-
Immediate or Reflective?: Effects of Real-timeFeedback on Group Discussions over Videochat
Authors:
Samiha Samrose,
Reza Rawassizadeh,
Ehsan Hoque
Abstract:
Having a group discussion with the members holding conflicting viewpoints is difficult. It is especially challenging for machine-mediated discussions in which the subtle social cues are hard to notice. We present a fully automated videochat framework that can automatically analyze audio-video data of the participants and provide real-time feedback on participation, interruption, volume, and facial…
▽ More
Having a group discussion with the members holding conflicting viewpoints is difficult. It is especially challenging for machine-mediated discussions in which the subtle social cues are hard to notice. We present a fully automated videochat framework that can automatically analyze audio-video data of the participants and provide real-time feedback on participation, interruption, volume, and facial emotion. In a heated discourse, these features are especially aligned with the undesired characteristics of dominating the conversation without taking turns, interrupting constantly, raising voice, and expressing negative emotion. We conduct a treatment-control user study with 40 participants having 20 sessions in total. We analyze the immediate and the reflective effects of real-time feedback on participants. Our findings show that while real-time feedback can make the ongoing discussion significantly less spontaneous, its effects propagate to successive sessions bringing significantly more expressiveness to the team. Our explorations with instant and propagated impacts of real-time feedback can be useful for developing design strategies for various collaborative environments.
△ Less
Submitted 12 November, 2020;
originally announced November 2020.
-
WSL-DS: Weakly Supervised Learning with Distant Supervision for Query Focused Multi-Document Abstractive Summarization
Authors:
Md Tahmid Rahman Laskar,
Enamul Hoque,
Jimmy Xiangji Huang
Abstract:
In the Query Focused Multi-Document Summarization (QF-MDS) task, a set of documents and a query are given where the goal is to generate a summary from these documents based on the given query. However, one major challenge for this task is the lack of availability of labeled training datasets. To overcome this issue, in this paper, we propose a novel weakly supervised learning approach via utilizin…
▽ More
In the Query Focused Multi-Document Summarization (QF-MDS) task, a set of documents and a query are given where the goal is to generate a summary from these documents based on the given query. However, one major challenge for this task is the lack of availability of labeled training datasets. To overcome this issue, in this paper, we propose a novel weakly supervised learning approach via utilizing distant supervision. In particular, we use datasets similar to the target dataset as the training data where we leverage pre-trained sentence similarity models to generate the weak reference summary of each individual document in a document set from the multi-document gold reference summaries. Then, we iteratively train our summarization model on each single-document to alleviate the computational complexity issue that occurs while training neural summarization models in multiple documents (i.e., long sequences) at once. Experimental results in Document Understanding Conferences (DUC) datasets show that our proposed approach sets a new state-of-the-art result in terms of various evaluation metrics.
△ Less
Submitted 2 November, 2020;
originally announced November 2020.
-
On the solutions of certain Lebesgue-Ramanujan-Nagell equations
Authors:
Kalyan Chakraborty,
Azizul Hoque,
Richa Sharma
Abstract:
We completely solve the Diophantine equation $x^2+2^k11^\ell19^m=y^n$ in integers $x,y\geq 1;~ k,\ell, m\geq 0~$ and $n\geq 3$ with $\gcd(x,y)=1$, except the case $2\mid k, 2\nmid \ell m$ and $5\mid n$. We use this result to recover some earlier results in the same direction.
We completely solve the Diophantine equation $x^2+2^k11^\ell19^m=y^n$ in integers $x,y\geq 1;~ k,\ell, m\geq 0~$ and $n\geq 3$ with $\gcd(x,y)=1$, except the case $2\mid k, 2\nmid \ell m$ and $5\mid n$. We use this result to recover some earlier results in the same direction.
△ Less
Submitted 1 June, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
Detecting Individuals with Depressive Disorder fromPersonal Google Search and YouTube History Logs
Authors:
Boyu Zhang,
Anis Zaman,
Rupam Acharyya,
Ehsan Hoque,
Vincent Silenzio,
Henry Kautz
Abstract:
Depressive disorder is one of the most prevalent mental illnesses among the global population. However, traditional screening methods require exacting in-person interviews and may fail to provide immediate interventions. In this work, we leverage ubiquitous personal longitudinal Google Search and YouTube engagement logs to detect individuals with depressive disorder. We collected Google Search and…
▽ More
Depressive disorder is one of the most prevalent mental illnesses among the global population. However, traditional screening methods require exacting in-person interviews and may fail to provide immediate interventions. In this work, we leverage ubiquitous personal longitudinal Google Search and YouTube engagement logs to detect individuals with depressive disorder. We collected Google Search and YouTube history data and clinical depression evaluation results from $212$ participants ($99$ of them suffered from moderate to severe depressions). We then propose a personalized framework for classifying individuals with and without depression symptoms based on mutual-exciting point process that captures both the temporal and semantic aspects of online activities. Our best model achieved an average F1 score of $0.77 \pm 0.04$ and an AUC ROC of $0.81 \pm 0.02$.
△ Less
Submitted 28 October, 2020;
originally announced October 2020.
-
Wideband Index Modulation with Circularly-Shifted Chirps
Authors:
Safi Shams Muhtasimul Hoque,
Chao-Yu Chen,
Alphan Sahin
Abstract:
In this study, we propose a wideband index modulation (IM) based on circularly-shifted chirps. To derive the proposed method, we first prove that a Golay complementary pair (GCP) can be constructed by linearly combining the Fourier series of chirps. We show that Fresnel integrals and/or Bessel functions, arising from sinusoidal and linear chirps, respectively, can lead to GCPs. We then exploit dis…
▽ More
In this study, we propose a wideband index modulation (IM) based on circularly-shifted chirps. To derive the proposed method, we first prove that a Golay complementary pair (GCP) can be constructed by linearly combining the Fourier series of chirps. We show that Fresnel integrals and/or Bessel functions, arising from sinusoidal and linear chirps, respectively, can lead to GCPs. We then exploit discrete Fourier transform-spread orthogonal frequency division multiplexing (DFT-s-OFDM) to obtain a low-complexity transmitter and receiver. We also discuss its generalization for achieving a trade-off between peak-to-mean envelope power ratio (PMEPR) and spectral efficiency (SE). Through comprehensive simulations, we compare the proposed scheme with DFT-s-OFDM with IM, orthogonal frequency division multiplexing (OFDM) with IM and complementary sequences (CSs) from Reed-Muller (RM) code. Our numerical results show that the proposed method limits the PMEPR while exploiting the frequency.
△ Less
Submitted 25 October, 2020;
originally announced October 2020.
-
Chart-to-Text: Generating Natural Language Descriptions for Charts by Adapting the Transformer Model
Authors:
Jason Obeid,
Enamul Hoque
Abstract:
Information visualizations such as bar charts and line charts are very popular for exploring data and communicating insights. Interpreting and making sense of such visualizations can be challenging for some people, such as those who are visually impaired or have low visualization literacy. In this work, we introduce a new dataset and present a neural model for automatically generating natural lang…
▽ More
Information visualizations such as bar charts and line charts are very popular for exploring data and communicating insights. Interpreting and making sense of such visualizations can be challenging for some people, such as those who are visually impaired or have low visualization literacy. In this work, we introduce a new dataset and present a neural model for automatically generating natural language summaries for charts. The generated summaries provide an interpretation of the chart and convey the key insights found within that chart. Our neural model is developed by extending the state-of-the-art model for the data-to-text generation task, which utilizes a transformer-based encoder-decoder architecture. We found that our approach outperforms the base model on a content selection metric by a wide margin (55.42% vs. 8.49%) and generates more informative, concise, and coherent summaries.
△ Less
Submitted 29 November, 2020; v1 submitted 18 October, 2020;
originally announced October 2020.
