-
Exploring Fault-Energy Trade-offs in Approximate DNN Hardware Accelerators
Authors:
Ayesha Siddique,
Kanad Basu,
Khaza Anuarul Hoque
Abstract:
Systolic array-based deep neural network (DNN) accelerators have recently gained prominence for their low computational cost. However, their high energy consumption poses a bottleneck to their deployment in energy-constrained devices. To address this problem, approximate computing can be employed at the cost of some tolerable accuracy loss. However, such small accuracy variations may increase the…
▽ More
Systolic array-based deep neural network (DNN) accelerators have recently gained prominence for their low computational cost. However, their high energy consumption poses a bottleneck to their deployment in energy-constrained devices. To address this problem, approximate computing can be employed at the cost of some tolerable accuracy loss. However, such small accuracy variations may increase the sensitivity of DNNs towards undesired subtle disturbances, such as permanent faults. The impact of permanent faults in accurate DNNs has been thoroughly investigated in the literature. Conversely, the impact of permanent faults in approximate DNN accelerators (AxDNNs) is yet under-explored. The impact of such faults may vary with the fault bit positions, activation functions and approximation errors in AxDNN layers. Such dynamacity poses a considerable challenge to exploring the trade-off between their energy efficiency and fault resilience in AxDNNs. Towards this, we present an extensive layer-wise and bit-wise fault resilience and energy analysis of different AxDNNs, using the state-of-the-art Evoapprox8b signed multipliers. In particular, we vary the stuck-at-0, stuck-at-1 fault-bit positions, and activation functions to study their impact using the most widely used MNIST and Fashion-MNIST datasets. Our quantitative analysis shows that the permanent faults exacerbate the accuracy loss in AxDNNs when compared to the accurate DNN accelerators. For instance, a permanent fault in AxDNNs can lead up to 66\% accuracy loss, whereas the same faulty bit can lead to only 9\% accuracy loss in an accurate DNN accelerator. Our results demonstrate that the fault resilience in AxDNNs is orthogonal to the energy efficiency.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Deep Convolutional Neural Networks Model-based Brain Tumor Detection in Brain MRI Images
Authors:
Md. Abu Bakr Siddique,
Shadman Sakib,
Mohammad Mahmudur Rahman Khan,
Abyaz Kader Tanzeem,
Madiha Chowdhury,
Nowrin Yasmin
Abstract:
Diagnosing Brain Tumor with the aid of Magnetic Resonance Imaging (MRI) has gained enormous prominence over the years, primarily in the field of medical science. Detection and/or partitioning of brain tumors solely with the aid of MR imaging is achieved at the cost of immense time and effort and demands a lot of expertise from engaged personnel. This substantiates the necessity of fabricating an a…
▽ More
Diagnosing Brain Tumor with the aid of Magnetic Resonance Imaging (MRI) has gained enormous prominence over the years, primarily in the field of medical science. Detection and/or partitioning of brain tumors solely with the aid of MR imaging is achieved at the cost of immense time and effort and demands a lot of expertise from engaged personnel. This substantiates the necessity of fabricating an autonomous model brain tumor diagnosis. Our work involves implementing a deep convolutional neural network (DCNN) for diagnosing brain tumors from MR images. The dataset used in this paper consists of 253 brain MR images where 155 images are reported to have tumors. Our model can single out the MR images with tumors with an overall accuracy of 96%. The model outperformed the existing conventional methods for the diagnosis of brain tumor in the test dataset (Precision = 0.93, Sensitivity = 1.00, and F1-score = 0.97). Moreover, the proposed model's average precision-recall score is 0.93, Cohen's Kappa 0.91, and AUC 0.95. Therefore, the proposed model can help clinical experts verify whether the patient has a brain tumor and, consequently, accelerate the treatment procedure.
△ Less
Submitted 3 October, 2020;
originally announced October 2020.
