situations for most of the countries around the world. The whole world is trying to overcome this pandemic situation. A better health care quality may help a country to tackle the pandemic. Making clusters of countries with similar types of health care quality provides an insight into the quality of health care in different countries. In the area of machine learning and data science, the K-means clustering algorithm is typically used to create clusters based on similarity. In this paper, we propose an efficient K-means clustering method that determines the initial centroids of the clusters efficiently. Based on this proposed method, we have determined health care quality clusters of countries utilizing the COVID-19 datasets. Experimental results show that our proposed method reduces the number of iterations and execution time to analyze COVID-19 while comparing with the traditional k-means clustering algorithm.
△ Less
Submitted 20 December, 2020;
originally announced January 2021.
-
Exploring Fault-Energy Trade-offs in Approximate DNN Hardware Accelerators
Authors:
Ayesha Siddique,
Kanad Basu,
Khaza Anuarul Hoque
Abstract:
Systolic array-based deep neural network (DNN) accelerators have recently gained prominence for their low computational cost. However, their high energy consumption poses a bottleneck to their deployment in energy-constrained devices. To address this problem, approximate computing can be employed at the cost of some tolerable accuracy loss. However, such small accuracy variations may increase the…
▽ More
Systolic array-based deep neural network (DNN) accelerators have recently gained prominence for their low computational cost. However, their high energy consumption poses a bottleneck to their deployment in energy-constrained devices. To address this problem, approximate computing can be employed at the cost of some tolerable accuracy loss. However, such small accuracy variations may increase the sensitivity of DNNs towards undesired subtle disturbances, such as permanent faults. The impact of permanent faults in accurate DNNs has been thoroughly investigated in the literature. Conversely, the impact of permanent faults in approximate DNN accelerators (AxDNNs) is yet under-explored. The impact of such faults may vary with the fault bit positions, activation functions and approximation errors in AxDNN layers. Such dynamacity poses a considerable challenge to exploring the trade-off between their energy efficiency and fault resilience in AxDNNs. Towards this, we present an extensive layer-wise and bit-wise fault resilience and energy analysis of different AxDNNs, using the state-of-the-art Evoapprox8b signed multipliers. In particular, we vary the stuck-at-0, stuck-at-1 fault-bit positions, and activation functions to study their impact using the most widely used MNIST and Fashion-MNIST datasets. Our quantitative analysis shows that the permanent faults exacerbate the accuracy loss in AxDNNs when compared to the accurate DNN accelerators. For instance, a permanent fault in AxDNNs can lead up to 66\% accuracy loss, whereas the same faulty bit can lead to only 9\% accuracy loss in an accurate DNN accelerator. Our results demonstrate that the fault resilience in AxDNNs is orthogonal to the energy efficiency.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Outcome-Explorer: A Causality Guided Interactive Visual Interface for Interpretable Algorithmic Decision Making
Authors:
Md Naimul Hoque,
Klaus Mueller
Abstract:
The widespread adoption of algorithmic decision-making systems has brought about the necessity to interpret the reasoning behind these decisions. The majority of these systems are complex black box models, and auxiliary models are often used to approximate and then explain their behavior. However, recent research suggests that such explanations are not overly accessible to lay users with no specif…
▽ More
The widespread adoption of algorithmic decision-making systems has brought about the necessity to interpret the reasoning behind these decisions. The majority of these systems are complex black box models, and auxiliary models are often used to approximate and then explain their behavior. However, recent research suggests that such explanations are not overly accessible to lay users with no specific expertise in machine learning and this can lead to an incorrect interpretation of the underlying model. In this paper, we show that a predictive and interactive model based on causality is inherently interpretable, does not require any auxiliary model, and allows both expert and non-expert users to understand the model comprehensively. To demonstrate our method we developed Outcome Explorer, a causality guided interactive interface, and evaluated it by conducting think-aloud sessions with three expert users and a user study with 18 non-expert users. All three expert users found our tool to be comprehensive in supporting their explanation needs while the non-expert users were able to understand the inner workings of a model easily.
△ Less
Submitted 24 February, 2022; v1 submitted 3 January, 2021;
originally announced January 2021.
