-
Towards explainable message passing networks for predicting carbon dioxide adsorption in metal-organic frameworks
Authors:
Ali Raza,
Faaiq Waqar,
Arni Sturluson,
Cory Simon,
Xiaoli Fern
Abstract:
Metal-organic framework (MOFs) are nanoporous materials that could be used to capture carbon dioxide from the exhaust gas of fossil fuel power plants to mitigate climate change. In this work, we design and train a message passing neural network (MPNN) to predict simulated CO$_2$ adsorption in MOFs. Towards providing insights into what substructures of the MOFs are important for the prediction, we…
▽ More
Metal-organic framework (MOFs) are nanoporous materials that could be used to capture carbon dioxide from the exhaust gas of fossil fuel power plants to mitigate climate change. In this work, we design and train a message passing neural network (MPNN) to predict simulated CO$_2$ adsorption in MOFs. Towards providing insights into what substructures of the MOFs are important for the prediction, we introduce a soft attention mechanism into the readout function that quantifies the contributions of the node representations towards the graph representations. We investigate different mechanisms for sparse attention to ensure only the most relevant substructures are identified.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Survivable Hyper-Redundant Robotic Arm with Bayesian Policy Morphing
Authors:
Sayyed Jaffar Ali Raza,
Apan Dastider,
Mingjie Lin
Abstract:
In this paper we present a Bayesian reinforcement learning framework that allows robotic manipulators to adaptively recover from random mechanical failures autonomously, hence being survivable. To this end, we formulate the framework of Bayesian Policy Morphing (BPM) that enables a robot agent to self-modify its learned policy after the diminution of its maneuvering dimensionality. We build upon e…
▽ More
In this paper we present a Bayesian reinforcement learning framework that allows robotic manipulators to adaptively recover from random mechanical failures autonomously, hence being survivable. To this end, we formulate the framework of Bayesian Policy Morphing (BPM) that enables a robot agent to self-modify its learned policy after the diminution of its maneuvering dimensionality. We build upon existing actor-critic framework, and extend it to perform policy gradient updates as posterior learning, taking past policy updates as prior distributions. We show that policy search, in the direction biased by prior experience, significantly improves learning efficiency in terms of sampling requirements. We demonstrate our results on an 8-DOF robotic arm with our algorithm of BPM, while intentionally disabling random joints with different damage types like unresponsive joints, constant offset errors and angular imprecision. Our results have shown that, even with physical damages, the robotic arm can still successfully maintain its functionality to accurately locate and grasp a given target object.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
HydraMix-Net: A Deep Multi-task Semi-supervised Learning Approach for Cell Detection and Classification
Authors:
R. M. Saad Bashir,
Talha Qaiser,
Shan E Ahmed Raza,
Nasir M. Rajpoot
Abstract:
Semi-supervised techniques have removed the barriers of large scale labelled set by exploiting unlabelled data to improve the performance of a model. In this paper, we propose a semi-supervised deep multi-task classification and localization approach HydraMix-Net in the field of medical imagining where labelling is time consuming and costly. Firstly, the pseudo labels are generated using the model…
▽ More
Semi-supervised techniques have removed the barriers of large scale labelled set by exploiting unlabelled data to improve the performance of a model. In this paper, we propose a semi-supervised deep multi-task classification and localization approach HydraMix-Net in the field of medical imagining where labelling is time consuming and costly. Firstly, the pseudo labels are generated using the model's prediction on the augmented set of unlabelled image with averaging. The high entropy predictions are further sharpened to reduced the entropy and are then mixed with the labelled set for training. The model is trained in multi-task learning manner with noise tolerant joint loss for classification localization and achieves better performance when given limited data in contrast to a simple deep model. On DLBCL data it achieves 80\% accuracy in contrast to simple CNN achieving 70\% accuracy when given only 100 labelled examples.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Adaptive HTAP through Elastic Resource Scheduling
Authors:
Aunn Raza,
Periklis Chrysogelos,
Angelos Christos Anadiotis,
Anastasia Ailamaki
Abstract:
Modern Hybrid Transactional/Analytical Processing (HTAP) systems use an integrated data processing engine that performs analytics on fresh data, which are ingested from a transactional engine. HTAP systems typically consider data freshness at design time, and are optimized for a fixed range of freshness requirements, addressed at a performance cost for either OLTP or OLAP. The data freshness and t…
▽ More
Modern Hybrid Transactional/Analytical Processing (HTAP) systems use an integrated data processing engine that performs analytics on fresh data, which are ingested from a transactional engine. HTAP systems typically consider data freshness at design time, and are optimized for a fixed range of freshness requirements, addressed at a performance cost for either OLTP or OLAP. The data freshness and the performance requirements of both engines, however, may vary with the workload.
We approach HTAP as a scheduling problem, addressed at runtime through elastic resource management. We model an HTAP system as a set of three individual engines: an OLTP, an OLAP and a Resource and Data Exchange (RDE) engine. We devise a scheduling algorithm which traverses the HTAP design spectrum through elastic resource management, to meet the data freshness requirements of the workload. We propose an in-memory system design which is non-intrusive to the current state-of-art OLTP and OLAP engines, and we use it to evaluate the performance of our approach. Our evaluation shows that the performance benefit of our system for OLAP queries increases over time, reaching up to 50% compared to static schedules for 100 query sequences, while maintaining a small, and controlled, drop in the OLTP throughput.
△ Less
Submitted 14 April, 2020; v1 submitted 11 April, 2020;
originally announced April 2020.
-
Forecasting Crime Using ARIMA Model
Authors:
Khawar Islam,
Akhter Raza
Abstract:
Data mining is the process in which we extract the different patterns and useful Information from large dataset. According to London police, crimes are immediately increases from beginning of 2017 in different borough of London. No useful information is available for prevent crime on future basis. We forecasts crime rates in London borough by extracting large dataset of crime in London and predict…
▽ More
Data mining is the process in which we extract the different patterns and useful Information from large dataset. According to London police, crimes are immediately increases from beginning of 2017 in different borough of London. No useful information is available for prevent crime on future basis. We forecasts crime rates in London borough by extracting large dataset of crime in London and predicted number of crimes in future. We used time series ARIMA model for forecasting crimes in London. By giving 5 years of data to ARIMA model forecasting 2 years crime data. Comparatively, with exponential smoothing ARIMA model has higher fitting values. A real dataset of crimes reported by London police collected from its website and other resources. Our main concept is divided into four parts. Data extraction (DE), data processing (DP) of unstructured data, visualizing model in IBM SPSS. DE extracts crime data from web sources during 2012 for the 2016 year. DP integrates and reduces data and give them predefined attributes. Crime prediction is analyzed by applying some calculation, calculated their moving average, difference, and auto-regression. Forecasted Model gives 80% correct values, which is formed to be an accurate model. This work helps for London police in decision-making against crime.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
A Secure Cloud with Minimal Provider Trust
Authors:
Amin Mosayyebzadeh,
Gerardo Ravago,
Apoorve Mohan,
Ali Raza,
Sahil Tikale,
Nabil Schear,
Trammell Hudson,
Jason Hennessey,
Naved Ansari,
Kyle Hogan,
Charles Munson,
Larry Rudolph,
Gene Cooperman,
Peter Desnoyers,
Orran Krieger
Abstract:
Bolted is a new architecture for a bare metal cloud with the goal of providing security-sensitive customers of a cloud the same level of security and control that they can obtain in their own private data centers. It allows tenants to elastically allocate secure resources within a cloud while being protected from other previous, current, and future tenants of the cloud. The provisioning of a new s…
▽ More
Bolted is a new architecture for a bare metal cloud with the goal of providing security-sensitive customers of a cloud the same level of security and control that they can obtain in their own private data centers. It allows tenants to elastically allocate secure resources within a cloud while being protected from other previous, current, and future tenants of the cloud. The provisioning of a new server to a tenant isolates a bare metal server, only allowing it to communicate with other tenant's servers once its critical firmware and software have been attested to the tenant. Tenants, rather than the provider, control the tradeoffs between security, price, and performance. A prototype demonstrates scalable end-to-end security with small overhead compared to a less secure alternative.