-
Prediction of Temperature and Rainfall in Bangladesh using Long Short Term Memory Recurrent Neural Networks
Authors:
Mohammad Mahmudur Rahman Khan,
Md. Abu Bakr Siddique,
Shadman Sakib,
Anas Aziz,
Ihtyaz Kader Tasawar,
Ziad Hossain
Abstract:
Temperature and rainfall have a significant impact on economic growth as well as the outbreak of seasonal diseases in a region. In spite of that inadequate studies have been carried out for analyzing the weather pattern of Bangladesh implementing the artificial neural network. Therefore, in this study, we are implementing a Long Short-term Memory (LSTM) model to forecast the month-wise temperature…
▽ More
Temperature and rainfall have a significant impact on economic growth as well as the outbreak of seasonal diseases in a region. In spite of that inadequate studies have been carried out for analyzing the weather pattern of Bangladesh implementing the artificial neural network. Therefore, in this study, we are implementing a Long Short-term Memory (LSTM) model to forecast the month-wise temperature and rainfall by analyzing 115 years (1901-2015) of weather data of Bangladesh. The LSTM model has shown a mean error of -0.38oC in case of predicting the month-wise temperature for 2 years and -17.64mm in case of predicting the rainfall. This prediction model can help to understand the weather pattern changes as well as studying seasonal diseases of Bangladesh whose outbreaks are dependent on regional temperature and/or rainfall.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
Electrocardiogram Heartbeat Classification Using Convolutional Neural Networks for the Detection of Cardiac Arrhythmia
Authors:
Mohammad Mahmudur Rahman Khan,
Md. Abu Bakr Siddique,
Shadman Sakib,
Anas Aziz,
Abyaz Kader Tanzeem,
Ziad Hossain
Abstract:
The classification of the electrocardiogram (ECG) signal has a vital impact on identifying heart-related diseases. This can ensure the premature finding of heart disease and the proper selection of the patient's customized treatment. However, the detection of arrhythmia is a challenging task to perform manually. This justifies the necessity of a technique for automatic detection of abnormal heart…
▽ More
The classification of the electrocardiogram (ECG) signal has a vital impact on identifying heart-related diseases. This can ensure the premature finding of heart disease and the proper selection of the patient's customized treatment. However, the detection of arrhythmia is a challenging task to perform manually. This justifies the necessity of a technique for automatic detection of abnormal heart signals. Therefore, our work is based on the classification of five classes of ECG arrhythmic signals from Physionet's MIT-BIH Arrhythmia Dataset. Artificial Neural Networks (ANN) have demonstrated significant success in ECG signal classification. Our proposed model is a Convolutional Neural Network (CNN) customized to categorize the ECG signals. Our result testifies that the planned CNN model can successfully categorize arrhythmia with an overall accuracy of 95.2%. The average precision and recall of the proposed model are 95.2% and 95.4%, respectively. This model can effectively be used to detect irregularities of heart rhythm at an early stage.
△ Less
Submitted 5 October, 2020;
originally announced October 2020.
-
App-Aware Response Synthesis for User Reviews
Authors:
Umar Farooq,
A. B. Siddique,
Fuad Jamour,
Zhijia Zhao,
Vagelis Hristidis
Abstract:
Responding to user reviews promptly and satisfactorily improves application ratings, which is key to application popularity and success. The proliferation of such reviews makes it virtually impossible for developers to keep up with responding manually. To address this challenge, recent work has shown the possibility of automatic response generation. However, because the training review-response pa…
▽ More
Responding to user reviews promptly and satisfactorily improves application ratings, which is key to application popularity and success. The proliferation of such reviews makes it virtually impossible for developers to keep up with responding manually. To address this challenge, recent work has shown the possibility of automatic response generation. However, because the training review-response pairs are aggregated from many different apps, it remains challenging for such models to generate app-specific responses, which, on the other hand, are often desirable as apps have different features and concerns. Solving the challenge by simply building a model per app (i.e., training with review-response pairs of a single app) may be insufficient because individual apps have limited review-response pairs, and such pairs typically lack the relevant information needed to respond to a new review. To enable app-specific response generation, this work proposes AARSynth: an app-aware response synthesis system. The key idea behind AARSynth is to augment the seq2seq model with information specific to a given app. Given a new user review, it first retrieves the top-K most relevant app reviews and the most relevant snippet from the app description. The retrieved information and the new user review are then fed into a fused machine learning model that integrates the seq2seq model with a machine reading comprehension model. The latter helps digest the retrieved reviews and app description. Finally, the fused model generates a response that is customized to the given app. We evaluated AARSynth using a large corpus of reviews and responses from Google Play. The results show that AARSynth outperforms the state-of-the-art system by 22.2% on BLEU-4 score. Furthermore, our human study shows that AARSynth produces a statistically significant improvement in response quality compared to the state-of-the-art system.
△ Less
Submitted 10 November, 2020; v1 submitted 30 July, 2020;
originally announced July 2020.
-
Performance Evaluation of t-SNE and MDS Dimensionality Reduction Techniques with KNN, ENN and SVM Classifiers
Authors:
Shadman Sakib,
Md. Abu Bakr Siddique,
Md. Abdur Rahman
Abstract:
The central goal of this paper is to establish two commonly available dimensionality reduction (DR) methods i.e. t-distributed Stochastic Neighbor Embedding (t-SNE) and Multidimensional Scaling (MDS) in Matlab and to observe their application in several datasets. These DR techniques are applied to nine different datasets namely CNAE9, Segmentation, Seeds, Pima Indians diabetes, Parkinsons, Movemen…
▽ More
The central goal of this paper is to establish two commonly available dimensionality reduction (DR) methods i.e. t-distributed Stochastic Neighbor Embedding (t-SNE) and Multidimensional Scaling (MDS) in Matlab and to observe their application in several datasets. These DR techniques are applied to nine different datasets namely CNAE9, Segmentation, Seeds, Pima Indians diabetes, Parkinsons, Movement Libras, Mammographic Masses, Knowledge, and Ionosphere acquired from UCI machine learning repository. By applying t-SNE and MDS algorithms, each dataset is transformed to the half of its original dimension by eliminating unnecessary features from the datasets. Subsequently, these datasets with reduced dimensions are fed into three supervised classification algorithms for classification. These classification algorithms are K Nearest Neighbors (KNN), Extended Nearest Neighbors (ENN), and Support Vector Machine (SVM). Again, all these algorithms are implemented in Matlab. The training and test data ratios are maintained as ninety percent: ten percent for each dataset. Upon accuracy observation, the efficiency for every dimensionality technique with availed classification algorithms is analyzed and the performance of each classifier is evaluated.
