-
Digital Twin Enabled Site Specific Channel Precoding: Over the Air CIR Inference
Authors:
Majumder Haider,
Imtiaz Ahmed,
Zoheb Hassan,
Timothy J. O'Shea,
Lingjia Liu,
Danda B. Rawat
Abstract:
This paper investigates the significance of designing a reliable, intelligent, and true physical environment-aware precoding scheme by leveraging an accurately designed channel twin model to obtain realistic channel state information (CSI) for cellular communication systems. Specifically, we propose a fine-tuned multi-step channel twin design process that can render CSI very close to the CSI of th…
▽ More
This paper investigates the significance of designing a reliable, intelligent, and true physical environment-aware precoding scheme by leveraging an accurately designed channel twin model to obtain realistic channel state information (CSI) for cellular communication systems. Specifically, we propose a fine-tuned multi-step channel twin design process that can render CSI very close to the CSI of the actual environment. After generating a precise CSI, we execute precoding using the obtained CSI at the transmitter end. We demonstrate a two-step parameters' tuning approach to design channel twin by ray tracing (RT) emulation, then further fine-tuning of CSI by employing an artificial intelligence (AI) based algorithm can significantly reduce the gap between actual CSI and the fine-tuned digital twin (DT) rendered CSI. The simulation results show the effectiveness of the proposed novel approach in designing a true physical environment-aware channel twin model.
△ Less
Submitted 27 January, 2025;
originally announced January 2025.
-
On the Parallelizability of Approval-Based Committee Rules
Authors:
Zack Fitzsimmons,
Zohair Raza Hassan,
Edith Hemaspaandra
Abstract:
Approval-Based Committee (ABC) rules are an important tool for choosing a fair set of candidates when given the preferences of a collection of voters. Though finding a winning committee for many ABC rules is NP-hard, natural variations for these rules with polynomial-time algorithms exist. The recently introduced Method of Equal Shares, an important ABC rule with desirable properties, is also comp…
▽ More
Approval-Based Committee (ABC) rules are an important tool for choosing a fair set of candidates when given the preferences of a collection of voters. Though finding a winning committee for many ABC rules is NP-hard, natural variations for these rules with polynomial-time algorithms exist. The recently introduced Method of Equal Shares, an important ABC rule with desirable properties, is also computable in polynomial time. However, when working with very large elections, polynomial time is not enough and parallelization may be necessary. We show that computing a winning committee using these ABC rules (including the Method of Equal Shares) is P-hard, thus showing they cannot be parallelized. In contrast, we show that finding a winning committee can be parallelized when the votes are single-peaked or single-crossing for the important ABC rule Chamberlin-Courant.
△ Less
Submitted 9 May, 2025; v1 submitted 24 January, 2025;
originally announced January 2025.
-
Enhancing Naturalness in LLM-Generated Utterances through Disfluency Insertion
Authors:
Syed Zohaib Hassan,
Pierre Lison,
Pål Halvorsen
Abstract:
Disfluencies are a natural feature of spontaneous human speech but are typically absent from the outputs of Large Language Models (LLMs). This absence can diminish the perceived naturalness of synthesized speech, which is an important criteria when building conversational agents that aim to mimick human behaviours. We show how the insertion of disfluencies can alleviate this shortcoming. The propo…
▽ More
Disfluencies are a natural feature of spontaneous human speech but are typically absent from the outputs of Large Language Models (LLMs). This absence can diminish the perceived naturalness of synthesized speech, which is an important criteria when building conversational agents that aim to mimick human behaviours. We show how the insertion of disfluencies can alleviate this shortcoming. The proposed approach involves (1) fine-tuning an LLM with Low-Rank Adaptation (LoRA) to incorporate various types of disfluencies into LLM-generated utterances and (2) synthesizing those utterances using a text-to-speech model that supports the generation of speech phenomena such as disfluencies. We evaluated the quality of the generated speech across two metrics: intelligibility and perceived spontaneity. We demonstrate through a user study that the insertion of disfluencies significantly increase the perceived spontaneity of the generated speech. This increase came, however, along with a slight reduction in intelligibility.
△ Less
Submitted 17 December, 2024;
originally announced December 2024.