-
TechTexC: Classification of Technical Texts using Convolution and Bidirectional Long Short Term Memory Network
Authors:
Omar Sharif,
Eftekhar Hossain,
Mohammed Moshiul Hoque
Abstract:
This paper illustrates the details description of technical text classification system and its results that developed as a part of participation in the shared task TechDofication 2020. The shared task consists of two sub-tasks: (i) first task identify the coarse-grained technical domain of given text in a specified language and (ii) the second task classify a text of computer science domain into f…
▽ More
This paper illustrates the details description of technical text classification system and its results that developed as a part of participation in the shared task TechDofication 2020. The shared task consists of two sub-tasks: (i) first task identify the coarse-grained technical domain of given text in a specified language and (ii) the second task classify a text of computer science domain into fine-grained sub-domains. A classification system (called 'TechTexC') is developed to perform the classification task using three techniques: convolution neural network (CNN), bidirectional long short term memory (BiLSTM) network, and combined CNN with BiLSTM. Results show that CNN with BiLSTM model outperforms the other techniques concerning task-1 of sub-tasks (a, b, c and g) and task-2a. This combined model obtained f1 scores of 82.63 (sub-task a), 81.95 (sub-task b), 82.39 (sub-task c), 84.37 (sub-task g), and 67.44 (task-2a) on the development dataset. Moreover, in the case of test set, the combined CNN with BiLSTM approach achieved that higher accuracy for the subtasks 1a (70.76%), 1b (79.97%), 1c (65.45%), 1g (49.23%) and 2a (70.14%).
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
Fairness in Rating Prediction by Awareness of Verbal and Gesture Quality of Public Speeches
Authors:
Ankani Chattoraj,
Rupam Acharyya,
Shouman Das,
Md. Iftekhar Tanveer,
Ehsan Hoque
Abstract:
The role of verbal and non-verbal cues towards great public speaking has been a topic of exploration for many decades. We identify a commonality across present theories, the element of "variety or heterogeneity" in channels or modes of communication (e.g. resorting to stories, scientific facts, emotional connections, facial expressions etc.) which is essential for effectively communicating informa…
▽ More
The role of verbal and non-verbal cues towards great public speaking has been a topic of exploration for many decades. We identify a commonality across present theories, the element of "variety or heterogeneity" in channels or modes of communication (e.g. resorting to stories, scientific facts, emotional connections, facial expressions etc.) which is essential for effectively communicating information. We use this observation to formalize a novel HEterogeneity Metric, HEM, that quantifies the quality of a talk both in the verbal and non-verbal domain (transcript and facial gestures). We use TED talks as an input repository of public speeches because it consists of speakers from a diverse community besides having a wide outreach. We show that there is an interesting relationship between HEM and the ratings of TED talks given to speakers by viewers. It emphasizes that HEM inherently and successfully represents the quality of a talk based on "variety or heterogeneity". Further, we also discover that HEM successfully captures the prevalent bias in ratings with respect to race and gender, that we call sensitive attributes (because prediction based on these might result in unfair outcome). We incorporate the HEM metric into the loss function of a neural network with the goal to reduce unfairness in rating predictions with respect to race and gender. Our results show that the modified loss function improves fairness in prediction without considerably affecting prediction accuracy of the neural network. Our work ties together a novel metric for public speeches in both verbal and non-verbal domain with the computational power of a neural network to design a fair prediction system for speakers.
△ Less
Submitted 15 November, 2021; v1 submitted 11 December, 2020;
originally announced December 2020.
-
Facial expressions can detect Parkinson's disease: preliminary evidence from videos collected online
Authors:
Mohammad Rafayet Ali,
Taylor Myers,
Ellen Wagner,
Harshil Ratnu,
E. Ray Dorsey,
Ehsan Hoque
Abstract:
One of the symptoms of Parkinson's disease (PD) is hypomimia or reduced facial expressions. In this paper, we present a digital biomarker for PD that utilizes the study of micro-expressions. We analyzed the facial action units (AU) from 1812 videos of 604 individuals (61 with PD and 543 without PD, mean age 63.9 yo, sd 7.8 ) collected online using a web-based tool (www.parktest.net). In these vide…
▽ More
One of the symptoms of Parkinson's disease (PD) is hypomimia or reduced facial expressions. In this paper, we present a digital biomarker for PD that utilizes the study of micro-expressions. We analyzed the facial action units (AU) from 1812 videos of 604 individuals (61 with PD and 543 without PD, mean age 63.9 yo, sd 7.8 ) collected online using a web-based tool (www.parktest.net). In these videos, participants were asked to make three facial expressions (a smiling, disgusted, and surprised face) followed by a neutral face. Using techniques from computer vision and machine learning, we objectively measured the variance of the facial muscle movements and used it to distinguish between individuals with and without PD. The prediction accuracy using the facial micro-expressions was comparable to those methodologies that utilize motor symptoms. Logistic regression analysis revealed that participants with PD had less variance in AU6 (cheek raiser), AU12 (lip corner puller), and AU4 (brow lowerer) than non-PD individuals. An automated classifier using Support Vector Machine was trained on the variances and achieved 95.6% accuracy. Using facial expressions as a biomarker for PD could be potentially transformative for patients in need of physical separation (e.g., due to COVID) or are immobile.