-
MMGSD: Multi-Modal Gaussian Shape Descriptors for Correspondence Matching in 1D and 2D Deformable Objects
Authors:
Aditya Ganapathi,
Priya Sundaresan,
Brijen Thananjeyan,
Ashwin Balakrishna,
Daniel Seita,
Ryan Hoque,
Joseph E. Gonzalez,
Ken Goldberg
Abstract:
We explore learning pixelwise correspondences between images of deformable objects in different configurations. Traditional correspondence matching approaches such as SIFT, SURF, and ORB can fail to provide sufficient contextual information for fine-grained manipulation. We propose Multi-Modal Gaussian Shape Descriptor (MMGSD), a new visual representation of deformable objects which extends ideas…
▽ More
We explore learning pixelwise correspondences between images of deformable objects in different configurations. Traditional correspondence matching approaches such as SIFT, SURF, and ORB can fail to provide sufficient contextual information for fine-grained manipulation. We propose Multi-Modal Gaussian Shape Descriptor (MMGSD), a new visual representation of deformable objects which extends ideas from dense object descriptors to predict all symmetric correspondences between different object configurations. MMGSD is learned in a self-supervised manner from synthetic data and produces correspondence heatmaps with measurable uncertainty. In simulation, experiments suggest that MMGSD can achieve an RMSE of 32.4 and 31.3 for square cloth and braided synthetic nylon rope respectively. The results demonstrate an average of 47.7% improvement over a provided baseline based on contrastive learning, symmetric pixel-wise contrastive loss (SPCL), as opposed to MMGSD which enforces distributional continuity.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
Index-Modulated Circularly-Shifted Chirps for Dual-Function Radar & Communication Systems
Authors:
Safi Shams Muhtasimul Hoque,
Alphan Sahin
Abstract:
In this study, we analyze index modulation (IM) based on circularly-shifted chirps (CSCs) for dual-function radar & communication (DFRC) systems. We develop a maximum likelihood (ML) range estimator that considers multiple scatters. To improve the correlation properties of the transmitted waveform and estimation accuracy, we propose index separation (IS) which separates the CSCs apart in time. We…
▽ More
In this study, we analyze index modulation (IM) based on circularly-shifted chirps (CSCs) for dual-function radar & communication (DFRC) systems. We develop a maximum likelihood (ML) range estimator that considers multiple scatters. To improve the correlation properties of the transmitted waveform and estimation accuracy, we propose index separation (IS) which separates the CSCs apart in time. We theoretically show that the separation can be large under certain conditions without losing the spectral efficiency (SE). Our numerical results show that the IS combined ML and linear minimum mean square error (LMMSE)-based estimators can provide approximately 3 dB signal-to-noise ratio (SNR) gain in some cases while improving estimation accuracy substantially without causing any bit-error ratio (BER) degradation at the communication receiver.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Extraction of Material Properties through Multi-fidelity Deep Learning from Molecular Dynamics Simulation
Authors:
Mahmudul Islam,
Md Shajedul Hoque Thakur,
Satyajit Mojumder,
Mohammad Nasim Hasan
Abstract:
Simulation of reasonable timescales for any long physical process using molecular dynamics (MD) is a major challenge in computational physics. In this study, we have implemented an approach based on multi-fidelity physics informed neural network (MPINN) to achieve long-range MD simulation results over a large sample space with significantly less computational cost. The fidelity of our present mult…
▽ More
Simulation of reasonable timescales for any long physical process using molecular dynamics (MD) is a major challenge in computational physics. In this study, we have implemented an approach based on multi-fidelity physics informed neural network (MPINN) to achieve long-range MD simulation results over a large sample space with significantly less computational cost. The fidelity of our present multi-fidelity study is based on the integration timestep size of MD simulations. While MD simulations with larger timestep produce results with lower level of accuracy, it can provide enough computationally cheap training data for MPINN to learn an accurate relationship between these low-fidelity results and high-fidelity MD results obtained using smaller simulation timestep. We have performed two benchmark studies, involving one and two component LJ systems, to determine the optimum percentage of high-fidelity training data required to achieve accurate results with high computational saving. The results show that important system properties such as system energy per atom, system pressure and diffusion coefficients can be determined with high accuracy while saving 68% computational costs. Finally, as a demonstration of the applicability of our present methodology in practical MD studies, we have studied the viscosity of argon-copper nanofluid and its variation with temperature and volume fraction by MD simulation using MPINN. Then we have compared them with numerous previous studies and theoretical models. Our results indicate that MPINN can predict accurate nanofluid viscosity at a wide range of sample space with significantly small number of MD simulations. Our present methodology is the first implementation of MPINN in conjunction with MD simulation for predicting nanoscale properties. This can pave pathways to investigate more complex engineering problems that demand long-range MD simulations.
△ Less
Submitted 14 November, 2020; v1 submitted 28 September, 2020;
originally announced September 2020.
-
Adversarial Examples in Deep Learning for Multivariate Time Series Regression
Authors:
Gautam Raj Mode,
Khaza Anuarul Hoque
Abstract:
Multivariate time series (MTS) regression tasks are common in many real-world data mining applications including finance, cybersecurity, energy, healthcare, prognostics, and many others. Due to the tremendous success of deep learning (DL) algorithms in various domains including image recognition and computer vision, researchers started adopting these techniques for solving MTS data mining problems…
▽ More
Multivariate time series (MTS) regression tasks are common in many real-world data mining applications including finance, cybersecurity, energy, healthcare, prognostics, and many others. Due to the tremendous success of deep learning (DL) algorithms in various domains including image recognition and computer vision, researchers started adopting these techniques for solving MTS data mining problems, many of which are targeted for safety-critical and cost-critical applications. Unfortunately, DL algorithms are known for their susceptibility to adversarial examples which also makes the DL regression models for MTS forecasting also vulnerable to those attacks. To the best of our knowledge, no previous work has explored the vulnerability of DL MTS regression models to adversarial time series examples, which is an important step, specifically when the forecasting from such models is used in safety-critical and cost-critical applications. In this work, we leverage existing adversarial attack generation techniques from the image classification domain and craft adversarial multivariate time series examples for three state-of-the-art deep learning regression models, specifically Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU). We evaluate our study using Google stock and household power consumption dataset. The obtained results show that all the evaluated DL regression models are vulnerable to adversarial attacks, transferable, and thus can lead to catastrophic consequences in safety-critical and cost-critical domains, such as energy and finance.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
Fast Adaptation Nonlinear Observer for SLAM
Authors:
Trevor P. Drayton,
Abdul A. Jaiyeola,
Nazmul Hoque,
Mikhayla Maurer,
Hashim A. Hashim
Abstract:
The process of simultaneously mapping the environment in three dimensional (3D) space and localizing a moving vehicle's pose (orientation and position) is termed Simultaneous Localization and Mapping (SLAM). SLAM is a core task in robotics applications. In the SLAM problem, each of the vehicle's pose and the environment are assumed to be completely unknown. This paper takes the conventional SLAM d…
▽ More
The process of simultaneously mapping the environment in three dimensional (3D) space and localizing a moving vehicle's pose (orientation and position) is termed Simultaneous Localization and Mapping (SLAM). SLAM is a core task in robotics applications. In the SLAM problem, each of the vehicle's pose and the environment are assumed to be completely unknown. This paper takes the conventional SLAM design as a basis and proposes a novel approach that ensures fast adaptation of the nonlinear observer for SLAM. Due to the fact that the true SLAM problem is nonlinear and is modeled on the Lie group of $\mathbb{SLAM}_{n}\left(3\right)$, the proposed observer for SLAM is nonlinear and modeled on $\mathbb{SLAM}_{n}\left(3\right)$. The proposed observer compensates for unknown bias attached to velocity measurements. The results of the simulation illustrate the robustness of the proposed approach.
△ Less
Submitted 9 September, 2021; v1 submitted 23 September, 2020;
originally announced September 2020.
-
Novel Computational Linguistic Measures, Dialogue System and the Development of SOPHIE: Standardized Online Patient for Healthcare Interaction Education
Authors:
Mohammad Rafayet Ali,
Taylan Sen,
Benjamin Kane,
Shagun Bose,
Thomas M Carroll,
Ronald Epstein,
Lenhart Schubert,
Ehsan Hoque
Abstract:
In this paper, we describe the iterative participatory design of SOPHIE, an online virtual patient for feedback-based practice of sensitive patient-physician conversations, and discuss an initial qualitative evaluation of the system by professional end users. The design of SOPHIE was motivated from a computational linguistic analysis of the transcripts of 383 patient-physician conversations from a…
▽ More
In this paper, we describe the iterative participatory design of SOPHIE, an online virtual patient for feedback-based practice of sensitive patient-physician conversations, and discuss an initial qualitative evaluation of the system by professional end users. The design of SOPHIE was motivated from a computational linguistic analysis of the transcripts of 383 patient-physician conversations from an essential office visit of late stage cancer patients with their oncologists. We developed methods for the automatic detection of two behavioral paradigms, lecturing and positive language usage patterns (sentiment trajectory of conversation), that are shown to be significantly associated with patient prognosis understanding. These automated metrics associated with effective communication were incorporated into SOPHIE, and a pilot user study identified that SOPHIE was favorably reviewed by a user group of practicing physicians.
△ Less
Submitted 23 September, 2020;
originally announced September 2020.
-
Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Authors:
Gautam Raj Mode,
Khaza Anuarul Hoque
Abstract:
In manufacturing, unexpected failures are considered a primary operational risk, as they can hinder productivity and can incur huge losses. State-of-the-art Prognostics and Health Management (PHM) systems incorporate Deep Learning (DL) algorithms and Internet of Things (IoT) devices to ascertain the health status of equipment, and thus reduce the downtime, maintenance cost and increase the product…
▽ More
In manufacturing, unexpected failures are considered a primary operational risk, as they can hinder productivity and can incur huge losses. State-of-the-art Prognostics and Health Management (PHM) systems incorporate Deep Learning (DL) algorithms and Internet of Things (IoT) devices to ascertain the health status of equipment, and thus reduce the downtime, maintenance cost and increase the productivity. Unfortunately, IoT sensors and DL algorithms, both are vulnerable to cyber attacks, and hence pose a significant threat to PHM systems. In this paper, we adopt the adversarial example crafting techniques from the computer vision domain and apply them to the PHM domain. Specifically, we craft adversarial examples using the Fast Gradient Sign Method (FGSM) and Basic Iterative Method (BIM) and apply them on the Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Convolutional Neural Network (CNN) based PHM models. We evaluate the impact of adversarial attacks using NASA's turbofan engine dataset. The obtained results show that all the evaluated PHM models are vulnerable to adversarial attacks and can cause a serious defect in the remaining useful life estimation. The obtained results also show that the crafted adversarial examples are highly transferable and may cause significant damages to PHM systems.
△ Less
Submitted 28 September, 2020; v1 submitted 21 September, 2020;
originally announced September 2020.