-
Cross-Lingual Query-by-Example Spoken Term Detection: A Transformer-Based Approach
Authors:
Allahdadi Fatemeh,
Mahdian Toroghi Rahil,
Zareian Hassan
Abstract:
Query-by-example spoken term detection (QbE-STD) is typically constrained by transcribed data scarcity and language specificity. This paper introduces a novel, language-agnostic QbE-STD model leveraging image processing techniques and transformer architecture. By employing a pre-trained XLSR-53 network for feature extraction and a Hough transform for detection, our model effectively searches for u…
▽ More
Query-by-example spoken term detection (QbE-STD) is typically constrained by transcribed data scarcity and language specificity. This paper introduces a novel, language-agnostic QbE-STD model leveraging image processing techniques and transformer architecture. By employing a pre-trained XLSR-53 network for feature extraction and a Hough transform for detection, our model effectively searches for user-defined spoken terms within any audio file. Experimental results across four languages demonstrate significant performance gains (19-54%) over a CNN-based baseline. While processing time is improved compared to DTW, accuracy remains inferior. Notably, our model offers the advantage of accurately counting query term repetitions within the target audio.
△ Less
Submitted 5 October, 2024;
originally announced October 2024.
-
The Complexity of (P3, H)-Arrowing and Beyond
Authors:
Zohair Raza Hassan
Abstract:
Often regarded as the study of how order emerges from randomness, Ramsey theory has played an important role in mathematics and computer science, giving rise to applications in numerous domains such as logic, parallel processing, and number theory. The core of graph Ramsey theory is arrowing: For fixed graphs $F$ and $H$, the $(F, H)$-Arrowing problem asks whether a given graph, $G$, has a red/blu…
▽ More
Often regarded as the study of how order emerges from randomness, Ramsey theory has played an important role in mathematics and computer science, giving rise to applications in numerous domains such as logic, parallel processing, and number theory. The core of graph Ramsey theory is arrowing: For fixed graphs $F$ and $H$, the $(F, H)$-Arrowing problem asks whether a given graph, $G$, has a red/blue coloring of the edges of $G$ such that there are no red copies of $F$ and no blue copies of $H$. For some cases, the problem has been shown to be coNP-complete, or solvable in polynomial time. However, a more systematic approach is needed to categorize the complexity of all cases.
We focus on $(P_3, H)$-Arrowing as $F = P_3$ is the simplest meaningful case for which the complexity question remains open, and the hardness for this case likely extends to general $(F, H)$-Arrowing for nontrivial $F$. In this pursuit, we also gain insight into the complexity of a class of matching removal problems, since $(P_3, H)$-Arrowing is equivalent to $H$-free Matching Removal. We show that $(P_3, H)$-Arrowing is coNP-complete for all $2$-connected $H$ except when $H = K_3$, in which case the problem is in P. We introduce a new graph invariant to help us carefully combine graphs when constructing the gadgets for our reductions. Moreover, we show how $(P_3,H)$-Arrowing hardness results can be extended to other $(F,H)$-Arrowing problems. This allows for more intuitive and palatable hardness proofs instead of ad-hoc constructions of SAT gadgets, bringing us closer to categorizing the complexity of all $(F, H)$-Arrowing problems.
△ Less
Submitted 21 July, 2024;
originally announced July 2024.
-
Non-Terrestrial Network (NTN): a Novel Alternate Fractional Programming for the Downlink Channels Power Allocation
Authors:
Mahfuzur Rahman,
Zoheb Hassan,
Jeffrey H. Reed,
Lingjia Liu
Abstract:
Non-terrestrial network (NTN) communication has garnered considerable attention from government entities, industries, and academia in recent times. NTN networks encompass a variety of systems, including Low Earth Orbit (LEO) satellites, Medium Earth Orbit (MEO) satellites, Geostationary Earth Orbit (GEO) satellites, High Altitude Platforms (HAPS), and Low Altitude Platforms (LAPS). Furthermore, th…
▽ More
Non-terrestrial network (NTN) communication has garnered considerable attention from government entities, industries, and academia in recent times. NTN networks encompass a variety of systems, including Low Earth Orbit (LEO) satellites, Medium Earth Orbit (MEO) satellites, Geostationary Earth Orbit (GEO) satellites, High Altitude Platforms (HAPS), and Low Altitude Platforms (LAPS). Furthermore, the deployment of high-throughput satellites (HTS/VHTS) in the GEO space has gained momentum. While LEO and MEO satellites offer advantages such as low latency and reduced launching costs compared to GEO satellites, this study focuses on GEO satellites due to their stationary nature and broader coverage. In traditional cellular networks, each user equipment (UE) is allocated at least one resource block (RB), which is not shared with other UEs. However, in NTN communications, where the coverage area is extensive, dedicating an RB to only one UE is an inefficient utilization of radio resources. To address this challenge, fractional programming (FP), cognitive radio, and rate splitting multiple access (RSMA) are existing technologies. This paper aims to maximize spectral efficiency, average RBG rate, and sum rate for GEO satellite systems. However, achieving this objective involves dealing with a non-convex, NP-hard problem, as it requires the logarithmic sum of different fractions. Finding a global solution to such an NP-hard problem presents significant challenges. This paper introduces a novel alternate fractional programming algorithm specifically designed to tackle these complex NP-hard problems in the context of GEO NTN cellular networks. By employing this innovative approach, the study seeks to contribute to the optimization of NTN communication systems, enabling efficient resource allocation and improved network performance.
