-
3D Roadway Scene Object Detection with LIDARs in Snowfall Conditions
Authors:
Ghazal Farhani,
Taufiq Rahman,
Syed Mostaquim Ali,
Andrew Liu,
Mohamed Zaki,
Dominique Charlebois,
Benoit Anctil
Abstract:
Because 3D structure of a roadway environment can be characterized directly by a Light Detection and Ranging (LiDAR) sensors, they can be used to obtain exceptional situational awareness for assitive and autonomous driving systems. Although LiDARs demonstrate good performance in clean and clear weather conditions, their performance significantly deteriorates in adverse weather conditions such as t…
▽ More
Because 3D structure of a roadway environment can be characterized directly by a Light Detection and Ranging (LiDAR) sensors, they can be used to obtain exceptional situational awareness for assitive and autonomous driving systems. Although LiDARs demonstrate good performance in clean and clear weather conditions, their performance significantly deteriorates in adverse weather conditions such as those involving atmospheric precipitation. This may render perception capabilities of autonomous systems that use LiDAR data in learning based models to perform object detection and ranging ineffective. While efforts have been made to enhance the accuracy of these models, the extent of signal degradation under various weather conditions remains largely not quantified. In this study, we focus on the performance of an automotive grade LiDAR in snowy conditions in order to develop a physics-based model that examines failure modes of a LiDAR sensor. Specifically, we investigated how the LiDAR signal attenuates with different snowfall rates and how snow particles near the source serve as small but efficient reflectors. Utilizing our model, we transform data from clear conditions to simulate snowy scenarios, enabling a comparison of our synthetic data with actual snowy conditions. Furthermore, we employ this synthetic data, representative of different snowfall rates, to explore the impact on a pre-trained object detection model, assessing its performance under varying levels of snowfall
△ Less
Submitted 25 October, 2025;
originally announced October 2025.
-
A Comparative Study of Oscillatory Perturbations in Car-Following Models
Authors:
Oumaima Barhoumi,
Ghazal Farhani,
Taufiq Rahman,
Mohamed H. Zaki,
Sofiène Tahar
Abstract:
As connected and autonomous vehicles become more widespread, platooning has emerged as a key strategy to improve road capacity, reduce fuel consumption, and enhance traffic flow. However, the benefits of platoons strongly depend on their ability to maintain stability. Instability can lead to unsafe spacing and increased energy usage. In this work, we study platoon instability and analyze the root…
▽ More
As connected and autonomous vehicles become more widespread, platooning has emerged as a key strategy to improve road capacity, reduce fuel consumption, and enhance traffic flow. However, the benefits of platoons strongly depend on their ability to maintain stability. Instability can lead to unsafe spacing and increased energy usage. In this work, we study platoon instability and analyze the root cause of its occurrence, as well as its impacts on the following vehicle. To achieve this, we propose a comparative study between different car-following models such as the Intelligent Driver Model (IDM), the Optimal Velocity Model (OVM), the General Motors Model (GMM), and the Cooperative Adaptive Cruise Control (CACC). In our approach, we introduce a disruption in the model by varying the velocity of the leading vehicle to visualize the behavior of the following vehicles. To evaluate the dynamic response of each model, we introduce controlled perturbations in the velocity of the leading vehicle, specifically, sinusoidal oscillations and discrete velocity changes. The resulting vehicle trajectories and variations in inter-vehicle spacing are analyzed to assess the robustness of each model to disturbance propagation. The findings offer insight into model sensitivity, stability characteristics, and implications for designing resilient platooning control strategies.
△ Less
Submitted 16 October, 2025;
originally announced October 2025.
-
Enhanced Breakdown and RF Performance in Field-Plated AlGaN/GaN HEMT for High-Power Applications
Authors:
Tanjim Rahman,
Trupti Ranjan Lenka
Abstract:
High Electron Mobility Transistors (HEMTs) are most suitable for harsh environments as they operate reliably under extreme conditions such as high voltages, high temperatures, radiation exposure and corrosive atmospheres. In this article, gate field-plated engineering Al0.295GaN/GaN HEMT is proposed for achieving high breakdown voltage to reliably operate in harsh environments. The Al0.295GaN/GaN…
▽ More
High Electron Mobility Transistors (HEMTs) are most suitable for harsh environments as they operate reliably under extreme conditions such as high voltages, high temperatures, radiation exposure and corrosive atmospheres. In this article, gate field-plated engineering Al0.295GaN/GaN HEMT is proposed for achieving high breakdown voltage to reliably operate in harsh environments. The Al0.295GaN/GaN heterointerface results in a 2DEG (two-dimensional electron gas) density of the order of 1013 cm-2 obtained from the self-consistent solution of Schrödinger and Poisson equations. The device has undergone DC and breakdown simulations which result in threshold voltage of -5.5 V, drain saturation current of 3000 mA, and breakdown voltage of 1 kV. The HEMT also shows excellent RF characteristics which include cut-off frequency (ft) of 28 GHz and maximum frequency of oscillation (fmax) of 38 GHz. The proposed gate field-plated HEMT is stable up to 40 GHz and suitable for high-voltage and high-power RF operation during harsh environment applications.
△ Less
Submitted 10 October, 2025;
originally announced October 2025.
-
To Sink or Not to Sink: Visual Information Pathways in Large Vision-Language Models
Authors:
Jiayun Luo,
Wan-Cyuan Fan,
Lyuyang Wang,
Xiangteng He,
Tanzila Rahman,
Purang Abolmaesumi,
Leonid Sigal
Abstract:
Large Vision Language Models (LVLMs) have recently emerged as powerful architectures capable of understanding and reasoning over both visual and textual information. These models typically rely on two key components: a Vision Transformer (ViT) and a Large Language Model (LLM). ViT encodes visual content into a sequence of image tokens and serves as the perceptual front-end -- the eyes of the model…
▽ More
Large Vision Language Models (LVLMs) have recently emerged as powerful architectures capable of understanding and reasoning over both visual and textual information. These models typically rely on two key components: a Vision Transformer (ViT) and a Large Language Model (LLM). ViT encodes visual content into a sequence of image tokens and serves as the perceptual front-end -- the eyes of the model. In contrast, the LLM interprets these tokens to perform high-level reasoning, generates responses, and functions as the cognitive core -- the brain of the model. However, it remains unclear which visual tokens contribute most significantly to understanding and reasoning, and how effectively these signals are propagated from ViT to the LLM. While most existing works have focused on identifying attention sinks, low-semantic tokens receiving disproportionately high attention, within the LLM, we shift the focus to the vision encoder by identifying a class of high-norm visual tokens from ViT, referred to as ViT attention sinks -- a problem that has been rarely studied but is indeed very important for LVLMs. Our findings show that these ViT sinks encapsulate high-level semantic concepts from images, allowing the LLM to perform more effective understanding and reasoning. Despite their importance, these sink tokens are often overlooked in existing LVLM architectures. To explore their contribution, we present both qualitative and quantitative analyses of the information embedded in these sink tokens. We also propose both training-free and training-based approaches to better leverage how this information is interpreted by the LLM, and to what extent. By explicitly utilizing these tokens, we demonstrate substantial improvements across a range of LVLMs and visual reasoning tasks, highlighting the untapped potential of ViT attention sinks in enhancing visual reasoning.
△ Less
Submitted 9 October, 2025;
originally announced October 2025.
-
Learning to Condition: A Neural Heuristic for Scalable MPE Inference
Authors:
Brij Malhotra,
Shivvrat Arya,
Tahrima Rahman,
Vibhav Giridhar Gogate
Abstract:
We introduce learning to condition (L2C), a scalable, data-driven framework for accelerating Most Probable Explanation (MPE) inference in Probabilistic Graphical Models (PGMs), a fundamentally intractable problem. L2C trains a neural network to score variable-value assignments based on their utility for conditioning, given observed evidence. To facilitate supervised learning, we develop a scalable…
▽ More
We introduce learning to condition (L2C), a scalable, data-driven framework for accelerating Most Probable Explanation (MPE) inference in Probabilistic Graphical Models (PGMs), a fundamentally intractable problem. L2C trains a neural network to score variable-value assignments based on their utility for conditioning, given observed evidence. To facilitate supervised learning, we develop a scalable data generation pipeline that extracts training signals from the search traces of existing MPE solvers. The trained network serves as a heuristic that integrates with search algorithms, acting as a conditioning strategy prior to exact inference or as a branching and node selection policy within branch-and-bound solvers. We evaluate L2C on challenging MPE queries involving high-treewidth PGMs. Experiments show that our learned heuristic significantly reduces the search space while maintaining or improving solution quality over state-of-the-art methods.
△ Less
Submitted 22 September, 2025;
originally announced September 2025.
-
Bohr Phenomenon for $K$-quasiconformal Harmonic Mappings Involving One Parameter
Authors:
Molla Basir Ahamed,
Taimur Rahman
Abstract:
In this article, we study Bohr-type inequalities involving a parameter or convex combinations for $K$-quasiconformal, sense-preserving harmonic mappings in $\mathbb{D}$, where the analytic part is subordinate to a convex function. Moreover, we establish similar inequalities when the subordinating function is chosen from the class of concave univalent functions with pole $p$, as well as from the fa…
▽ More
In this article, we study Bohr-type inequalities involving a parameter or convex combinations for $K$-quasiconformal, sense-preserving harmonic mappings in $\mathbb{D}$, where the analytic part is subordinate to a convex function. Moreover, we establish similar inequalities when the subordinating function is chosen from the class of concave univalent functions with pole $p$, as well as from the family of concave univalent functions with opening angle $πα$. The results generalize several existing results.
△ Less
Submitted 10 September, 2025;
originally announced September 2025.
