-
An Ecosystem of Services for FAIR Computational Workflows
Authors:
Sean R. Wilkinson,
Johan Gustafsson,
Finn Bacall,
Khalid Belhajjame,
Salvador Capella,
Jose Maria Fernandez Gonzalez,
Jacob Fosso Tande,
Luiz Gadelha,
Daniel Garijo,
Patricia Grubel,
Bjorn Grüning,
Farah Zaib Khan,
Sehrish Kanwal,
Simone Leo,
Stuart Owen,
Luca Pireddu,
Line Pouchard,
Laura Rodríguez-Navas,
Beatriz Serrano-Solano,
Stian Soiland-Reyes,
Baiba Vilne,
Alan Williams,
Merridee Ann Wouters,
Frederik Coppens,
Carole Goble
Abstract:
Computational workflows, regardless of their portability or maturity, represent major investments of both effort and expertise. They are first class, publishable research objects in their own right. They are key to sharing methodological know-how for reuse, reproducibility, and transparency. Consequently, the application of the FAIR principles to workflows is inevitable to enable them to be Findab…
▽ More
Computational workflows, regardless of their portability or maturity, represent major investments of both effort and expertise. They are first class, publishable research objects in their own right. They are key to sharing methodological know-how for reuse, reproducibility, and transparency. Consequently, the application of the FAIR principles to workflows is inevitable to enable them to be Findable, Accessible, Interoperable, and Reusable. Making workflows FAIR would reduce duplication of effort, assist in the reuse of best practice approaches and community-supported standards, and ensure that workflows as digital objects can support reproducible and robust science. FAIR workflows also encourage interdisciplinary collaboration, enabling workflows developed in one field to be repurposed and adapted for use in other research domains. FAIR workflows draw from both FAIR data and software principles. Workflows propose explicit method abstractions and tight bindings to data, hence making many of the data principles apply. Meanwhile, as executable pipelines with a strong emphasis on code composition and data flow between steps, the software principles apply, too. As workflows are chiefly concerned with the processing and creation of data, they also have an important role to play in ensuring and supporting data FAIRification.
The FAIR Principles for software and data mandate the use of persistent identifiers (PID) and machine actionable metadata associated with workflows to enable findability, reusability, interoperability and reusability. To implement the principles requires a PID and metadata framework with appropriate programmatic protocols, an accompanying ecosystem of services, tools, guidelines, policies, and best practices, as well the buy-in of existing workflow systems such that they adapt in order to adopt. The European EOSC-Life Workflow Collaboratory is an example of such a ...
△ Less
Submitted 21 May, 2025;
originally announced May 2025.
-
Serverless Edge Computing: A Taxonomy, Systematic Literature Review, Current Trends and Research Challenges
Authors:
Iqra Batool,
Sania Kanwal
Abstract:
In recent years, the rapid expansion of Internet of Things (IoT) nodes and devices has seamlessly integrated technology into everyday life, amplifying the demand for optimized computing solutions. To meet the critical Quality of Service (QoS) requirements such as reduced latency, efficient bandwidth usage, swift reaction times, scalability, privacy, and security serverless edge computing has emerg…
▽ More
In recent years, the rapid expansion of Internet of Things (IoT) nodes and devices has seamlessly integrated technology into everyday life, amplifying the demand for optimized computing solutions. To meet the critical Quality of Service (QoS) requirements such as reduced latency, efficient bandwidth usage, swift reaction times, scalability, privacy, and security serverless edge computing has emerged as a transformative paradigm. This systematic literature review explores the current landscape of serverless edge computing, analyzing recent studies to uncover the present state of this technology. The review identifies the essential features of serverless edge computing, focusing on architectural designs, QoS metrics, implementation specifics, practical applications, and communication modalities central to this paradigm. Furthermore, we propose a comprehensive taxonomy that categorizes existing research efforts, providing a comparative analysis based on these classifications. The paper concludes with an in depth discussion of open research challenges and highlights promising future directions that hold potential for advancing serverless edge computing research.