△ Less
Submitted 17 December, 2023;
originally announced January 2024.
-
Transcending Controlled Environments Assessing the Transferability of ASRRobust NLU Models to Real-World Applications
Authors:
Hania Khan,
Aleena Fatima Khalid,
Zaryab Hassan
Abstract:
This research investigates the transferability of Automatic Speech Recognition (ASR)-robust Natural Language Understanding (NLU) models from controlled experimental conditions to practical, real-world applications. Focused on smart home automation commands in Urdu, the study assesses model performance under diverse noise profiles, linguistic variations, and ASR error scenarios. Leveraging the Urdu…
▽ More
This research investigates the transferability of Automatic Speech Recognition (ASR)-robust Natural Language Understanding (NLU) models from controlled experimental conditions to practical, real-world applications. Focused on smart home automation commands in Urdu, the study assesses model performance under diverse noise profiles, linguistic variations, and ASR error scenarios. Leveraging the UrduBERT model, the research employs a systematic methodology involving real-world data collection, cross-validation, transfer learning, noise variation studies, and domain adaptation. Evaluation metrics encompass task-specific accuracy, latency, user satisfaction, and robustness to ASR errors. The findings contribute insights into the challenges and adaptability of ASR-robust NLU models in transcending controlled environments.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
The Complexity of $(P_k, P_\ell)$-Arrowing
Authors:
Zohair Raza Hassan,
Edith Hemaspaandra,
Stanisław Radziszowski
Abstract:
For fixed nonnegative integers $k$ and $\ell$, the $(P_k, P_\ell)$-Arrowing problem asks whether a given graph, $G$, has a red/blue coloring of $E(G)$ such that there are no red copies of $P_k$ and no blue copies of $P_\ell$. The problem is trivial when $\max(k,\ell) \leq 3$, but has been shown to be coNP-complete when $k = \ell = 4$. In this work, we show that the problem remains coNP-complete fo…
▽ More
For fixed nonnegative integers $k$ and $\ell$, the $(P_k, P_\ell)$-Arrowing problem asks whether a given graph, $G$, has a red/blue coloring of $E(G)$ such that there are no red copies of $P_k$ and no blue copies of $P_\ell$. The problem is trivial when $\max(k,\ell) \leq 3$, but has been shown to be coNP-complete when $k = \ell = 4$. In this work, we show that the problem remains coNP-complete for all pairs of $k$ and $\ell$, except $(3,4)$, and when $\max(k,\ell) \leq 3$.
Our result is only the second hardness result for $(F,H)$-Arrowing for an infinite family of graphs and the first for 1-connected graphs. Previous hardness results for $(F, H)$-Arrowing depended on constructing graphs that avoided the creation of too many copies of $F$ and $H$, allowing easier analysis of the reduction. This is clearly unavoidable with paths and thus requires a more careful approach. We define and prove the existence of special graphs that we refer to as ``transmitters.'' Using transmitters, we construct gadgets for three distinct cases: 1) $k = 3$ and $\ell \geq 5$, 2) $\ell > k \geq 4$, and 3) $\ell = k \geq 4$. For $(P_3, P_4)$-Arrowing we show a polynomial-time algorithm by reducing the problem to 2SAT, thus successfully categorizing the complexity of all $(P_k, P_\ell)$-Arrowing problems.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
Knowledge Distillation for Adaptive MRI Prostate Segmentation Based on Limit-Trained Multi-Teacher Models
Authors:
Eddardaa Ben Loussaief,
Hatem Rashwan,
Mohammed Ayad,
Mohammed Zakaria Hassan,
Domenec Puig
Abstract:
With numerous medical tasks, the performance of deep models has recently experienced considerable improvements. These models are often adept learners. Yet, their intricate architectural design and high computational complexity make deploying them in clinical settings challenging, particularly with devices with limited resources. To deal with this issue, Knowledge Distillation (KD) has been propose…
▽ More
With numerous medical tasks, the performance of deep models has recently experienced considerable improvements. These models are often adept learners. Yet, their intricate architectural design and high computational complexity make deploying them in clinical settings challenging, particularly with devices with limited resources. To deal with this issue, Knowledge Distillation (KD) has been proposed as a compression method and an acceleration technology. KD is an efficient learning strategy that can transfer knowledge from a burdensome model (i.e., teacher model) to a lightweight model (i.e., student model). Hence we can obtain a compact model with low parameters with preserving the teacher's performance. Therefore, we develop a KD-based deep model for prostate MRI segmentation in this work by combining features-based distillation with Kullback-Leibler divergence, Lovasz, and Dice losses. We further demonstrate its effectiveness by applying two compression procedures: 1) distilling knowledge to a student model from a single well-trained teacher, and 2) since most of the medical applications have a small dataset, we train multiple teachers that each one trained with a small set of images to learn an adaptive student model as close to the teachers as possible considering the desired accuracy and fast inference time. Extensive experiments were conducted on a public multi-site prostate tumor dataset, showing that the proposed adaptation KD strategy improves the dice similarity score by 9%, outperforming all tested well-established baseline models.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Decentralized Model Dissemination Empowered Federated Learning in mmWave Aerial-Terrestrial Integrated Networks