-
The Relationship between Deteriorating Mental Health Conditions and Longitudinal Behavioral Changes in Google and YouTube Usages among College Students in the United States during COVID-19: Observational Study
Authors:
Anis Zaman,
Boyu Zhang,
Ehsan Hoque,
Vincent Silenzio,
Henry Kautz
Abstract:
Mental health problems among the global population are worsened during the coronavirus disease (COVID-19). How individuals engage with online platforms such as Google Search and YouTube undergoes drastic shifts due to pandemic and subsequent lockdowns. Such ubiquitous daily behaviors on online platforms have the potential to capture and correlate with clinically alarming deteriorations in mental h…
▽ More
Mental health problems among the global population are worsened during the coronavirus disease (COVID-19). How individuals engage with online platforms such as Google Search and YouTube undergoes drastic shifts due to pandemic and subsequent lockdowns. Such ubiquitous daily behaviors on online platforms have the potential to capture and correlate with clinically alarming deteriorations in mental health profiles in a non-invasive manner. The goal of this study is to examine, among college students, the relationship between deteriorating mental health conditions and changes in user behaviors when engaging with Google Search and YouTube during COVID-19. This study recruited a cohort of 49 students from a U.S. college campus during January 2020 (prior to the pandemic) and measured the anxiety and depression levels of each participant. This study followed up with the same cohort during May 2020 (during the pandemic), and the anxiety and depression levels were assessed again. The longitudinal Google Search and YouTube history data were anonymized and collected. From individual-level Google Search and YouTube histories, we developed 5 signals that can quantify shifts in online behaviors during the pandemic. We then assessed the differences between groups with and without deteriorating mental health profiles in terms of these features. Significant features included late-night online activities, continuous usages, and time away from the internet, porn consumptions, and keywords associated with negative emotions, social activities, and personal affairs. Though further studies are required, our results demonstrated the feasibility of utilizing pervasive online data to establish non-invasive surveillance systems for mental health conditions that bypasses many disadvantages of existing screening methods.
△ Less
Submitted 4 September, 2020;
originally announced September 2020.
-
Trust Concerns in Health Apps collecting Personally Identifiable Information during COVID-19-like Zoonosis
Authors:
Molla Rashied Hussein,
Md. Ashikur Rahman,
Md. Jahidul Hassan Mojumder,
Shakib Ahmed,
Samia Naz Isha,
Shaila Akter,
Abdullah Bin Shams,
Ehsanul Hoque Apu
Abstract:
Coronavirus disease 2019, or COVID-19 in short, is a zoonosis, i.e., a disease that spreads from animals to humans. Due to its highly epizootic nature, it has compelled the public health experts to deploy smartphone applications to trace its rapid transmission pattern along with the infected persons as well by utilizing the persons' personally identifiable information. However, these information m…
▽ More
Coronavirus disease 2019, or COVID-19 in short, is a zoonosis, i.e., a disease that spreads from animals to humans. Due to its highly epizootic nature, it has compelled the public health experts to deploy smartphone applications to trace its rapid transmission pattern along with the infected persons as well by utilizing the persons' personally identifiable information. However, these information may summon several undesirable provocations towards the technical experts in terms of privacy and cyber security, particularly the trust concerns. If not resolved by now, the circumstances will affect the mass level population through inadequate usage of the health applications in the smartphones and thus liberate the forgery of a catastrophe for another COVID-19-like zoonosis to come. Therefore, an extensive study was required to address this severe issue. This paper has fulfilled the study mentioned above needed by not only discussing the recently designed and developed health applications all over the regions around the world but also investigating their usefulness and limitations. The trust defiance is identified as well as scrutinized from the viewpoint of an end-user. Several recommendations are suggested in the later part of this paper to leverage awareness among the ordinary individuals.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Atomistic Modelling of Functionally Graded Cu-Ni Alloy and its Implication on the Mechanical Properties of Nanowires
Authors:
Md Shajedul Hoque Thakur,
Mahmudul Islam,
Nur Jahan Monisha,
Pritom Bose,
Md. Adnan Mahathir Munshi,
Turash Haque Pial
Abstract:
Functionally graded materials (FGM) eliminate the stress singularity in the interface between two different materials and therefore have a wide range of applications in high temperature environments such as engines, nuclear reactors, spacecrafts etc. Therefore, it is essential to study the mechanical properties of different FGM materials. This paper aims at establishing a method for modelling FGMs…
▽ More
Functionally graded materials (FGM) eliminate the stress singularity in the interface between two different materials and therefore have a wide range of applications in high temperature environments such as engines, nuclear reactors, spacecrafts etc. Therefore, it is essential to study the mechanical properties of different FGM materials. This paper aims at establishing a method for modelling FGMs in molecular dynamics (MD) to get a better insight of their mechanical properties. In this study, the mechanical characteristics of Cu-Ni FGM nanowires (NW) under uniaxial loading have been investigated using the proposed method through MD simulations. In order to describe the inter-atomic forces and hence predict the properties properly, EAM (Embedded atom model) potential has been used. The nanowire is composed of an alloying constituent in the core and the other constituent graded functionally along the outward radial direction. Simple Linear and Exponential functions have been considered as the functions which defines the grading pattern. The alloying percentage on the surface has been varied from 0% to 50% for both Cu-cored and Ni-cored nanowires. All the simulations have been carried out at 300 K. The L/D ratios are 10.56 and 10.67 for Cu-cored and Ni-cored NWs, respectively. This study suggests that Ultimate Tensile Stress and Young's modulus increase with increasing surface Ni percentage in Cu-cored NWs. However, in Ni-cored NWs these values decrease with the increase of surface Cu percentage. Also, for the same surface percentage of Ni in Cu-cored NW, the values are higher in linearly graded FGMs than that in exponentially graded FGMs. While in Ni-cored NWs, exponentially graded FGM shows higher values of UTS and E than those in linearly graded FGM. Thus, grading functions and surface percentages can be used as parameters for modulating the mechanical properties of FGM nanowires.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Detecting Parkinson's Disease From an Online Speech-task
Authors:
Wasifur Rahman,
Sangwu Lee,
Md. Saiful Islam,
Victor Nikhil Antony,
Harshil Ratnu,
Mohammad Rafayet Ali,
Abdullah Al Mamun,
Ellen Wagner,
Stella Jensen-Roberts,
Max A. Little,
Ray Dorsey,
Ehsan Hoque
Abstract:
In this paper, we envision a web-based framework that can help anyone, anywhere around the world record a short speech task, and analyze the recorded data to screen for Parkinson's disease (PD). We collected data from 726 unique participants (262 PD, 38% female; 464 non-PD, 65% female; average age: 61) -- from all over the US and beyond. A small portion of the data was collected in a lab setting t…
▽ More
In this paper, we envision a web-based framework that can help anyone, anywhere around the world record a short speech task, and analyze the recorded data to screen for Parkinson's disease (PD). We collected data from 726 unique participants (262 PD, 38% female; 464 non-PD, 65% female; average age: 61) -- from all over the US and beyond. A small portion of the data was collected in a lab setting to compare quality. The participants were instructed to utter a popular pangram containing all the letters in the English alphabet "the quick brown fox jumps over the lazy dog..". We extracted both standard acoustic features (Mel Frequency Cepstral Coefficients (MFCC), jitter and shimmer variants) and deep learning based features from the speech data. Using these features, we trained several machine learning algorithms. We achieved 0.75 AUC (Area Under The Curve) performance on determining presence of self-reported Parkinson's disease by modeling the standard acoustic features through the XGBoost -- a gradient-boosted decision tree model. Further analysis reveal that the widely used MFCC features and a subset of previously validated dysphonia features designed for detecting Parkinson's from verbal phonation task (pronouncing 'ahh') contains the most distinct information. Our model performed equally well on data collected in controlled lab environment as well as 'in the wild' across different gender and age groups. Using this tool, we can collect data from almost anyone anywhere with a video/audio enabled device, contributing to equity and access in neurological care.
△ Less
Submitted 15 December, 2020; v1 submitted 2 September, 2020;
originally announced September 2020.
-
Electrically Controlled Spin Injection from Giant Rashba Spin-Orbit Conductor BiTeBr
Authors:
Zoltán Kovács-Krausz,
Anamul Md Hoque,
Péter Makk,
Bálint Szentpéteri,
Mátyás Kocsis,
Bálint Fülöp,
Michael Vasilievich Yakushev,
Tatyana Vladimirovna Kuznetsova,
Oleg Evgenevich Tereshchenko,
Konstantin Aleksandrovich Kokh,
István Endre Lukács,
Takashi Taniguchi,
Kenji Watanabe,
Saroj Prasad Dash,
Szabolcs Csonka
Abstract:
Ferromagnetic materials are the widely used source of spin-polarized electrons in spintronic devices, which are controlled by external magnetic fields or spin-transfer torque methods. However, with increasing demand for smaller and faster spintronic components, utilization of spin-orbit phenomena provides promising alternatives. New materials with unique spin textures are highly desirable since al…
▽ More
Ferromagnetic materials are the widely used source of spin-polarized electrons in spintronic devices, which are controlled by external magnetic fields or spin-transfer torque methods. However, with increasing demand for smaller and faster spintronic components, utilization of spin-orbit phenomena provides promising alternatives. New materials with unique spin textures are highly desirable since all-electric creation and control of spin polarization is expected, where the strength, as well as an arbitrary orientation of the polarization, can be defined without the use of a magnetic field. In this work, we use a novel spin-orbit crystal BiTeBr for this purpose. Owning to its giant Rashba spin splitting, bulk spin polarization is created at room temperature by an electric current. Integrating BiTeBr crystal into graphene-based spin valve devices, we demonstrate for the first time that it acts as a current-controlled spin injector, opening new avenues for future spintronic applications in integrated circuits.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
DFT-spread-OFDM Based Chirp Transmission
Authors:
Alphan Sahin,
Nozhan Hosseini,
Hosseinali Jamal,
Safi Shams Muhtasimul Hoque,
David W. Matolak
Abstract:
In this study, we propose a framework for chirp-based communications by exploiting discrete Fourier transform-spread orthogonal frequency division multiplexing (DFT-s-OFDM). We show that a well-designed frequency-domain spectral shaping (FDSS) filter for DFT-s-OFDM can convert its single-carrier nature to a linear combination of chirps circularly translated in the time domain. Also, by exploiting…
▽ More
In this study, we propose a framework for chirp-based communications by exploiting discrete Fourier transform-spread orthogonal frequency division multiplexing (DFT-s-OFDM). We show that a well-designed frequency-domain spectral shaping (FDSS) filter for DFT-s-OFDM can convert its single-carrier nature to a linear combination of chirps circularly translated in the time domain. Also, by exploiting the properties of the Fourier series and Bessel function of the first kind, we analytically obtain the FDSS filter for an arbitrary chirp. We theoretically show that the chirps with low ripples in the frequency domain result in a lower bit-error ratio (BER) via less noise enhancement. We also address the noise enhancement by exploiting the repetitions in the frequency. The proposed framework offers a new way to efficiently synthesize chirps that can be used in Internet-of-Things (IoT), dual-function radar and communication (DFRC) or wireless sensing applications with existing DFT-s-OFDM transceivers.