△ Less
Submitted 13 July, 2019;
originally announced July 2019.
-
HoVer-Net: Simultaneous Segmentation and Classification of Nuclei in Multi-Tissue Histology Images
Authors:
Simon Graham,
Quoc Dang Vu,
Shan E Ahmed Raza,
Ayesha Azam,
Yee Wah Tsang,
Jin Tae Kwak,
Nasir Rajpoot
Abstract:
Nuclear segmentation and classification within Haematoxylin & Eosin stained histology images is a fundamental prerequisite in the digital pathology work-flow. The development of automated methods for nuclear segmentation and classification enables the quantitative analysis of tens of thousands of nuclei within a whole-slide pathology image, opening up possibilities of further analysis of large-sca…
▽ More
Nuclear segmentation and classification within Haematoxylin & Eosin stained histology images is a fundamental prerequisite in the digital pathology work-flow. The development of automated methods for nuclear segmentation and classification enables the quantitative analysis of tens of thousands of nuclei within a whole-slide pathology image, opening up possibilities of further analysis of large-scale nuclear morphometry. However, automated nuclear segmentation and classification is faced with a major challenge in that there are several different types of nuclei, some of them exhibiting large intra-class variability such as the tumour cells. Additionally, some of the nuclei are often clustered together. To address these challenges, we present a novel convolutional neural network for simultaneous nuclear segmentation and classification that leverages the instance-rich information encoded within the vertical and horizontal distances of nuclear pixels to their centres of mass. These distances are then utilised to separate clustered nuclei, resulting in an accurate segmentation, particularly in areas with overlapping instances. Then for each segmented instance, the network predicts the type of nucleus via a devoted up-sampling branch. We demonstrate state-of-the-art performance compared to other methods on multiple independent multi-tissue histology image datasets. As part of this work, we introduce a new dataset of Haematoxylin & Eosin stained colorectal adenocarcinoma image tiles, containing 24,319 exhaustively annotated nuclei with associated class labels.
△ Less
Submitted 13 November, 2019; v1 submitted 16 December, 2018;
originally announced December 2018.
-
Revisit of the Eigenfilter Method for the Design of FIR Filters and Wideband Beamformers
Authors:
Ahsan Raza,
Wei Liu
Abstract:
The least squares based eigenfilter method has been applied to the design of both finite impulse response (FIR) filters and wideband beamformers successfully. It involves calculating the resultant filter coefficients as the eigenvector of an appropriate Hermitian matrix, and offers lower complexity and less computation time with better numerical stability as compared to the standard least squares…
▽ More
The least squares based eigenfilter method has been applied to the design of both finite impulse response (FIR) filters and wideband beamformers successfully. It involves calculating the resultant filter coefficients as the eigenvector of an appropriate Hermitian matrix, and offers lower complexity and less computation time with better numerical stability as compared to the standard least squares method. In this paper, we revisit the method and critically analyze the eigenfilter method by revealing a serious performance issue in the passband of the designed FIR filter and the mainlobe of the wideband beamformer, which occurs due to a formulation problem. A solution is then proposed to mitigate this issue by imposing an additional constraint to control the response at the passband/mainlode, and design examples for both FIR filters and wideband beamformers are provided to demonstrate the effectiveness of the proposed method.
△ Less
Submitted 19 September, 2018;
originally announced September 2018.
-
Signature-based Non-orthogonal Multiple Access (S-NOMA) for Massive Machine-Type Communications in 5G
Authors:
Mostafa Mohammadkarimi,
Muhammad Ahmad Raza,
Octavia A. Dobre
Abstract:
The problem of providing massive connectivity in Internet-of-Things (IoT) with a limited number of available resources motivates the non-orthogonal multiple access (NOMA) solutions. In this article, we provide a comprehensive review of the signature-based NOMA (S-NOMA) schemes as potential candidates for IoT. The signature in S-NOMA represents the way the data stream of an active device is spread…
▽ More
The problem of providing massive connectivity in Internet-of-Things (IoT) with a limited number of available resources motivates the non-orthogonal multiple access (NOMA) solutions. In this article, we provide a comprehensive review of the signature-based NOMA (S-NOMA) schemes as potential candidates for IoT. The signature in S-NOMA represents the way the data stream of an active device is spread over available resources in a non-orthogonal manner. It can be designed based on device-specific codebook structures, delay patterns, spreading sequences, interleaving patterns, and scrambling sequences. Additionally, we present the detection algorithms employed to decode each device's data from non-orthogonally superimposed signals at the receiver. The bit error rate of different S-NOMA schemes is simulated in impulsive noise environments, which can be important in machine-type communications. Simulation results show that the performance of the S-NOMA schemes degrades under such conditions. Finally, research challenges in S-NOMA oriented IoT are presented.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
The rent's too high: Self-archive for fair online publication costs
Authors:
Robert T. Thibault,
Amanda MacPherson,
Stevan Harnad,
Amir Raza
Abstract:
The main contributors of scientific knowledge, researchers, generally aim to disseminate their findings far and wide. And yet, publishing companies have largely kept these findings behind a paywall. With digital publication technology markedly reducing cost, this enduring wall seems disproportionate and unjustified; moreover, it has sparked a topical exchange concerning how to modernize academic p…
▽ More
The main contributors of scientific knowledge, researchers, generally aim to disseminate their findings far and wide. And yet, publishing companies have largely kept these findings behind a paywall. With digital publication technology markedly reducing cost, this enduring wall seems disproportionate and unjustified; moreover, it has sparked a topical exchange concerning how to modernize academic publishing. This discussion, however, seems to focus on how to compensate major publishers for providing open access through a "pay to publish" model, in turn transferring financial burdens from libraries to authors and their funders. Large publishing companies, including Elsevier, Springer Nature, Wiley, PLoS, and Frontiers, continue to earn exorbitant revenues each year, hundreds of millions of dollars of which now come from processing charges for open-access articles. A less expensive and equally accessible alternative exists: widespread self-archiving of peer-reviewed articles. All we need is awareness of this alternative and the will to employ it
△ Less
Submitted 18 August, 2018;
originally announced August 2018.