△ Less
Submitted 20 June, 2020;
originally announced July 2020.
-
Tracking Passengers and Baggage Items Using Multiple Overhead Cameras at Security Checkpoints
Authors:
Abubakar Siddique,
Henry Medeiros
Abstract:
We introduce a novel framework to track multiple objects in overhead camera videos for airport checkpoint security scenarios where targets correspond to passengers and their baggage items. We propose a self-supervised learning (SSL) technique to provide the model information about instance segmentation uncertainty from overhead images. Our SSL approach improves object detection by employing a test…
▽ More
We introduce a novel framework to track multiple objects in overhead camera videos for airport checkpoint security scenarios where targets correspond to passengers and their baggage items. We propose a self-supervised learning (SSL) technique to provide the model information about instance segmentation uncertainty from overhead images. Our SSL approach improves object detection by employing a test-time data augmentation and a regression-based, rotation-invariant pseudo-label refinement technique. Our pseudo-label generation method provides multiple geometrically transformed images as inputs to a convolutional neural network (CNN), regresses the augmented detections generated by the network to reduce localization errors, and then clusters them using the mean-shift algorithm. The self-supervised detector model is used in a single-camera tracking algorithm to generate temporal identifiers for the targets. Our method also incorporates a multiview trajectory association mechanism to maintain consistent temporal identifiers as passengers travel across camera views. An evaluation of detection, tracking, and association performances on videos obtained from multiple overhead cameras in a realistic airport checkpoint environment demonstrates the effectiveness of the proposed approach. Our results show that self-supervision improves object detection accuracy by up to 42% without increasing the inference time of the model. Our multicamera association method achieves up to 89% multiobject tracking accuracy with an average computation time of less than 15 ms.
△ Less
Submitted 27 February, 2024; v1 submitted 15 July, 2020;
originally announced July 2020.
-
Unsupervised Spatio-temporal Latent Feature Clustering for Multiple-object Tracking and Segmentation
Authors:
Abubakar Siddique,
Reza Jalil Mozhdehi,
Henry Medeiros
Abstract:
Assigning consistent temporal identifiers to multiple moving objects in a video sequence is a challenging problem. A solution to that problem would have immediate ramifications in multiple object tracking and segmentation problems. We propose a strategy that treats the temporal identification task as a spatio-temporal clustering problem. We propose an unsupervised learning approach using a convolu…
▽ More
Assigning consistent temporal identifiers to multiple moving objects in a video sequence is a challenging problem. A solution to that problem would have immediate ramifications in multiple object tracking and segmentation problems. We propose a strategy that treats the temporal identification task as a spatio-temporal clustering problem. We propose an unsupervised learning approach using a convolutional and fully connected autoencoder, which we call deep heterogeneous autoencoder, to learn discriminative features from segmentation masks and detection bounding boxes. We extract masks and their corresponding bounding boxes from a pretrained instance segmentation network and train the autoencoders jointly using task-dependent uncertainty weights to generate common latent features. We then construct constraints graphs that encourage associations among objects that satisfy a set of known temporal conditions. The feature vectors and the constraints graphs are then provided to the kmeans clustering algorithm to separate the corresponding data points in the latent space. We evaluate the performance of our method using challenging synthetic and real-world multiple-object video datasets. Our results show that our technique outperforms several state-of-the-art methods.
△ Less
Submitted 4 November, 2021; v1 submitted 14 July, 2020;
originally announced July 2020.
-
Unsupervised Paraphrasing via Deep Reinforcement Learning
Authors:
A. B. Siddique,
Samet Oymak,
Vagelis Hristidis
Abstract:
Paraphrasing is expressing the meaning of an input sentence in different wording while maintaining fluency (i.e., grammatical and syntactical correctness). Most existing work on paraphrasing use supervised models that are limited to specific domains (e.g., image captions). Such models can neither be straightforwardly transferred to other domains nor generalize well, and creating labeled training d…
▽ More
Paraphrasing is expressing the meaning of an input sentence in different wording while maintaining fluency (i.e., grammatical and syntactical correctness). Most existing work on paraphrasing use supervised models that are limited to specific domains (e.g., image captions). Such models can neither be straightforwardly transferred to other domains nor generalize well, and creating labeled training data for new domains is expensive and laborious. The need for paraphrasing across different domains and the scarcity of labeled training data in many such domains call for exploring unsupervised paraphrase generation methods. We propose Progressive Unsupervised Paraphrasing (PUP): a novel unsupervised paraphrase generation method based on deep reinforcement learning (DRL). PUP uses a variational autoencoder (trained using a non-parallel corpus) to generate a seed paraphrase that warm-starts the DRL model. Then, PUP progressively tunes the seed paraphrase guided by our novel reward function which combines semantic adequacy, language fluency, and expression diversity measures to quantify the quality of the generated paraphrases in each iteration without needing parallel sentences. Our extensive experimental evaluation shows that PUP outperforms unsupervised state-of-the-art paraphrasing techniques in terms of both automatic metrics and user studies on four real datasets. We also show that PUP outperforms domain-adapted supervised algorithms on several datasets. Our evaluation also shows that PUP achieves a great trade-off between semantic similarity and diversity of expression.
△ Less
Submitted 5 July, 2020;
originally announced July 2020.