△ Less
Submitted 21 November, 2020; v1 submitted 9 August, 2020;
originally announced August 2020.
-
Class number one problem for the real quadratic fields $\mathbb{Q}({\sqrt{m^2+2r}})$
Authors:
Azizul Hoque,
Srinivas Kotyada
Abstract:
We investigate the class number one problem for a parametric family of real quadratic fields of the form $\mathbb{Q}( \sqrt{m^2+4r})$ for certain positive integers $m$ and $r$.
We investigate the class number one problem for a parametric family of real quadratic fields of the form $\mathbb{Q}( \sqrt{m^2+4r})$ for certain positive integers $m$ and $r$.
△ Less
Submitted 8 August, 2020;
originally announced August 2020.
-
Overview of digital health surveillance system during COVID-19 pandemic: public health issues and misapprehensions
Authors:
Molla Rashied Hussein,
Ehsanul Hoque Apu,
Shahriar Shahabuddin,
Abdullah Bin Shams,
Russell Kabir
Abstract:
Without proper medication and vaccination for the COVID-19, many governments are using automated digital healthcare surveillance system to prevent and control the spread. There is not enough literature explaining the concerns and privacy issues; hence, we have briefly explained the topics in this paper. We focused on digital healthcare surveillance system's privacy concerns and different segments.…
▽ More
Without proper medication and vaccination for the COVID-19, many governments are using automated digital healthcare surveillance system to prevent and control the spread. There is not enough literature explaining the concerns and privacy issues; hence, we have briefly explained the topics in this paper. We focused on digital healthcare surveillance system's privacy concerns and different segments. Further research studies should be conducted in different sectors. This paper provides an overview based on the published articles, which are not focusing on the privacy issues that much. Artificial intelligence and 5G networks combine the advanced digital healthcare surveillance system; whereas Bluetooth-based contact tracing systems have fewer privacy concerns. More studies are required to find the appropriate digital healthcare surveillance system, which would be ideal for monitoring, controlling, and predicting the COVID-19 trajectory.
△ Less
Submitted 27 July, 2020;
originally announced July 2020.
-
Digital Surveillance Systems for Tracing COVID-19: Privacy and Security Challenges with Recommendations
Authors:
Molla Rashied Hussein,
Abdullah Bin Shams,
Ehsanul Hoque Apu,
Khondaker Abdullah Al Mamun,
Mohammad Shahriar Rahman
Abstract:
Coronavirus disease 2019, i.e. COVID-19 has imposed the public health measure of keeping social distancing for preventing mass transmission of COVID-19. For monitoring the social distancing and keeping the trace of transmission, we are obligated to develop various types of digital surveillance systems, which include contact tracing systems and drone-based monitoring systems. Due to the inconvenien…
▽ More
Coronavirus disease 2019, i.e. COVID-19 has imposed the public health measure of keeping social distancing for preventing mass transmission of COVID-19. For monitoring the social distancing and keeping the trace of transmission, we are obligated to develop various types of digital surveillance systems, which include contact tracing systems and drone-based monitoring systems. Due to the inconvenience of manual labor, traditional contact tracing systems are gradually replaced by the efficient automated contact tracing applications that are developed for smartphones. However, the commencement of automated contact tracing applications introduces the inevitable privacy and security challenges. Nevertheless, unawareness and/or lack of smartphone usage among mass people lead to drone-based monitoring systems. These systems also invite unwelcomed privacy and security challenges. This paper discusses the recently designed and developed digital surveillance system applications with their protocols deployed in several countries around the world. Their privacy and security challenges are discussed as well as analyzed from the viewpoint of privacy acts. Several recommendations are suggested separately for automated contact tracing systems and drone-based monitoring systems, which could further be explored and implemented afterwards to prevent any possible privacy violation and protect an unsuspecting person from any potential cyber attack.
△ Less
Submitted 26 July, 2020;
originally announced July 2020.
-
Optical soliton solutions of the Biswas-Arshed model by the $\tan(\circleddash/2)$ expansion approach
Authors:
Md Fazlul Hoque,
Harun-Or-Roshid
Abstract:
In this paper, we consider the Biswas-Arshed model (BAM) with nonlinear Kerr and power law. We integrate these nonlinear structures of the BAM to obtain optical exact solitons that passing through the optical fibers. To retrieve the solutions, we apply the $\tan(\circleddash/2)$ expansion integral scheme to the structures of the BAM nonlinearity. The novel solutions present optical shock wave, dou…
▽ More
In this paper, we consider the Biswas-Arshed model (BAM) with nonlinear Kerr and power law. We integrate these nonlinear structures of the BAM to obtain optical exact solitons that passing through the optical fibers. To retrieve the solutions, we apply the $\tan(\circleddash/2)$ expansion integral scheme to the structures of the BAM nonlinearity. The novel solutions present optical shock wave, double periodic optical solitons, interaction between optical periodic wave and optical solitons, and optical periodic and rogue waves for both structures of the model. It is shown that the amplitude of the periodic double solitons waves gradually increases and reached the highest peak at the moment of interaction, and it goes to diminish for a much larger time. In fact, we show that the amplitude of the wave for the interaction between periodic and optical solitons, gradually increases with beat phenomena. To the purpose, all these types of optical solitons can be frequently used to amplify or reduce waves for a certain hight. Moreover, we describe the physical phenomena of the solitons in graphically.
△ Less
Submitted 5 July, 2020;
originally announced July 2020.
-
A Robotic Framework for Making Eye Contact with Humans
Authors:
Mohammed Moshiul Hoque
Abstract:
Meeting eye contact is the essential prerequisite skill of a human to initiate any conversation with others. However, it is not an easy task for a robot to meet eye contact with a human if they are not facing each other initially or the human is intensely engaged his or her task. If the robot would like to start communication with a particular person, it should turn its gaze to that person first.…
▽ More
Meeting eye contact is the essential prerequisite skill of a human to initiate any conversation with others. However, it is not an easy task for a robot to meet eye contact with a human if they are not facing each other initially or the human is intensely engaged his or her task. If the robot would like to start communication with a particular person, it should turn its gaze to that person first. However, only such a turning action alone is not always enough to set up eye contact. Sometimes, the robot should perform some strong actions so that it can capture the human's attention toward it. In this paper, we proposed a computational model for robots that can proactively capture human attention and makes eye contact with him or her. Evaluation experiments by using a robotic head reveal the effectiveness of the proposed model in different viewing situations.
△ Less
Submitted 13 July, 2020;
originally announced July 2020.
-
Cues to gender and racial identity reduce creativity in diverse social networks
Authors:
Raiyan Abdul Baten,
Richard Aslin,
Gourab Ghoshal,
Mohammed Ehsan Hoque
Abstract:
The characteristics of social partners have long been hypothesized as influential in guiding group interactions. Understanding how demographic cues impact networks of creative collaborators is critical for elevating creative performances therein. We conducted a randomized experiment to investigate how the knowledge of peers' gender and racial identities distorts people's connection patterns and th…
▽ More
The characteristics of social partners have long been hypothesized as influential in guiding group interactions. Understanding how demographic cues impact networks of creative collaborators is critical for elevating creative performances therein. We conducted a randomized experiment to investigate how the knowledge of peers' gender and racial identities distorts people's connection patterns and the resulting creative outcomes in a dynamic social network. Consistent with prior work, we found that creative inspiration links are primarily formed with top idea-generators. However, when gender and racial identities are known, not only is there (1) an increase of 82.03% in the odds of same-gender connections (but not for same-race connections), but (2) the semantic similarity of idea-sets stimulated by these connections also increase significantly compared to demography-agnostic networks, negatively impacting the outcomes of divergent creativity. We found that ideas tend to be more homogeneous within demographic groups than between, taking away diversity-bonuses from similarity-based links and partly explaining the results. These insights can inform intelligent interventions to enhance network-wide creative performances.
△ Less
Submitted 28 April, 2021; v1 submitted 12 July, 2020;
originally announced July 2020.
