-
An Identity and Interaction Based Network Forensic Analysis
Authors:
Nathan Clarke,
Gaseb Alotibi,
Dany Joy,
Fudong Li,
Steven Furnell,
Ali Alshumrani,
Hussan Mohammed
Abstract:
In todays landscape of increasing electronic crime, network forensics plays a pivotal role in digital investigations. It aids in understanding which systems to analyse and as a supplement to support evidence found through more traditional computer based investigations. However, the nature and functionality of the existing Network Forensic Analysis Tools (NFATs) fall short compared to File System F…
▽ More
In todays landscape of increasing electronic crime, network forensics plays a pivotal role in digital investigations. It aids in understanding which systems to analyse and as a supplement to support evidence found through more traditional computer based investigations. However, the nature and functionality of the existing Network Forensic Analysis Tools (NFATs) fall short compared to File System Forensic Analysis Tools (FS FATs) in providing usable data. The analysis tends to focus upon IP addresses, which are not synonymous with user identities, a point of significant interest to investigators. This paper presents several experiments designed to create a novel NFAT approach that can identify users and understand how they are using network based applications whilst the traffic remains encrypted. The experiments build upon the prior art and investigate how effective this approach is in classifying users and their actions. Utilising an in-house dataset composed of 50 million packers, the experiments are formed of three incremental developments that assist in improving performance. Building upon the successful experiments, a proposed NFAT interface is presented to illustrate the ease at which investigators would be able to ask relevant questions of user interactions. The experiments profiled across 27 users, has yielded an average 93.3% True Positive Identification Rate (TPIR), with 41% of users experiencing 100% TPIR. Skype, Wikipedia and Hotmail services achieved a notably high level of recognition performance. The study has developed and evaluated an approach to analyse encrypted network traffic more effectively through the modelling of network traffic and to subsequently visualise these interactions through a novel network forensic analysis tool.
△ Less
Submitted 24 March, 2025;
originally announced March 2025.
-
Risk factor identification and classification of malnutrition among under-five children in Bangladesh: Machine learning and statistical approach
Authors:
Tasfin Mahmud,
Tayab Uddin Wara,
Chironjeet Das Joy
Abstract:
This study aims to understand the factors that resulted in under-five children's malnutrition from the Multiple Indicator Cluster (MICS-2019) nationwide surveys and classify different malnutrition stages based on the four well-established machine learning algorithms, namely - Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), and Multi-layer Perceptron (MLP) neural network. Accu…
▽ More
This study aims to understand the factors that resulted in under-five children's malnutrition from the Multiple Indicator Cluster (MICS-2019) nationwide surveys and classify different malnutrition stages based on the four well-established machine learning algorithms, namely - Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), and Multi-layer Perceptron (MLP) neural network. Accuracy, precision, recall, and F1 scores are obtained to evaluate the performance of each model. The statistical Pearson correlation coefficient analysis is also done to understand the significant factors related to a child's malnutrition. The eligible data sample for analysis was 21,858 among 24,686 samples from the dataset. Satisfactory and insightful results were obtained in each case and, the RF and MLP performed extraordinarily well. For RF, the accuracy was 98.55%, average precision 98.3%, recall value 95.68%, and F1 score 97.13%. For MLP, the accuracy was 98.69%, average precision 97.62%, recall 90.96%, and F1 score of 97.39%. From the Pearson co-efficient, all negative correlation results are enlisted, and the most significant impacts are found for the WAZ2 (Weight for age Z score WHO) (-0.828"), WHZ2 (Weight for height Z score WHO) (-0.706"), ZBMI (BMI Z score WHO) (-0.656"), BD3 (whether child is still being breastfed) (-0.59"), HAZ2 (Height for age Z score WHO) (-0.452"), CA1 (whether child had diarrhea in last 2 weeks) (-0.34"), Windex5 (Wealth index quantile) (-0.161"), melevel (Mother's education) (-0.132"), and CA14/CA16/CA17 (whether child had illness with fever, cough, and breathing) (-0.04) in successive order.
△ Less
Submitted 7 December, 2024;
originally announced December 2024.