-
Performance Analysis of Deep Autoencoder and NCA Dimensionality Reduction Techniques with KNN, ENN and SVM Classifiers
Authors:
Md. Abu Bakr Siddique,
Shadman Sakib,
Md. Abdur Rahman
Abstract:
The central aim of this paper is to implement Deep Autoencoder and Neighborhood Components Analysis (NCA) dimensionality reduction methods in Matlab and to observe the application of these algorithms on nine unlike datasets from UCI machine learning repository. These datasets are CNAE9, Movement Libras, Pima Indians diabetes, Parkinsons, Knowledge, Segmentation, Seeds, Mammographic Masses, and Ion…
▽ More
The central aim of this paper is to implement Deep Autoencoder and Neighborhood Components Analysis (NCA) dimensionality reduction methods in Matlab and to observe the application of these algorithms on nine unlike datasets from UCI machine learning repository. These datasets are CNAE9, Movement Libras, Pima Indians diabetes, Parkinsons, Knowledge, Segmentation, Seeds, Mammographic Masses, and Ionosphere. First of all, the dimension of these datasets has been reduced to fifty percent of their original dimension by selecting and extracting the most relevant and appropriate features or attributes using Deep Autoencoder and NCA dimensionality reduction techniques. Afterward, each dataset is classified applying K-Nearest Neighbors (KNN), Extended Nearest Neighbors (ENN) and Support Vector Machine (SVM) classification algorithms. All classification algorithms are developed in the Matlab environment. In each classification, the training test data ratio is always set to ninety percent: ten percent. Upon classification, variation between accuracies is observed and analyzed to find the degree of compatibility of each dimensionality reduction technique with each classifier and to evaluate each classifier performance on each dataset.
△ Less
Submitted 24 December, 2019; v1 submitted 11 December, 2019;
originally announced December 2019.
-
Non-Intrusive Electrical Appliances Monitoring and Classification using K-Nearest Neighbors
Authors:
Mohammad Mahmudur Rahman Khan,
Md. Abu Bakr Siddique,
Shadman Sakib
Abstract:
Non-Intrusive Load Monitoring (NILM) is the method of detecting an individual device's energy signal from an aggregated energy consumption signature [1]. As existing energy meters provide very little to no information regarding the energy consumption of individual appliances apart from the aggregated power rating, the spotting of individual appliances' energy usages by NILM will not only provide c…
▽ More
Non-Intrusive Load Monitoring (NILM) is the method of detecting an individual device's energy signal from an aggregated energy consumption signature [1]. As existing energy meters provide very little to no information regarding the energy consumption of individual appliances apart from the aggregated power rating, the spotting of individual appliances' energy usages by NILM will not only provide consumers the feedback of appliance-specific energy usage but also lead to the changes of their consumption behavior which facilitate energy conservation. B Neenan et al. [2] have demonstrated that direct individual appliance-specific energy usage signals lead to consumers' behavioral changes which improves energy efficiency by as much as 15%. Upon disaggregation of an energy signal, the signal needs to be classified according to the appropriate appliance. Hence, the goal of this paper is to disaggregate total energy consumption data to individual appliance signature and then classify appliance-specific energy loads using a prominent supervised classification method known as K-Nearest Neighbors (KNN). To perform this operation we have used a publicly accessible dataset of power signals from several houses known as the REDD dataset. Before applying KNN, data is preprocessed for each device. Then KNN is applied to check whether their energy consumption signature is separable or not. KNN is applied with K=5.
△ Less
Submitted 22 November, 2019;
originally announced November 2019.
-
Recognition of Handwritten Digit using Convolutional Neural Network in Python with Tensorflow and Comparison of Performance for Various Hidden Layers
Authors:
Fathma Siddique,
Shadman Sakib,
Md. Abu Bakr Siddique
Abstract:
In recent times, with the increase of Artificial Neural Network (ANN), deep learning has brought a dramatic twist in the field of machine learning by making it more artificially intelligent. Deep learning is remarkably used in vast ranges of fields because of its diverse range of applications such as surveillance, health, medicine, sports, robotics, drones, etc. In deep learning, Convolutional Neu…
▽ More
In recent times, with the increase of Artificial Neural Network (ANN), deep learning has brought a dramatic twist in the field of machine learning by making it more artificially intelligent. Deep learning is remarkably used in vast ranges of fields because of its diverse range of applications such as surveillance, health, medicine, sports, robotics, drones, etc. In deep learning, Convolutional Neural Network (CNN) is at the center of spectacular advances that mixes Artificial Neural Network (ANN) and up to date deep learning strategies. It has been used broadly in pattern recognition, sentence classification, speech recognition, face recognition, text categorization, document analysis, scene, and handwritten digit recognition. The goal of this paper is to observe the variation of accuracies of CNN to classify handwritten digits using various numbers of hidden layers and epochs and to make the comparison between the accuracies. For this performance evaluation of CNN, we performed our experiment using Modified National Institute of Standards and Technology (MNIST) dataset. Further, the network is trained using stochastic gradient descent and the backpropagation algorithm.
△ Less
Submitted 12 September, 2019;
originally announced September 2019.