-
Sentiment Polarity Detection on Bengali Book Reviews Using Multinomial Naive Bayes
Authors:
Eftekhar Hossain,
Omar Sharif,
Mohammed Moshiul Hoque
Abstract:
Recently, sentiment polarity detection has increased attention to NLP researchers due to the massive availability of customer's opinions or reviews in the online platform. Due to the continued expansion of e-commerce sites, the rate of purchase of various products, including books, are growing enormously among the people. Reader's opinions/reviews affect the buying decision of a customer in most c…
▽ More
Recently, sentiment polarity detection has increased attention to NLP researchers due to the massive availability of customer's opinions or reviews in the online platform. Due to the continued expansion of e-commerce sites, the rate of purchase of various products, including books, are growing enormously among the people. Reader's opinions/reviews affect the buying decision of a customer in most cases. This work introduces a machine learning-based technique to determine sentiment polarities (either positive or negative category) from Bengali book reviews. To assess the effectiveness of the proposed technique, a corpus with 2000 reviews on Bengali books is developed. A comparative analysis with various approaches (such as logistic regression, naive Bayes, SVM, and SGD) also performed by taking into consideration of the unigram, bigram, and trigram features, respectively. Experimental result reveals that the multinomial Naive Bayes with unigram feature outperforms the other techniques with 84% accuracy on the test set.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Individual-level Anxiety Detection and Prediction from Longitudinal YouTube and Google Search Engagement Logs
Authors:
Anis Zaman,
Boyu Zhang,
Vincent Silenzio,
Ehsan Hoque,
Henry Kautz
Abstract:
Anxiety disorder is one of the world's most prevalent mental health conditions, arising from complex interactions of biological and environmental factors and severely interfering one's ability to lead normal life activities. Current methods for detecting anxiety heavily rely on in-person interviews, which can be expensive, time-consuming, and blocked by social stigmas. In this work, we propose an…
▽ More
Anxiety disorder is one of the world's most prevalent mental health conditions, arising from complex interactions of biological and environmental factors and severely interfering one's ability to lead normal life activities. Current methods for detecting anxiety heavily rely on in-person interviews, which can be expensive, time-consuming, and blocked by social stigmas. In this work, we propose an alternative method to identify individuals with anxiety and further estimate their levels of anxiety using personal online activity histories from YouTube and the Google Search engine, platforms that are used by millions of people daily. We ran a longitudinal study and collected multiple rounds of anonymized YouTube and Google Search logs from volunteering participants, along with their clinically validated ground-truth anxiety assessment scores. We then developed explainable features that capture both the temporal and contextual aspects of online behaviors. Using those, we were able to train models that (i) identify individuals having anxiety disorder with an average F1 score of 0.83 and (ii) assess the level of anxiety by predicting the gold standard Generalized Anxiety Disorder 7-item scores (ranges from 0 to 21) with a mean square error of 1.87 based on the ubiquitous individual-level online engagement data. Our proposed anxiety assessment framework is cost-effective, time-saving, scalable, and opens the door for it to be deployed in real-world clinical settings, empowering care providers and therapists to learn about anxiety disorders of patients non-invasively at any moment in time.
△ Less
Submitted 30 November, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
-
Influence of Yb3+on the structural, electrical and optical properties of sol-gel synthesized Ni-Zn nanoferrites
Authors:
N. Jahan,
M. N. I. Khan,
F. -U. -Z. Chowdhury,
A. K. M. Akhter Hossain,
S. M. Hoque,
M. A. Matin,
M. N. Hossain,
M. M. Hossain,
M. M. Uddin
Abstract:
Polycrystalline Yb substituted NiZn nanoferrites with the compositions of Ni0.5Zn0.5YbxFe2-xO4 (x= 0.00, 0.04, 0.08, 0.12, 0.16 and 0.20) have been synthesized using sol gel auto combustion technique. Single phase cubic spinel structure has been confirmed by the X ray diffraction (XRD) patterns. Larger lattice constants of the compositions are found with increasing Yb3+ concentration while the ave…
▽ More
Polycrystalline Yb substituted NiZn nanoferrites with the compositions of Ni0.5Zn0.5YbxFe2-xO4 (x= 0.00, 0.04, 0.08, 0.12, 0.16 and 0.20) have been synthesized using sol gel auto combustion technique. Single phase cubic spinel structure has been confirmed by the X ray diffraction (XRD) patterns. Larger lattice constants of the compositions are found with increasing Yb3+ concentration while the average grain size (52 to 18 nm) has noticeable decrease as Yb3+ content is increased. The presence of all existing elements as well as the purity of the samples has also been confirmed from energy dispersive X ray spectroscopic (EDS) analysis. Frequency dependent dielectric constant, dielectric loss, dielectric relaxation time, AC and DC resistivity of the compositions have also been examined at room temperature. The DC resistivity value is found in the order of 10 to power 10 (omega-cm) which is at least four orders greater than the ferrites prepared by conventional method. This larger value of resistivity attributes due to very small grain size and successfully explained using the Verwey and deBoer hopping conduction model. The contribution of grain and grain boundary resistance has been elucidated using Cole Cole plot. The study of temperature dependent DC resistivity confirms the semiconducting nature of all titled compositions wherein bandgap (optical) increases from 2.73 eV to 3.25 eV with the increase of Yb content. The high value of resistivity is of notable achievement for the compositions that make them a potential candidate for implication in the high frequency applications where reduction of eddy current loss is highly required.
△ Less
Submitted 25 June, 2020;
originally announced June 2020.
-
High-level Modeling of Manufacturing Faults in Deep Neural Network Accelerators
Authors:
Shamik Kundu,
Ahmet Soyyiğit,
Khaza Anuarul Hoque,
Kanad Basu
Abstract:
The advent of data-driven real-time applications requires the implementation of Deep Neural Networks (DNNs) on Machine Learning accelerators. Google's Tensor Processing Unit (TPU) is one such neural network accelerator that uses systolic array-based matrix multiplication hardware for computation in its crux. Manufacturing faults at any state element of the matrix multiplication unit can cause unex…
▽ More
The advent of data-driven real-time applications requires the implementation of Deep Neural Networks (DNNs) on Machine Learning accelerators. Google's Tensor Processing Unit (TPU) is one such neural network accelerator that uses systolic array-based matrix multiplication hardware for computation in its crux. Manufacturing faults at any state element of the matrix multiplication unit can cause unexpected errors in these inference networks. In this paper, we propose a formal model of permanent faults and their propagation in a TPU using the Discrete-Time Markov Chain (DTMC) formalism. The proposed model is analyzed using the probabilistic model checking technique to reason about the likelihood of faulty outputs. The obtained quantitative results show that the classification accuracy is sensitive to the type of permanent faults as well as their location, bit position and the number of layers in the neural network. The conclusions from our theoretical model have been validated using experiments on a digit recognition-based DNN.
△ Less
Submitted 26 October, 2020; v1 submitted 5 June, 2020;
originally announced June 2020.
-
On the exponents of class groups of some families of imaginary quadratic fields
Authors:
Azizul Hoque
Abstract:
Let $a\geq 1$ and $n>1$ be odd integers. For a given prime $p$, we prove under certain conditions that the class groups of imaginary quadratic fields $\mathbb{Q}(\sqrt{a^2-4p^n})$ have a subgroup isomorphic to $\mathbb{Z}/n\mathbb{Z}$. We also show that this family of fields has infinitely many members with the property that their class groups have a subgroup isomorphic to…
▽ More
Let $a\geq 1$ and $n>1$ be odd integers. For a given prime $p$, we prove under certain conditions that the class groups of imaginary quadratic fields $\mathbb{Q}(\sqrt{a^2-4p^n})$ have a subgroup isomorphic to $\mathbb{Z}/n\mathbb{Z}$. We also show that this family of fields has infinitely many members with the property that their class groups have a subgroup isomorphic to $\mathbb{Z}/n\mathbb{Z}$. In addition, we deduce some unconditional results concerning the divisibility of the class numbers of certain imaginary quadratic fields. At the end, we provide some numerical examples to verify our results.
△ Less
Submitted 1 June, 2021; v1 submitted 26 May, 2020;
originally announced May 2020.
-
A Conjectural Experiment to Observe the Effect of Conditional locked-down in an Epidemic
Authors:
M. E. Hoque,
S. K. Das
Abstract:
In a pandemic like Covid-19, there are many countries of lower-earning cannot provide a complete locked-down within the duration of the detected case. The locked-down may result in famine throughout the region of underdeveloped countries after the outbreak. So, a conjectural setup of an epidemic has been studied by applying specific period of locked-down (30 days) in 5 different scenarios. The sto…
▽ More
In a pandemic like Covid-19, there are many countries of lower-earning cannot provide a complete locked-down within the duration of the detected case. The locked-down may result in famine throughout the region of underdeveloped countries after the outbreak. So, a conjectural setup of an epidemic has been studied by applying specific period of locked-down (30 days) in 5 different scenarios. The stochastic approach to the SEIR (Susceptible, Exposed, Infected and Recovered) model has been used to evaluate the dynamics and the effects of locked-down. It is observed that there exist a suitable period to apply locked-down where more susceptible escape from the infection. The effect of the early (as soon as the infected case detected) and late (with respect to the estimated peak of detected cases for no locked-down) implementation of the locked-down has also been studied and found that the late implementation of locked-down will take the least time to end the epidemic. The CFR (Case Fatality Rate) has also been found to be varied from 7.55 to 8.02 for all the considered scenarios.
△ Less
Submitted 14 May, 2020;
originally announced May 2020.