-
Longitudinal DC Conductivity in Dirac Nodal Line Semimetals: Intrinsic and Extrinsic Contributions
Authors:
Vivek Pandey,
Dayana Joy,
Dimitrie Culcer,
Pankaj Bhalla
Abstract:
Nodal line semimetals, a class of topological quantum materials, exhibit a variety of novel phenomena due to their properties, such as bands touching on a one-dimensional line or a ring in the Brillouin zone and drumhead-like surface states. In addition, these semimetals are protected by the combined space-inversion and time-reversal ($\mathcal{PT}$) symmetry. In this study, we investigate the lon…
▽ More
Nodal line semimetals, a class of topological quantum materials, exhibit a variety of novel phenomena due to their properties, such as bands touching on a one-dimensional line or a ring in the Brillouin zone and drumhead-like surface states. In addition, these semimetals are protected by the combined space-inversion and time-reversal ($\mathcal{PT}$) symmetry. In this study, we investigate the longitudinal DC conductivity of the Dirac nodal line semimetals for the broken $\mathcal{PT}$-symmetric system by the mass term. Here, using the quantum kinetic technique, we find the intrinsic (field-driven) and extrinsic (scattering-driven) contributions to the total DC conductivity due to interband effects. Interestingly, the resulting intrinsic conductivity is the Fermi sea contribution, while the extrinsic stems from the Fermi surface contribution. We show that at low chemical potential, the extrinsic part contributes more and dominates over the traditional Drude intraband term, while at the high chemical potential, the intrinsic conductivity contributes. Furthermore, the total DC response due to interband effects saturates at high chemical potential and its strength decreases with increasing mass value. Our findings suggest that the extrinsic contributions are rich enough to understand the overall feature of the response for the three-dimensional system.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
An Atmospheric Correction Integrated LULC Segmentation Model for High-Resolution Satellite Imagery
Authors:
Soham Mukherjee,
Yash Dixit,
Naman Srivastava,
Joel D Joy,
Rohan Olikara,
Koesha Sinha,
Swarup E,
Rakshit Ramesh
Abstract:
The integration of fine-scale multispectral imagery with deep learning models has revolutionized land use and land cover (LULC) classification. However, the atmospheric effects present in Top-of-Atmosphere sensor measured Digital Number values must be corrected to retrieve accurate Bottom-of-Atmosphere surface reflectance for reliable analysis. This study employs look-up-table-based radiative tran…
▽ More
The integration of fine-scale multispectral imagery with deep learning models has revolutionized land use and land cover (LULC) classification. However, the atmospheric effects present in Top-of-Atmosphere sensor measured Digital Number values must be corrected to retrieve accurate Bottom-of-Atmosphere surface reflectance for reliable analysis. This study employs look-up-table-based radiative transfer simulations to estimate the atmospheric path reflectance and transmittance for atmospherically correcting high-resolution CARTOSAT-3 Multispectral (MX) imagery for several Indian cities. The corrected surface reflectance data were subsequently used in supervised and semi-supervised segmentation models, demonstrating stability in multi-class (buildings, roads, trees and water bodies) LULC segmentation accuracy, particularly in scenarios with sparsely labelled data.
△ Less
Submitted 10 September, 2024; v1 submitted 9 September, 2024;
originally announced September 2024.
-
Cross Pseudo Supervision Framework for Sparsely Labelled Geospatial Images
Authors:
Yash Dixit,
Naman Srivastava,
Joel D Joy,
Rohan Olikara,
Swarup E,
Rakshit Ramesh
Abstract:
Land Use Land Cover (LULC) mapping is a vital tool for urban and resource planning, playing a key role in the development of innovative and sustainable cities. This study introduces a semi-supervised segmentation model for LULC prediction using high-resolution satellite images with a vast diversity of data distributions in different areas of India. Our approach ensures a robust generalization acro…
▽ More
Land Use Land Cover (LULC) mapping is a vital tool for urban and resource planning, playing a key role in the development of innovative and sustainable cities. This study introduces a semi-supervised segmentation model for LULC prediction using high-resolution satellite images with a vast diversity of data distributions in different areas of India. Our approach ensures a robust generalization across different types of buildings, roads, trees, and water bodies within these distinct areas. We propose a modified Cross Pseudo Supervision framework to train image segmentation models on sparsely labelled data. The proposed framework addresses the limitations of the famous 'Cross Pseudo Supervision' technique for semi-supervised learning, specifically tackling the challenges of training segmentation models on noisy satellite image data with sparse and inaccurate labels. This comprehensive approach significantly enhances the accuracy and utility of LULC mapping, providing valuable insights for urban and resource planning applications.