-
Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection
Authors:
Cosimo Ieracitano,
Ahsan Adeel,
Mandar Gogate,
Kia Dashtipour,
Francesco Carlo Morabito,
Hadi Larijani,
Ali Raza,
Amir Hussain
Abstract:
Attackers have developed ever more sophisticated and intelligent ways to hack information and communication technology systems. The extent of damage an individual hacker can carry out upon infiltrating a system is well understood. A potentially catastrophic scenario can be envisaged where a nation-state intercepting encrypted financial data gets hacked. Thus, intelligent cybersecurity systems have…
▽ More
Attackers have developed ever more sophisticated and intelligent ways to hack information and communication technology systems. The extent of damage an individual hacker can carry out upon infiltrating a system is well understood. A potentially catastrophic scenario can be envisaged where a nation-state intercepting encrypted financial data gets hacked. Thus, intelligent cybersecurity systems have become inevitably important for improved protection against malicious threats. However, as malware attacks continue to dramatically increase in volume and complexity, it has become ever more challenging for traditional analytic tools to detect and mitigate threat. Furthermore, a huge amount of data produced by large networks has made the recognition task even more complicated and challenging. In this work, we propose an innovative statistical analysis driven optimized deep learning system for intrusion detection. The proposed intrusion detection system (IDS) extracts optimized and more correlated features using big data visualization and statistical analysis methods (human-in-the-loop), followed by a deep autoencoder for potential threat detection. Specifically, a pre-processing module eliminates the outliers and converts categorical variables into one-hot-encoded vectors. The feature extraction module discard features with null values and selects the most significant features as input to the deep autoencoder model (trained in a greedy-wise manner). The NSL-KDD dataset from the Canadian Institute for Cybersecurity is used as a benchmark to evaluate the feasibility and effectiveness of the proposed architecture. Simulation results demonstrate the potential of our proposed system and its outperformance as compared to existing state-of-the-art methods and recently published novel approaches. Ongoing work includes further optimization and real-time evaluation of our proposed IDS.
△ Less
Submitted 16 August, 2018;
originally announced August 2018.
-
Deep Belief Networks Based Feature Generation and Regression for Predicting Wind Power
Authors:
Asifullah Khan,
Aneela Zameer,
Tauseef Jamal,
Ahmad Raza
Abstract:
Wind energy forecasting helps to manage power production, and hence, reduces energy cost. Deep Neural Networks (DNN) mimics hierarchical learning in the human brain and thus possesses hierarchical, distributed, and multi-task learning capabilities. Based on aforementioned characteristics, we report Deep Belief Network (DBN) based forecast engine for wind power prediction because of its good genera…
▽ More
Wind energy forecasting helps to manage power production, and hence, reduces energy cost. Deep Neural Networks (DNN) mimics hierarchical learning in the human brain and thus possesses hierarchical, distributed, and multi-task learning capabilities. Based on aforementioned characteristics, we report Deep Belief Network (DBN) based forecast engine for wind power prediction because of its good generalization and unsupervised pre-training attributes. The proposed DBN-WP forecast engine, which exhibits stochastic feature generation capabilities and is composed of multiple Restricted Boltzmann Machines, generates suitable features for wind power prediction using atmospheric properties as input. DBN-WP, due to its unsupervised pre-training of RBM layers and generalization capabilities, is able to learn the fluctuations in the meteorological properties and thus is able to perform effective mapping of the wind power. In the deep network, a regression layer is appended at the end to predict sort-term wind power. It is experimentally shown that the deep learning and unsupervised pre-training capabilities of DBN based model has comparable and in some cases better results than hybrid and complex learning techniques proposed for wind power prediction. The proposed prediction system based on DBN, achieves mean values of RMSE, MAE and SDE as 0.124, 0.083 and 0.122, respectively. Statistical analysis of several independent executions of the proposed DBN-WP wind power prediction system demonstrates the stability of the system. The proposed DBN-WP architecture is easy to implement and offers generalization as regards the change in location of the wind farm is concerned.
△ Less
Submitted 31 July, 2018;
originally announced July 2018.
-
DeepSDCS: Dissecting cancer proliferation heterogeneity in Ki67 digital whole slide images
Authors:
Priya Lakshmi Narayanan,
Shan E Ahmed Raza,
Andrew Dodson,
Barry Gusterson,
Mitchell Dowsett,
Yinyin Yuan
Abstract:
Ki67 is an important biomarker for breast cancer. Classification of positive and negative Ki67 cells in histology slides is a common approach to determine cancer proliferation status. However, there is a lack of generalizable and accurate methods to automate Ki67 scoring in large-scale patient cohorts. In this work, we have employed a novel deep learning technique based on hypercolumn descriptors…
▽ More
Ki67 is an important biomarker for breast cancer. Classification of positive and negative Ki67 cells in histology slides is a common approach to determine cancer proliferation status. However, there is a lack of generalizable and accurate methods to automate Ki67 scoring in large-scale patient cohorts. In this work, we have employed a novel deep learning technique based on hypercolumn descriptors for cell classification in Ki67 images. Specifically, we developed the Simultaneous Detection and Cell Segmentation (DeepSDCS) network to perform cell segmentation and detection. VGG16 network was used for the training and fine tuning to training data. We extracted the hypercolumn descriptors of each cell to form the vector of activation from specific layers to capture features at different granularity. Features from these layers that correspond to the same pixel were propagated using a stochastic gradient descent optimizer to yield the detection of the nuclei and the final cell segmentations. Subsequently, seeds generated from cell segmentation were propagated to a spatially constrained convolutional neural network for the classification of the cells into stromal, lymphocyte, Ki67-positive cancer cell, and Ki67-negative cancer cell. We validated its accuracy in the context of a large-scale clinical trial of oestrogen-receptor-positive breast cancer. We achieved 99.06% and 89.59% accuracy on two separate test sets of Ki67 stained breast cancer dataset comprising biopsy and whole-slide images.
△ Less
Submitted 28 June, 2018;
originally announced June 2018.