-
COVID-19Base: A knowledgebase to explore biomedical entities related to COVID-19
Authors:
Junaed Younus Khan,
Md. Tawkat Islam Khondaker,
Iram Tazim Hoque,
Hamada Al-Absi,
Mohammad Saifur Rahman,
Tanvir Alam,
M. Sohel Rahman
Abstract:
We are presenting COVID-19Base, a knowledgebase highlighting the biomedical entities related to COVID-19 disease based on literature mining. To develop COVID-19Base, we mine the information from publicly available scientific literature and related public resources. We considered seven topic-specific dictionaries, including human genes, human miRNAs, human lncRNAs, diseases, Protein Databank, drugs…
▽ More
We are presenting COVID-19Base, a knowledgebase highlighting the biomedical entities related to COVID-19 disease based on literature mining. To develop COVID-19Base, we mine the information from publicly available scientific literature and related public resources. We considered seven topic-specific dictionaries, including human genes, human miRNAs, human lncRNAs, diseases, Protein Databank, drugs, and drug side effects, are integrated to mine all scientific evidence related to COVID-19. We have employed an automated literature mining and labeling system through a novel approach to measure the effectiveness of drugs against diseases based on natural language processing, sentiment analysis, and deep learning. To the best of our knowledge, this is the first knowledgebase dedicated to COVID-19, which integrates such large variety of related biomedical entities through literature mining. Proper investigation of the mined biomedical entities along with the identified interactions among those, reported in COVID-19Base, would help the research community to discover possible ways for the therapeutic treatment of COVID-19.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
On a class of Lebesgue-Ramanujan-Nagell equations
Authors:
Azizul Hoque
Abstract:
We deeply investigate the Diophantine equation $cx^2+d^{2m+1}=2y^n$ in integers $x, y\geq 1, m\geq 0$ and $n\geq 3$, where $c$ and $d$ are given coprime positive integers such that $cd\not\equiv 3 \pmod 4$. We first solve this equation for prime $n$, under the condition $n\nmid h(-cd)$, where $h(-cd)$ denotes the class number of the quadratic field $\mathbb{Q}(\sqrt{-cd})$. We then completely solv…
▽ More
We deeply investigate the Diophantine equation $cx^2+d^{2m+1}=2y^n$ in integers $x, y\geq 1, m\geq 0$ and $n\geq 3$, where $c$ and $d$ are given coprime positive integers such that $cd\not\equiv 3 \pmod 4$. We first solve this equation for prime $n$, under the condition $n\nmid h(-cd)$, where $h(-cd)$ denotes the class number of the quadratic field $\mathbb{Q}(\sqrt{-cd})$. We then completely solve this equation for both $c$ and $d$ primes under the assumption that $\gcd(n, h(-cd))=1$. We also completely solve this equation for $c=1$ and $d\equiv1 \pmod 4$, under the condition $\gcd(n, h(-d))=1$. For some fixed values of $c$ and $d$, we derive some results concerning the solvability of this equation.
△ Less
Submitted 31 May, 2023; v1 submitted 11 May, 2020;
originally announced May 2020.
-
First law of black hole mechanics with fermions
Authors:
P. B. Aneesh,
Sumanta Chakraborty,
Sk Jahanur Hoque,
Amitabh Virmani
Abstract:
In the last few years, there has been significant interest in understanding the stationary comparison version of the first law of black hole mechanics in the vielbein formulation of gravity. Several authors have pointed out that to discuss the first law in the vielbein formulation one must extend the Iyer-Wald Noether charge formalism appropriately. Jacobson and Mohd [arXiv:1507.01054] and Prabhu…
▽ More
In the last few years, there has been significant interest in understanding the stationary comparison version of the first law of black hole mechanics in the vielbein formulation of gravity. Several authors have pointed out that to discuss the first law in the vielbein formulation one must extend the Iyer-Wald Noether charge formalism appropriately. Jacobson and Mohd [arXiv:1507.01054] and Prabhu [arXiv:1511.00388] formulated such a generalisation for symmetry under combined spacetime diffeomorphisms and local Lorentz transformations. In this paper, we apply and appropriately adapt their formalism to four-dimensional gravity coupled to a Majorana field and to a Rarita-Schwinger field. We explore the first law of black hole mechanics and the construction of the Lorentz-diffeomorphism Noether charges in the presence of fermionic fields, relevant for simple supergravity.
△ Less
Submitted 16 August, 2020; v1 submitted 21 April, 2020;
originally announced April 2020.
-
Left centralizers on Lie ideals in prime and semiprime gamma rings
Authors:
Md Fazlul Hoque,
Akhil Chandra Paul
Abstract:
Let $U$ be a Lie ideal of a 2-torsion free prime $Γ$-ring $M$ such that $uαu\in U$ for all $u\in U$ and $α\inΓ$. If $T:M\rightarrow M$ is an additive mapping satifying the relation $T(uαu)=T(u)αu$ for all $u\in U$ and $α\inΓ$, then we prove that $T(uαv)=T(u)αv$ for all $u, v\in U$ and $α\inΓ$. Also this result is extended to semiprime $Γ$-rings.
Let $U$ be a Lie ideal of a 2-torsion free prime $Γ$-ring $M$ such that $uαu\in U$ for all $u\in U$ and $α\inΓ$. If $T:M\rightarrow M$ is an additive mapping satifying the relation $T(uαu)=T(u)αu$ for all $u\in U$ and $α\inΓ$, then we prove that $T(uαv)=T(u)αv$ for all $u, v\in U$ and $α\inΓ$. Also this result is extended to semiprime $Γ$-rings.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
Learning Dense Visual Correspondences in Simulation to Smooth and Fold Real Fabrics
Authors:
Aditya Ganapathi,
Priya Sundaresan,
Brijen Thananjeyan,
Ashwin Balakrishna,
Daniel Seita,
Jennifer Grannen,
Minho Hwang,
Ryan Hoque,
Joseph E. Gonzalez,
Nawid Jamali,
Katsu Yamane,
Soshi Iba,
Ken Goldberg
Abstract:
Robotic fabric manipulation is challenging due to the infinite dimensional configuration space, self-occlusion, and complex dynamics of fabrics. There has been significant prior work on learning policies for specific deformable manipulation tasks, but comparatively less focus on algorithms which can efficiently learn many different tasks. In this paper, we learn visual correspondences for deformab…
▽ More
Robotic fabric manipulation is challenging due to the infinite dimensional configuration space, self-occlusion, and complex dynamics of fabrics. There has been significant prior work on learning policies for specific deformable manipulation tasks, but comparatively less focus on algorithms which can efficiently learn many different tasks. In this paper, we learn visual correspondences for deformable fabrics across different configurations in simulation and show that this representation can be used to design policies for a variety of tasks. Given a single demonstration of a new task from an initial fabric configuration, the learned correspondences can be used to compute geometrically equivalent actions in a new fabric configuration. This makes it possible to robustly imitate a broad set of multi-step fabric smoothing and folding tasks on multiple physical robotic systems. The resulting policies achieve 80.3% average task success rate across 10 fabric manipulation tasks on two different robotic systems, the da Vinci surgical robot and the ABB YuMi. Results also suggest robustness to fabrics of various colors, sizes, and shapes. See https://tinyurl.com/fabric-descriptors for supplementary material and videos.
△ Less
Submitted 11 November, 2020; v1 submitted 28 March, 2020;
originally announced March 2020.
-
An Automated Framework for Board-level Trojan Benchmarking
Authors:
Tamzidul Hoque,
Shuo Yang,
Aritra Bhattacharyay,
Jonathan Cruz,
Swarup Bhunia
Abstract:
Economic and operational advantages have led the supply chain of printed circuit boards (PCBs) to incorporate various untrusted entities. Any of the untrusted entities are capable of introducing malicious alterations to facilitate a functional failure or leakage of secret information during field operation. While researchers have been investigating the threat of malicious modification within the s…
▽ More
Economic and operational advantages have led the supply chain of printed circuit boards (PCBs) to incorporate various untrusted entities. Any of the untrusted entities are capable of introducing malicious alterations to facilitate a functional failure or leakage of secret information during field operation. While researchers have been investigating the threat of malicious modification within the scale of individual microelectronic components, the possibility of a board-level malicious manipulation has essentially been unexplored. In the absence of standard benchmarking solutions, prospective countermeasures for PCB trust assurance are likely to utilize homegrown representation of the attacks that undermines their evaluation and does not provide scope for comparison with other techniques. In this paper, we have developed the first-ever benchmarking solution to facilitate an unbiased and comparable evaluation of countermeasures applicable to PCB trust assurance. Based on a taxonomy tailored for PCB-level alterations, we have developed high-level Trojan models. From these models, we have generated a custom pool of board-level Trojan designs of varied complexity and functionality. We have also developed a tool-flow for automatically inserting these Trojans into various PCB designs and generate the Trojan benchmarks (i.e., PCB designs with Trojan). The tool-based Trojan insertion facilitate a comprehensive evaluation against large number of diverse Trojan implementations and application of data mining for trust verification. Finally, with experimental measurements from a fabricated PCB, we analyze the stealthiness of the Trojan designs.
△ Less
Submitted 27 March, 2020;
originally announced March 2020.
-
Numerical Investigation of Mechanical Properties of Aluminum-Copper Alloys at Nanoscale
Authors:
Satyajit Mojumder,
Md Shajedul Hoque Thakur,
Mahmudul Islam,
Monon Mahboob,
Mohammad Motalab
Abstract:
Nanoindentation is a powerful tool capable of providing fundamental insights of material elastic and plastic response at the nanoscale. Alloys at nanoscale are particularly interesting as the local heterogeneity and deformation mechanism revealed by atomistic study offers a better way to understand hardening mechanism to build a stronger material. In this work, nanoindentation in Al-Cu alloys are…
▽ More
Nanoindentation is a powerful tool capable of providing fundamental insights of material elastic and plastic response at the nanoscale. Alloys at nanoscale are particularly interesting as the local heterogeneity and deformation mechanism revealed by atomistic study offers a better way to understand hardening mechanism to build a stronger material. In this work, nanoindentation in Al-Cu alloys are studied using atomistic simulations to investigate the effects of loading direction, alloying percentages of Cu via dislocation-driven mechanisms. Also, a low-fidelity finite element (FE) model has been developed for nanoindentation simulations where nanoscale materials properties are used from atomistic simulations. Material properties, such as hardness and reduced modulus, are computed from both the FE and MD simulations and then compared. Considering the fundamental difference between these two numerical approaches, the FE results obtained from the present study conform fairly with those from MD simulations. This paves a way into finding material properties of alloys with reduced simulation time and cost by using FE where high-fidelity results are not required. The results have been presented as load-displacement analysis, dislocation density, dislocation loops nucleation and propagation, von-Mises stress distribution and surface imprints. The techniques adopted in this paper to incorporate atomistic data into FE simulations can be further extended for finding other mechanical and fracture properties for complex alloy materials.