-
A Spin-Based Pathway to Testing the Quantum Nature of Gravity
Authors:
Sougato Bose,
Anupam Mazumdar,
Roger Penrose,
Ivette Fuentes,
Marko Toroš,
Ron Folman,
Gerard J. Milburn,
Myungshik Kim,
Adrian Kent,
A. T. M. Anishur Rahman,
Cyril Laplane,
Aaron Markowitz,
Debarshi Das,
Ethan Campos-Méndez,
Eva Kilian,
David Groswasser,
Menachem Givon,
Or Dobkowski,
Peter Skakunenko,
Maria Muretova,
Yonathan Japha,
Naor Levi,
Omer Feldman,
Damián Pitalúa-García,
Jonathan M. H. Gosling
, et al. (30 additional authors not shown)
Abstract:
A key open problem in physics is the correct way to combine gravity (described by general relativity) with everything else (described by quantum mechanics). This problem suggests that general relativity and possibly also quantum mechanics need fundamental corrections. Most physicists expect that gravity should be quantum in character, but gravity is fundamentally different to the other forces beca…
▽ More
A key open problem in physics is the correct way to combine gravity (described by general relativity) with everything else (described by quantum mechanics). This problem suggests that general relativity and possibly also quantum mechanics need fundamental corrections. Most physicists expect that gravity should be quantum in character, but gravity is fundamentally different to the other forces because it alone is described by spacetime geometry. Experiments are needed to test whether gravity, and hence space-time, is quantum or classical. We propose an experiment to test the quantum nature of gravity by checking whether gravity can entangle two micron-sized crystals. A pathway to this is to create macroscopic quantum superpositions of each crystal first using embedded spins and Stern-Gerlach forces. These crystals could be nanodiamonds containing nitrogen-vacancy (NV) centres. The spins can subsequently be measured to witness the gravitationally generated entanglement. This is based on extensive theoretical feasibility studies and experimental progress in quantum technology. The eventual experiment will require a medium-sized consortium with excellent suppression of decoherence including vibrations and gravitational noise. In this white paper, we review the progress and plans towards realizing this. While implementing these plans, we will further explore the most macroscopic superpositions that are possible, which will test theories that predict a limit to this.
△ Less
Submitted 1 September, 2025;
originally announced September 2025.
-
Weather-Dependent Variations in Driver Gaze Behavior: A Case Study in Rainy Conditions
Authors:
Ghazal Farhani,
Taufiq Rahman,
Dominique Charlebois
Abstract:
Rainy weather significantly increases the risk of road accidents due to reduced visibility and vehicle traction. Understanding how experienced drivers adapt their visual perception through gaze behavior under such conditions is critical for designing robust driver monitoring systems (DMS) and for informing advanced driver assistance systems (ADAS). This case study investigates the eye gaze behavio…
▽ More
Rainy weather significantly increases the risk of road accidents due to reduced visibility and vehicle traction. Understanding how experienced drivers adapt their visual perception through gaze behavior under such conditions is critical for designing robust driver monitoring systems (DMS) and for informing advanced driver assistance systems (ADAS). This case study investigates the eye gaze behavior of a driver operating the same highway route under both clear and rainy conditions. To this end, gaze behavior was analyzed by a two-step clustering approach: first, clustering gaze points within 10-second intervals, and then aggregating cluster centroids into meta-clusters. This, along with Markov transition matrices and metrics such as fixation duration, gaze elevation, and azimuth distributions, reveals meaningful behavioral shifts. While the overall gaze behavior focused on the road with occasional mirror checks remains consistent, rainy conditions lead to more frequent dashboard glances, longer fixation durations, and higher gaze elevation, indicating increased cognitive focus. These findings offer valuable insight into visual attention patterns under adverse conditions and highlight the potential of leveraging gaze modeling to aid in the design of more robust ADAS and DMS.
△ Less
Submitted 31 August, 2025;
originally announced September 2025.
-
From Coverage to Consequences: BMI, Health Behaviors, and Self-rated Health After Medicaid Contraction
Authors:
Md Twfiqur Rahman
Abstract:
Leveraging Tennessee's 2005 Medicaid contraction, I study the impact of losing public health insurance on body weight and relevant health behaviors. Using Behavioral Risk Factor Surveillance System (BRFSS) data from 1997 to 2010, I estimate synthetic difference-in-differences models. The estimates suggest that the reform increased Body Mass Index by 0.38 points and the overweight or obesity preval…
▽ More
Leveraging Tennessee's 2005 Medicaid contraction, I study the impact of losing public health insurance on body weight and relevant health behaviors. Using Behavioral Risk Factor Surveillance System (BRFSS) data from 1997 to 2010, I estimate synthetic difference-in-differences models. The estimates suggest that the reform increased Body Mass Index by 0.38 points and the overweight or obesity prevalence (BMI$\geq$25) by $\sim$4\% among Tennessean childless adults. My findings -- a 21\% increase in the share of childless adults reporting ``poor'' health status (the lowest level on the five-point scale), a reduction in Medicaid-reimbursed utilization of pain and anti-inflammatory medications, and a reduction in participation in moderate physical activities -- suggest that worsening unmanaged health conditions may be a key pathway through which coverage loss affected weight gain. Additionally, my analysis offers practical guidance for conducting robust inference in single treated cluster settings with limited pre-treatment data.
△ Less
Submitted 26 August, 2025;
originally announced August 2025.
-
Compressed Learning for Nanosurface Deficiency Recognition Using Angle-resolved Scatterometry Data
Authors:
Mehdi Abdollahpour,
Carsten Bockelmann,
Tajim Md Hasibur Rahman,
Armin Dekorsy,
Andreas Fischer
Abstract:
Nanoscale manufacturing requires high-precision surface inspection to guarantee the quality of the produced nanostructures. For production environments, angle-resolved scatterometry offers a non- invasive and in-line compatible alternative to traditional surface inspection methods, such as scanning electron microscopy. However, angle-resolved scatterometry currently suffers from long data acquisit…
▽ More
Nanoscale manufacturing requires high-precision surface inspection to guarantee the quality of the produced nanostructures. For production environments, angle-resolved scatterometry offers a non- invasive and in-line compatible alternative to traditional surface inspection methods, such as scanning electron microscopy. However, angle-resolved scatterometry currently suffers from long data acquisition time. Our study addresses the issue of slow data acquisition by proposing a compressed learning framework for the accurate recognition of nanosurface deficiencies using angle-resolved scatterometry data. The framework uses the particle swarm optimization algorithm with a sampling scheme customized for scattering patterns. This combination allows the identification of optimal sampling points in scatterometry data that maximize the detection accuracy of five different levels of deficiency in ZnO nanosurfaces. The proposed method significantly reduces the amount of sampled data while maintaining a high accuracy in deficiency detection, even in noisy environments. Notably, by sampling only 1% of the data, the method achieves an accuracy of over 86%, which further improves to 94% when the sampling rate is increased to 6%. These results demonstrate a favorable balance between data reduction and classification performance. The obtained results also show that the compressed learning framework effectively identifies critical sampling areas.
△ Less
Submitted 25 August, 2025;
originally announced August 2025.
-
Fuel Consumption in Platoons: A Literature Review
Authors:
Oumaima Barhoumi,
Ghazal Farhani,
Taufiq Rahman,
Mohamed H. Zaki,
Sofiène Tahar,
Fadi Araji
Abstract:
Platooning has emerged as a promising strategy for improving fuel efficiency in automated vehicle systems, with significant implications for reducing emissions and operational costs. While existing literature on vehicle platooning primarily focuses on individual aspects such as aerodynamic drag reduction or specific control strategies, this work takes a more comprehensive approach by bringing toge…
▽ More
Platooning has emerged as a promising strategy for improving fuel efficiency in automated vehicle systems, with significant implications for reducing emissions and operational costs. While existing literature on vehicle platooning primarily focuses on individual aspects such as aerodynamic drag reduction or specific control strategies, this work takes a more comprehensive approach by bringing together a wide range of factors and components that contribute to fuel savings in platoons. In this literature review, we examine the impact of platooning on fuel consumption, highlighting the key components of platoon systems, the factors and actors influencing fuel savings, methods for estimating fuel use, and the effect of platoon instability on efficiency. Furthermore, we study the role of reduced aerodynamic drag, vehicle coordination, and the challenges posed by instability in real-world conditions. By compiling insights from recent studies, this work provides a comprehensive overview of the latest advancements in platooning technologies and highlights both the challenges and opportunities for future research to maximize fuel savings in real-world scenarios.
△ Less
Submitted 14 August, 2025;
originally announced August 2025.
-
Deep Learning-Based Analysis of Power Consumption in Gasoline, Electric, and Hybrid Vehicles
Authors:
Roksana Yahyaabadi,
Ghazal Farhani,
Taufiq Rahman,
Soodeh Nikan,
Abdullah Jirjees,
Fadi Araji
Abstract:
Accurate power consumption prediction is crucial for improving efficiency and reducing environmental impact, yet traditional methods relying on specialized instruments or rigid physical models are impractical for large-scale, real-world deployment. This study introduces a scalable data-driven method using powertrain dynamic feature sets and both traditional machine learning and deep neural network…
▽ More
Accurate power consumption prediction is crucial for improving efficiency and reducing environmental impact, yet traditional methods relying on specialized instruments or rigid physical models are impractical for large-scale, real-world deployment. This study introduces a scalable data-driven method using powertrain dynamic feature sets and both traditional machine learning and deep neural networks to estimate instantaneous and cumulative power consumption in internal combustion engine (ICE), electric vehicle (EV), and hybrid electric vehicle (HEV) platforms. ICE models achieved high instantaneous accuracy with mean absolute error and root mean squared error on the order of $10^{-3}$, and cumulative errors under 3%. Transformer and long short-term memory models performed best for EVs and HEVs, with cumulative errors below 4.1% and 2.1%, respectively. Results confirm the approach's effectiveness across vehicles and models. Uncertainty analysis revealed greater variability in EV and HEV datasets than ICE, due to complex power management, emphasizing the need for robust models for advanced powertrains.
△ Less
Submitted 11 August, 2025;
originally announced August 2025.
-
AeroSafe: Mobile Indoor Air Purification using Aerosol Residence Time Analysis and Robotic Cough Emulator Testbed
Authors:
M Tanjid Hasan Tonmoy,
Rahath Malladi,
Kaustubh Singh,
Forsad Al Hossain,
Rajesh Gupta,
Andrés E. Tejada-Martínez,
Tauhidur Rahman
Abstract:
Indoor air quality plays an essential role in the safety and well-being of occupants, especially in the context of airborne diseases. This paper introduces AeroSafe, a novel approach aimed at enhancing the efficacy of indoor air purification systems through a robotic cough emulator testbed and a digital-twins-based aerosol residence time analysis. Current portable air filters often overlook the co…
▽ More
Indoor air quality plays an essential role in the safety and well-being of occupants, especially in the context of airborne diseases. This paper introduces AeroSafe, a novel approach aimed at enhancing the efficacy of indoor air purification systems through a robotic cough emulator testbed and a digital-twins-based aerosol residence time analysis. Current portable air filters often overlook the concentrations of respiratory aerosols generated by coughs, posing a risk, particularly in high-exposure environments like healthcare facilities and public spaces. To address this gap, we present a robotic dual-agent physical emulator comprising a maneuverable mannequin simulating cough events and a portable air purifier autonomously responding to aerosols. The generated data from this emulator trains a digital twins model, combining a physics-based compartment model with a machine learning approach, using Long Short-Term Memory (LSTM) networks and graph convolution layers. Experimental results demonstrate the model's ability to predict aerosol concentration dynamics with a mean residence time prediction error within 35 seconds. The proposed system's real-time intervention strategies outperform static air filter placement, showcasing its potential in mitigating airborne pathogen risks.