-
Deconvolving convolution neural network for cell detection
Authors:
Shan E Ahmed Raza,
Khalid AbdulJabbar,
Mariam Jamal-Hanjani,
Selvaraju Veeriah,
John Le Quesne,
Charles Swanton,
Yinyin Yuan
Abstract:
Automatic cell detection in histology images is a challenging task due to varying size, shape and features of cells and stain variations across a large cohort. Conventional deep learning methods regress the probability of each pixel belonging to the centre of a cell followed by detection of local maxima. We present deconvolution as an alternate approach to local maxima detection. The ground truth…
▽ More
Automatic cell detection in histology images is a challenging task due to varying size, shape and features of cells and stain variations across a large cohort. Conventional deep learning methods regress the probability of each pixel belonging to the centre of a cell followed by detection of local maxima. We present deconvolution as an alternate approach to local maxima detection. The ground truth points are convolved with a mapping filter to generate artifical labels. A convolutional neural network (CNN) is modified to convolve it's output with the same mapping filter and is trained for the mapped labels. Output of the trained CNN is then deconvolved to generate points as cell detection. We compare our method with state-of-the-art deep learning approaches where the results show that the proposed approach detects cells with comparatively high precision and F1-score.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
Urdu Word Segmentation using Conditional Random Fields (CRFs)
Authors:
Haris Bin Zia,
Agha Ali Raza,
Awais Athar
Abstract:
State-of-the-art Natural Language Processing algorithms rely heavily on efficient word segmentation. Urdu is amongst languages for which word segmentation is a complex task as it exhibits space omission as well as space insertion issues. This is partly due to the Arabic script which although cursive in nature, consists of characters that have inherent joining and non-joining attributes regardless…
▽ More
State-of-the-art Natural Language Processing algorithms rely heavily on efficient word segmentation. Urdu is amongst languages for which word segmentation is a complex task as it exhibits space omission as well as space insertion issues. This is partly due to the Arabic script which although cursive in nature, consists of characters that have inherent joining and non-joining attributes regardless of word boundary. This paper presents a word segmentation system for Urdu which uses a Conditional Random Field sequence modeler with orthographic, linguistic and morphological features. Our proposed model automatically learns to predict white space as word boundary as well as Zero Width Non-Joiner (ZWNJ) as sub-word boundary. Using a manually annotated corpus, our model achieves F1 score of 0.97 for word boundary identification and 0.85 for sub-word boundary identification tasks. We have made our code and corpus publicly available to make our results reproducible.
△ Less
Submitted 14 June, 2018;
originally announced June 2018.
-
Micro-Net: A unified model for segmentation of various objects in microscopy images
Authors:
Shan E Ahmed Raza,
Linda Cheung,
Muhammad Shaban,
Simon Graham,
David Epstein,
Stella Pelengaris,
Michael Khan,
Nasir M. Rajpoot
Abstract:
Object segmentation and structure localization are important steps in automated image analysis pipelines for microscopy images. We present a convolution neural network (CNN) based deep learning architecture for segmentation of objects in microscopy images. The proposed network can be used to segment cells, nuclei and glands in fluorescence microscopy and histology images after slight tuning of inp…
▽ More
Object segmentation and structure localization are important steps in automated image analysis pipelines for microscopy images. We present a convolution neural network (CNN) based deep learning architecture for segmentation of objects in microscopy images. The proposed network can be used to segment cells, nuclei and glands in fluorescence microscopy and histology images after slight tuning of input parameters. The network trains at multiple resolutions of the input image, connects the intermediate layers for better localization and context and generates the output using multi-resolution deconvolution filters. The extra convolutional layers which bypass the max-pooling operation allow the network to train for variable input intensities and object size and make it robust to noisy data. We compare our results on publicly available data sets and show that the proposed network outperforms recent deep learning algorithms.
△ Less
Submitted 22 January, 2019; v1 submitted 22 April, 2018;
originally announced April 2018.
-
Real-World Modeling of a Pathfinding Robot Using Robot Operating System (ROS)
Authors:
Sayyed Jaffar Ali Raza,
Nitish A. Gupta,
Nisarg Chitaliya,
Gita R. Sukthankar
Abstract:
This paper presents a practical approach towards implementing pathfinding algorithms on real-world and low-cost non- commercial hardware platforms. While using robotics simulation platforms as a test-bed for our algorithms we easily overlook real- world exogenous problems that are developed by external factors. Such problems involve robot wheel slips, asynchronous motors, abnormal sensory data or…
▽ More
This paper presents a practical approach towards implementing pathfinding algorithms on real-world and low-cost non- commercial hardware platforms. While using robotics simulation platforms as a test-bed for our algorithms we easily overlook real- world exogenous problems that are developed by external factors. Such problems involve robot wheel slips, asynchronous motors, abnormal sensory data or unstable power sources. The real-world dynamics tend to be very painful even for executing simple algorithms like a Wavefront planner or A-star search. This paper addresses designing techniques that tend to be robust as well as reusable for any hardware platforms; covering problems like controlling asynchronous drives, odometry offset issues and handling abnormal sensory feedback. The algorithm implementation medium and hardware design tools have been kept general in order to present our work as a serving platform for future researchers and robotics enthusiast working in the field of path planning robotics.
△ Less
Submitted 27 February, 2018;
originally announced February 2018.
-
Management's Perspective on Critical Success Factors Affecting Mobile Learning in Higher Education Institutions - An Empirical Study
Authors:
Muasaad Alrasheedi,
Luiz Fernando Capretz,
Arif Raza
Abstract:
Mobile learning (m-Learning) is considered to be one of the fastest growing learning platforms. The immense interest in m-Learning is attributed to the incredible rate of growth of mobile technology and its proliferation into every aspect of modern life. Despite this, m-Learning has not experienced a similar adoption rate in the education sector, chiefly higher education. Researchers have attempte…
▽ More
Mobile learning (m-Learning) is considered to be one of the fastest growing learning platforms. The immense interest in m-Learning is attributed to the incredible rate of growth of mobile technology and its proliferation into every aspect of modern life. Despite this, m-Learning has not experienced a similar adoption rate in the education sector, chiefly higher education. Researchers have attempted to explain this anomaly by conducting several studies in the area. However, mostly the research in m-Learning is examined from the perspective of the students and educators. In this research, it is contended that there is a third important stakeholder group whose opinion is equally important in determining the success of m-Learning: the university management. Although diversified by nature, heads of departments, deans, and IT system administrators are nevertheless considered members of any university management. The results of the research show that university commitment to m-Learning, university learning practices, and change management practices were the factors critical to the success of m-Learning, from the university management perspective.
△ Less
Submitted 12 January, 2018;
originally announced January 2018.
-
PronouncUR: An Urdu Pronunciation Lexicon Generator
Authors:
Haris Bin Zia,
Agha Ali Raza,
Awais Athar
Abstract:
State-of-the-art speech recognition systems rely heavily on three basic components: an acoustic model, a pronunciation lexicon and a language model. To build these components, a researcher needs linguistic as well as technical expertise, which is a barrier in low-resource domains. Techniques to construct these three components without having expert domain knowledge are in great demand. Urdu, despi…
▽ More
State-of-the-art speech recognition systems rely heavily on three basic components: an acoustic model, a pronunciation lexicon and a language model. To build these components, a researcher needs linguistic as well as technical expertise, which is a barrier in low-resource domains. Techniques to construct these three components without having expert domain knowledge are in great demand. Urdu, despite having millions of speakers all over the world, is a low-resource language in terms of standard publically available linguistic resources. In this paper, we present a grapheme-to-phoneme conversion tool for Urdu that generates a pronunciation lexicon in a form suitable for use with speech recognition systems from a list of Urdu words. The tool predicts the pronunciation of words using a LSTM-based model trained on a handcrafted expert lexicon of around 39,000 words and shows an accuracy of 64% upon internal evaluation. For external evaluation on a speech recognition task, we obtain a word error rate comparable to one achieved using a fully handcrafted expert lexicon.