△ Less
Submitted 29 September, 2020; v1 submitted 22 March, 2020;
originally announced March 2020.
-
Energy of weak gravitational waves in spacetimes with a positive cosmological constant
Authors:
P. T. Chruściel,
Sk Jahanur Hoque,
Tomasz Smołka
Abstract:
We derive a formula for the total canonical energy, and its flux, of weak gravitational waves on a de Sitter background.
We derive a formula for the total canonical energy, and its flux, of weak gravitational waves on a de Sitter background.
△ Less
Submitted 30 January, 2021; v1 submitted 20 March, 2020;
originally announced March 2020.
-
Crime Prediction Using Spatio-Temporal Data
Authors:
Sohrab Hossain,
Ahmed Abtahee,
Imran Kashem,
Mohammed Moshiul Hoque,
Iqbal H. Sarker
Abstract:
A crime is a punishable offence that is harmful for an individual and his society. It is obvious to comprehend the patterns of criminal activity to prevent them. Research can help society to prevent and solve crime activates. Study shows that only 10 percent offenders commits 50 percent of the total offences. The enforcement team can respond faster if they have early information and pre-knowledge…
▽ More
A crime is a punishable offence that is harmful for an individual and his society. It is obvious to comprehend the patterns of criminal activity to prevent them. Research can help society to prevent and solve crime activates. Study shows that only 10 percent offenders commits 50 percent of the total offences. The enforcement team can respond faster if they have early information and pre-knowledge about crime activities of the different points of a city. In this paper, supervised learning technique is used to predict crimes with better accuracy. The proposed system predicts crimes by analyzing data-set that contains records of previously committed crimes and their patterns. The system stands on two main algorithms - i) decision tree, and ii) k-nearest neighbor. Random Forest algorithm and Adaboost are used to increase the accuracy of the prediction. Finally, oversampling is used for better accuracy. The proposed system is feed with a criminal-activity data set of twelve years of San Francisco city.
△ Less
Submitted 11 March, 2020;
originally announced March 2020.
-
VisuoSpatial Foresight for Multi-Step, Multi-Task Fabric Manipulation
Authors:
Ryan Hoque,
Daniel Seita,
Ashwin Balakrishna,
Aditya Ganapathi,
Ajay Kumar Tanwani,
Nawid Jamali,
Katsu Yamane,
Soshi Iba,
Ken Goldberg
Abstract:
Robotic fabric manipulation has applications in home robotics, textiles, senior care and surgery. Existing fabric manipulation techniques, however, are designed for specific tasks, making it difficult to generalize across different but related tasks. We extend the Visual Foresight framework to learn fabric dynamics that can be efficiently reused to accomplish different fabric manipulation tasks wi…
▽ More
Robotic fabric manipulation has applications in home robotics, textiles, senior care and surgery. Existing fabric manipulation techniques, however, are designed for specific tasks, making it difficult to generalize across different but related tasks. We extend the Visual Foresight framework to learn fabric dynamics that can be efficiently reused to accomplish different fabric manipulation tasks with a single goal-conditioned policy. We introduce VisuoSpatial Foresight (VSF), which builds on prior work by learning visual dynamics on domain randomized RGB images and depth maps simultaneously and completely in simulation. We experimentally evaluate VSF on multi-step fabric smoothing and folding tasks against 5 baseline methods in simulation and on the da Vinci Research Kit (dVRK) surgical robot without any demonstrations at train or test time. Furthermore, we find that leveraging depth significantly improves performance. RGBD data yields an 80% improvement in fabric folding success rate over pure RGB data. Code, data, videos, and supplementary material are available at https://sites.google.com/view/fabric-vsf/.
△ Less
Submitted 18 February, 2021; v1 submitted 19 March, 2020;
originally announced March 2020.
-
A Rule Based Expert System to Assess Coronary Artery Disease under Uncertainty
Authors:
Sohrab Hossain,
Dhiman Sarma,
Rana Joyti Chakma,
Wahidul Alam,
Mohammed Moshiul Hoque,
Iqbal H. Sarker
Abstract:
The coronary artery disease (CAD) involves narrowing and damaging the major blood vessels has become the most life threating disease in the world especially in south Asian reason. Although outstanding medical facilities are available in Singapore and India for CAD patients, early detection of CAD stages are necessary to minimize the patients' sufferings and expenses. It is really challenging for d…
▽ More
The coronary artery disease (CAD) involves narrowing and damaging the major blood vessels has become the most life threating disease in the world especially in south Asian reason. Although outstanding medical facilities are available in Singapore and India for CAD patients, early detection of CAD stages are necessary to minimize the patients' sufferings and expenses. It is really challenging for doctors to incorporate numerous factors for details analysis and CAD detections are expensive as it needs expensive medical facilities. Clinical Decision Support Systems (CDSS) may assist to analyze numerous factors for patients. In this paper, a Rule Based Expert System (RBES) is proposed which can predict five different stages of CAD. RBES contains five different Belief Rule Based (BRB) systems and the final output is produced by combining all BRBs using the Evidential Reasoning (ER). Success, Error, Failure, False Omission rates are calculated to measures the performance of the RBES. The Success Rate and False Omission Rate show better performance comparing to existing CDSS.
△ Less
Submitted 16 March, 2020;
originally announced March 2020.
-
The physical and mechanical properties of hafnium orthosilicate: experiments and first-principles calculations
Authors:
Zhidong Ding,
Mackenzie Ridley,
Jeroen Deijkers,
Naiming Liu,
Md Shafkat Bin Hoque,
John Gaskins,
Mona Zebarjadi,
Patrick Hopkins,
Haydn Wadley,
Elizabeth Opila,
Keivan Esfarjani
Abstract:
Hafnium orthosilicate (HfSiO4: hafnon) has been proposed as an environmental barrier coating (EBC) material to protect silicon coated, silicon-based ceramic materials at high temperatures and as a candidate dielectric material in microelectronic devices. It can naturally form at the interface between silicon dioxide (SiO2) and hafnia (HfO2). When used in these applications, its coefficient of ther…
▽ More
Hafnium orthosilicate (HfSiO4: hafnon) has been proposed as an environmental barrier coating (EBC) material to protect silicon coated, silicon-based ceramic materials at high temperatures and as a candidate dielectric material in microelectronic devices. It can naturally form at the interface between silicon dioxide (SiO2) and hafnia (HfO2). When used in these applications, its coefficient of thermal expansion (CTE) should match that of silicon and SiC composites to reduce the stored elastic strain energy, and thus risk of failure of these systems. The physical, mechanical, thermodynamic and thermal transport properties of hafnon have been investigated using a combination of both density functional theory (DFT) calculations and experimental assessments. The average linear coefficient of thermal expansion (CTE) calculated using the quasi-harmonic approximation increase from 3.06 10-6 K-1 to 6.36 10-6 K-1, as the temperature increases from 300 to 1500 K, in agreement with both X-ray diffraction lattice parameter and dilatometry measurements. The predicted thermal conductivity from Boltzmann transport theory was approximately 18 W/m.K at 300K. Both hot disk and laser flash measurements gave a thermal conductivity of 13.3 W/m.K. This slightly lower value is indicative of residual disorder in the experimental samples that was absent in the theoretical analysis. First-principles calculations and nanoindentation techniques were used to assess the ambient temperature elastic constants and bulk modulus respectively. The elastic properties obtained by both approaches agreed to within 5% validating the computational approach and its future use for study of the thermomechanical properties of other oxides or silicates.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
Random Forest Classifier Based Prediction of Rogue waves on Deep Oceans
Authors:
Pujan Pokhrel,
Elias Ioup,
Md Tamjidul Hoque,
Julian Simeonov,
Mahdi Abdelguerfi
Abstract:
In this paper, we present a novel approach for the prediction of rogue waves in oceans using statistical machine learning methods. Since the ocean is composed of many wave systems, the change from a bimodal or multimodal directional distribution to unimodal one is taken as the warning criteria. Likewise, we explore various features that help in predicting rogue waves. The analysis of the results s…
▽ More
In this paper, we present a novel approach for the prediction of rogue waves in oceans using statistical machine learning methods. Since the ocean is composed of many wave systems, the change from a bimodal or multimodal directional distribution to unimodal one is taken as the warning criteria. Likewise, we explore various features that help in predicting rogue waves. The analysis of the results shows that the Spectral features are significant in predicting rogue waves. We find that nonlinear classifiers have better prediction accuracy than the linear ones. Finally, we propose a Random Forest Classifier based algorithm to predict rogue waves in oceanic conditions. The proposed algorithm has an Overall Accuracy of 89.57% to 91.81%, and the Balanced Accuracy varies between 79.41% to 89.03% depending on the forecast time window. Moreover, due to the model-free nature of the evaluation criteria and interdisciplinary characteristics of the approach, similar studies may be motivated in other nonlinear dispersive media, such as nonlinear optics, plasma, and solids, governed by similar equations, which will allow for the early detection of extreme waves
△ Less
Submitted 13 March, 2020;
originally announced March 2020.