△ Less
Submitted 4 August, 2025;
originally announced August 2025.
-
Bohr inequality and Bohr-Rogosinski inequality for $K$-Quasiconformal harmonic mappings
Authors:
Molla Basir Ahamed,
Taimur Rahman
Abstract:
In this paper, we prove several sharp Bohr-type and Bohr-Rogosinski-type inequalities for $K$-quasiconformal, sense-preserving harmonic mappings on $\mathbb{D}$, whose analytic part is subordinate to a function belonging to the class of concave univalent functions on $\mathbb{D}$. In addition, we derive Bohr-type inequalities for $K$-quasiconformal, sense-preserving harmonic mappings on…
▽ More
In this paper, we prove several sharp Bohr-type and Bohr-Rogosinski-type inequalities for $K$-quasiconformal, sense-preserving harmonic mappings on $\mathbb{D}$, whose analytic part is subordinate to a function belonging to the class of concave univalent functions on $\mathbb{D}$. In addition, we derive Bohr-type inequalities for $K$-quasiconformal, sense-preserving harmonic mappings on $\mathbb{D}$, where the analytic part is subordinate to a function from the Ma-Minda class of convex and starlike functions. The results generalize several existing results.
△ Less
Submitted 21 July, 2025;
originally announced August 2025.
-
VerilogDB: The Largest, Highest-Quality Dataset with a Preprocessing Framework for LLM-based RTL Generation
Authors:
Paul E. Calzada,
Zahin Ibnat,
Tanvir Rahman,
Kamal Kandula,
Danyu Lu,
Sujan Kumar Saha,
Farimah Farahmandi,
Mark Tehranipoor
Abstract:
Large Language Models (LLMs) are gaining popularity for hardware design automation, particularly through Register Transfer Level (RTL) code generation. In this work, we examine the current literature on RTL generation using LLMs and identify key requirements for training and fine-tuning datasets. We construct a robust Verilog dataset through an automated three-pronged process involving database (D…
▽ More
Large Language Models (LLMs) are gaining popularity for hardware design automation, particularly through Register Transfer Level (RTL) code generation. In this work, we examine the current literature on RTL generation using LLMs and identify key requirements for training and fine-tuning datasets. We construct a robust Verilog dataset through an automated three-pronged process involving database (DB) creation and management with PostgreSQL, data collection from code hosting sites like OpenCores and GitHub, and data preprocessing to verify the codes' syntax, run logic synthesis, and extract relevant module metadata. We implement a scalable and efficient DB infrastructure to support analysis and detail our preprocessing pipeline to enforce high-quality data before DB insertion. The resulting dataset comprises 20,392 Verilog samples, 751 MB of Verilog code data, which is the largest high-quality Verilog dataset for LLM fine-tuning to our knowledge. We further evaluate the dataset, address associated challenges, and explore potential applications for future research and development in LLM-based hardware generation.
△ Less
Submitted 9 July, 2025;
originally announced July 2025.
-
Mobility Extraction and Analysis of GaN HEMTs for RF Applications Using TCAD and Experimental Data
Authors:
Tanjim Rahman
Abstract:
This paper presents an analysis of GaN high-electron-mobility transistors (HEMTs) using both TCAD simulation and experimental characterization. The energy band structure was studied using Nextnano simulation software to observe two-dimensional electron gas (2DEG) formation and carrier confinement under equilibrium conditions. Additionally, I-V and C-V data from fabricated research-grade GaN HEMTs…
▽ More
This paper presents an analysis of GaN high-electron-mobility transistors (HEMTs) using both TCAD simulation and experimental characterization. The energy band structure was studied using Nextnano simulation software to observe two-dimensional electron gas (2DEG) formation and carrier confinement under equilibrium conditions. Additionally, I-V and C-V data from fabricated research-grade GaN HEMTs were analyzed to extract key electrical parameters. The device demonstrated an ON current of 1.9 mA and an OFF current of 0.01 mA, indicating a strong ON/OFF current ratio. A subthreshold swing of 80 mV/decade and a DIBL of 5 mV/V were observed, confirming good gate control and short-channel suppression. The ON-resistance was 22.72 ohm per micron, with a saturation voltage of 1 V . The peak transconductance was extracted as 0.18 mS in the linear region and 0.5 mS in saturation. Field-effect mobility was calculated using the transconductance method, with a maximum value of approximately 1200 cm2/V.s at low drain bias. The combined simulation and experimental approach provided comprehensive insight into GaN HEMT behavior, enabling a deeper understanding of structure-performance relationships critical to advanced transistor design.
△ Less
Submitted 15 July, 2025;
originally announced July 2025.
-
Arbiter PUF: Uniqueness and Reliability Analysis Using Hybrid CMOS-Stanford Memristor Model
Authors:
Tanvir Rahman,
A. B. M. Harun-ur Rashid
Abstract:
In an increasingly interconnected world, protecting electronic devices has grown more crucial because of the dangers of data extraction, reverse engineering, and hardware tampering. Producing chips in a third-party manufacturing company can let hackers change the design. As the Internet of Things (IoT) proliferates, physical attacks happen more, and conventional cryptography techniques do not func…
▽ More
In an increasingly interconnected world, protecting electronic devices has grown more crucial because of the dangers of data extraction, reverse engineering, and hardware tampering. Producing chips in a third-party manufacturing company can let hackers change the design. As the Internet of Things (IoT) proliferates, physical attacks happen more, and conventional cryptography techniques do not function well. In this paper, we investigate the design and assessment of PUFs using the Stanford Memristor Model, utilizing its random filament evolution to improve security. The system was built using 45nm CMOS technology. A comparison is made between CMOS-based and memristor-based Arbiter PUFs, evaluating their performance under temperature, voltage, and process variations. Intra- and inter-hamming distances are employed by Monte Carlo simulations to estimate uniqueness and reliability. The results show that memristor-based PUFs offer better reliability than CMOS-based designs, though uniqueness needs further improvement. Furthermore, this study sheds light on the reasonableness of memristor-based PUFs for secure applications in hardware security.
△ Less
Submitted 6 July, 2025;
originally announced July 2025.
-
Exploring Adversarial Watermarking in Transformer-Based Models: Transferability and Robustness Against Defense Mechanism for Medical Images
Authors:
Rifat Sadik,
Tanvir Rahman,
Arpan Bhattacharjee,
Bikash Chandra Halder,
Ismail Hossain
Abstract:
Deep learning models have shown remarkable success in dermatological image analysis, offering potential for automated skin disease diagnosis. Previously, convolutional neural network(CNN) based architectures have achieved immense popularity and success in computer vision (CV) based task like skin image recognition, generation and video analysis. But with the emergence of transformer based models,…
▽ More
Deep learning models have shown remarkable success in dermatological image analysis, offering potential for automated skin disease diagnosis. Previously, convolutional neural network(CNN) based architectures have achieved immense popularity and success in computer vision (CV) based task like skin image recognition, generation and video analysis. But with the emergence of transformer based models, CV tasks are now are nowadays carrying out using these models. Vision Transformers (ViTs) is such a transformer-based models that have shown success in computer vision. It uses self-attention mechanisms to achieve state-of-the-art performance across various tasks. However, their reliance on global attention mechanisms makes them susceptible to adversarial perturbations. This paper aims to investigate the susceptibility of ViTs for medical images to adversarial watermarking-a method that adds so-called imperceptible perturbations in order to fool models. By generating adversarial watermarks through Projected Gradient Descent (PGD), we examine the transferability of such attacks to CNNs and analyze the performance defense mechanism -- adversarial training. Results indicate that while performance is not compromised for clean images, ViTs certainly become much more vulnerable to adversarial attacks: an accuracy drop of as low as 27.6%. Nevertheless, adversarial training raises it up to 90.0%.
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
A Training Framework for Optimal and Stable Training of Polynomial Neural Networks
Authors:
Forsad Al Hossain,
Tauhidur Rahman
Abstract:
By replacing standard non-linearities with polynomial activations, Polynomial Neural Networks (PNNs) are pivotal for applications such as privacy-preserving inference via Homomorphic Encryption (HE). However, training PNNs effectively presents a significant challenge: low-degree polynomials can limit model expressivity, while higher-degree polynomials, crucial for capturing complex functions, ofte…
▽ More
By replacing standard non-linearities with polynomial activations, Polynomial Neural Networks (PNNs) are pivotal for applications such as privacy-preserving inference via Homomorphic Encryption (HE). However, training PNNs effectively presents a significant challenge: low-degree polynomials can limit model expressivity, while higher-degree polynomials, crucial for capturing complex functions, often suffer from numerical instability and gradient explosion. We introduce a robust and versatile training framework featuring two synergistic innovations: 1) a novel Boundary Loss that exponentially penalizes activation inputs outside a predefined stable range, and 2) Selective Gradient Clipping that effectively tames gradient magnitudes while preserving essential Batch Normalization statistics. We demonstrate our framework's broad efficacy by training PNNs within deep architectures composed of HE-compatible layers (e.g., linear layers, average pooling, batch normalization, as used in ResNet variants) across diverse image, audio, and human activity recognition datasets. These models consistently achieve high accuracy with low-degree polynomial activations (such as degree 2) and, critically, exhibit stable training and strong performance with polynomial degrees up to 22, where standard methods typically fail or suffer severe degradation. Furthermore, the performance of these PNNs achieves a remarkable parity, closely approaching that of their original ReLU-based counterparts. Extensive ablation studies validate the contributions of our techniques and guide hyperparameter selection. We confirm the HE-compatibility of the trained models, advancing the practical deployment of accurate, stable, and secure deep learning inference.
△ Less
Submitted 16 May, 2025;
originally announced May 2025.
-
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Authors:
Md Farhan Tasnim Oshim,
Nigel Doering,
Bashima Islam,
Tsui-Wei Weng,
Tauhidur Rahman
Abstract:
Recent advancements in Ultra-Wideband (UWB) radar technology have enabled contactless, non-line-of-sight vital sign monitoring, making it a valuable tool for healthcare. However, UWB radar's ability to capture sensitive physiological data, even through walls, raises significant privacy concerns, particularly in human-robot interactions and autonomous systems that rely on radar for sensing human pr…
▽ More
Recent advancements in Ultra-Wideband (UWB) radar technology have enabled contactless, non-line-of-sight vital sign monitoring, making it a valuable tool for healthcare. However, UWB radar's ability to capture sensitive physiological data, even through walls, raises significant privacy concerns, particularly in human-robot interactions and autonomous systems that rely on radar for sensing human presence and physiological functions. In this paper, we present Anti-Sensing, a novel defense mechanism designed to prevent unauthorized radar-based sensing. Our approach introduces physically realizable perturbations, such as oscillatory motion from wearable devices, to disrupt radar sensing by mimicking natural cardiac motion, thereby misleading heart rate (HR) estimations. We develop a gradient-based algorithm to optimize the frequency and spatial amplitude of these oscillations for maximal disruption while ensuring physiological plausibility. Through both simulations and real-world experiments with radar data and neural network-based HR sensing models, we demonstrate the effectiveness of Anti-Sensing in significantly degrading model accuracy, offering a practical solution for privacy preservation.