△ Less
Submitted 16 February, 2025;
originally announced February 2025.
-
Workflows Community Summit 2024: Future Trends and Challenges in Scientific Workflows
Authors:
Rafael Ferreira da Silva,
Deborah Bard,
Kyle Chard,
Shaun de Witt,
Ian T. Foster,
Tom Gibbs,
Carole Goble,
William Godoy,
Johan Gustafsson,
Utz-Uwe Haus,
Stephen Hudson,
Shantenu Jha,
Laila Los,
Drew Paine,
Frédéric Suter,
Logan Ward,
Sean Wilkinson,
Marcos Amaris,
Yadu Babuji,
Jonathan Bader,
Riccardo Balin,
Daniel Balouek,
Sarah Beecroft,
Khalid Belhajjame,
Rajat Bhattarai
, et al. (86 additional authors not shown)
Abstract:
The Workflows Community Summit gathered 111 participants from 18 countries to discuss emerging trends and challenges in scientific workflows, focusing on six key areas: time-sensitive workflows, AI-HPC convergence, multi-facility workflows, heterogeneous HPC environments, user experience, and FAIR computational workflows. The integration of AI and exascale computing has revolutionized scientific w…
▽ More
The Workflows Community Summit gathered 111 participants from 18 countries to discuss emerging trends and challenges in scientific workflows, focusing on six key areas: time-sensitive workflows, AI-HPC convergence, multi-facility workflows, heterogeneous HPC environments, user experience, and FAIR computational workflows. The integration of AI and exascale computing has revolutionized scientific workflows, enabling higher-fidelity models and complex, time-sensitive processes, while introducing challenges in managing heterogeneous environments and multi-facility data dependencies. The rise of large language models is driving computational demands to zettaflop scales, necessitating modular, adaptable systems and cloud-service models to optimize resource utilization and ensure reproducibility. Multi-facility workflows present challenges in data movement, curation, and overcoming institutional silos, while diverse hardware architectures require integrating workflow considerations into early system design and developing standardized resource management tools. The summit emphasized improving user experience in workflow systems and ensuring FAIR workflows to enhance collaboration and accelerate scientific discovery. Key recommendations include developing standardized metrics for time-sensitive workflows, creating frameworks for cloud-HPC integration, implementing distributed-by-design workflow modeling, establishing multi-facility authentication protocols, and accelerating AI integration in HPC workflow management. The summit also called for comprehensive workflow benchmarks, workflow-specific UX principles, and a FAIR workflow maturity model, highlighting the need for continued collaboration in addressing the complex challenges posed by the convergence of AI, HPC, and multi-facility research environments.
△ Less
Submitted 18 October, 2024;
originally announced October 2024.
-
Applying the FAIR Principles to computational workflows
Authors:
Sean R. Wilkinson,
Meznah Aloqalaa,
Khalid Belhajjame,
Michael R. Crusoe,
Bruno de Paula Kinoshita,
Luiz Gadelha,
Daniel Garijo,
Ove Johan Ragnar Gustafsson,
Nick Juty,
Sehrish Kanwal,
Farah Zaib Khan,
Johannes Köster,
Karsten Peters-von Gehlen,
Line Pouchard,
Randy K. Rannow,
Stian Soiland-Reyes,
Nicola Soranzo,
Shoaib Sufi,
Ziheng Sun,
Baiba Vilne,
Merridee A. Wouters,
Denis Yuen,
Carole Goble
Abstract:
Recent trends within computational and data sciences show an increasing recognition and adoption of computational workflows as tools for productivity and reproducibility that also democratize access to platforms and processing know-how. As digital objects to be shared, discovered, and reused, computational workflows benefit from the FAIR principles, which stand for Findable, Accessible, Interopera…
▽ More
Recent trends within computational and data sciences show an increasing recognition and adoption of computational workflows as tools for productivity and reproducibility that also democratize access to platforms and processing know-how. As digital objects to be shared, discovered, and reused, computational workflows benefit from the FAIR principles, which stand for Findable, Accessible, Interoperable, and Reusable. The Workflows Community Initiative's FAIR Workflows Working Group (WCI-FW), a global and open community of researchers and developers working with computational workflows across disciplines and domains, has systematically addressed the application of both FAIR data and software principles to computational workflows. We present recommendations with commentary that reflects our discussions and justifies our choices and adaptations. These are offered to workflow users and authors, workflow management system developers, and providers of workflow services as guidelines for adoption and fodder for discussion. The FAIR recommendations for workflows that we propose in this paper will maximize their value as research assets and facilitate their adoption by the wider community.