-
In Situ Network and Application Performance Measurement on Android Devices and the Imperfections
Authors:
Mohammad A. Hoque,
Ashwin Rao,
Sasu Tarkoma
Abstract:
Understanding network and application performance are essential for debugging, improving user experience, and performance comparison. Meanwhile, modern mobile systems are optimized for energy-efficient computation and communications that may limit the performance of network and applications. In recent years, several tools have emerged that analyze network performance of mobile applications in~situ…
▽ More
Understanding network and application performance are essential for debugging, improving user experience, and performance comparison. Meanwhile, modern mobile systems are optimized for energy-efficient computation and communications that may limit the performance of network and applications. In recent years, several tools have emerged that analyze network performance of mobile applications in~situ with the help of the VPN service. There is a limited understanding of how these measurement tools and system optimizations affect the network and application performance. In this study, we first demonstrate that mobile systems employ energy-aware system hardware tuning, which affects application performance and network throughput. We next show that the VPN-based application performance measurement tools, such as Lumen, PrivacyGuard, and Video Optimizer, aid in ambiguous network performance measurements and degrade the application performance. Our findings suggest that sound application and network performance measurement on Android devices requires a good understanding of the device, networks, measurement tools, and applications.
△ Less
Submitted 11 March, 2020;
originally announced March 2020.
-
Dual-Phase High-Entropy Ultra-High Temperature Ceramics
Authors:
Mingde Qin,
Joshua Gild,
Chongze Hu,
Haoren Wang,
Md Shafkat Bin Hoque,
Jeffrey L. Braun,
Tyler J. Harrington,
Patrick E. Hopkins,
Kenneth S. Vecchio,
Jian Luo
Abstract:
A series of dual-phase high-entropy ultrahigh temperature ceramics (DPHE-UHTCs) are fabricated starting from N binary borides and (5-N) binary carbides powders. >~99% relative densities have been achieved with virtually no native oxides. These DPHE-UHTCs consist of a hexagonal high-entropy boride (HEB) phase and a cubic high-entropy carbide (HEC) phase. A thermodynamic relation that governs the co…
▽ More
A series of dual-phase high-entropy ultrahigh temperature ceramics (DPHE-UHTCs) are fabricated starting from N binary borides and (5-N) binary carbides powders. >~99% relative densities have been achieved with virtually no native oxides. These DPHE-UHTCs consist of a hexagonal high-entropy boride (HEB) phase and a cubic high-entropy carbide (HEC) phase. A thermodynamic relation that governs the compositions of the HEB and HEC phases in equilibrium is discovered and a thermodynamic model is proposed. These DPHE-UHTCs exhibit tunable grain size, Vickers microhardness, Young' and shear moduli, and thermal conductivity. The DPHE-UHTCs have higher hardness than the weighted linear average of the two single-phase HEB and HEC, which are already harder than the rule-of-mixture averages of individual binary borides and carbides. This study extends the state of the art by introducing dual-phase high-entropy ceramics (DPHECs), which provide a new platform to tailor various properties via changing the phase fraction and microstructure.
△ Less
Submitted 21 May, 2020; v1 submitted 22 February, 2020;
originally announced February 2020.
-
P2C2: Peer-to-Peer Car Charging
Authors:
Prabuddha Chakraborty,
Robert C. Parker,
Tamzidul Hoque,
Jonathan Cruz,
Swarup Bhunia
Abstract:
With the rising concerns of fossil fuel depletion and the impact of Internal Combustion Engine(ICE) vehicles on our climate, the transportation industry is observing a rapid proliferation of electric vehicles (EVs). However, long-distance travel withEV is not possible yet without making multiple halt at EV charging stations. Many remote regions do not have charging stations, and even if they are p…
▽ More
With the rising concerns of fossil fuel depletion and the impact of Internal Combustion Engine(ICE) vehicles on our climate, the transportation industry is observing a rapid proliferation of electric vehicles (EVs). However, long-distance travel withEV is not possible yet without making multiple halt at EV charging stations. Many remote regions do not have charging stations, and even if they are present, it can take several hours to recharge the battery. Conversely, ICE vehicle fueling stations are much more prevalent, and re-fueling takes a couple of minutes. These facts have deterred many from moving to EVs. Existing solutions to these problems, such as building more charging stations, increasing battery capacity, and road-charging have not been proven efficient so far. In this paper, we propose Peer-to-Peer Car Charging (P2C2), a highly scalable novel technique for charging EVs on the go with minimal cost overhead. We allow EVs to share charge among each others based on the instructions from a cloud-based control system. The control system assigns and guides EVs for charge sharing. We also introduce mobile Charging Stations (MoCS), which are high battery capacity vehicles that are used to replenish the overall charge in the vehicle networks. We have implemented P2C2 and integrated it with the traffic simulator, SUMO. We observe promising results with up to 65% reduction in the number of EV halts with up to 24.4% reduction in required battery capacity without any extra halts.
△ Less
Submitted 28 January, 2020;
originally announced February 2020.
-
Mechanical behavior, enhanced dc resistivity, energy band gap and high temperature magnetic properties of Y-substituted Mg-Zn ferrites
Authors:
M. A. Ali,
M. N. I. Khan,
M. M. Hossain,
F. -U. -Z. Chowdhury,
M. N. Hossain,
R. Rashid,
M. A. Hakim,
S. M. Hoque,
M. M. Uddin
Abstract:
We report the synthesis of Y-substituted Mg-Zn ferrites using conventional standard ceramic technique. XRD patterns confirm the single phase cubic spinel structure up to x = 0.03 and appearance of a secondary phase of YFeO3for higher Y contents. FESEM images depict the distribution of grains and EDS spectra confirmed the absence of any unwanted element. Completion of solid state reaction and forma…
▽ More
We report the synthesis of Y-substituted Mg-Zn ferrites using conventional standard ceramic technique. XRD patterns confirm the single phase cubic spinel structure up to x = 0.03 and appearance of a secondary phase of YFeO3for higher Y contents. FESEM images depict the distribution of grains and EDS spectra confirmed the absence of any unwanted element. Completion of solid state reaction and formation of spinel structure has been revealed from FTIR spectra. The FTIR data along with lattice constant, bulk density and porosity were further used to calculate the stiffness constant (Cij), elastic constant and Debye temperatures. Mechanical stability of all studied compositions is confirmed from Cij using Born stability conditions. Brittleness and isotropic nature are also confirmed using Poisson ratio and anisotropy constants, respectively. The enhancement of dc electrical resistivity with Y content is observed. The energy band gap (increased with Y contents) is found in good agreement with dc electrical resistivity. Ferrimagnetic to paramagnetic phase change has been observed from the field dependent high temperature magnetization curves. The magnetic moments and saturation magnetization were found to be decreased with increasing temperature. The Curie temperature (Tc) has been measured from temperature dependent magnetic moment (M-T) and initial permeability and found to be in good agreement with each other. Decrease in Tc with Y content is due to redistribution of cations and weakening of the exchange coupling constant. The magnetic phase transition has been analyzed by Arrott plot and found to have second order phase transition. The dc resistivity endorses the prepared ferrites are suitable for high frequency and high temperature magnetic device applications as well.
△ Less
Submitted 20 January, 2020;
originally announced January 2020.
-
Blockchain Consensus Algorithms: A Survey
Authors:
Md Sadek Ferdous,
Mohammad Jabed Morshed Chowdhury,
Mohammad A. Hoque,
Alan Colman
Abstract:
In recent years, blockchain technology has received unparalleled attention from academia, industry, and governments all around the world. It is considered a technological breakthrough anticipated to disrupt several application domains. This has resulted in a plethora of blockchain systems for various purposes. However, many of these blockchain systems suffer from serious shortcomings related to th…
▽ More
In recent years, blockchain technology has received unparalleled attention from academia, industry, and governments all around the world. It is considered a technological breakthrough anticipated to disrupt several application domains. This has resulted in a plethora of blockchain systems for various purposes. However, many of these blockchain systems suffer from serious shortcomings related to their performance and security, which need to be addressed before any wide-scale adoption can be achieved. A crucial component of any blockchain system is its underlying consensus algorithm, which in many ways, determines its performance and security. Therefore, to address the limitations of different blockchain systems, several existing as well novel consensus algorithms have been introduced. A systematic analysis of these algorithms will help to understand how and why any particular blockchain performs the way it functions. However, the existing studies of consensus algorithms are not comprehensive. Those studies have incomplete discussions on the properties of the algorithms and fail to analyse several major blockchain consensus algorithms in terms of their scopes. This article fills this gap by analysing a wide range of consensus algorithms using a comprehensive taxonomy of properties and by examining the implications of different issues still prevalent in consensus algorithms in detail. The result of the analysis is presented in tabular formats, which provides a visual illustration of these algorithms in a meaningful way. We have also analysed more than hundred top crypto-currencies belonging to different categories of consensus algorithms to understand their properties and to implicate different trends in these crypto-currencies. Finally, we have presented a decision tree of algorithms to be used as a tool to test the suitability of consensus algorithms under different criteria.
△ Less
Submitted 7 February, 2020; v1 submitted 20 January, 2020;
originally announced January 2020.
-
Divisibility of Selmer groups and class groups
Authors:
Kalyan Banerjee,
Kalyan Chakraborty,
Azizul Hoque
Abstract:
In this paper, we study two topics. One is the divisibility problem of class groups of quadratic number fields and its connections to algebraic geometry. The other is the construction of Selmer group and Tate-Shafarevich group for an abelian variety defined over a number field.
In this paper, we study two topics. One is the divisibility problem of class groups of quadratic number fields and its connections to algebraic geometry. The other is the construction of Selmer group and Tate-Shafarevich group for an abelian variety defined over a number field.
△ Less
Submitted 5 December, 2019;
originally announced December 2019.