△ Less
Submitted 16 May, 2025;
originally announced May 2025.
-
Unraveling spin entanglement using quantum gates with scanning tunneling microscopy-driven electron spin resonance
Authors:
Eric D. Switzer,
Jose Reina-Gálvez,
Géza Giedke,
Talat S. Rahman,
Christoph Wolf,
Deung-Jang Choi,
Nicolás Lorente
Abstract:
Quantum entanglement is a fundamental resource for quantum information processing, and its controlled generation and detection remain key challenges in scalable quantum architectures. Here, we numerically demonstrate the deterministic generation of entangled spin states in a solid-state platform by implementing quantum gates via electron spin resonance combined with scanning tunneling microscopy (…
▽ More
Quantum entanglement is a fundamental resource for quantum information processing, and its controlled generation and detection remain key challenges in scalable quantum architectures. Here, we numerically demonstrate the deterministic generation of entangled spin states in a solid-state platform by implementing quantum gates via electron spin resonance combined with scanning tunneling microscopy (ESR-STM). Using two titanium atoms on a MgO/Ag(100) substrate as a model, we construct a two-qubit system whose dynamics are coherently manipulated through tailored microwave pulse sequences. We generate Bell states by implementing a Hadamard gate followed by a controlled-NOT gate, and evaluate its fidelity and concurrence using the quantum-master equation-based code TimeESR. Our results demonstrate that ESR-STM can create entangled states with significant fidelity. This study paves the way for the realization of atom-based quantum circuits and highlights ESR-STM as a powerful tool for probing and engineering entangled states on surfaces.
△ Less
Submitted 14 May, 2025;
originally announced May 2025.
-
TS-Detector : Detecting Feature Toggle Usage Patterns
Authors:
Tajmilur Rahman,
Mengzhe Fei,
Tushar Sharma,
Chanchal Roy
Abstract:
Feature toggles enable developers to control feature states, allowing the features to be released to a limited group of users while preserving overall software functionality. The absence of comprehensive best practices for feature toggle usage often results in improper implementation, causing code quality issues. Although certain feature toggle usage patterns are prone to toggle smells, there is n…
▽ More
Feature toggles enable developers to control feature states, allowing the features to be released to a limited group of users while preserving overall software functionality. The absence of comprehensive best practices for feature toggle usage often results in improper implementation, causing code quality issues. Although certain feature toggle usage patterns are prone to toggle smells, there is no tool as of today for software engineers to detect toggle usage patterns from the source code. This paper presents a tool TS-Detector to detect five different toggle usage patterns across ten open-source software projects in six different programming languages. We conducted a manual evaluation and results show that the true positive rates of detecting Spread, Nested, and Dead toggles are 80%, 86.4%, and 66.6% respectively, and the true negative rate of Mixed and Enum usages was 100%. The tool can be downloaded from its GitHub repository and can be used following the instructions provided there.
△ Less
Submitted 8 May, 2025;
originally announced May 2025.
-
An Empirical Study on Common Defects in Modern Web Browsers Using Knowledge Embedding in GPT-4o
Authors:
Rahul Singh,
Yousuf Sultan,
Tajmilur Rahman,
Sri Vidya Puttareddygari
Abstract:
Technology is advancing at an unprecedented pace. With the advent of cutting-edge technologies, keeping up with rapid changes are becoming increasingly challenging. In addition to that, increasing dependencies on the cloud technologies have imposed enormous pressure on modern web browsers leading to adapting new technologies faster and making them more susceptible to defects/bugs. Although, many s…
▽ More
Technology is advancing at an unprecedented pace. With the advent of cutting-edge technologies, keeping up with rapid changes are becoming increasingly challenging. In addition to that, increasing dependencies on the cloud technologies have imposed enormous pressure on modern web browsers leading to adapting new technologies faster and making them more susceptible to defects/bugs. Although, many studies have explored browser bugs, a comparative study among the modern browsers generalizing the bug categories and their nature was still lacking. To fill this gap, we undertook an empirical investigation aimed at gaining insights into the prevalent bugs in Google Chromium and Mozilla Firefox as the representatives of modern web browsers. We used GPT-4.o to identify the defect (bugs) categories and analyze the clusters of the most commonly appeared bugs in the two prominent web browsers. Additionally, we compared our LLM based bug categorization with the traditional NLP based approach using TF-IDF and K-Means clustering. We found that although Google Chromium and Firefox have evolved together since almost around the same time (2006-2008), Firefox suffers from high number of bugs having extremely high defect-prone components compared to Chromium. This exploratory study offers valuable insights on the browser bugs and defect-prone components to the developers, enabling them to craft web browsers and web-applications with enhanced resilience and reduced errors.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
Dynamic Tsetlin Machine Accelerators for On-Chip Training at the Edge using FPGAs
Authors:
Gang Mao,
Tousif Rahman,
Sidharth Maheshwari,
Bob Pattison,
Zhuang Shao,
Rishad Shafik,
Alex Yakovlev
Abstract:
The increased demand for data privacy and security in machine learning (ML) applications has put impetus on effective edge training on Internet-of-Things (IoT) nodes. Edge training aims to leverage speed, energy efficiency and adaptability within the resource constraints of the nodes. Deploying and training Deep Neural Networks (DNNs)-based models at the edge, although accurate, posit significant…
▽ More
The increased demand for data privacy and security in machine learning (ML) applications has put impetus on effective edge training on Internet-of-Things (IoT) nodes. Edge training aims to leverage speed, energy efficiency and adaptability within the resource constraints of the nodes. Deploying and training Deep Neural Networks (DNNs)-based models at the edge, although accurate, posit significant challenges from the back-propagation algorithm's complexity, bit precision trade-offs, and heterogeneity of DNN layers. This paper presents a Dynamic Tsetlin Machine (DTM) training accelerator as an alternative to DNN implementations. DTM utilizes logic-based on-chip inference with finite-state automata-driven learning within the same Field Programmable Gate Array (FPGA) package. Underpinned on the Vanilla and Coalesced Tsetlin Machine algorithms, the dynamic aspect of the accelerator design allows for a run-time reconfiguration targeting different datasets, model architectures, and model sizes without resynthesis. This makes the DTM suitable for targeting multivariate sensor-based edge tasks. Compared to DNNs, DTM trains with fewer multiply-accumulates, devoid of derivative computation. It is a data-centric ML algorithm that learns by aligning Tsetlin automata with input data to form logical propositions enabling efficient Look-up-Table (LUT) mapping and frugal Block RAM usage in FPGA training implementations. The proposed accelerator offers 2.54x more Giga operations per second per Watt (GOP/s per W) and uses 6x less power than the next-best comparable design.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
Quantum-assured magnetic navigation achieves positioning accuracy better than a strategic-grade INS in airborne and ground-based field trials
Authors:
Murat Muradoglu,
Mattias T. Johnsson,
Nathanial M. Wilson,
Yuval Cohen,
Dongki Shin,
Tomas Navickas,
Tadas Pyragius,
Divya Thomas,
Daniel Thompson,
Steven I. Moore,
Md Tanvir Rahman,
Adrian Walker,
Indranil Dutta,
Suraj Bijjahalli,
Jacob Berlocher,
Michael R. Hush,
Russell P. Anderson,
Stuart S. Szigeti,
Michael J. Biercuk
Abstract:
Modern navigation systems rely critically on GNSS, which in many cases is unavailable or unreliable (e.g. due to jamming or spoofing). For this reason there is great interest in augmenting backup navigation systems such as inertial navigation systems (INS) with additional modalities that reduce positioning error in the absence of reliable GNSS. Magnetic-anomaly navigation is one such approach, pro…
▽ More
Modern navigation systems rely critically on GNSS, which in many cases is unavailable or unreliable (e.g. due to jamming or spoofing). For this reason there is great interest in augmenting backup navigation systems such as inertial navigation systems (INS) with additional modalities that reduce positioning error in the absence of reliable GNSS. Magnetic-anomaly navigation is one such approach, providing passive, non-jammable navigation through periodic position fixes obtained by comparing local measurements of Earth's crustal field against known anomaly maps. Despite its potential, existing MagNav efforts have been limited by magnetometer performance and platform noise; solutions addressing these problems have proven either too brittle or impractical for realistic deployment. Here we demonstrate a quantum-assured MagNav solution based on proprietary quantum magnetometers with by a novel denoising and map-matching algorithms. The system fits on fixed-wing drones or in the avionics bay of a commercial airliner. We present trials at altitudes up to 19000 feet, testing onboard and outboard quantum magnetometers comparing against a strategic-grade INS. Our MagNav solution achieves superior performance, delivering up to 46x better positioning error than the velocity-aided INS; the best final positioning accuracy we achieve is 22m or 0.006% of the flight distance. Airborne trials consistently achieve at least 11x advantage over the INS across varying conditions, altitudes, and flight patterns. The system learns model parameters online without special vehicle maneuvers providing robustness to various configuration changes (e.g. changing payload or latitude). Our trials also include the first successful MagNav performed in a ground vehicle using publicly-available anomaly maps, delivering bounded positioning error 7x lower than the INS, with both systems in strapdown configuration.
△ Less
Submitted 10 April, 2025;
originally announced April 2025.