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
It is anticipated that aerial-terrestrial integrated networks incorporating unmanned aerial vehicles (UAVs) mounted relays will offer improved coverage and connectivity in the beyond 5G era. Meanwhile, federated learning (FL) is a promising distributed machine learning technique for building inference models over wireless networks due to its ability to maintain user privacy and reduce communicatio…
▽ More
It is anticipated that aerial-terrestrial integrated networks incorporating unmanned aerial vehicles (UAVs) mounted relays will offer improved coverage and connectivity in the beyond 5G era. Meanwhile, federated learning (FL) is a promising distributed machine learning technique for building inference models over wireless networks due to its ability to maintain user privacy and reduce communication overhead. However, off-the-shelf FL models aggregate global parameters at a central parameter server (CPS), increasing energy consumption and latency, as well as inefficiently utilizing radio resource blocks (RRBs) for distributed user devices (UDs). This paper presents a resource-efficient FL framework, called FedMoD (\textbf{fed}erated learning with \textbf{mo}del \textbf{d}issemination), for millimeter-wave (mmWave) aerial-terrestrial integrated networks with the following two unique characteristics. Firstly, FedMoD presents a novel decentralized model dissemination algorithm that makes use of UAVs as local model aggregators through UAV-to-UAV and device-to-device (D2D) communications. As a result, FedMoD (i) increases the number of participant UDs in developing FL model and (ii) achieves global model aggregation without involving CPS. Secondly, FedMoD reduces the energy consumption of FL using radio resource management (RRM) under the constraints of over-the-air learning latency. In order to achieve this, by leveraging graph theory, FedMoD optimizes the scheduling of line-of-sight (LOS) UDs to suitable UAVs/RRBs over mmWave links and non-LOS UDs to available LOS UDs via overlay D2D communications. Extensive simulations reveal that decentralized FedMoD offers same convergence rate performance as compared to conventional FL frameworks.
△ Less
Submitted 28 February, 2023;
originally announced March 2023.
-
Visual Sentiment Analysis: A Natural DisasterUse-case Task at MediaEval 2021
Authors:
Syed Zohaib Hassan,
Kashif Ahmad,
Michael A. Riegler,
Steven Hicks,
Nicola Conci,
Paal Halvorsen,
Ala Al-Fuqaha
Abstract:
The Visual Sentiment Analysis task is being offered for the first time at MediaEval. The main purpose of the task is to predict the emotional response to images of natural disasters shared on social media. Disaster-related images are generally complex and often evoke an emotional response, making them an ideal use case of visual sentiment analysis. We believe being able to perform meaningful analy…
▽ More
The Visual Sentiment Analysis task is being offered for the first time at MediaEval. The main purpose of the task is to predict the emotional response to images of natural disasters shared on social media. Disaster-related images are generally complex and often evoke an emotional response, making them an ideal use case of visual sentiment analysis. We believe being able to perform meaningful analysis of natural disaster-related data could be of great societal importance, and a joint effort in this regard can open several interesting directions for future research. The task is composed of three sub-tasks, each aiming to explore a different aspect of the challenge. In this paper, we provide a detailed overview of the task, the general motivation of the task, and an overview of the dataset and the metrics to be used for the evaluation of the proposed solutions.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Computing Graph Descriptors on Edge Streams
Authors:
Zohair Raza Hassan,
Sarwan Ali,
Imdadullah Khan,
Mudassir Shabbir,
Waseem Abbas
Abstract:
Feature extraction is an essential task in graph analytics. These feature vectors, called graph descriptors, are used in downstream vector-space-based graph analysis models. This idea has proved fruitful in the past, with spectral-based graph descriptors providing state-of-the-art classification accuracy. However, known algorithms to compute meaningful descriptors do not scale to large graphs sinc…
▽ More
Feature extraction is an essential task in graph analytics. These feature vectors, called graph descriptors, are used in downstream vector-space-based graph analysis models. This idea has proved fruitful in the past, with spectral-based graph descriptors providing state-of-the-art classification accuracy. However, known algorithms to compute meaningful descriptors do not scale to large graphs since: (1) they require storing the entire graph in memory, and (2) the end-user has no control over the algorithm's runtime. In this paper, we present streaming algorithms to approximately compute three different graph descriptors capturing the essential structure of graphs. Operating on edge streams allows us to avoid storing the entire graph in memory, and controlling the sample size enables us to keep the runtime of our algorithms within desired bounds. We demonstrate the efficacy of the proposed descriptors by analyzing the approximation error and classification accuracy. Our scalable algorithms compute descriptors of graphs with millions of edges within minutes. Moreover, these descriptors yield predictive accuracy comparable to the state-of-the-art methods but can be computed using only 25% as much memory.