△ Less
Submitted 13 August, 2024; v1 submitted 5 August, 2024;
originally announced August 2024.
-
GeoWATCH for Detecting Heavy Construction in Heterogeneous Time Series of Satellite Images
Authors:
Jon Crall,
Connor Greenwell,
David Joy,
Matthew Leotta,
Aashish Chaudhary,
Anthony Hoogs
Abstract:
Learning from multiple sensors is challenging due to spatio-temporal misalignment and differences in resolution and captured spectra. To that end, we introduce GeoWATCH, a flexible framework for training models on long sequences of satellite images sourced from multiple sensor platforms, which is designed to handle image classification, activity recognition, object detection, or object tracking ta…
▽ More
Learning from multiple sensors is challenging due to spatio-temporal misalignment and differences in resolution and captured spectra. To that end, we introduce GeoWATCH, a flexible framework for training models on long sequences of satellite images sourced from multiple sensor platforms, which is designed to handle image classification, activity recognition, object detection, or object tracking tasks. Our system includes a novel partial weight loading mechanism based on sub-graph isomorphism which allows for continually training and modifying a network over many training cycles. This has allowed us to train a lineage of models over a long period of time, which we have observed has improved performance as we adjust configurations while maintaining a core backbone.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Language Models are Alignable Decision-Makers: Dataset and Application to the Medical Triage Domain
Authors:
Brian Hu,
Bill Ray,
Alice Leung,
Amy Summerville,
David Joy,
Christopher Funk,
Arslan Basharat
Abstract:
In difficult decision-making scenarios, it is common to have conflicting opinions among expert human decision-makers as there may not be a single right answer. Such decisions may be guided by different attributes that can be used to characterize an individual's decision. We introduce a novel dataset for medical triage decision-making, labeled with a set of decision-maker attributes (DMAs). This da…
▽ More
In difficult decision-making scenarios, it is common to have conflicting opinions among expert human decision-makers as there may not be a single right answer. Such decisions may be guided by different attributes that can be used to characterize an individual's decision. We introduce a novel dataset for medical triage decision-making, labeled with a set of decision-maker attributes (DMAs). This dataset consists of 62 scenarios, covering six different DMAs, including ethical principles such as fairness and moral desert. We present a novel software framework for human-aligned decision-making by utilizing these DMAs, paving the way for trustworthy AI with better guardrails. Specifically, we demonstrate how large language models (LLMs) can serve as ethical decision-makers, and how their decisions can be aligned to different DMAs using zero-shot prompting. Our experiments focus on different open-source models with varying sizes and training techniques, such as Falcon, Mistral, and Llama 2. Finally, we also introduce a new form of weighted self-consistency that improves the overall quantified performance. Our results provide new research directions in the use of LLMs as alignable decision-makers. The dataset and open-source software are publicly available at: https://github.com/ITM-Kitware/llm-alignable-dm.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Emergent scale and anomalous dynamics in certain quasi-periodic systems
Authors:
Parvathy S Nair,
Dintomon Joy,
Sambuddha Sanyal
Abstract:
We study localisation transition in a class of quasi-periodic systems that has two competing periodic scales. We show that such class of systems show a re-entrant localisation transition where the energy scale of transition is set by the periodicities of these two scales. Furthermore we show dynamical properties in these systems, exhibits various kinds critical dynamics including sub-diffusive, su…
▽ More
We study localisation transition in a class of quasi-periodic systems that has two competing periodic scales. We show that such class of systems show a re-entrant localisation transition where the energy scale of transition is set by the periodicities of these two scales. Furthermore we show dynamical properties in these systems, exhibits various kinds critical dynamics including sub-diffusive, super-diffusive and diffusive spread of an initially localised wave-packet. Finally we show that these characteristics of quasi-periodic systems with two periodic scales can be realised within the regime of current experiments.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer
Authors:
Dintomon Joy,
M Sabir,
Bikash K. Behera,
Prasanta K. Panigrahi
Abstract:
Quantum secret sharing is a way to share secret messages among the clients in a group with complete security. For the first time, Hillery et al. (Phys Rev A 59:1829, 1999) proposed the quantum version of the classical secret sharing protocol using GHZ states. Here, we implement the above quantum secret sharing protocol in 'IBM Q 5 Tenerife' quantum processor and compare the experimentally obtained…
▽ More
Quantum secret sharing is a way to share secret messages among the clients in a group with complete security. For the first time, Hillery et al. (Phys Rev A 59:1829, 1999) proposed the quantum version of the classical secret sharing protocol using GHZ states. Here, we implement the above quantum secret sharing protocol in 'IBM Q 5 Tenerife' quantum processor and compare the experimentally obtained results with the theoretically predicted ones. Further, a new quantum binary voting protocol is proposed and implemented in the 14-qubit 'IBM Q 14 Melbourne' quantum processor. The results are analyzed through the technique of quantum state tomography, and the fidelity of states is calculated for a different number of executions made in the device.
△ Less
Submitted 22 March, 2020; v1 submitted 9 July, 2018;
originally announced July 2018.
-
Efficient schemes for the quantum teleportation of a sub-class of tripartite entangled states
Authors:
Dintomon Joy,
M Sabir
Abstract:
In this paper we propose two schemes for teleportation of a sub-class of tripartite states, the first one with the four-qubit cluster state and the second one with two Bell pairs as entanglement channels. A four-qubit joint measurement in the first case and two Bell measurements in the second are performed by the sender. Appropriate unitary operations on the qubits at the receiver's end along with…
▽ More
In this paper we propose two schemes for teleportation of a sub-class of tripartite states, the first one with the four-qubit cluster state and the second one with two Bell pairs as entanglement channels. A four-qubit joint measurement in the first case and two Bell measurements in the second are performed by the sender. Appropriate unitary operations on the qubits at the receiver's end along with an ancilla qubit result in the perfect teleportation of the tripartite state. Analysis of the quantum circuits employed in these schemes reveal that in our technique the desired quantum tasks are achieved with lesser quantum cost, gate count and classical communication bits compared with other similar schemes.
△ Less
Submitted 22 May, 2018;
originally announced May 2018.
-
Experimental Demonstration of Non-local Controlled-Unitary Quantum Gates Using a Five-qubit Quantum Computer
Authors:
Vishnu P. K.,
Dintomon Joy,
Bikash K. Behera,
Prasanta K. Panigrahi
Abstract:
Local implementation of non-local quantum gates is necessary in a distributed quantum computer. Here, we demonstrate the non-local implementation of controlled-unitary quantum gates proposed by Eisert et al. (Phys Rev A 62:052317, 2000) using the five-qubit IBM quantum computer. We verify the fidelity and accuracy of the implementation through the techniques of quantum state and process tomographi…
▽ More
Local implementation of non-local quantum gates is necessary in a distributed quantum computer. Here, we demonstrate the non-local implementation of controlled-unitary quantum gates proposed by Eisert et al. (Phys Rev A 62:052317, 2000) using the five-qubit IBM quantum computer. We verify the fidelity and accuracy of the implementation through the techniques of quantum state and process tomographies.
△ Less
Submitted 15 May, 2019; v1 submitted 17 September, 2017;
originally announced September 2017.
-
Efficient Deterministic Secure Quantum Communication protocols using multipartite entangled states
Authors:
Dintomon Joy,
Supin P Surendran,
Sabir M
Abstract:
We propose two deterministic secure quantum communication (DSQC) protocols employing three-qubit GHZ-like states and five-qubit Brown states as quantum channels for secure transmission of information in units of two bits and three bits using multipartite teleportation schemes developed here. In these schemes, the sender's capability in selecting quantum channels and the measuring bases leads to im…
▽ More
We propose two deterministic secure quantum communication (DSQC) protocols employing three-qubit GHZ-like states and five-qubit Brown states as quantum channels for secure transmission of information in units of two bits and three bits using multipartite teleportation schemes developed here. In these schemes, the sender's capability in selecting quantum channels and the measuring bases leads to improved qubit efficiency of the protocols.