-
ACE-RLHF: Automated Code Evaluation and Socratic Feedback Generation Tool using Large Language Models and Reinforcement Learning with Human Feedback
Authors:
Tasnia Rahman,
Sathish A. P. Kumar,
Sumit Jha,
Arvind Ramanathan
Abstract:
Automated Program Repair tools are developed for generating feedback and suggesting a repair method for erroneous code. State of the art (SOTA) code repair methods rely on data-driven approaches and often fail to deliver solution for complicated programming questions. To interpret the natural language of unprecedented programming problems, using Large Language Models (LLMs) for code-feedback gener…
▽ More
Automated Program Repair tools are developed for generating feedback and suggesting a repair method for erroneous code. State of the art (SOTA) code repair methods rely on data-driven approaches and often fail to deliver solution for complicated programming questions. To interpret the natural language of unprecedented programming problems, using Large Language Models (LLMs) for code-feedback generation is crucial. LLMs generate more comprehensible feedback than compiler-generated error messages, and Reinforcement Learning with Human Feedback (RLHF) further enhances quality by integrating human-in-the-loop which helps novice students to lean programming from scratch interactively. We are applying RLHF fine-tuning technique for an expected Socratic response such as a question with hint to solve the programming issue. We are proposing code feedback generation tool by fine-tuning LLM with RLHF, Automated Code Evaluation with RLHF (ACE-RLHF), combining two open-source LLM models with two different SOTA optimization techniques. The quality of feedback is evaluated on two benchmark datasets containing basic and competition-level programming questions where the later is proposed by us. We achieved 2-5% higher accuracy than RL-free SOTA techniques using Llama-3-7B-Proximal-policy optimization in automated evaluation and similar or slightly higher accuracy compared to reward model-free RL with AI Feedback (RLAIF). We achieved almost 40% higher accuracy with GPT-3.5 Best-of-n optimization while performing manual evaluation.
△ Less
Submitted 6 April, 2025;
originally announced April 2025.
-
Unveiling Coverage Dependent Interactions of N-Methylaniline with the Pt(111) Surface
Authors:
Bushra Ashraf,
Nils Brinkmann,
Dave Austin,
Duy Le,
Katharina Al Shamery,
Talat S. Rahman
Abstract:
This study aims to elucidate the adsorption and surface chemistry of N-methylaniline (NMA) on Pt(111), using it as a model molecule to probe the activation mechanisms of aromatic amines on catalytic surfaces. Through a combination of density functional theory (DFT) calculations and experimental techniques such as temperature programmed X-ray photoelectron spectroscopy (TP-XPS), temperature program…
▽ More
This study aims to elucidate the adsorption and surface chemistry of N-methylaniline (NMA) on Pt(111), using it as a model molecule to probe the activation mechanisms of aromatic amines on catalytic surfaces. Through a combination of density functional theory (DFT) calculations and experimental techniques such as temperature programmed X-ray photoelectron spectroscopy (TP-XPS), temperature programmed desorption (TPD), and Fourier transform infrared reflection absorption spectroscopy(FT-IRRAS),we explored the coverage-dependent behaviour of NMA on Pt(111) to identify key steps in the activation process. The population of certain reaction paths is driven by a coverage dependent balance between molecule surface charge transfer and intermolecular interactions, dictating the selective activation of specific bonds. Our findings reveal how coverage influences the orientation and bonding of NMA on the Pt(111)surface. At lower coverages, the molecule binds to the surface through the phenyl ring and activation, facilitating C-N bond cleavage to the ring under HCN formation. In comparison, at higher coverages, the molecule binds only through the nitrogen atom and desorbs intact. These insights into variable bond activation lay the ground work for understanding the fundamental processes involved in potential heterogeneously catalyzed reactions of aromatic amines, contributing to the development of new catalytic strategies.
△ Less
Submitted 24 March, 2025;
originally announced March 2025.
-
A Case Study of Counting the Number of Unique Users in Linear and Non-Linear Trails -- A Multi-Agent System Approach
Authors:
Tanvir Rahman
Abstract:
Parks play a crucial role in enhancing the quality of life by providing recreational spaces and environmental benefits. Understanding the patterns of park usage, including the number of visitors and their activities, is essential for effective security measures, infrastructure maintenance, and resource allocation. Traditional methods rely on single-entry sensors that count total visits but fail to…
▽ More
Parks play a crucial role in enhancing the quality of life by providing recreational spaces and environmental benefits. Understanding the patterns of park usage, including the number of visitors and their activities, is essential for effective security measures, infrastructure maintenance, and resource allocation. Traditional methods rely on single-entry sensors that count total visits but fail to distinguish unique users, limiting their effectiveness due to manpower and cost constraints.With advancements in affordable video surveillance and networked processing, more comprehensive park usage analysis is now feasible. This study proposes a multi-agent system leveraging low-cost cameras in a distributed network to track and analyze unique users. As a case study, we deployed this system at the Jack A. Markell (JAM) Trail in Wilmington, Delaware, and Hall Trail in Newark, Delaware. The system captures video data, autonomously processes it using existing algorithms, and extracts user attributes such as speed, direction, activity type, clothing color, and gender. These attributes are shared across cameras to construct movement trails and accurately count unique visitors. Our approach was validated through comparison with manual human counts and simulated scenarios under various conditions. The results demonstrate a 72% success rate in identifying unique users, setting a benchmark in automated park activity monitoring. Despite challenges such as camera placement and environmental factors, our findings suggest that this system offers a scalable, cost-effective solution for real-time park usage analysis and visitor behavior tracking.
△ Less
Submitted 6 March, 2025;
originally announced March 2025.
-
A Transformer-in-Transformer Network Utilizing Knowledge Distillation for Image Recognition
Authors:
Dewan Tauhid Rahman,
Yeahia Sarker,
Antar Mazumder,
Md. Shamim Anower
Abstract:
This paper presents a novel knowledge distillation neural architecture leveraging efficient transformer networks for effective image classification. Natural images display intricate arrangements encompassing numerous extraneous elements. Vision transformers utilize localized patches to compute attention. However, exclusive dependence on patch segmentation proves inadequate in sufficiently encompas…
▽ More
This paper presents a novel knowledge distillation neural architecture leveraging efficient transformer networks for effective image classification. Natural images display intricate arrangements encompassing numerous extraneous elements. Vision transformers utilize localized patches to compute attention. However, exclusive dependence on patch segmentation proves inadequate in sufficiently encompassing the comprehensive nature of the image. To address this issue, we have proposed an inner-outer transformer-based architecture, which gives attention to the global and local aspects of the image. Moreover, The training of transformer models poses significant challenges due to their demanding resource, time, and data requirements. To tackle this, we integrate knowledge distillation into the architecture, enabling efficient learning. Leveraging insights from a larger teacher model, our approach enhances learning efficiency and effectiveness. Significantly, the transformer-in-transformer network acquires lightweight characteristics by means of distillation conducted within the feature extraction layer. Our featured network's robustness is established through substantial experimentation on the MNIST, CIFAR10, and CIFAR100 datasets, demonstrating commendable top-1 and top-5 accuracy. The conducted ablative analysis comprehensively validates the effectiveness of the chosen parameters and settings, showcasing their superiority against contemporary methodologies. Remarkably, the proposed Transformer-in-Transformer Network (TITN) model achieves impressive performance milestones across various datasets: securing the highest top-1 accuracy of 74.71% and a top-5 accuracy of 92.28% for the CIFAR100 dataset, attaining an unparalleled top-1 accuracy of 92.03% and top-5 accuracy of 99.80% for the CIFAR-10 dataset, and registering an exceptional top-1 accuracy of 99.56% for the MNIST dataset.
△ Less
Submitted 23 February, 2025;
originally announced February 2025.
-
Runtime Tunable Tsetlin Machines for Edge Inference on eFPGAs
Authors:
Tousif Rahman,
Gang Mao,
Bob Pattison,
Sidharth Maheshwari,
Marcos Sartori,
Adrian Wheeldon,
Rishad Shafik,
Alex Yakovlev
Abstract:
Embedded Field-Programmable Gate Arrays (eFPGAs) allow for the design of hardware accelerators of edge Machine Learning (ML) applications at a lower power budget compared with traditional FPGA platforms. However, the limited eFPGA logic and memory significantly constrain compute capabilities and model size. As such, ML application deployment on eFPGAs is in direct contrast with the most recent FPG…
▽ More
Embedded Field-Programmable Gate Arrays (eFPGAs) allow for the design of hardware accelerators of edge Machine Learning (ML) applications at a lower power budget compared with traditional FPGA platforms. However, the limited eFPGA logic and memory significantly constrain compute capabilities and model size. As such, ML application deployment on eFPGAs is in direct contrast with the most recent FPGA approaches developing architecture-specific implementations and maximizing throughput over resource frugality. This paper focuses on the opposite side of this trade-off: the proposed eFPGA accelerator focuses on minimizing resource usage and allowing flexibility for on-field recalibration over throughput. This allows for runtime changes in model size, architecture, and input data dimensionality without offline resynthesis. This is made possible through the use of a bitwise compressed inference architecture of the Tsetlin Machine (TM) algorithm. TM compute does not require any multiplication operations, being limited to only bitwise AND, OR, NOT, summations and additions. Additionally, TM model compression allows the entire model to fit within the on-chip block RAM of the eFPGA. The paper uses this accelerator to propose a strategy for runtime model tuning in the field. The proposed approach uses 2.5x fewer Look-up-Tables (LUTs) and 3.38x fewer registers than the current most resource-fugal design and achieves up to 129x energy reduction compared with low-power microcontrollers running the same ML application.
△ Less
Submitted 10 February, 2025;
originally announced February 2025.
-
Realization of Two-dimensional Discrete Time Crystals with Anisotropic Heisenberg Coupling
Authors:
Eric D. Switzer,
Niall Robertson,
Nathan Keenan,
Ángel Rodríguez,
Andrea D'Urbano,
Bibek Pokharel,
Talat S. Rahman,
Oles Shtanko,
Sergiy Zhuk,
Nicolás Lorente
Abstract:
A discrete time crystal (DTC) is the paradigmatic example of a phase of matter that occurs exclusively in systems out of equilibrium. This phenomenon is characterized by the spontaneous symmetry breaking of discrete time-translation and provides a rich playground to study a fundamental question in statistical physics: what mechanism allows for driven quantum systems to exhibit emergent behavior th…
▽ More
A discrete time crystal (DTC) is the paradigmatic example of a phase of matter that occurs exclusively in systems out of equilibrium. This phenomenon is characterized by the spontaneous symmetry breaking of discrete time-translation and provides a rich playground to study a fundamental question in statistical physics: what mechanism allows for driven quantum systems to exhibit emergent behavior that deviates from their counterparts with time-independent evolution? Unlike equilibrium phases, DTCs exhibit macroscopic manifestations of coherent quantum dynamics, challenging the conventional narrative that thermodynamic behavior universally erases quantum signatures. However, due to the difficulty of simulating these systems with either classical or quantum computers, previous studies have been limited to a set of models with Ising-like couplings -- and mostly only in one dimension -- thus precluding our understanding of the existence (or not) of DTCs in models with interactions that closely align with what occurs in nature. In this work, by combining the latest generation of IBM quantum processors with state-of-the-art tensor network methods, we are able to demonstrate the existence of a DTC in a two-dimensional system governed by anisotropic Heisenberg interactions. Our comprehensive analysis reveals a rich phase diagram encompassing spin-glass, ergodic, and time-crystalline phases, highlighting the tunability of these phases through multiple control parameters. Crucially, our results emphasize the interplay of initialization, interaction anisotropy, and driving protocols in stabilizing the DTC phase. By extending the study of Floquet matter beyond simplified models, we lay the groundwork for exploring how driven systems bridge the gap between quantum coherence and emergent non-equilibrium thermodynamics.