△ Less
Submitted 8 April, 2023; v1 submitted 2 September, 2021;
originally announced September 2021.
-
Energy Efficient Federated Learning in Integrated Fog-Cloud Computing Enabled Internet-of-Things Networks
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
We investigate resource allocation scheme to reduce the energy consumption of federated learning (FL) in the integrated fog-cloud computing enabled Internet-of-things (IoT) networks. In the envisioned system, IoT devices are connected with the centralized cloud server (CS) via multiple fog access points (F-APs). We consider two different scenarios for training the local models. In the first scenar…
▽ More
We investigate resource allocation scheme to reduce the energy consumption of federated learning (FL) in the integrated fog-cloud computing enabled Internet-of-things (IoT) networks. In the envisioned system, IoT devices are connected with the centralized cloud server (CS) via multiple fog access points (F-APs). We consider two different scenarios for training the local models. In the first scenario, local models are trained at the IoT devices and the F-APs upload the local model parameters to the CS. In the second scenario, local models are trained at the F-APs based on the collected data from the IoT devices and the F-APs collaborate with the CS for updating the model parameters. Our objective is to minimize the overall energy-consumption of both scenarios subject to FL time constraint. Towards this goal, we devise a joint optimization of scheduling of IoT devices with the F-APs, transmit power allocation, computation frequency allocation at the devices and F-APs and decouple it into two subproblems. In the first subproblem, we optimize the IoT device scheduling and power allocation, while in the second subproblem, we optimize the computation frequency allocation. For each scenario, we develop a conflict graph based solution to iteratively solve the two subproblems. Simulation results show that the proposed two schemes achieve a considerable performance gain in terms of the energy consumption minimization. The presented simulation results interestingly reveal that for a large number of IoT devices and large data sizes, it is more energy efficient to train the local models at the IoT devices instead of the F-APs.
△ Less
Submitted 7 July, 2021;
originally announced July 2021.
-
Task Offloading Optimization in NOMA-Enabled Multi-hop Mobile Edge Computing System Using Conflict Graph
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
Resource allocation is investigated for offloading computational-intensive tasks in multi-hop mobile edge computing (MEC) system. The envisioned system has both the cooperative access points (AP) with the computing capability and the MEC servers. A user-device (UD) therefore first uploads a computing task to the nearest AP, and the AP can either locally process the received task or offload to MEC…
▽ More
Resource allocation is investigated for offloading computational-intensive tasks in multi-hop mobile edge computing (MEC) system. The envisioned system has both the cooperative access points (AP) with the computing capability and the MEC servers. A user-device (UD) therefore first uploads a computing task to the nearest AP, and the AP can either locally process the received task or offload to MEC server. In order to utilize the radio resource blocks (RRBs) in the APs efficiently, we exploit the non-orthogonal multiple access for offloading the tasks from the UDs to the AP(s). For the considered NOMA-enabled multi-hop MEC computing system, our objective is to minimize both the latency and energy consumption of the system jointly. Towards this goal, a joint optimization problem is formulated by taking the offloading decision of the APs, the scheduling among the UDs, RRBs, and APs, and UDs' transmit power allocation into account. To solve this problem efficiently, (i) a conflict graph-based approach is devised that solves the scheduling among the UDs, APs, and RRBs, the transmit power control, and the APs' computation resource allocation jointly, and (ii) a low-complexity pruning graph-based approach is also devised. The efficiency of the proposed graph-based approaches over several benchmark schemes is verified via extensive simulations.