△ Less
Submitted 9 December, 2020;
originally announced December 2020.
-
Technology-driven Alteration of Nonverbal Cues and its Effects on Negotiation
Authors:
Raiyan Abdul Baten,
Ehsan Hoque
Abstract:
A person's appearance, identity, and other nonverbal cues can substantially influence how one is perceived by a negotiation counterpart, potentially impacting the outcome of the negotiation. With recent advances in technology, it is now possible to alter such cues through real-time video communication. In many cases, a person's physical presence can explicitly be replaced by 2D/3D representations…
▽ More
A person's appearance, identity, and other nonverbal cues can substantially influence how one is perceived by a negotiation counterpart, potentially impacting the outcome of the negotiation. With recent advances in technology, it is now possible to alter such cues through real-time video communication. In many cases, a person's physical presence can explicitly be replaced by 2D/3D representations in live interactive media. In other cases, technologies such as deepfake can subtly and implicitly alter many nonverbal cues -- including a person's appearance and identity -- in real-time. In this article, we look at some state-of-the-art technological advances that can enable such explicit and implicit alteration of nonverbal cues. We also discuss the implications of such technology for the negotiation landscape and highlight ethical considerations that warrant deep, ongoing attention from stakeholders.
△ Less
Submitted 7 December, 2020;
originally announced December 2020.
-
Robust Spin Interconnect with Isotropic Spin Dynamics in Chemical Vapour Deposited Graphene Layers and Boundaries
Authors:
Dmitrii Khokhriakov,
Bogdan Karpiak,
Anamul Md. Hoque,
Bing Zhao,
Subir Parui,
Saroj P. Dash
Abstract:
The utilization of large-area graphene grown by chemical vapour deposition (CVD) is crucial for the development of scalable spin interconnects in all-spin-based memory and logic circuits. However, the fundamental influence of the presence of multilayer graphene patches and their boundaries on spin dynamics has not been addressed yet, which is necessary for basic understanding and application of ro…
▽ More
The utilization of large-area graphene grown by chemical vapour deposition (CVD) is crucial for the development of scalable spin interconnects in all-spin-based memory and logic circuits. However, the fundamental influence of the presence of multilayer graphene patches and their boundaries on spin dynamics has not been addressed yet, which is necessary for basic understanding and application of robust spin interconnects. Here, we report universal spin transport and dynamic properties in specially devised single layer, bi-layer, and tri-layer graphene channels and their layer boundaries and folds that are usually present in CVD graphene samples. We observe uniform spin lifetime with isotropic spin relaxation for spins with different orientations in graphene layers and their boundaries at room temperature. In all the inhomogeneous graphene channels, the spin lifetime anisotropy ratios for spins polarized out-of-plane and in-plane are measured to be close to unity. Our analysis shows the importance of both Elliott-Yafet and Dyakonov-Perel mechanisms, with an increasing role of the latter mechanism in multilayer channels. These results of universal and isotropic spin transport on large-area inhomogeneous CVD graphene with multilayer patches and their boundaries and folds at room temperature prove its outstanding spin interconnect functionality, beneficial for the development of scalable spintronic circuits.
△ Less
Submitted 4 December, 2020;
originally announced December 2020.
-
Charge-spin conversion signal in WTe2 van der Waals hybrid devices with a geometrical design
Authors:
Bing Zhao,
Anamul Md. Hoque,
Dmitrii Khokhriakov,
Bogdan Karpiak,
Saroj P. Dash
Abstract:
The efficient generation and control of spin polarization via charge-spin conversion in topological semimetals are desirable for future spintronic and quantum technologies. Here, we report the charge-spin conversion (CSC) signals measured in a Weyl semimetal candidate WTe2 based hybrid graphene device with a geometrical design. Notably, the geometrical angle of WTe2 on the graphene spin-valve chan…
▽ More
The efficient generation and control of spin polarization via charge-spin conversion in topological semimetals are desirable for future spintronic and quantum technologies. Here, we report the charge-spin conversion (CSC) signals measured in a Weyl semimetal candidate WTe2 based hybrid graphene device with a geometrical design. Notably, the geometrical angle of WTe2 on the graphene spin-valve channel yields contributions to symmetric and anti-symmetric CSC signal components. The spin precession measurements of CSC signal at different gate voltages and ferromagnet magnetization shows the robustness of the CSC in WTe2 at room temperature. These results can be useful for the design of heterostructure devices and in the architectures of two-dimensional spintronic circuits.