△ Less
Submitted 29 January, 2025;
originally announced January 2025.
-
MMFactory: A Universal Solution Search Engine for Vision-Language Tasks
Authors:
Wan-Cyuan Fan,
Tanzila Rahman,
Leonid Sigal
Abstract:
With advances in foundational and vision-language models, and effective fine-tuning techniques, a large number of both general and special-purpose models have been developed for a variety of visual tasks. Despite the flexibility and accessibility of these models, no single model is able to handle all tasks and/or applications that may be envisioned by potential users. Recent approaches, such as vi…
▽ More
With advances in foundational and vision-language models, and effective fine-tuning techniques, a large number of both general and special-purpose models have been developed for a variety of visual tasks. Despite the flexibility and accessibility of these models, no single model is able to handle all tasks and/or applications that may be envisioned by potential users. Recent approaches, such as visual programming and multimodal LLMs with integrated tools aim to tackle complex visual tasks, by way of program synthesis. However, such approaches overlook user constraints (e.g., performance / computational needs), produce test-time sample-specific solutions that are difficult to deploy, and, sometimes, require low-level instructions that maybe beyond the abilities of a naive user. To address these limitations, we introduce MMFactory, a universal framework that includes model and metrics routing components, acting like a solution search engine across various available models. Based on a task description and few sample input-output pairs and (optionally) resource and/or performance constraints, MMFactory can suggest a diverse pool of programmatic solutions by instantiating and combining visio-lingual tools from its model repository. In addition to synthesizing these solutions, MMFactory also proposes metrics and benchmarks performance / resource characteristics, allowing users to pick a solution that meets their unique design constraints. From the technical perspective, we also introduced a committee-based solution proposer that leverages multi-agent LLM conversation to generate executable, diverse, universal, and robust solutions for the user. Experimental results show that MMFactory outperforms existing methods by delivering state-of-the-art solutions tailored to user problem specifications. Project page is available at https://davidhalladay.github.io/mmfactory_demo.
△ Less
Submitted 23 December, 2024;
originally announced December 2024.
-
Toward Foundation Model for Multivariate Wearable Sensing of Physiological Signals
Authors:
Yunfei Luo,
Yuliang Chen,
Asif Salekin,
Tauhidur Rahman
Abstract:
Time-series foundation models excel at tasks like forecasting across diverse data types by leveraging informative waveform representations. Wearable sensing data, however, pose unique challenges due to their variability in patterns and frequency bands, especially for healthcare-related outcomes. The main obstacle lies in crafting generalizable representations that adapt efficiently across heteroge…
▽ More
Time-series foundation models excel at tasks like forecasting across diverse data types by leveraging informative waveform representations. Wearable sensing data, however, pose unique challenges due to their variability in patterns and frequency bands, especially for healthcare-related outcomes. The main obstacle lies in crafting generalizable representations that adapt efficiently across heterogeneous sensing configurations and applications. To address this, we propose NormWear, the first multi-modal and ubiquitous foundation model designed to extract generalized and informative representations from wearable sensing data. Specifically, we design a channel-aware attention mechanism with a shared special liaison [CLS] token to detect signal patterns in both intra-sensor and inter-sensors. This helps the model to extract more meaningful information considering both time series themselves and the relationships between input sensors. This helps the model to be widely compatible with various sensors settings. NormWear is pretrained on a diverse set of physiological signals, including PPG, ECG, EEG, GSR, and IMU, from various public datasets. Our model shows exceptional generalizability across 11 public wearable sensing datasets, spanning 18 applications in mental health, body state inference, vital sign estimation, and disease risk evaluation. It consistently outperforms competitive baselines under zero-shot, partial-shot, and full-shot settings, indicating broad applicability in real-world health applications.
△ Less
Submitted 16 May, 2025; v1 submitted 12 December, 2024;
originally announced December 2024.
-
Predicting Quality of Video Gaming Experience Using Global-Scale Telemetry Data and Federated Learning
Authors:
Zhongyang Zhang,
Jinhe Wen,
Zixi Chen,
Dara Arbab,
Sruti Sahani,
Kent Giard,
Bijan Arbab,
Haojian Jin,
Tauhidur Rahman
Abstract:
Frames Per Second (FPS) significantly affects the gaming experience. Providing players with accurate FPS estimates prior to purchase benefits both players and game developers. However, we have a limited understanding of how to predict a game's FPS performance on a specific device. In this paper, we first conduct a comprehensive analysis of a wide range of factors that may affect game FPS on a glob…
▽ More
Frames Per Second (FPS) significantly affects the gaming experience. Providing players with accurate FPS estimates prior to purchase benefits both players and game developers. However, we have a limited understanding of how to predict a game's FPS performance on a specific device. In this paper, we first conduct a comprehensive analysis of a wide range of factors that may affect game FPS on a global-scale dataset to identify the determinants of FPS. This includes player-side and game-side characteristics, as well as country-level socio-economic statistics. Furthermore, recognizing that accurate FPS predictions require extensive user data, which raises privacy concerns, we propose a federated learning-based model to ensure user privacy. Each player and game is assigned a unique learnable knowledge kernel that gradually extracts latent features for improved accuracy. We also introduce a novel training and prediction scheme that allows these kernels to be dynamically plug-and-play, effectively addressing cold start issues. To train this model with minimal bias, we collected a large telemetry dataset from 224 countries and regions, 100,000 users, and 835 games. Our model achieved a mean Wasserstein distance of 0.469 between predicted and ground truth FPS distributions, outperforming all baseline methods.
△ Less
Submitted 26 February, 2025; v1 submitted 12 December, 2024;
originally announced December 2024.
-
Labits: Layered Bidirectional Time Surfaces Representation for Event Camera-based Continuous Dense Trajectory Estimation
Authors:
Zhongyang Zhang,
Jiacheng Qiu,
Shuyang Cui,
Yijun Luo,
Tauhidur Rahman
Abstract:
Event cameras provide a compelling alternative to traditional frame-based sensors, capturing dynamic scenes with high temporal resolution and low latency. Moving objects trigger events with precise timestamps along their trajectory, enabling smooth continuous-time estimation. However, few works have attempted to optimize the information loss during event representation construction, imposing a cei…
▽ More
Event cameras provide a compelling alternative to traditional frame-based sensors, capturing dynamic scenes with high temporal resolution and low latency. Moving objects trigger events with precise timestamps along their trajectory, enabling smooth continuous-time estimation. However, few works have attempted to optimize the information loss during event representation construction, imposing a ceiling on this task. Fully exploiting event cameras requires representations that simultaneously preserve fine-grained temporal information, stable and characteristic 2D visual features, and temporally consistent information density, an unmet challenge in existing representations. We introduce Labits: Layered Bidirectional Time Surfaces, a simple yet elegant representation designed to retain all these features. Additionally, we propose a dedicated module for extracting active pixel local optical flow (APLOF), significantly boosting the performance. Our approach achieves an impressive 49% reduction in trajectory end-point error (TEPE) compared to the previous state-of-the-art on the MultiFlow dataset. The code will be released upon acceptance.
△ Less
Submitted 11 December, 2024;
originally announced December 2024.
-
Atomistic insights into Cu segregation effects on irradiation-induced defect dynamics in medium-entropy alloys
Authors:
Kazi Tawseef Rahman,
Mustofa Sakif Shahriar,
Mashaekh Tausif Ehsan,
Mohammad Nasim Hasan
Abstract:
Copper (Cu) segregation in medium and high-entropy alloys (M/HEAs) has shown significant influence on alloy properties. In this study, we investigate the effect of Cu segregation on evolution of irradiation-induced defects in FeNiCu, a model MEA, using hybrid molecular dynamics (MD) and Monte Carlo (MC) simulations. Thermodynamically driven hybrid MC/MD annealing at low temperature resulted in a p…
▽ More
Copper (Cu) segregation in medium and high-entropy alloys (M/HEAs) has shown significant influence on alloy properties. In this study, we investigate the effect of Cu segregation on evolution of irradiation-induced defects in FeNiCu, a model MEA, using hybrid molecular dynamics (MD) and Monte Carlo (MC) simulations. Thermodynamically driven hybrid MC/MD annealing at low temperature resulted in a partially decomposed Cu-segregated structure (CSS) and was compared with a random solid solution (RSS) and pure Ni. Results through cumulative displacement cascades reveal that Cu-rich domains in CSS act as defect traps, accelerating interstitial-vacancy recombination and suppressing defect cluster growth. The complex potential energy landscape (PEL) in CSS disrupts dislocation propagation, leading to spatially dispersed networks. Notably, CSS exhibits reduced stair-rod dislocation density compared to RSS, highlighting its superior resistance to irradiation swelling. Localized shear strain causes dislocations to preferentially nucleate in/near Cu-rich regions though their growth is hindered by chemical heterogeneity of the alloy. Notably, prolonged irradiation induces slow Cu segregation in the RSS structure, while slowly annihilating pre-existing Cu clusters in CSS simultaneously. The findings provide atomic-scale insights into the interplay between Cu segregation and irradiation-induced defect evolution in MEAs.
△ Less
Submitted 26 April, 2025; v1 submitted 20 November, 2024;
originally announced November 2024.
-
Nitrogen vacancy center in diamond-based Faraday magnetometer
Authors:
Reza Kashtiban,
Gavin W. Morley,
Mark E. Newton,
A T M Anishur Rahman
Abstract:
The nitrogen vacancy (NV) center in diamond is a versatile color center used for magnetometry, quantum computing, and quantum communications. In this article, using a single laser beam as a pump and probe, we measure the spin states of the NV center using the Faraday effect and use such measurements to develop a novel magnetic field sensor. Using the spin-state-dependent effect on the left and rig…
▽ More
The nitrogen vacancy (NV) center in diamond is a versatile color center used for magnetometry, quantum computing, and quantum communications. In this article, using a single laser beam as a pump and probe, we measure the spin states of the NV center using the Faraday effect and use such measurements to develop a novel magnetic field sensor. Using the spin-state-dependent effect on the left and right circularly polarized light, we probe and confirm the existence of spin-orbit coupling in the NV center at room temperature. The sensitivity of our magnetometer is $350~$nT/$\sqrt{Hz}$, limited by the background produced by the laser trapped inside the diamond. We argue that by using an optical cavity and a high-purity diamond, sensitivities in the femtotesla level can be achieved.