△ Less
Submitted 23 April, 2021;
originally announced April 2021.
-
A Joint Reinforcement-Learning Enabled Caching and Cross-Layer Network Code for Sum-Rate Maximization in F-RAN with D2D Communications
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
In this paper, we leverage reinforcement learning (RL) and cross-layer network coding (CLNC) for efficiently pre-fetching users' contents to the local caches and delivering these contents to users in a downlink fog-radio access network (F-RAN) with device-to-device (D2D) communications. In the considered system, fog access points (F-APs) and cache-enabled D2D (CE-D2D) users are equipped with local…
▽ More
In this paper, we leverage reinforcement learning (RL) and cross-layer network coding (CLNC) for efficiently pre-fetching users' contents to the local caches and delivering these contents to users in a downlink fog-radio access network (F-RAN) with device-to-device (D2D) communications. In the considered system, fog access points (F-APs) and cache-enabled D2D (CE-D2D) users are equipped with local caches for alleviating traffic burden at the fronthaul, while users' contents can be easily and quickly accommodated. In CLNC, the coding decisions take users' contents, their rates, and power levels of F-APs and CE-D2D users into account, and RL optimizes caching strategy. Towards this goal, a joint content placement and delivery problem is formulated as an optimization problem with a goal to maximize system sum-rate. For this NP-hard problem, we first develop an innovative decentralized CLNC coalition formation (CLNC-CF) algorithm to obtain a stable solution for the content delivery problem, where F-APs and CE-D2D users utilize CLNC resource allocation. By taking the behavior of F-APs and CE-D2D users into account, we then develop a multi-agent RL (MARL) algorithm for optimizing the content placements at both F-APs and CE-D2D users. Simulation results show that the proposed joint CLNC-CF and RL framework can effectively improve the sum-rate by up to 30\%, 60\%, and 150\%, respectively, compared to: 1) an optimal uncoded algorithm, 2) a standard rate-aware-NC algorithm, and 3) a benchmark classical NC with network-layer optimization.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Sentiment Analysis of Users' Reviews on COVID-19 Contact Tracing Apps with a Benchmark Dataset
Authors:
Kashif Ahmad,
Firoj Alam,
Junaid Qadir,
Basheer Qolomany,
Imran Khan,
Talhat Khan,
Muhammad Suleman,
Naina Said,
Syed Zohaib Hassan,
Asma Gul,
Ala Al-Fuqaha
Abstract:
Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. Thanks to digital technologies, such as smartphones and wearable devices, contacts of COVID-19 patients can be easily traced and informed about their potential exposure to the virus. To this aim, several interesting mobile applications have been developed. However, there are ever-growing concerns over…
▽ More
Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. Thanks to digital technologies, such as smartphones and wearable devices, contacts of COVID-19 patients can be easily traced and informed about their potential exposure to the virus. To this aim, several interesting mobile applications have been developed. However, there are ever-growing concerns over the working mechanism and performance of these applications. The literature already provides some interesting exploratory studies on the community's response to the applications by analyzing information from different sources, such as news and users' reviews of the applications. However, to the best of our knowledge, there is no existing solution that automatically analyzes users' reviews and extracts the evoked sentiments. In this work, we propose a pipeline starting from manual annotation via a crowd-sourcing study and concluding on the development and training of AI models for automatic sentiment analysis of users' reviews. In total, we employ eight different methods achieving up to an average F1-Scores 94.8% indicating the feasibility of automatic sentiment analysis of users' reviews on the COVID-19 contact tracing applications. We also highlight the key advantages, drawbacks, and users' concerns over the applications. Moreover, we also collect and annotate a large-scale dataset composed of 34,534 reviews manually annotated from the contract tracing applications of 46 distinct countries. The presented analysis and the dataset are expected to provide a baseline/benchmark for future research in the domain.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Throughput Maximization of Network-Coded and Multi-Level Cache-Enabled Heterogeneous Network
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
One of the paramount advantages of multi-level cache-enabled (MLCE) networks is pushing contents proximity to the network edge and proactively caching them at multiple transmitters (i.e., small base-stations (SBSs), unmanned aerial vehicles (UAVs), and cache-enabled device-to-device (CE-D2D) users). As such, the fronthaul congestion between a core network and a large number of transmitters is alle…
▽ More
One of the paramount advantages of multi-level cache-enabled (MLCE) networks is pushing contents proximity to the network edge and proactively caching them at multiple transmitters (i.e., small base-stations (SBSs), unmanned aerial vehicles (UAVs), and cache-enabled device-to-device (CE-D2D) users). As such, the fronthaul congestion between a core network and a large number of transmitters is alleviated. For this objective, we exploit network coding (NC) to schedule a set of users to the same transmitter. Focusing on this, we consider the throughput maximization problem that optimizes jointly the network-coded user scheduling and power allocation, subject to fronthaul capacity, transmit power, and NC constraints. Given the intractability of the problem, we decouple it into two separate subproblems. In the first subproblem, we consider the network-coded user scheduling problem for the given power allocation, while in the second subproblem, we use the NC resulting user schedule to optimize the power levels. We design an innovative \textit{two-layered rate-aware NC (RA-IDNC)} graph to solve the first subproblem and evaluate the second subproblem using an iterative function evaluation (IFE) approach. Simulation results are presented to depict the throughput gain of the proposed approach over the existing solutions.