△ Less
Submitted 25 March, 2017;
originally announced March 2017.
-
Generalized Controlled Quantum Secure Communication using GHZ-like state
Authors:
Jemy Geordy,
Dintomon Joy,
M Sabir
Abstract:
We present a novel scheme for controlled quantum secure communication (CQSC) using GHZ-like state. In this scheme, a trusted controller assists the users for achieving secure transmission of data between them. The dense coding technique is exploited to increase the qubit efficiency and we show that the proposed scheme is immune against common eavesdropping attacks. We show how the method can be ge…
▽ More
We present a novel scheme for controlled quantum secure communication (CQSC) using GHZ-like state. In this scheme, a trusted controller assists the users for achieving secure transmission of data between them. The dense coding technique is exploited to increase the qubit efficiency and we show that the proposed scheme is immune against common eavesdropping attacks. We show how the method can be generalized to include N controllers using sets of GHZ-like states shared among the controllers and users. In this process entanglement swapping and single particle measurements are performed by the controllers to relax their controls and the users get entangled in Bell states.
△ Less
Submitted 26 July, 2016; v1 submitted 25 July, 2016;
originally announced July 2016.
-
Multi-Terabyte EIDE Disk Arrays running Linux RAID5
Authors:
D. A. Sanders,
L. M. Cremaldi,
V. Eschenburg,
R. Godang,
M. D. Joy,
D. J. Summers,
D. L. Petravick
Abstract:
High-energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. Grid Computing is one method; however, the data must be cached at the various Grid nodes. We examine some storage techniques that exploit recent developments…
▽ More
High-energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. Grid Computing is one method; however, the data must be cached at the various Grid nodes. We examine some storage techniques that exploit recent developments in commodity hardware. Disk arrays using RAID level 5 (RAID-5) include both parity and striping. The striping improves access speed. The parity protects data in the event of a single disk failure, but not in the case of multiple disk failures.
We report on tests of dual-processor Linux Software RAID-5 arrays and Hardware RAID-5 arrays using a 12-disk 3ware controller, in conjunction with 250 and 300 GB disks, for use in offline high-energy physics data analysis. The price of IDE disks is now less than $1/GB. These RAID-5 disk arrays can be scaled to sizes affordable to small institutions and used when fast random access at low cost is important.
△ Less
Submitted 19 November, 2004;
originally announced November 2004.
-
Astronomical x-ray polarimetry based on photoelectric effect with microgap detectors
Authors:
Paolo Soffitta,
Enrico Costa,
Giuseppe di Persio,
Ennio Morelli,
Alda Rubini,
Ronaldo Bellazzini,
Alessandro Brez,
Renzo Raffo,
Gloria Spandre,
David Joy
Abstract:
The polarisation of x-ray photons can be determined by measuring the direction of emission of a K-shell photoelectron. Effective exploitation of this effect below 10 keV would allow development of a highly sensitive x-ray polarimeter dedicated in particular to x-ray astronomy observations. Only with the advent of finely segmented gas detectors was it possible to detect polarisation sensitivity b…
▽ More
The polarisation of x-ray photons can be determined by measuring the direction of emission of a K-shell photoelectron. Effective exploitation of this effect below 10 keV would allow development of a highly sensitive x-ray polarimeter dedicated in particular to x-ray astronomy observations. Only with the advent of finely segmented gas detectors was it possible to detect polarisation sensitivity based on the photoelectric effect in this energy range. Simulation and measurements at 5.4 and 8.04 keV with a microgap gas counter, using both a polarised and an unpolarised x-ray source, showed that the photoelectron track in a neon-based gas mixture retains the memory of the polarisation of the incoming photons. Possible experiments aimed at galactic/extragalactic sources and solar flares are considered and their sensitivity to these sources is calculated.
△ Less
Submitted 8 December, 2000;
originally announced December 2000.