△ Less
Submitted 5 March, 2018; v1 submitted 1 January, 2018;
originally announced January 2018.
-
Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges
Authors:
Muhammad Usama,
Junaid Qadir,
Aunn Raza,
Hunain Arif,
Kok-Lim Alvin Yau,
Yehia Elkhatib,
Amir Hussain,
Ala Al-Fuqaha
Abstract:
While machine learning and artificial intelligence have long been applied in networking research, the bulk of such works has focused on supervised learning. Recently there has been a rising trend of employing unsupervised machine learning using unstructured raw network data to improve network performance and provide services such as traffic engineering, anomaly detection, Internet traffic classifi…
▽ More
While machine learning and artificial intelligence have long been applied in networking research, the bulk of such works has focused on supervised learning. Recently there has been a rising trend of employing unsupervised machine learning using unstructured raw network data to improve network performance and provide services such as traffic engineering, anomaly detection, Internet traffic classification, and quality of service optimization. The interest in applying unsupervised learning techniques in networking emerges from their great success in other fields such as computer vision, natural language processing, speech recognition, and optimal control (e.g., for developing autonomous self-driving cars). Unsupervised learning is interesting since it can unconstrain us from the need of labeled data and manual handcrafted feature engineering thereby facilitating flexible, general, and automated methods of machine learning. The focus of this survey paper is to provide an overview of the applications of unsupervised learning in the domain of networking. We provide a comprehensive survey highlighting the recent advancements in unsupervised learning techniques and describe their applications for various learning tasks in the context of networking. We also provide a discussion on future directions and open research issues, while also identifying potential pitfalls. While a few survey papers focusing on the applications of machine learning in networking have previously been published, a survey of similar scope and breadth is missing in literature. Through this paper, we advance the state of knowledge by carefully synthesizing the insights from these survey papers while also providing contemporary coverage of recent advances.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
Thinned Coprime Arrays for DOA Estimation
Authors:
Ahsan Raza,
Wei Liu,
Qing Shen
Abstract:
Sparse arrays can generate a larger aperture than traditional uniform linear arrays (ULA) and offer enhanced degrees-of-freedom (DOFs) which can be exploited in both beamforming and direction-of-arrival (DOA) estimation. One class of sparse arrays is the coprime array, composed of two uniform linear subarrays which yield an effective difference co-array with higher number of DOFs. In this work, we…
▽ More
Sparse arrays can generate a larger aperture than traditional uniform linear arrays (ULA) and offer enhanced degrees-of-freedom (DOFs) which can be exploited in both beamforming and direction-of-arrival (DOA) estimation. One class of sparse arrays is the coprime array, composed of two uniform linear subarrays which yield an effective difference co-array with higher number of DOFs. In this work, we present a new coprime array structure termed thinned coprime array (TCA), which exploits the redundancy in the structure of the existing coprime array and achieves the same virtual aperture and DOFs as the conventional coprime array with much fewer number of sensors. An analysis of the DOFs provided by the new structure in comparison with other sparse arrays is provided and simulation results for DOA estimation using the compressive sensing based method are provided.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Ensembles of Randomized Time Series Shapelets Provide Improved Accuracy while Reducing Computational Costs
Authors:
Atif Raza,
Stefan Kramer
Abstract:
Shapelets are discriminative time series subsequences that allow generation of interpretable classification models, which provide faster and generally better classification than the nearest neighbor approach. However, the shapelet discovery process requires the evaluation of all possible subsequences of all time series in the training set, making it extremely computation intensive. Consequently, s…
▽ More
Shapelets are discriminative time series subsequences that allow generation of interpretable classification models, which provide faster and generally better classification than the nearest neighbor approach. However, the shapelet discovery process requires the evaluation of all possible subsequences of all time series in the training set, making it extremely computation intensive. Consequently, shapelet discovery for large time series datasets quickly becomes intractable. A number of improvements have been proposed to reduce the training time. These techniques use approximation or discretization and often lead to reduced classification accuracy compared to the exact method.
We are proposing the use of ensembles of shapelet-based classifiers obtained using random sampling of the shapelet candidates. Using random sampling reduces the number of evaluated candidates and consequently the required computational cost, while the classification accuracy of the resulting models is also not significantly different than that of the exact algorithm. The combination of randomized classifiers rectifies the inaccuracies of individual models because of the diversity of the solutions. Based on the experiments performed, it is shown that the proposed approach of using an ensemble of inexpensive classifiers provides better classification accuracy compared to the exact method at a significantly lesser computational cost.
△ Less
Submitted 22 February, 2017;
originally announced February 2017.
-
Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling
Authors:
Calin Iorgulescu,
Florin Dinu,
Aunn Raza,
Wajih Ul Hassan,
Willy Zwaenepoel
Abstract:
Understanding the performance of data-parallel workloads when resource-constrained has significant practical importance but unfortunately has received only limited attention. This paper identifies, quantifies and demonstrates memory elasticity, an intrinsic property of data-parallel tasks. Memory elasticity allows tasks to run with significantly less memory that they would ideally want while only…
▽ More
Understanding the performance of data-parallel workloads when resource-constrained has significant practical importance but unfortunately has received only limited attention. This paper identifies, quantifies and demonstrates memory elasticity, an intrinsic property of data-parallel tasks. Memory elasticity allows tasks to run with significantly less memory that they would ideally want while only paying a moderate performance penalty. For example, we find that given as little as 10% of ideal memory, PageRank and NutchIndexing Hadoop reducers become only 1.2x/1.75x and 1.08x slower. We show that memory elasticity is prevalent in the Hadoop, Spark, Tez and Flink frameworks. We also show that memory elasticity is predictable in nature by building simple models for Hadoop and extending them to Tez and Spark.
To demonstrate the potential benefits of leveraging memory elasticity, this paper further explores its application to cluster scheduling. In this setting, we observe that the resource vs. time trade-off enabled by memory elasticity becomes a task queuing time vs task runtime trade-off. Tasks may complete faster when scheduled with less memory because their waiting time is reduced. We show that a scheduler can turn this task-level trade-off into improved job completion time and cluster-wide memory utilization. We have integrated memory elasticity into Apache YARN. We show gains of up to 60% in average job completion time on a 50-node Hadoop cluster. Extensive simulations show similar improvements over a large number of scenarios.
△ Less
Submitted 14 February, 2017;
originally announced February 2017.