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
Cross-Layer Network Codes for Content Delivery in Cache-Enabled D2D Networks
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
In this paper, we consider the use of cross-layer network coding (CLNC), caching, and device-to-device (D2D) communications to jointly optimize the delivery of a set of popular contents to a set of user devices (UDs). In the considered D2D network, a group of near-by UDs cooperate with each other and use NC to combine their cached files, so as the completion time required for delivering all reques…
▽ More
In this paper, we consider the use of cross-layer network coding (CLNC), caching, and device-to-device (D2D) communications to jointly optimize the delivery of a set of popular contents to a set of user devices (UDs). In the considered D2D network, a group of near-by UDs cooperate with each other and use NC to combine their cached files, so as the completion time required for delivering all requested contents to all UDs is minimized. Unlike the previous work that considers only one transmitting UD at a time, our work allows multiple UDs to transmit simultaneously given the interference among the active links is small. Such configuration brings a new trade-off among scheduling UDs to transmitting UDs, selecting the coding decisions and the transmission rate/power. Therefore, we consider the completion time minimization problem that involves scheduling multiple transmitting UDs, determining their transmission rates/powers and file combinations. The problem is shown to be intractable because it involves all future coding decisions. To tackle the problem at each transmission slot, we first design a graph called herein the D2D Rate-Aware IDNC graph where its vertices have weights that judiciously balance between the rates/powers of the transmitting UDs and the number of their scheduled UDs. Then, we propose an innovative and efficient CLNC solution that iteratively selects a set of transmitting UDs only if the interference caused by the transmissions of the newly selected UDs does not significantly impact the overall completion time. Simulation results show that the proposed solution offers significant completion time reduction compared with the existing algorithms.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
Flood Detection via Twitter Streams using Textual and Visual Features
Authors:
Firoj Alam,
Zohaib Hassan,
Kashif Ahmad,
Asma Gul,
Michael Reiglar,
Nicola Conci,
Ala AL-Fuqaha
Abstract:
The paper presents our proposed solutions for the MediaEval 2020 Flood-Related Multimedia Task, which aims to analyze and detect flooding events in multimedia content shared over Twitter. In total, we proposed four different solutions including a multi-modal solution combining textual and visual information for the mandatory run, and three single modal image and text-based solutions as optional ru…
▽ More
The paper presents our proposed solutions for the MediaEval 2020 Flood-Related Multimedia Task, which aims to analyze and detect flooding events in multimedia content shared over Twitter. In total, we proposed four different solutions including a multi-modal solution combining textual and visual information for the mandatory run, and three single modal image and text-based solutions as optional runs. In the multimodal method, we rely on a supervised multimodal bitransformer model that combines textual and visual features in an early fusion, achieving a micro F1-score of .859 on the development data set. For the text-based flood events detection, we use a transformer network (i.e., pretrained Italian BERT model) achieving an F1-score of .853. For image-based solutions, we employed multiple deep models, pre-trained on both, the ImageNet and places data sets, individually and combined in an early fusion achieving F1-scores of .816 and .805 on the development set, respectively.
△ Less
Submitted 30 November, 2020;
originally announced November 2020.