△ Less
Submitted 24 February, 2025; v1 submitted 4 October, 2024;
originally announced October 2024.
-
Analytical model of space charge current for a cylindrical porous trap-limited dielectric
Authors:
Samra Kanwal,
Chun Yun Kee,
L. K. Ang
Abstract:
In this study, analytical models for space charge limited current (SCLC) transport in a porous (or disordered) trap-limited dielectric are derived for both planar and cylindrical configuration. By considering the porous solid as a fractional object characterized by a parameter a less than 1, we formulate its fractional capacitance and determine the SCLC transport by using the transit time approach…
▽ More
In this study, analytical models for space charge limited current (SCLC) transport in a porous (or disordered) trap-limited dielectric are derived for both planar and cylindrical configuration. By considering the porous solid as a fractional object characterized by a parameter a less than 1, we formulate its fractional capacitance and determine the SCLC transport by using the transit time approach. At a equal to 1, it will recover the well-known Mott Gurney (MG) law and Mark Helfrich (MH) law for trap-free and trap-limited cases, respectively. For cylindrical geometry, our findings show an analytical form that is not available from the traditional methods. We anticipate the proposed analytical model will serve as a useful tool for characterizing the current-voltage measurements in SCLC transport in dielectric breakdown and organic electronics, where spatial porosity of the materials is inevitable. The introduced fractional parameter a extracted from such characterization can facilitate the quantitative determination of the relationship between spatial porosity and charge mobility.
△ Less
Submitted 30 July, 2023;
originally announced July 2023.
-
Traffic Road Congestion System using by the internet of vehicles (IoV)
Authors:
Muhammad Shoaib Farooq,
Sawera Kanwal
Abstract:
Traffic problems have increased in modern life due to a huge number of vehicles, big cities, and ignoring the traffic rules. Vehicular ad hoc network (VANET) has improved the traffic system in previous some and plays a vital role in the best traffic control system in big cities. But due to some limitations, it is not enough to control some problems in specific conditions. Now a day invention of ne…
▽ More
Traffic problems have increased in modern life due to a huge number of vehicles, big cities, and ignoring the traffic rules. Vehicular ad hoc network (VANET) has improved the traffic system in previous some and plays a vital role in the best traffic control system in big cities. But due to some limitations, it is not enough to control some problems in specific conditions. Now a day invention of new technologies of the Internet of Things (IoT) is used for collaboratively and efficiently performing tasks. This technology was also introduced in the transportation system which makes it an intelligent transportation system (ITS), this is called the Internet of vehicles (IOV). We will elaborate on traffic problems in the traditional system and elaborate on the benefits, enhancements, and reasons to better IOV by Systematic Literature Review (SLR). This technique will be implemented by targeting needed papers through many search phrases. A systematic literature review is used for 121 articles between 2014 and 2023. The IoV technologies and tools are required to create the IoV and resolve some traffic rules through SUMO (simulation of urban mobility) which is used for the design and simulation the road traffic. We have tried to contribute to the best model of the traffic control system. This paper will analysis two vehicular congestion control models in term of select the optimized and efficient model and elaborate on the reasons for efficiency by searching the solution SLR based questions. Due to some efficient features, we have suggested the IOV based on vehicular clouds. These efficient features make this model the best and most effective than the traditional model which is a great reason to enhance the network system.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
Charmonium spectrum in an unquenched quark model
Authors:
Sadia Kanwal,
Faisal Akram,
Bilal Masud,
E. S. Swanson
Abstract:
The effects of virtual light quark pairs on the charmonium spectrum are studied. Pair creation is modelled with a ``$^{3}P_{0}$" vertex and intermediate states are summed up to 2S excitations. Quark model parameters are obtained by fitting to 12 well-known charmonium states, allowing for feedback between the decaying particle and the induced mass shifts. Both of these technical steps are new and i…
▽ More
The effects of virtual light quark pairs on the charmonium spectrum are studied. Pair creation is modelled with a ``$^{3}P_{0}$" vertex and intermediate states are summed up to 2S excitations. Quark model parameters are obtained by fitting to 12 well-known charmonium states, allowing for feedback between the decaying particle and the induced mass shifts. Both of these technical steps are new and improve agreement with the experimental spectrum. In general, the masses receive small shifts once model parameters are refit. This is true in almost cases except the $χ_{cJ}(2P)$ multiplet, which experiences upwards mass shifts of order 150 MeV, has the ordering of the multiplet rearranged, and pushes the erstwhile $c\bar{c}$ ${2}^3P_1$ state well above $D^*\bar{D}$ threshold--observations that clarify the nature of the enigmatic $X(3872)$
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Feature Selection Enhancement and Feature Space Visualization for Speech-Based Emotion Recognition
Authors:
Sofia Kanwal,
Sohail Asghar,
Hazrat Ali
Abstract:
Robust speech emotion recognition relies on the quality of the speech features. We present speech features enhancement strategy that improves speech emotion recognition. We used the INTERSPEECH 2010 challenge feature-set. We identified subsets from the features set and applied Principle Component Analysis to the subsets. Finally, the features are fused horizontally. The resulting feature set is an…
▽ More
Robust speech emotion recognition relies on the quality of the speech features. We present speech features enhancement strategy that improves speech emotion recognition. We used the INTERSPEECH 2010 challenge feature-set. We identified subsets from the features set and applied Principle Component Analysis to the subsets. Finally, the features are fused horizontally. The resulting feature set is analyzed using t-distributed neighbour embeddings (t-SNE) before the application of features for emotion recognition. The method is compared with the state-of-the-art methods used in the literature. The empirical evidence is drawn using two well-known datasets: Emotional Speech Dataset (EMO-DB) and Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS) for two languages, German and English, respectively. Our method achieved an average recognition gain of 11.5\% for six out of seven emotions for the EMO-DB dataset, and 13.8\% for seven out of eight emotions for the RAVDESS dataset as compared to the baseline study.
△ Less
Submitted 19 August, 2022;
originally announced August 2022.
-
A Survey on Image Aesthetic Assessment
Authors:
Abbas Anwar,
Saira Kanwal,
Muhammad Tahir,
Muhammad Saqib,
Muhammad Uzair,
Mohammad Khalid Imam Rahmani,
Habib Ullah
Abstract:
Automatic image aesthetics assessment is a computer vision problem dealing with categorizing images into different aesthetic levels. The categorization is usually done by analyzing an input image and computing some measure of the degree to which the image adheres to the fundamental principles of photography such as balance, rhythm, harmony, contrast, unity, look, feel, tone and texture. Due to its…
▽ More
Automatic image aesthetics assessment is a computer vision problem dealing with categorizing images into different aesthetic levels. The categorization is usually done by analyzing an input image and computing some measure of the degree to which the image adheres to the fundamental principles of photography such as balance, rhythm, harmony, contrast, unity, look, feel, tone and texture. Due to its diverse applications in many areas, automatic image aesthetic assessment has gained significant research attention in recent years. This article presents a review of the contemporary automatic image aesthetics assessment techniques. Many traditional hand-crafted and deep learning-based approaches are reviewed, and critical problem aspects are discussed, including why some features or models perform better than others and the limitations. A comparison of the quantitative results of different methods is also provided.
△ Less
Submitted 7 February, 2022; v1 submitted 22 March, 2021;
originally announced March 2021.