△ Less
Submitted 27 May, 2025; v1 submitted 15 November, 2024;
originally announced November 2024.
-
Hierarchical Sentiment Analysis Framework for Hate Speech Detection: Implementing Binary and Multiclass Classification Strategy
Authors:
Faria Naznin,
Md Touhidur Rahman,
Shahran Rahman Alve
Abstract:
A significant challenge in automating hate speech detection on social media is distinguishing hate speech from regular and offensive language. These identify an essential category of content that web filters seek to remove. Only automated methods can manage this volume of daily data. To solve this problem, the community of Natural Language Processing is currently investigating different ways of ha…
▽ More
A significant challenge in automating hate speech detection on social media is distinguishing hate speech from regular and offensive language. These identify an essential category of content that web filters seek to remove. Only automated methods can manage this volume of daily data. To solve this problem, the community of Natural Language Processing is currently investigating different ways of hate speech detection. In addition to those, previous approaches (e.g., Convolutional Neural Networks, multi-channel BERT models, and lexical detection) have always achieved low precision without carefully treating other related tasks like sentiment analysis and emotion classification. They still like to group all messages with specific words in them as hate speech simply because those terms often appear alongside hateful rhetoric. In this research, our paper presented the hate speech text classification system model drawn upon deep learning and machine learning. In this paper, we propose a new multitask model integrated with shared emotional representations to detect hate speech across the English language. The Transformer-based model we used from Hugging Face and sentiment analysis helped us prevent false positives. Conclusion. We conclude that utilizing sentiment analysis and a Transformer-based trained model considerably improves hate speech detection across multiple datasets.
△ Less
Submitted 3 November, 2024;
originally announced November 2024.
-
Ultrasound-Based AI for COVID-19 Detection: A Comprehensive Review of Public and Private Lung Ultrasound Datasets and Studies
Authors:
Abrar Morshed,
Abdulla Al Shihab,
Md Abrar Jahin,
Md Jaber Al Nahian,
Md Murad Hossain Sarker,
Md Sharjis Ibne Wadud,
Mohammad Istiaq Uddin,
Muntequa Imtiaz Siraji,
Nafisa Anjum,
Sumiya Rajjab Shristy,
Tanvin Rahman,
Mahmuda Khatun,
Md Rubel Dewan,
Mosaddeq Hossain,
Razia Sultana,
Ripel Chakma,
Sonet Barua Emon,
Towhidul Islam,
Mohammad Arafat Hussain
Abstract:
The COVID-19 pandemic has affected millions of people globally, with respiratory organs being strongly affected in individuals with comorbidities. Medical imaging-based diagnosis and prognosis have become increasingly popular in clinical settings for detecting COVID-19 lung infections. Among various medical imaging modalities, ultrasound stands out as a low-cost, mobile, and radiation-safe imaging…
▽ More
The COVID-19 pandemic has affected millions of people globally, with respiratory organs being strongly affected in individuals with comorbidities. Medical imaging-based diagnosis and prognosis have become increasingly popular in clinical settings for detecting COVID-19 lung infections. Among various medical imaging modalities, ultrasound stands out as a low-cost, mobile, and radiation-safe imaging technology. In this comprehensive review, we focus on AI-driven studies utilizing lung ultrasound (LUS) for COVID-19 detection and analysis. We provide a detailed overview of both publicly available and private LUS datasets and categorize the AI studies according to the dataset they used. Additionally, we systematically analyzed and tabulated the studies across various dimensions, including data preprocessing methods, AI models, cross-validation techniques, and evaluation metrics. In total, we reviewed 60 articles, 41 of which utilized public datasets, while the remaining employed private data. Our findings suggest that ultrasound-based AI studies for COVID-19 detection have great potential for clinical use, especially for children and pregnant women. Our review also provides a useful summary for future researchers and clinicians who may be interested in the field.
△ Less
Submitted 6 November, 2024;
originally announced November 2024.
-
NeRF-enabled Analysis-Through-Synthesis for ISAR Imaging of Small Everyday Objects with Sparse and Noisy UWB Radar Data
Authors:
Md Farhan Tasnim Oshim,
Albert Reed,
Suren Jayasuriya,
Tauhidur Rahman
Abstract:
Inverse Synthetic Aperture Radar (ISAR) imaging presents a formidable challenge when it comes to small everyday objects due to their limited Radar Cross-Section (RCS) and the inherent resolution constraints of radar systems. Existing ISAR reconstruction methods including backprojection (BP) often require complex setups and controlled environments, rendering them impractical for many real-world noi…
▽ More
Inverse Synthetic Aperture Radar (ISAR) imaging presents a formidable challenge when it comes to small everyday objects due to their limited Radar Cross-Section (RCS) and the inherent resolution constraints of radar systems. Existing ISAR reconstruction methods including backprojection (BP) often require complex setups and controlled environments, rendering them impractical for many real-world noisy scenarios. In this paper, we propose a novel Analysis-through-Synthesis (ATS) framework enabled by Neural Radiance Fields (NeRF) for high-resolution coherent ISAR imaging of small objects using sparse and noisy Ultra-Wideband (UWB) radar data with an inexpensive and portable setup. Our end-to-end framework integrates ultra-wideband radar wave propagation, reflection characteristics, and scene priors, enabling efficient 2D scene reconstruction without the need for costly anechoic chambers or complex measurement test beds. With qualitative and quantitative comparisons, we demonstrate that the proposed method outperforms traditional techniques and generates ISAR images of complex scenes with multiple targets and complex structures in Non-Line-of-Sight (NLOS) and noisy scenarios, particularly with limited number of views and sparse UWB radar scans. This work represents a significant step towards practical, cost-effective ISAR imaging of small everyday objects, with broad implications for robotics and mobile sensing applications.
△ Less
Submitted 13 October, 2024;
originally announced October 2024.
-
Advancing Cucumber Disease Detection in Agriculture through Machine Vision and Drone Technology
Authors:
Syada Tasfia Rahman,
Nishat Vasker,
Amir Khabbab Ahammed,
Mahamudul Hasan
Abstract:
This study uses machine vision and drone technologies to propose a unique method for the diagnosis of cucumber disease in agriculture. The backbone of this research is a painstakingly curated dataset of hyperspectral photographs acquired under genuine field conditions. Unlike earlier datasets, this study included a wide variety of illness types, allowing for precise early-stage detection. The mode…
▽ More
This study uses machine vision and drone technologies to propose a unique method for the diagnosis of cucumber disease in agriculture. The backbone of this research is a painstakingly curated dataset of hyperspectral photographs acquired under genuine field conditions. Unlike earlier datasets, this study included a wide variety of illness types, allowing for precise early-stage detection. The model achieves an excellent 87.5\% accuracy in distinguishing eight unique cucumber illnesses after considerable data augmentation. The incorporation of drone technology for high-resolution images improves disease evaluation. This development has enormous potential for improving crop management, lowering labor costs, and increasing agricultural productivity. This research, which automates disease detection, represents a significant step toward a more efficient and sustainable agricultural future.
△ Less
Submitted 18 September, 2024;
originally announced September 2024.
-
Interoperability and Explicable AI-based Zero-Day Attacks Detection Process in Smart Community
Authors:
Mohammad Sayduzzaman,
Anichur Rahman,
Jarin Tasnim Tamanna,
Dipanjali Kundu,
Tawhidur Rahman
Abstract:
Systems, technologies, protocols, and infrastructures all face interoperability challenges. It is among the most crucial parameters to give real-world effectiveness. Organizations that achieve interoperability will be able to identify, prevent, and provide appropriate protection on an international scale, which can be relied upon. This paper aims to explain how future technologies such as 6G mobil…
▽ More
Systems, technologies, protocols, and infrastructures all face interoperability challenges. It is among the most crucial parameters to give real-world effectiveness. Organizations that achieve interoperability will be able to identify, prevent, and provide appropriate protection on an international scale, which can be relied upon. This paper aims to explain how future technologies such as 6G mobile communication, Internet of Everything (IoE), Artificial Intelligence (AI), and Smart Contract embedded WPA3 protocol-based WiFi-8 can work together to prevent known attack vectors and provide protection against zero-day attacks, thus offering intelligent solutions for smart cities. The phrase zero-day refers to an attack that occurs on the day zero of the vulnerability's disclosure to the public or vendor. Existing systems require an extra layer of security. In the security world, interoperability enables disparate security solutions and systems to collaborate seamlessly. AI improves cybersecurity by enabling improved capabilities for detecting, responding, and preventing zero-day attacks. When interoperability and Explainable Artificial Intelligence (XAI) are integrated into cybersecurity, they form a strong protection against zero-day assaults. Additionally, we evaluate a couple of parameters based on the accuracy and time required for efficiently analyzing attack patterns and anomalies.
△ Less
Submitted 11 October, 2025; v1 submitted 5 August, 2024;
originally announced August 2024.
-
Automating Patch Set Generation from Code Review Comments Using Large Language Models
Authors:
Tajmilur Rahman,
Rahul Singh,
Mir Yousuf Sultan
Abstract:
The advent of Large Language Models (LLMs) has revolutionized various domains of artificial intelligence, including the realm of software engineering. In this research, we evaluate the efficacy of pre-trained LLMs in replicating the tasks traditionally performed by developers in response to code review comments. We provide code contexts to five popular LLMs and obtain the suggested code-changes (p…
▽ More
The advent of Large Language Models (LLMs) has revolutionized various domains of artificial intelligence, including the realm of software engineering. In this research, we evaluate the efficacy of pre-trained LLMs in replicating the tasks traditionally performed by developers in response to code review comments. We provide code contexts to five popular LLMs and obtain the suggested code-changes (patch sets) derived from real-world code-review comments. The performance of each model is meticulously assessed by comparing their generated patch sets against the historical data of human-generated patch-sets from the same repositories. This comparative analysis aims to determine the accuracy, relevance, and depth of the LLMs' feedback, thereby evaluating their readiness to support developers in responding to code-review comments.
Novelty: This particular research area is still immature requiring a substantial amount of studies yet to be done. No prior research has compared the performance of existing Large Language Models (LLMs) in code-review comments. This in-progress study assesses current LLMs in code review and paves the way for future advancements in automated code quality assurance, reducing context-switching overhead due to interruptions from code change requests.
△ Less
Submitted 9 April, 2024;
originally announced June 2024.