-
Implementation of Fruits Recognition Classifier using Convolutional Neural Network Algorithm for Observation of Accuracies for Various Hidden Layers
Authors:
Shadman Sakib,
Zahidun Ashrafi,
Md. Abu Bakr Siddique
Abstract:
Fruit recognition using Deep Convolutional Neural Network (CNN) is one of the most promising applications in computer vision. In recent times, deep learning based classifications are making it possible to recognize fruits from images. However, fruit recognition is still a problem for the stacked fruits on weighing scale because of the complexity and similarity. In this paper, a fruit recognition s…
▽ More
Fruit recognition using Deep Convolutional Neural Network (CNN) is one of the most promising applications in computer vision. In recent times, deep learning based classifications are making it possible to recognize fruits from images. However, fruit recognition is still a problem for the stacked fruits on weighing scale because of the complexity and similarity. In this paper, a fruit recognition system using CNN is proposed. The proposed method uses deep learning techniques for the classification. We have used Fruits-360 dataset for the evaluation purpose. From the dataset, we have established a dataset which contains 17,823 images from 25 different categories. The images are divided into training and test dataset. Moreover, for the classification accuracies, we have used various combinations of hidden layer and epochs for different cases and made a comparison between them. The overall performance losses of the network for different cases also observed. Finally, we have achieved the best test accuracy of 100% and a training accuracy of 99.79%.
△ Less
Submitted 25 January, 2020; v1 submitted 1 April, 2019;
originally announced April 2019.
-
Modeling and Simulation of Solar Photovoltaic Cell for the Generation of Electricity in UAE
Authors:
Shadman Sakib,
Md. Abu Bakr Siddique
Abstract:
This paper proposes the implementation of a circuit based simulation for a Solar Photovoltaic (PV) cell in order to get the maximum power output. The model is established based on the mathematical model of the PV module. As the PV cell is used to determine the physical and electrical behavior of the cell corresponding to environmental factors such as temperature and solar irradiance, this paper ev…
▽ More
This paper proposes the implementation of a circuit based simulation for a Solar Photovoltaic (PV) cell in order to get the maximum power output. The model is established based on the mathematical model of the PV module. As the PV cell is used to determine the physical and electrical behavior of the cell corresponding to environmental factors such as temperature and solar irradiance, this paper evaluates thirty years solar irradiation data in United Arab Emirates (UAE), also analyzes the performance parameters of PV cell for several locations. Based on the Shockley diode equation, a solar PV module is presented. However, to analyze the performance parameters, Solarex MSX 120, a typical 120W module is selected. The mathematical model for the chosen module is executed in Matlab. The consequence of this paper reflects the effects of variation of solar irradiation on PV cell within UAE. Conclusively, this paper determines the convenient places for implementing the large scale solar PV modules within UAE.
△ Less
Submitted 26 August, 2019; v1 submitted 26 February, 2019;
originally announced March 2019.
-
Unsupervised Segmentation Algorithms' Implementation in ITK for Tissue Classification via Human Head MRI Scans
Authors:
Shadman Sakib,
Md. Abu Bakr Siddique
Abstract:
Tissue classification is one of the significant tasks in the field of biomedical image analysis. Magnetic Resonance Imaging (MRI) is of great importance in tissue classification especially in the areas of brain tissue classification which is able to recognize anatomical areas of interest such as surgical planning, monitoring therapy, clinical drug trials, image registration, stereotactic neurosurg…
▽ More
Tissue classification is one of the significant tasks in the field of biomedical image analysis. Magnetic Resonance Imaging (MRI) is of great importance in tissue classification especially in the areas of brain tissue classification which is able to recognize anatomical areas of interest such as surgical planning, monitoring therapy, clinical drug trials, image registration, stereotactic neurosurgery, radiotherapy etc. The task of this paper is to implement different unsupervised classification algorithms in ITK and perform tissue classification (white matter, gray matter, cerebrospinal fluid (CSF) and background of the human brain). For this purpose, 5 grayscale head MRI scans are provided. In order of classifying brain tissues, three algorithms are used. These are: Otsu thresholding, Bayesian classification and Bayesian classification with Gaussian smoothing. The obtained classification results are analyzed in the results and discussion section.
△ Less
Submitted 25 January, 2020; v1 submitted 26 February, 2019;
originally announced February 2019.
-
ApproxCS: Near-Sensor Approximate Compressed Sensing for IoT-Healthcare Systems
Authors:
Ayesha Siddique,
Osman Hasan,
Faiq Khalid,
Muhammad Shafique
Abstract:
Internet of Things (IoTs) is an emerging trend that has enabled an upgrade in the design of wearable healthcare monitoring systems through the (integrated) edge, fog, and cloud computing paradigm. Energy efficiency is one of the most important design metrics in such IoT-healthcare systems especially, for the edge and fog nodes. Due to the sensing noise and inherent redundancy in the input data, ev…
▽ More
Internet of Things (IoTs) is an emerging trend that has enabled an upgrade in the design of wearable healthcare monitoring systems through the (integrated) edge, fog, and cloud computing paradigm. Energy efficiency is one of the most important design metrics in such IoT-healthcare systems especially, for the edge and fog nodes. Due to the sensing noise and inherent redundancy in the input data, even the most safety-critical biomedical applications can sometimes afford a slight degradation in the output quality. Hence, such inherent error tolerance in the bio-signals can be exploited to achieve high energy savings through the emerging trends like, the Approximate Computing which is applicable at both software and hardware levels. In this paper, we propose to leverage the approximate computing in digital Compressed Sensing (CS), through low-power approximate adders (LPAA) in an accurate Bernoulli sensing-based CS acquisition (BCS). We demonstrate that approximations can indeed be safely employed in IoT healthcare without affecting the detection of critical events in the biomedical signals. Towards this, we explored the trade-of between energy efficiency and output quality using the state-of-the-art lp2d RLS reconstruction algorithm. The proposed framework is validated with the MIT-BIH Arrhythmia database. Our results demonstrated approximately 59% energy savings as compared to the accurate design.