-
Single mode waveguide platform for spontaneous and surface-enhanced on-chip Raman spectroscopy
Authors:
Ashim Dhakal,
Frédéric Peyskens,
Stéphane Clemmen,
Ali Raza,
Pieter Wuytens,
Haolan Zhao,
Nicolas Le Thomas,
Roel Baets
Abstract:
We review an on-chip approach for spontaneous Raman spectroscopy and Surface Enhanced Raman Spectroscopy (SERS) based on evanescent excitation of the analyte as well as evanescent collection of the Raman signal using Complementary Metal Oxide Semiconductor (CMOS) compatible single mode waveguides. The signal is either directly collected from the analyte molecules or via plasmonic nanoantennas inte…
▽ More
We review an on-chip approach for spontaneous Raman spectroscopy and Surface Enhanced Raman Spectroscopy (SERS) based on evanescent excitation of the analyte as well as evanescent collection of the Raman signal using Complementary Metal Oxide Semiconductor (CMOS) compatible single mode waveguides. The signal is either directly collected from the analyte molecules or via plasmonic nanoantennas integrated on top of the waveguides. Flexibility in the design of the geometry of the waveguide, and/or the geometry of the antennas, enables optimization of the collection efficiency. Furthermore the sensor can be integrated with additional functionality (sources, detectors, spectrometers) on the same chip. In this paper, the basic theoretical concepts are introduced to identify the key design parameters and some proof-of-concept experimental results are reviewed.
△ Less
Submitted 15 September, 2016;
originally announced September 2016.
-
An Empirical Study of Open Source Software Usability: The Industrial Perspective
Authors:
Arif Raza,
Luiz Fernando Capretz,
Faheem Ahmed
Abstract:
Recent years have seen a sharp increase in the use of open source projects by common novice users; Open Source Software (OSS) is thus no longer a reserved arena for software developers and computer gurus. Although user-centered designs are gaining popularity in OSS, usability is still not considered as one of the prime objectives in many design scenarios. In this paper, we analyze industry users p…
▽ More
Recent years have seen a sharp increase in the use of open source projects by common novice users; Open Source Software (OSS) is thus no longer a reserved arena for software developers and computer gurus. Although user-centered designs are gaining popularity in OSS, usability is still not considered as one of the prime objectives in many design scenarios. In this paper, we analyze industry users perception of usability factors, including understandability, learnability, operability and attractiveness, on OSS usability. The research model of this empirical study establishes the relationship between the key usability factors and OSS usability from industrial perspective. In order to conduct the study, a data set of 105 industry users is included. The results of the empirical investigation indicate the significance of the key factors for OSS usability.
△ Less
Submitted 27 November, 2015;
originally announced November 2015.
-
Maintenance Support in Open Source Software Projects
Authors:
Arif Raza,
Luiz Fernando Capretz,
Faheem Ahmed
Abstract:
Easy and mostly free access to the internet has resulted in the growing use of open source software (OSS). However, it is a common perception that closed proprietary software is still superior in areas such as software maintenance and management. The research model of this study establishes a relationship between maintenance issues (such as user requests and error handling) and support provided by…
▽ More
Easy and mostly free access to the internet has resulted in the growing use of open source software (OSS). However, it is a common perception that closed proprietary software is still superior in areas such as software maintenance and management. The research model of this study establishes a relationship between maintenance issues (such as user requests and error handling) and support provided by open source software through project forums, mailing lists and trackers. To conduct this research, we have used a dataset consisting of 120 open source software projects, covering a wide range of categories. The results of the study show that project forums and mailing lists play a significant role in addressing user requests in open source software. However according to the empirical investigation, it has been explored that trackers are used as an effective medium for error reporting as well as user requests.
△ Less
Submitted 27 November, 2015;
originally announced November 2015.
-
Influence of Personality Types in Software Tasks Choices
Authors:
Luiz Fernando Capretz,
Daniel Varona,
Arif Raza
Abstract:
According to psychology, not everybody can excel at all kinds of tasks. Thus, chances of a successful outcome of software development increase if people with particular personality types are assigned to their preferred tasks in the project. Likewise, software development depends significantly on how software practitioners perform their tasks. This empirical study surveys 100 Cuban software develop…
▽ More
According to psychology, not everybody can excel at all kinds of tasks. Thus, chances of a successful outcome of software development increase if people with particular personality types are assigned to their preferred tasks in the project. Likewise, software development depends significantly on how software practitioners perform their tasks. This empirical study surveys 100 Cuban software developers, who also teach or study at the University of Informatics Sciences in Havana, Cuba. This work aims to find possible patterns that link personality types to role preferences in a software life cycle. Among the various roles, system analyst, software designer, and programmer are found to be the most preferred among the participants. In contrast, software tester and software maintainer happen to be the least popular roles among software engineers.
△ Less
Submitted 13 November, 2015;
originally announced November 2015.
-
A Systematic Literature Review of the Critical Factors for Success of Mobile Learning in Higher Education (University Students' Perspective)
Authors:
Muasaad Alrasheedi,
Luiz Fernando Capretz,
Arif Raza
Abstract:
The phenomenon of the use of a mobile learning (m-Learning) platform in educational institutions is slowly gaining momentum. While this can be taken as an encouraging sign, the perplexing part is that the fervor with which mobile phones have been welcomed into every aspect of our lives does not seem to be evident in the educational sector. In order to understand the reason, it is important to unde…
▽ More
The phenomenon of the use of a mobile learning (m-Learning) platform in educational institutions is slowly gaining momentum. While this can be taken as an encouraging sign, the perplexing part is that the fervor with which mobile phones have been welcomed into every aspect of our lives does not seem to be evident in the educational sector. In order to understand the reason, it is important to understand user expectations of the system. This paper documents a systematic review of various research studies seeking to find the success factors for effective m-Learning. A total of 30 studies were included in the research, which combined would give a true picture of user perceptions of the factors they consider important for effective m-Learning implementation. Our systematic review collates results from 30 studies conducted in 17 countries, where 13 critical success factors (CSFs) were found to strongly impact m-Learning.
△ Less
Submitted 13 November, 2015;
originally announced November 2015.
-
Personality Profiles of Software Engineers and Their Software Quality Preferences
Authors:
Arif Raza,
Luiz Fernando Capretz,
Zaka ul-Mustafa
Abstract:
Studies related to human aspects in software engineering (SE) have been performed from different perspectives. These perspectives include the study of human factors in different phases of software life cycle, effect of team performance in software development, how can a personality trait suit a particular task, and about some other miscellaneous issues. This research work aims to establish persona…
▽ More
Studies related to human aspects in software engineering (SE) have been performed from different perspectives. These perspectives include the study of human factors in different phases of software life cycle, effect of team performance in software development, how can a personality trait suit a particular task, and about some other miscellaneous issues. This research work aims to establish personality profiles of Pakistani software engineers using the Myers-Briggs Type Indicator (MBTI) instrument. In this survey, we have collected personality profiles of 110 software engineers. Moreover, their preferences of software quality attributes have also been collected. Analysis of the study shows that the most prominent personality type is a combination of introversion, sensing, thinking and judging. Investigative results indicate that most of the software engineers consider usability and functionality as the most important software quality attributes.
△ Less
Submitted 13 November, 2015;
originally announced November 2015.