△ Less
Submitted 21 November, 2020;
originally announced November 2020.
-
SentiLSTM: A Deep Learning Approach for Sentiment Analysis of Restaurant Reviews
Authors:
Eftekhar Hossain,
Omar Sharif,
Mohammed Moshiul Hoque,
Iqbal H. Sarker
Abstract:
The amount of textual data generation has increased enormously due to the effortless access of the Internet and the evolution of various web 2.0 applications. These textual data productions resulted because of the people express their opinion, emotion or sentiment about any product or service in the form of tweets, Facebook post or status, blog write up, and reviews. Sentiment analysis deals with…
▽ More
The amount of textual data generation has increased enormously due to the effortless access of the Internet and the evolution of various web 2.0 applications. These textual data productions resulted because of the people express their opinion, emotion or sentiment about any product or service in the form of tweets, Facebook post or status, blog write up, and reviews. Sentiment analysis deals with the process of computationally identifying and categorizing opinions expressed in a piece of text, especially in order to determine whether the writer's attitude toward a particular topic is positive, negative, or neutral. The impact of customer review is significant to perceive the customer attitude towards a restaurant. Thus, the automatic detection of sentiment from reviews is advantageous for the restaurant owners, or service providers and customers to make their decisions or services more satisfactory. This paper proposes, a deep learning-based technique (i.e., BiLSTM) to classify the reviews provided by the clients of the restaurant into positive and negative polarities. A corpus consists of 8435 reviews is constructed to evaluate the proposed technique. In addition, a comparative analysis of the proposed technique with other machine learning algorithms presented. The results of the evaluation on test dataset show that BiLSTM technique produced in the highest accuracy of 91.35%.
△ Less
Submitted 19 November, 2020;
originally announced November 2020.
-
BONIK: A Blockchain Empowered Chatbot for Financial Transactions
Authors:
Md. Saiful Islam Bhuiyan,
Abdur Razzak,
Md Sadek Ferdous,
Mohammad Jabed M. Chowdhury,
Mohammad A. Hoque,
Sasu Tarkoma
Abstract:
A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and transparency, that must be carefully handled for…
▽ More
A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and transparency, that must be carefully handled for their wide-scale adoption. Recently, the blockchain technology, with a number of security advantages, has emerged as one of the foundational technologies with the potential to disrupt a number of application domains, particularly in the financial sector. In this paper, we forward the idea of integrating a chatbot with blockchain technology in the view to improve the security issues in financial chatbots. More specifically, we present BONIK, a blockchain empowered chatbot for financial transactions, and discuss its architecture and design choices. Furthermore, we explore the developed Proof-of-Concept (PoC), evaluate its performance, analyse how different security and privacy issues are mitigated using BONIK.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Utilizing Bidirectional Encoder Representations from Transformers for Answer Selection
Authors:
Md Tahmid Rahman Laskar,
Enamul Hoque,
Jimmy Xiangji Huang
Abstract:
Pre-training a transformer-based model for the language modeling task in a large dataset and then fine-tuning it for downstream tasks has been found very useful in recent years. One major advantage of such pre-trained language models is that they can effectively absorb the context of each word in a sentence. However, for tasks such as the answer selection task, the pre-trained language models have…
▽ More
Pre-training a transformer-based model for the language modeling task in a large dataset and then fine-tuning it for downstream tasks has been found very useful in recent years. One major advantage of such pre-trained language models is that they can effectively absorb the context of each word in a sentence. However, for tasks such as the answer selection task, the pre-trained language models have not been extensively used yet. To investigate their effectiveness in such tasks, in this paper, we adopt the pre-trained Bidirectional Encoder Representations from Transformer (BERT) language model and fine-tune it on two Question Answering (QA) datasets and three Community Question Answering (CQA) datasets for the answer selection task. We find that fine-tuning the BERT model for the answer selection task is very effective and observe a maximum improvement of 13.1% in the QA datasets and 18.7% in the CQA datasets compared to the previous state-of-the-art.
△ Less
Submitted 13 November, 2020;
originally announced November 2020.