△ Less
Submitted 18 November, 2018;
originally announced November 2018.
-
Implementation of Fuzzy C-Means and Possibilistic C-Means Clustering Algorithms, Cluster Tendency Analysis and Cluster Validation
Authors:
Md. Abu Bakr Siddique,
Rezoana Bente Arif,
Mohammad Mahmudur Rahman Khan,
Zahidun Ashrafi
Abstract:
In this paper, several two-dimensional clustering scenarios are given. In those scenarios, soft partitioning clustering algorithms (Fuzzy C-means (FCM) and Possibilistic c-means (PCM)) are applied. Afterward, VAT is used to investigate the clustering tendency visually, and then in order of checking cluster validation, three types of indices (e.g., PC, DI, and DBI) were used. After observing the cl…
▽ More
In this paper, several two-dimensional clustering scenarios are given. In those scenarios, soft partitioning clustering algorithms (Fuzzy C-means (FCM) and Possibilistic c-means (PCM)) are applied. Afterward, VAT is used to investigate the clustering tendency visually, and then in order of checking cluster validation, three types of indices (e.g., PC, DI, and DBI) were used. After observing the clustering algorithms, it was evident that each of them has its limitations; however, PCM is more robust to noise than FCM as in case of FCM a noise point has to be considered as a member of any of the cluster.
△ Less
Submitted 12 May, 2019; v1 submitted 22 September, 2018;
originally announced September 2018.
-
ADBSCAN: Adaptive Density-Based Spatial Clustering of Applications with Noise for Identifying Clusters with Varying Densities
Authors:
Mohammad Mahmudur Rahman Khan,
Md. Abu Bakr Siddique,
Rezoana Bente Arif,
Mahjabin Rahman Oishe
Abstract:
Density-based spatial clustering of applications with noise (DBSCAN) is a data clustering algorithm which has the high-performance rate for dataset where clusters have the constant density of data points. One of the significant attributes of this algorithm is noise cancellation. However, DBSCAN demonstrates reduced performances for clusters with different densities. Therefore, in this paper, an ad…
▽ More
Density-based spatial clustering of applications with noise (DBSCAN) is a data clustering algorithm which has the high-performance rate for dataset where clusters have the constant density of data points. One of the significant attributes of this algorithm is noise cancellation. However, DBSCAN demonstrates reduced performances for clusters with different densities. Therefore, in this paper, an adaptive DBSCAN is proposed which can work significantly well for identifying clusters with varying densities.
△ Less
Submitted 29 November, 2018; v1 submitted 17 September, 2018;
originally announced September 2018.
-
Study and Observation of the Variations of Accuracies for Handwritten Digits Recognition with Various Hidden Layers and Epochs using Neural Network Algorithm
Authors:
Md. Abu Bakr Siddique,
Mohammad Mahmudur Rahman Khan,
Rezoana Bente Arif,
Zahidun Ashrafi
Abstract:
In recent days, Artificial Neural Network (ANN) can be applied to a vast majority of fields including business, medicine, engineering, etc. The most popular areas where ANN is employed nowadays are pattern and sequence recognition, novelty detection, character recognition, regression analysis, speech recognition, image compression, stock market prediction, Electronic nose, security, loan applicati…
▽ More
In recent days, Artificial Neural Network (ANN) can be applied to a vast majority of fields including business, medicine, engineering, etc. The most popular areas where ANN is employed nowadays are pattern and sequence recognition, novelty detection, character recognition, regression analysis, speech recognition, image compression, stock market prediction, Electronic nose, security, loan applications, data processing, robotics, and control. The benefits associated with its broad applications leads to increasing popularity of ANN in the era of 21st Century. ANN confers many benefits such as organic learning, nonlinear data processing, fault tolerance, and self-repairing compared to other conventional approaches. The primary objective of this paper is to analyze the influence of the hidden layers of a neural network over the overall performance of the network. To demonstrate this influence, we applied neural network with different layers on the MNIST dataset. Also, another goal is to observe the variations of accuracies of ANN for different numbers of hidden layers and epochs and to compare and contrast among them.
△ Less
Submitted 29 November, 2018; v1 submitted 17 September, 2018;
originally announced September 2018.