-
Defects-driven magnetism in bulk $α$-Li$ _{3}$N
Authors:
Saima Kanwal,
Gul Rahman
Abstract:
\textit{Ab-initio} calculations based on density functional theory with local spin density approximation are used to study defects-driven magnetism in bulk $α$-Li$ _{3}$N. Our calculations show that bulk Li$ _{3} $N is a non-magnetic semiconductor. Two types of Li vacancies (Li-I and Li-II) are considered, and Li-vacancies (either Li-I or Li-II type) can induce magnetism in Li$ _{3}$N with a total…
▽ More
\textit{Ab-initio} calculations based on density functional theory with local spin density approximation are used to study defects-driven magnetism in bulk $α$-Li$ _{3}$N. Our calculations show that bulk Li$ _{3} $N is a non-magnetic semiconductor. Two types of Li vacancies (Li-I and Li-II) are considered, and Li-vacancies (either Li-I or Li-II type) can induce magnetism in Li$ _{3}$N with a total magnetic moment of 1.0 $μ_{\rm B}$ which arises mainly due to partially occupied N-$p$-orbitals around the Li vacancies. The defect formation energies dictate that Li-II vacancy, which is in the Li$ _{2}$N plane, is thermodynamically more stable as compared with Li-I vacancy. The electronic structures of Li-vacancies show half-metallic behavior. On the other hand N-vacancy does not induce magnetism and has a larger formation energy than Li-vacancies. N vacancy derived bands at the Fermi energy are mainly contributed by the Li atoms. Carbon is also doped at Li-I and Li-II sites, and it is expected that doping C at Li-I site is thermodynamically more stable as compared with Li-II site. Carbon can induce metallicity with zero magnetic moment when doped at Li-I site, whereas magnetism is observed when Li-II site is occupied by the C impurity atom and C-driven magnetism is spread over the N atoms as well. Carbon can also induce half-metallic magnetism when doped at N site in Li$ _{3}$N, and has a smaller defect formation energy as compared with Li-II site doping. The ferromagnetic (FM) and antiferromagnetic (AFM) coupling between the C atoms is also investigated, and we conclude that FM state is more stable than the AFM state.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
Magnetic monolayer Li$_{2}$N: Density Functional Theory Calculations
Authors:
Gul Rahman,
Altaf Ur Rahman,
Saima Kanwal,
P. Kratzer
Abstract:
Density functional theory (DFT) calculations are used to investigate the electronic and magnetic structures of a two-dimensional (2D) monolayer Li$_{2}$N. It is shown that bulk Li$_{3}$N is a non-magnetic semiconductor. The non-spinpolarized DFT calculations show that $p$ electrons of N in 2D Li$_{2}$N form a narrow band at the Fermi energy $E_{\rm{F}}$ due to a low coordination number, and the de…
▽ More
Density functional theory (DFT) calculations are used to investigate the electronic and magnetic structures of a two-dimensional (2D) monolayer Li$_{2}$N. It is shown that bulk Li$_{3}$N is a non-magnetic semiconductor. The non-spinpolarized DFT calculations show that $p$ electrons of N in 2D Li$_{2}$N form a narrow band at the Fermi energy $E_{\rm{F}}$ due to a low coordination number, and the density of states at the Fermi energy ($g(E_{\rm{F}}$)) is increased as compared with bulk Li$_{3}$N. The large $g(E_{\rm{F}}$) shows instability towards magnetism in Stoner's mean field model. The spin-polarized calculations reveal that 2D Li$_{2}$N is magnetic without intrinsic or impurity defects. The magnetic moment of 1.0\,$μ_{\rm{B}}$ in 2D Li$_{2}$N is mainly contributed by the $p_{z}$ electrons of N, and the band structure shows half-metallic behavior. {Dynamic instability in planar Li$_{2}$N monolayer is observed, but a buckled Li$_{2}$N monolayer is found to be dynamically stable.} The ferromagnetic (FM) and antiferromagnetic (AFM) coupling between the N atoms is also investigated to access the exchange field strength. {We found that planar (buckled) 2D Li$_{2}$N is a ferromagnetic material with Curie temperature $T_{c}$ of 161 (572) K.}
△ Less
Submitted 12 October, 2017;
originally announced October 2017.