-
Usability as a Dominant Quality Attribute
Authors:
Arif Raza,
Luiz Fernando Capretz
Abstract:
Whenever an architect or a team of architects begins an architectural design, there are certain goals set to achieve. There are many factors involved in setting up goals for the architecture design such as type of the project, end user perspective, functional and non-functional requirements and so on. This paper reviews and further elaborates strategy for the usability characteristics of software…
▽ More
Whenever an architect or a team of architects begins an architectural design, there are certain goals set to achieve. There are many factors involved in setting up goals for the architecture design such as type of the project, end user perspective, functional and non-functional requirements and so on. This paper reviews and further elaborates strategy for the usability characteristics of software architecture. Although user centered designs are tremendously gaining popularity, still in many design scenarios, usability is barely even considered as one of the primary goals. This work provides an opportunity to compare different strategies and evaluate their pros and cons.
△ Less
Submitted 25 August, 2015;
originally announced August 2015.
-
Addressing User Requirements in Opens Source Software: The Role of Online Forums
Authors:
Arif Raza,
Luiz Fernando Capretz
Abstract:
User satisfaction has always been important in the success of software, regardless of whether it is closed and proprietary or open source software (OSS). OSS users are geographically distributed and include technical as well as novice users. However, it is generally believed that if OSS was more usable, its popularity would increase tremendously. Hence, users and their requirements need to be addr…
▽ More
User satisfaction has always been important in the success of software, regardless of whether it is closed and proprietary or open source software (OSS). OSS users are geographically distributed and include technical as well as novice users. However, it is generally believed that if OSS was more usable, its popularity would increase tremendously. Hence, users and their requirements need to be addressed in the priorities of an OSS environment. Online public forums are a major medium of communication for the OSS community. The research model of this work studies the relationship between user requirements in open source software and online public forums. To conduct this research, we used a dataset consisting of 100 open source software projects in different categories. The results show that online forums play a significant role in identifying user requirements and addressing their requests in open source software.
△ Less
Submitted 24 July, 2015;
originally announced July 2015.
-
Personality Dimensions and Temperaments of Engineering Professors and Students - A Survey
Authors:
Arif Raza,
Zaka-u-Mustafa,
Luiz Fernando Capretz
Abstract:
This research work aims to study personality profiles and temperaments of Pakistani software engineering professors and students. In this survey we have collected personality profiles of 18 professors and 92 software engineering students. According to the Myers-Briggs Type Indicator (MBTI) instrument, the most prominent personality type among professors as well as among students is a combination o…
▽ More
This research work aims to study personality profiles and temperaments of Pakistani software engineering professors and students. In this survey we have collected personality profiles of 18 professors and 92 software engineering students. According to the Myers-Briggs Type Indicator (MBTI) instrument, the most prominent personality type among professors as well as among students is a combination of Introversion, Sensing, Thinking, and Judging (ISTJ). The study shows ITs (Introverts and Thinking) and IJs (Introverts and Judging) are the leading temperaments among the professors. About the students data, the results of the study indicate SJs (Sensing and Judging) and ISs (Introverts and Sensing) as the dominant temperaments.
△ Less
Submitted 24 July, 2015;
originally announced July 2015.
-
Do Open Source Software Developers Listen to Their Users?
Authors:
Arif Raza,
Luiz Fernando Capretz
Abstract:
In application software, the satisfaction of target users makes the software more acceptable. Open Source Software (OSS) systems have neither the physical nor the commercial boundaries of proprietary software, thus users from all over the world can interact with them. This free access is advantageous, as increasing numbers of users are able to access OSS; there are more chances of improvement. Thi…
▽ More
In application software, the satisfaction of target users makes the software more acceptable. Open Source Software (OSS) systems have neither the physical nor the commercial boundaries of proprietary software, thus users from all over the world can interact with them. This free access is advantageous, as increasing numbers of users are able to access OSS; there are more chances of improvement. This study examines the way users feedback is handled by OSS developers. In our survey, we have also inquired whether OSS developers consult professional usability experts to improve their projects. According to the results, majority of OSS developers neither consider usability as their top priority nor do they consult usability experts.
△ Less
Submitted 24 July, 2015;
originally announced July 2015.
-
Do Personality Profiles Differ in the Pakistani Software Industry and Academia - A Case Study
Authors:
Arif Raza,
Zaka-ul-Mustafa,
Luiz Fernando Capretz
Abstract:
Effects of personality profiles and human factors in software engineering (SE) have been studied from different perspectives, such as: software life cycle, team performance, software quality attributes, and so on. This study intends to compare personality profiles of software engineers in academia and industry. In this survey we have collected personality profiles of software engineers from academ…
▽ More
Effects of personality profiles and human factors in software engineering (SE) have been studied from different perspectives, such as: software life cycle, team performance, software quality attributes, and so on. This study intends to compare personality profiles of software engineers in academia and industry. In this survey we have collected personality profiles of software engineers from academia and the local industry in Pakistan. According to the Myers- Briggs Type Indicator (MBTI) instrument, the most prominent personality type among Pakistani academicians is a combination of Introversion, Sensing, Thinking, and Judging (ISTJ). However the most dominant personality type among software engineers in the Pakistani software industry is a combination of Extroversion, Sensing, Thinking, and Judging (ESTJ). The results of study establish that software engineers working in industry are mostly Extroverts as compared to those in academia who tend to be Introverts. The dimensions: Sensing, Thinking, and Judging (STJ), however, remain common in the dominant personality types of software engineers, both in Pakistani software industry and academia.
△ Less
Submitted 24 July, 2015;
originally announced July 2015.
-
Contributors Preference in Open Source Software Usability: An Empirical Study
Authors:
Arif Raza,
Luiz Fernando Capretz
Abstract:
The fact that the number of users of open source software (OSS) is practically un-limited and that ultimately the software quality is determined by end users experience, makes the usability an even more critical quality attribute than it is for proprietary software. With the sharp increase in use of open source projects by both individuals and organizations, the level of usability and related issu…
▽ More
The fact that the number of users of open source software (OSS) is practically un-limited and that ultimately the software quality is determined by end users experience, makes the usability an even more critical quality attribute than it is for proprietary software. With the sharp increase in use of open source projects by both individuals and organizations, the level of usability and related issues must be addressed more seriously. The research model of this empirical investigation studies and establishes the relationship between the key usability factors from contributors perspective and OSS usability. A data set of 78 OSS contributors that includes architects, designers, developers, testers and users from 22 open source projects of varied size has been used to study the research model. The results of this study provide empirical evidence by indicating that the highlighted key factors play a significant role in improving OSS usability.
△ Less
Submitted 24 July, 2015;
originally announced July 2015.