-
Study and Observation of the Variations of Accuracies for Handwritten Digits Recognition with Various Hidden Layers and Epochs using Convolutional Neural Network
Authors:
Rezoana Bente Arif,
Md. Abu Bakr Siddique,
Mohammad Mahmudur Rahman Khan,
Mahjabin Rahman Oishe
Abstract:
Nowadays, deep learning can be employed to a wide ranges of fields including medicine, engineering, etc. In deep learning, Convolutional Neural Network (CNN) is extensively used in the pattern and sequence recognition, video analysis, natural language processing, spam detection, topic categorization, regression analysis, speech recognition, image classification, object detection, segmentation, fac…
▽ More
Nowadays, deep learning can be employed to a wide ranges of fields including medicine, engineering, etc. In deep learning, Convolutional Neural Network (CNN) is extensively used in the pattern and sequence recognition, video analysis, natural language processing, spam detection, topic categorization, regression analysis, speech recognition, image classification, object detection, segmentation, face recognition, robotics, and control. The benefits associated with its near human level accuracies in large applications lead to the growing acceptance of CNN in recent years. The primary contribution of this paper is to analyze the impact of the pattern of the hidden layers of a CNN over the overall performance of the network. To demonstrate this influence, we applied neural network with different layers on the Modified National Institute of Standards and Technology (MNIST) dataset. Also, is to observe the variations of accuracies of the network for various numbers of hidden layers and epochs and to make comparison and contrast among them. The system is trained utilizing stochastic gradient and backpropagation algorithm and tested with feedforward algorithm.
△ Less
Submitted 29 November, 2018; v1 submitted 17 September, 2018;
originally announced September 2018.
-
Study and Observation of the Variation of Accuracies of KNN, SVM, LMNN, ENN Algorithms on Eleven Different Datasets from UCI Machine Learning Repository
Authors:
Mohammad Mahmudur Rahman Khan,
Rezoana Bente Arif,
Md. Abu Bakr Siddique,
Mahjabin Rahman Oishe
Abstract:
Machine learning qualifies computers to assimilate with data, without being solely programmed [1, 2]. Machine learning can be classified as supervised and unsupervised learning. In supervised learning, computers learn an objective that portrays an input to an output hinged on training input-output pairs [3]. Most efficient and widely used supervised learning algorithms are K-Nearest Neighbors (KNN…
▽ More
Machine learning qualifies computers to assimilate with data, without being solely programmed [1, 2]. Machine learning can be classified as supervised and unsupervised learning. In supervised learning, computers learn an objective that portrays an input to an output hinged on training input-output pairs [3]. Most efficient and widely used supervised learning algorithms are K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Large Margin Nearest Neighbor (LMNN), and Extended Nearest Neighbor (ENN). The main contribution of this paper is to implement these elegant learning algorithms on eleven different datasets from the UCI machine learning repository to observe the variation of accuracies for each of the algorithms on all datasets. Analyzing the accuracy of the algorithms will give us a brief idea about the relationship of the machine learning algorithms and the data dimensionality. All the algorithms are developed in Matlab. Upon such accuracy observation, the comparison can be built among KNN, SVM, LMNN, and ENN regarding their performances on each dataset.
△ Less
Submitted 29 November, 2018; v1 submitted 17 September, 2018;
originally announced September 2018.
-
Modelling Evaluation of MPLS using Physical and virtual Network on GNS3
Authors:
Abdul Ahad Abro,
Abdul Basit Abro,
Mehvish Abro,
Asad Aslam Siddique
Abstract:
The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional network inside part passage steering conventions ruin the viable acknowledgment of modern activity designing approaches in legacy IP systems. Virtualization of the network could easily be assuring the network performance and virtual network…
▽ More
The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional network inside part passage steering conventions ruin the viable acknowledgment of modern activity designing approaches in legacy IP systems. Virtualization of the network could easily be assuring the network performance and virtual network are logically connected with one physical machine so that data could easily be send and get information from one virtual machine to the next machine. The purpose of this Paper is to analyse the traffic of MPLS using physical and virtual networks. This Paper will show that MPLS could also be run on physical and virtual networks. MPLS is running nowadays to provide local area network speed into the wide area Network.
△ Less
Submitted 18 April, 2018;
originally announced April 2018.
-
Symmetry- and Input-Cluster Synchronization in Networks
Authors:
Abu Bakar Siddique,
Louis Pecora,
Joe Hart,
Francesco Sorrentino
Abstract:
We study cluster synchronization in networks and show that the stability of all possible cluster synchronization patterns depends on a small set of Lyapunov exponents. Our approach can be applied to clusters corresponding to both orbital partitions of the network nodes (symmetry-cluster synchronization) and equitable partitions of the network nodes (input-cluster synchronization.) Our results are…
▽ More
We study cluster synchronization in networks and show that the stability of all possible cluster synchronization patterns depends on a small set of Lyapunov exponents. Our approach can be applied to clusters corresponding to both orbital partitions of the network nodes (symmetry-cluster synchronization) and equitable partitions of the network nodes (input-cluster synchronization.) Our results are verified experimentally in networks of coupled opto-electronic oscillators.
△ Less
Submitted 30 March, 2018;
originally announced April 2018.