-
Comparing Information-Theoretic Measures of Complexity in Boltzmann Machines
Authors:
Maxinder S. Kanwal,
Joshua A. Grochow,
Nihat Ay
Abstract:
In the past three decades, many theoretical measures of complexity have been proposed to help understand complex systems. In this work, for the first time, we place these measures on a level playing field, to explore the qualitative similarities and differences between them, and their shortcomings. Specifically, using the Boltzmann machine architecture (a fully connected recurrent neural network)…
▽ More
In the past three decades, many theoretical measures of complexity have been proposed to help understand complex systems. In this work, for the first time, we place these measures on a level playing field, to explore the qualitative similarities and differences between them, and their shortcomings. Specifically, using the Boltzmann machine architecture (a fully connected recurrent neural network) with uniformly distributed weights as our model of study, we numerically measure how complexity changes as a function of network dynamics and network parameters. We apply an extension of one such information-theoretic measure of complexity to understand incremental Hebbian learning in Hopfield networks, a fully recurrent architecture model of autoassociative memory. In the course of Hebbian learning, the total information flow reflects a natural upward trend in complexity as the network attempts to learn more and more patterns.
△ Less
Submitted 29 July, 2017; v1 submitted 29 June, 2017;
originally announced June 2017.
-
A Closer Look at Memorization in Deep Networks
Authors:
Devansh Arpit,
Stanisław Jastrzębski,
Nicolas Ballas,
David Krueger,
Emmanuel Bengio,
Maxinder S. Kanwal,
Tegan Maharaj,
Asja Fischer,
Aaron Courville,
Yoshua Bengio,
Simon Lacoste-Julien
Abstract:
We examine the role of memorization in deep learning, drawing connections to capacity, generalization, and adversarial robustness. While deep networks are capable of memorizing noise data, our results suggest that they tend to prioritize learning simple patterns first. In our experiments, we expose qualitative differences in gradient-based optimization of deep neural networks (DNNs) on noise vs. r…
▽ More
We examine the role of memorization in deep learning, drawing connections to capacity, generalization, and adversarial robustness. While deep networks are capable of memorizing noise data, our results suggest that they tend to prioritize learning simple patterns first. In our experiments, we expose qualitative differences in gradient-based optimization of deep neural networks (DNNs) on noise vs. real data. We also demonstrate that for appropriately tuned explicit regularization (e.g., dropout) we can degrade DNN training performance on noise datasets without compromising generalization on real data. Our analysis suggests that the notions of effective capacity which are dataset independent are unlikely to explain the generalization performance of deep networks when trained with gradient based methods because training data itself plays an important role in determining the degree of memorization.
△ Less
Submitted 1 July, 2017; v1 submitted 16 June, 2017;
originally announced June 2017.
-
Proof of Luck: an Efficient Blockchain Consensus Protocol
Authors:
Mitar Milutinovic,
Warren He,
Howard Wu,
Maxinder Kanwal
Abstract:
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs. First, we show how using TEEs for existing proof of work schemes can make mining equitably distributed by preventing the use of ASICs. Next, we extend the design with proof of time and proof of ow…
▽ More
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs. First, we show how using TEEs for existing proof of work schemes can make mining equitably distributed by preventing the use of ASICs. Next, we extend the design with proof of time and proof of ownership consensus primitives to make mining energy- and time-efficient. Further improving on these designs, we present a blockchain using a proof of luck consensus protocol. Our proof of luck blockchain uses a TEE platform's random number generation to choose a consensus leader, which offers low-latency transaction validation, deterministic confirmation time, negligible energy consumption, and equitably distributed mining. Lastly, we discuss a potential protection against up to a constant number of compromised TEEs.
△ Less
Submitted 15 March, 2017;
originally announced March 2017.