-
Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
Authors:
Md Sadik Awal,
Buddhipriya Gayanath,
Md Tauhidur Rahman
Abstract:
Physical side channels emerge from the relation between internal computation or data with observable physical parameters of a chip. Previous works mostly focus on properties related to current consumption such as power consumption. The fundamental property behind current consumption occur from the impedance of the chip. Contemporary works have stared using chip impedance as a physical side channel…
▽ More
Physical side channels emerge from the relation between internal computation or data with observable physical parameters of a chip. Previous works mostly focus on properties related to current consumption such as power consumption. The fundamental property behind current consumption occur from the impedance of the chip. Contemporary works have stared using chip impedance as a physical side channel in extracting sensitive information from computing systems. It leverages variations in intrinsic impedance of a chip across different logic states. However, there has been a lack of comparative studies. In this study, we conduct a comparative analysis of the impedance side channel, which has been limitedly explored, and the well-established power side channel. Through experimental evaluation, we investigate the efficacy of these side channels in extracting stored advanced encryption standard (AES) cryptographic key on a memory and analyze their performance. Our findings indicate that impedance analysis demonstrates a higher potential for cryptographic key extraction compared to power side-channel analysis (SCA). Moreover, we identify scenarios where power SCA does not yield satisfactory results, whereas impedance analysis proves to be more robust and effective. This work not only underscores the significance of impedance SCA in enhancing cryptographic security but also emphasizes the necessity for a deeper understanding of its mechanisms and implications.
△ Less
Submitted 30 September, 2024; v1 submitted 10 May, 2024;
originally announced May 2024.
-
On a vectorized basic linear algebra package for prototyping codes in MATLAB
Authors:
Alexej Moskovka,
Talal Rahman,
Jan Valdman,
Jon Eivind Vatne
Abstract:
When writing high-performance code for numerical computation in a scripting language like MATLAB, it is crucial to have the operations in a large for-loop vectorized. If not, the code becomes too slow to use, even for a moderately large problem. However, in the process of vectorizing, the code often loses its original structure and becomes less readable. This is particularly true in the case of a…
▽ More
When writing high-performance code for numerical computation in a scripting language like MATLAB, it is crucial to have the operations in a large for-loop vectorized. If not, the code becomes too slow to use, even for a moderately large problem. However, in the process of vectorizing, the code often loses its original structure and becomes less readable. This is particularly true in the case of a finite element implementation, even though finite element methods are inherently structured. A basic remedy to this is the separation of the vectorization part from the mathematics part of the code, which is easily achieved through building the code on top of the basic linear algebra subprograms that are already vectorized codes, an idea that has been used in a series of papers over the last fifteen years, developing codes that are fast and still structured and readable. We discuss the vectorized basic linear algebra package and introduce a formalism using multi-linear algebra to explain and define formally the functions in the package, as well as MATLAB pagetime functions. We provide examples from computations of varying complexity, including the computation of normal vectors, volumes, and finite element methods. Benchmarking shows that we also get fast computations. Using the library, we can write codes that closely follow our mathematical thinking, making writing, following, reusing, and extending the code easier.
△ Less
Submitted 15 March, 2024;
originally announced April 2024.
-
Learning to Solve the Constrained Most Probable Explanation Task in Probabilistic Graphical Models
Authors:
Shivvrat Arya,
Tahrima Rahman,
Vibhav Gogate
Abstract:
We propose a self-supervised learning approach for solving the following constrained optimization task in log-linear models or Markov networks. Let $f$ and $g$ be two log-linear models defined over the sets $\mathbf{X}$ and $\mathbf{Y}$ of random variables respectively. Given an assignment $\mathbf{x}$ to all variables in $\mathbf{X}$ (evidence) and a real number $q$, the constrained most-probable…
▽ More
We propose a self-supervised learning approach for solving the following constrained optimization task in log-linear models or Markov networks. Let $f$ and $g$ be two log-linear models defined over the sets $\mathbf{X}$ and $\mathbf{Y}$ of random variables respectively. Given an assignment $\mathbf{x}$ to all variables in $\mathbf{X}$ (evidence) and a real number $q$, the constrained most-probable explanation (CMPE) task seeks to find an assignment $\mathbf{y}$ to all variables in $\mathbf{Y}$ such that $f(\mathbf{x}, \mathbf{y})$ is maximized and $g(\mathbf{x}, \mathbf{y})\leq q$. In our proposed self-supervised approach, given assignments $\mathbf{x}$ to $\mathbf{X}$ (data), we train a deep neural network that learns to output near-optimal solutions to the CMPE problem without requiring access to any pre-computed solutions. The key idea in our approach is to use first principles and approximate inference methods for CMPE to derive novel loss functions that seek to push infeasible solutions towards feasible ones and feasible solutions towards optimal ones. We analyze the properties of our proposed method and experimentally demonstrate its efficacy on several benchmark problems.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
VoltaVision: A Transfer Learning model for electronic component classification
Authors:
Anas Mohammad Ishfaqul Muktadir Osmani,
Taimur Rahman,
Salekul Islam
Abstract:
In this paper, we analyze the effectiveness of transfer learning on classifying electronic components. Transfer learning reuses pre-trained models to save time and resources in building a robust classifier rather than learning from scratch. Our work introduces a lightweight CNN, coined as VoltaVision, and compares its performance against more complex models. We test the hypothesis that transferrin…
▽ More
In this paper, we analyze the effectiveness of transfer learning on classifying electronic components. Transfer learning reuses pre-trained models to save time and resources in building a robust classifier rather than learning from scratch. Our work introduces a lightweight CNN, coined as VoltaVision, and compares its performance against more complex models. We test the hypothesis that transferring knowledge from a similar task to our target domain yields better results than state-of-the-art models trained on general datasets. Our dataset and code for this work are available at https://github.com/AnasIshfaque/VoltaVision.
△ Less
Submitted 5 April, 2024;
originally announced April 2024.
-
Automated User Story Generation with Test Case Specification Using Large Language Model
Authors:
Tajmilur Rahman,
Yuecai Zhu
Abstract:
Modern Software Engineering era is moving fast with the assistance of artificial intelligence (AI), especially Large Language Models (LLM). Researchers have already started automating many parts of the software development workflow. Requirements Engineering (RE) is a crucial phase that begins the software development cycle through multiple discussions on a proposed scope of work documented in diff…
▽ More
Modern Software Engineering era is moving fast with the assistance of artificial intelligence (AI), especially Large Language Models (LLM). Researchers have already started automating many parts of the software development workflow. Requirements Engineering (RE) is a crucial phase that begins the software development cycle through multiple discussions on a proposed scope of work documented in different forms. RE phase ends with a list of user-stories for each unit task identified through discussions and usually these are created and tracked on a project management tool such as Jira, AzurDev etc. In this research we developed a tool "GeneUS" using GPT-4.0 to automatically create user stories from requirements document which is the outcome of the RE phase. The output is provided in JSON format leaving the possibilities open for downstream integration to the popular project management tools. Analyzing requirements documents takes significant effort and multiple meetings with stakeholders. We believe, automating this process will certainly reduce additional load off the software engineers, and increase the productivity since they will be able to utilize their time on other prioritized tasks.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
MATADOR: Automated System-on-Chip Tsetlin Machine Design Generation for Edge Applications
Authors:
Tousif Rahman,
Gang Mao,
Sidharth Maheshwari,
Rishad Shafik,
Alex Yakovlev
Abstract:
System-on-Chip Field-Programmable Gate Arrays (SoC-FPGAs) offer significant throughput gains for machine learning (ML) edge inference applications via the design of co-processor accelerator systems. However, the design effort for training and translating ML models into SoC-FPGA solutions can be substantial and requires specialist knowledge aware trade-offs between model performance, power consumpt…
▽ More
System-on-Chip Field-Programmable Gate Arrays (SoC-FPGAs) offer significant throughput gains for machine learning (ML) edge inference applications via the design of co-processor accelerator systems. However, the design effort for training and translating ML models into SoC-FPGA solutions can be substantial and requires specialist knowledge aware trade-offs between model performance, power consumption, latency and resource utilization. Contrary to other ML algorithms, Tsetlin Machine (TM) performs classification by forming logic proposition between boolean actions from the Tsetlin Automata (the learning elements) and boolean input features. A trained TM model, usually, exhibits high sparsity and considerable overlapping of these logic propositions both within and among the classes. The model, thus, can be translated to RTL-level design using a miniscule number of AND and NOT gates. This paper presents MATADOR, an automated boolean-to-silicon tool with GUI interface capable of implementing optimized accelerator design of the TM model onto SoC-FPGA for inference at the edge. It offers automation of the full development pipeline: model training, system level design generation, design verification and deployment. It makes use of the logic sharing that ensues from propositional overlap and creates a compact design by effectively utilizing the TM model's sparsity. MATADOR accelerator designs are shown to be up to 13.4x faster, up to 7x more resource frugal and up to 2x more power efficient when compared to the state-of-the-art Quantized and Binary Deep Neural Network implementations.
△ Less
Submitted 3 March, 2024;
originally announced March 2024.
-
Visual Concept-driven Image Generation with Text-to-Image Diffusion Model
Authors:
Tanzila Rahman,
Shweta Mahajan,
Hsin-Ying Lee,
Jian Ren,
Sergey Tulyakov,
Leonid Sigal
Abstract:
Text-to-image (TTI) diffusion models have demonstrated impressive results in generating high-resolution images of complex and imaginative scenes. Recent approaches have further extended these methods with personalization techniques that allow them to integrate user-illustrated concepts (e.g., the user him/herself) using a few sample image illustrations. However, the ability to generate images with…
▽ More
Text-to-image (TTI) diffusion models have demonstrated impressive results in generating high-resolution images of complex and imaginative scenes. Recent approaches have further extended these methods with personalization techniques that allow them to integrate user-illustrated concepts (e.g., the user him/herself) using a few sample image illustrations. However, the ability to generate images with multiple interacting concepts, such as human subjects, as well as concepts that may be entangled in one, or across multiple, image illustrations remains illusive. In this work, we propose a concept-driven TTI personalization framework that addresses these core challenges. We build on existing works that learn custom tokens for user-illustrated concepts, allowing those to interact with existing text tokens in the TTI model. However, importantly, to disentangle and better learn the concepts in question, we jointly learn (latent) segmentation masks that disentangle these concepts in user-provided image illustrations. We do so by introducing an Expectation Maximization (EM)-like optimization procedure where we alternate between learning the custom tokens and estimating (latent) masks encompassing corresponding concepts in user-supplied images. We obtain these masks based on cross-attention, from within the U-Net parameterized latent diffusion model and subsequent DenseCRF optimization. We illustrate that such joint alternating refinement leads to the learning of better tokens for concepts and, as a by-product, latent masks. We illustrate the benefits of the proposed approach qualitatively and quantitatively with several examples and use cases that can combine three or more entangled concepts.
△ Less
Submitted 1 May, 2025; v1 submitted 18 February, 2024;
originally announced February 2024.