-
Instructor Perspectives of Mobile Learning Platform: An Empirical Study
Authors:
Muasaad Alrasheedi,
Luiz Fernando Capretz,
Arif Raza
Abstract:
Mobile learning (mLearning) is the cutting-edge learning platform to really gain traction, driven mostly by the huge uptake in smartphones and their ever increasing uses within the educational society. Education has long benefitted from the proliferation of technology; however, mLearning adoption has not proceeded at the pace one might expect. There is a disconnect between the rate of adoption of…
▽ More
Mobile learning (mLearning) is the cutting-edge learning platform to really gain traction, driven mostly by the huge uptake in smartphones and their ever increasing uses within the educational society. Education has long benefitted from the proliferation of technology; however, mLearning adoption has not proceeded at the pace one might expect. There is a disconnect between the rate of adoption of the underlying platform (smartphones) and the use of that technology within learning. The reasons behind this have been the subject of several research studies. However, previous studies have mostly focused on investigating the critical success factors (CSFs) from the student perspectives. In this research, we have carried out an extensive study of the six factors that impact the success of mLearning from instructors perspectives. The results of the research showed that three factors: technical competence of instructors, Instructors autonomy, and blended learning are the most important elements that contribute to mLearning adoption from instructors perspectives.
△ Less
Submitted 20 July, 2015;
originally announced July 2015.
-
Dipole-containing encapsulation on WSe2/MoS2 nanoflake p-n diode with glass substrate toward an ideal performance
Authors:
Pyo Jin Jeon,
Sung-Wook Min,
Jin Sung Kim,
Syed Raza Ali Raza,
Kyung Hee Choi,
Hee Sung Lee,
Young Tack Lee,
Do Kyung Hwang,
Hyoung Joon Choi,
Seongil Im
Abstract:
We report on p-WSe2/n-MoS2 heterojunction diodes fabricated both on glass and SiO2/p+-Si substrates. The electrostatic performance and stability of our diode were successfully improved toward ideal current-voltage (I-V) behavior by adopting the fluoropolymer CYTOP encapsulation layer on top of our diode; reduction of reverse-bias leakage current and enhancement of forward-bias on current were achi…
▽ More
We report on p-WSe2/n-MoS2 heterojunction diodes fabricated both on glass and SiO2/p+-Si substrates. The electrostatic performance and stability of our diode were successfully improved toward ideal current-voltage (I-V) behavior by adopting the fluoropolymer CYTOP encapsulation layer on top of our diode; reduction of reverse-bias leakage current and enhancement of forward-bias on current were achieved along with good aging stability in air ambient. Such performance improvement is attributed to the intrinsic properties of CYTOP materials with C-F bonds whose strong dipole moment causes hole accumulation, while the strong hydrophobicity of CYTOP would prevent ambient molecule adsorption on 2D semiconductor surface. Moreover, fabricated on glass, our p-n diode displayed good dynamic rectification at over 100 Hz, without displacement current-induced signal overshoot/undershoot which was shown in the other diode on SiO2/p+-Si. Little I-V hysteresis in our diode is another benefit of glass substrate. We conclude that our CYTOP-encapsulated WSe2/MoS2 p-n diode on glass is a high performance and ambient stable 2D nanodevice toward future advanced electronics.
△ Less
Submitted 23 December, 2014;
originally announced December 2014.
-
Content Distribution Strategies in Opportunistic Networks
Authors:
Syed Haani Masood,
Syed Ali Raza,
Mark Coates
Abstract:
This paper describes a mechanism for content distribution through opportunistic contacts between subscribers. A subset of subscribers in the network are seeded with the content. The remaining subscribers obtain the information through opportunistic contact with a user carrying the updated content. We study how the rate of content retrieval by subscribers is affected by the number of initial seeder…
▽ More
This paper describes a mechanism for content distribution through opportunistic contacts between subscribers. A subset of subscribers in the network are seeded with the content. The remaining subscribers obtain the information through opportunistic contact with a user carrying the updated content. We study how the rate of content retrieval by subscribers is affected by the number of initial seeders in the network. We also study the rate of content retrieval by the subscribers under coding strategies (Network Coding, Erasure Coding) and under Flooding, Epidemic Routing.
△ Less
Submitted 4 August, 2013;
originally announced August 2013.
-
Immuno-inspired robotic applications: a review
Authors:
Ali Raza,
Benito R. Fernandez
Abstract:
Artificial immune systems primarily mimic the adaptive nature of biological immune functions. Their ability to adapt to varying pathogens makes such systems a suitable choice for various robotic applications. Generally, AIS-based robotic applications map local instantaneous sensory information into either an antigen or a co-stimulatory signal, according to the choice of representation schema. Algo…
▽ More
Artificial immune systems primarily mimic the adaptive nature of biological immune functions. Their ability to adapt to varying pathogens makes such systems a suitable choice for various robotic applications. Generally, AIS-based robotic applications map local instantaneous sensory information into either an antigen or a co-stimulatory signal, according to the choice of representation schema. Algorithms then use relevant immune functions to output either evolved antibodies or maturity of dendritic cells, in terms of actuation signals. It is observed that researchers, in an attempt to solve the problem in hand, do not try to replicate the biological immunity but select necessary immune functions instead, resulting in an ad-hoc manner these applications are reported. Authors, therefore, present a comprehensive review of immuno-inspired robotic applications in an attempt to categorize them according to underlying immune definitions. Implementation details are tabulated in terms of corresponding mathematical expressions and their representation schema that include binary, real or hybrid data. Limitations of reported applications are also identified in light of modern immunological interpretations. As a result of this study, authors suggest a renewed focus on innate immunity and also emphasize that immunological representations should benefit from robot embodiment and must be extended to include modern trends.
△ Less
Submitted 20 February, 2012;
originally announced February 2012.
-
A symplectic construction of Calabi's extremal Kähler metrics on the blow-up of $\bbC\bbP^n$ at one point
Authors:
Aleksis Raza
Abstract:
We apply a local differential geometric framework from Kähler toric geometry to (re)construct Calabi's extremal Kähler metrics on $\bbC\bbP^n$ blown-up at a point from data on the moment polytope.
We apply a local differential geometric framework from Kähler toric geometry to (re)construct Calabi's extremal Kähler metrics on $\bbC\bbP^n$ blown-up at a point from data on the moment polytope.
△ Less
Submitted 26 March, 2005; v1 submitted 22 March, 2005;
originally announced March 2005.
-
An application of Guillemin-Abreu theory to a non-abelian group action
Authors:
Aleksis Raza
Abstract:
This note is a step towards demonstrating the benefits of a symplectic approach to studying equivariant Kähler geometry. We apply a local differential geometric framework from Kähler toric geometry due to Guillemin & Abreu to the case of the standard linear $\SU(n)$ action on $\bbC^n\setminus\{0\}$. Using this framework we (re)construct a scalar-flat Kähler metric on the blow-up of $\bbC^n$ at t…
▽ More
This note is a step towards demonstrating the benefits of a symplectic approach to studying equivariant Kähler geometry. We apply a local differential geometric framework from Kähler toric geometry due to Guillemin & Abreu to the case of the standard linear $\SU(n)$ action on $\bbC^n\setminus\{0\}$. Using this framework we (re)construct a scalar-flat Kähler metric on the blow-up of $\bbC^n$ at the origin from data on the moment polytope.
△ Less
Submitted 27 March, 2005; v1 submitted 22 October, 2004;
originally announced October 2004.