-
Symmetries in the time-averaged dynamics of networks: reducing unnecessary complexity through minimal network models
Authors:
Francesco Sorrentino,
Abu Bakar Siddique,
Louis M. Pecora
Abstract:
Complex networks are the subject of fundamental interest from the scientific community at large. Several metrics have been introduced to characterize the structure of these networks, such as the degree distribution, degree correlation, path length, clustering coefficient, centrality measures etc. Another important feature is the presence of network symmetries. In particular, the effect of these sy…
▽ More
Complex networks are the subject of fundamental interest from the scientific community at large. Several metrics have been introduced to characterize the structure of these networks, such as the degree distribution, degree correlation, path length, clustering coefficient, centrality measures etc. Another important feature is the presence of network symmetries. In particular, the effect of these symmetries has been studied in the context of network synchronization, where they have been used to predict the emergence and stability of cluster synchronous states. Here we provide theoretical, numerical, and experimental evidence that network symmetries play a role in a substantially broader class of dynamical models on networks, including epidemics, game theory, communication, and coupled excitable systems. Namely, we see that in all these models, nodes that are related by a symmetry relation show the same time-averaged dynamical properties. This discovery leads us to propose reduction techniques for exact, yet minimal, simulation of complex networks dynamics, which we show are effective in order to optimize the use of computational resources, such as computation time and memory.
△ Less
Submitted 22 December, 2018; v1 submitted 14 October, 2017;
originally announced October 2017.
-
Combinatorial Entropy Encoding
Authors:
Abu Bakar Siddique
Abstract:
This paper proposes a novel entropy encoding technique for lossless data compression. Representing a message string by its lexicographic index in the permutations of its symbols results in a compressed version matching Shannon entropy of the message. Commercial data compression standards make use of Huffman or arithmetic coding at some stage of the compression process. In the proposed method, like…
▽ More
This paper proposes a novel entropy encoding technique for lossless data compression. Representing a message string by its lexicographic index in the permutations of its symbols results in a compressed version matching Shannon entropy of the message. Commercial data compression standards make use of Huffman or arithmetic coding at some stage of the compression process. In the proposed method, like arithmetic coding entire string is mapped to an integer but is not based on fractional numbers. Unlike both arithmetic and Huffman coding no prior entropy model of the source is required. Simple intuitive algorithm based on multinomial coefficients is developed for entropy encoding that adoptively uses low number of bits for more frequent symbols. Correctness of the algorithm is demonstrated by an example.
△ Less
Submitted 23 March, 2017;
originally announced March 2017.
-
Proof of bijection for combinatorial number system
Authors:
Abu Bakar Siddique,
Saadia Farid,
Muhammad Tahir
Abstract:
Combinatorial number system represents a non-negative natural numbers as sum of binomial coefficients. This paper presents an induction proof that there exists unique representation of every non-negative natural number $m$ as sum of $r$ binomial coefficients.
Combinatorial number system represents a non-negative natural numbers as sum of binomial coefficients. This paper presents an induction proof that there exists unique representation of every non-negative natural number $m$ as sum of $r$ binomial coefficients.
△ Less
Submitted 21 January, 2016;
originally announced January 2016.
-
Electric-field Controlled Magnetization Switching in Co/Pt thin-Film Ferromagnets
Authors:
A. Siddique,
S. Gu,
R. Witte,
M. Ghahremani,
C. A. Nwokoye,
A. Aslani,
R. Kruk,
V. Provenzano,
L. H. Bennett,
E. Della Torre
Abstract:
A study of dynamic and reversible voltage controlled magnetization switching in ferromagnetic Co/Pt thin film with perpendicular magnetic anisotropy at room temperature is presented. The change in the magnetic properties of the system is observed in a relatively thick film of 15 nm. A surface charge is induced by the formation of electrochemical double layer between the metallic thin film and non-…
▽ More
A study of dynamic and reversible voltage controlled magnetization switching in ferromagnetic Co/Pt thin film with perpendicular magnetic anisotropy at room temperature is presented. The change in the magnetic properties of the system is observed in a relatively thick film of 15 nm. A surface charge is induced by the formation of electrochemical double layer between the metallic thin film and non-aqueous lithium LiClO4 electrolyte to manipulate the magnetism. The change in the magnetic properties occurred by the application of an external electric field. As the negative voltage was increased, the coercivity and the switching magnetic field decreased thus activating magnetization switching. The results are envisaged to lead to faster and ultra-low power magnetization switching as compared to spin-transfer torque (STT) switching in spintronic devices.
△ Less
Submitted 11 November, 2015;
originally announced November 2015.
-
Performance Analysis of m-retry BEB based DCF under Unsaturated Traffic Condition
Authors:
Atiur Rahman Siddique,
Joarder Kamruzzaman
Abstract:
The IEEE 802.11 standard offers a cheap and promising solution for small scale wireless networks. Due to the self configuring nature, WLANs do not require large scale infrastructure deployment, and are scalable and easily maintainable which incited its popularity in both literature and industry. In real environment, these networks operate mostly under unsaturated condition. We investigate perfor…
▽ More
The IEEE 802.11 standard offers a cheap and promising solution for small scale wireless networks. Due to the self configuring nature, WLANs do not require large scale infrastructure deployment, and are scalable and easily maintainable which incited its popularity in both literature and industry. In real environment, these networks operate mostly under unsaturated condition. We investigate performance of such a network with m-retry limit BEB based DCF. We consider imperfect channel with provision for power capture. Our method employs a Markov model and represents the most common performance measures in terms of network parameters making the model and mathematical analysis useful in network design and planning. We also explore the effects of packet error, network size, initial contention window, and retry limit on overall performance of WLANs.
△ Less
Submitted 3 February, 2010;
originally announced February 2010.