-
Visual Sentiment Analysis from Disaster Images in Social Media
Authors:
Syed Zohaib Hassan,
Kashif Ahmad,
Steven Hicks,
Paal Halvorsen,
Ala Al-Fuqaha,
Nicola Conci,
Michael Riegler
Abstract:
The increasing popularity of social networks and users' tendency towards sharing their feelings, expressions, and opinions in text, visual, and audio content, have opened new opportunities and challenges in sentiment analysis. While sentiment analysis of text streams has been widely explored in literature, sentiment analysis from images and videos is relatively new. This article focuses on visual…
▽ More
The increasing popularity of social networks and users' tendency towards sharing their feelings, expressions, and opinions in text, visual, and audio content, have opened new opportunities and challenges in sentiment analysis. While sentiment analysis of text streams has been widely explored in literature, sentiment analysis from images and videos is relatively new. This article focuses on visual sentiment analysis in a societal important domain, namely disaster analysis in social media. To this aim, we propose a deep visual sentiment analyzer for disaster related images, covering different aspects of visual sentiment analysis starting from data collection, annotation, model selection, implementation, and evaluations. For data annotation, and analyzing peoples' sentiments towards natural disasters and associated images in social media, a crowd-sourcing study has been conducted with a large number of participants worldwide. The crowd-sourcing study resulted in a large-scale benchmark dataset with four different sets of annotations, each aiming a separate task. The presented analysis and the associated dataset will provide a baseline/benchmark for future research in the domain. We believe the proposed system can contribute toward more livable communities by helping different stakeholders, such as news broadcasters, humanitarian organizations, as well as the general public.
△ Less
Submitted 4 September, 2020;
originally announced September 2020.
-
A Simpler NP-Hardness Proof for Familial Graph Compression
Authors:
Ammar Ahmed,
Zohair Raza Hassan,
Mudassir Shabbir
Abstract:
This document presents a simpler proof showcasing the NP-hardness of Familial Graph Compression.
This document presents a simpler proof showcasing the NP-hardness of Familial Graph Compression.
△ Less
Submitted 7 September, 2020;
originally announced September 2020.
-
Device-Clustering and Rate-Splitting Enabled Device-to-Device Cooperation Framework in Fog Radio Access Network
Authors:
Md. Zoheb Hassan,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
Resource allocation is investigated to enhance the performance of device-to-device (D2D) cooperation in a fog radio access network (F-RAN) architecture. Our envisioned framework enables two D2D links to share certain orthogonal radio resource blocks (RRBs) by forming device-clusters. In each device-cluster, both content-holder device-users (DUs) transmit to the content-requester DUs via an enhance…
▽ More
Resource allocation is investigated to enhance the performance of device-to-device (D2D) cooperation in a fog radio access network (F-RAN) architecture. Our envisioned framework enables two D2D links to share certain orthogonal radio resource blocks (RRBs) by forming device-clusters. In each device-cluster, both content-holder device-users (DUs) transmit to the content-requester DUs via an enhanced remote radio head (eRRH) over the same RRBs. Such RRBs are shared with the uplink F-RAN as well. The intra device-cluster interference is mitigated by exploiting both uplink and downlink rate-splitting schemes, and the inter device-cluster interference is mitigated by using an orthogonal RRB allocation strategy. Our objective is to maximize the end-to-end sum-rate of the device-clusters while reducing the interference between D2D cooperation and the uplink F-RAN over the shared RRBs. Towards this objective, a joint optimization of device-clustering, transmit power allocations, assignment of device-clusters to the eRRHs, and allocation of RRBs among the device-clusters is presented. Since the joint optimization is NP-hard and intractable, it is decomposed into device-clustering and resource allocation sub-problems, and efficient solutions to both sub-problems are developed. Based on the solutions to the sub-problems, a semi-distributed and convergent algorithm, entitled rate-splitting for multi-hop D2D (RSMD), is proposed to obtain the device-clusters and resource allocation for these device-clusters. Through extensive simulations, efficiency of the proposed RSMD algorithm over several benchmark schemes is demonstrated
△ Less
Submitted 14 April, 2021; v1 submitted 7 July, 2020;
originally announced July 2020.
-
Estimating Descriptors for Large Graphs
Authors:
Zohair Raza Hassan,
Mudassir Shabbir,
Imdadullah Khan,
Waseem Abbas
Abstract:
Embedding networks into a fixed dimensional feature space, while preserving its essential structural properties is a fundamental task in graph analytics. These feature vectors (graph descriptors) are used to measure the pairwise similarity between graphs. This enables applying data mining algorithms (e.g classification, clustering, or anomaly detection) on graph-structured data which have numerous…
▽ More
Embedding networks into a fixed dimensional feature space, while preserving its essential structural properties is a fundamental task in graph analytics. These feature vectors (graph descriptors) are used to measure the pairwise similarity between graphs. This enables applying data mining algorithms (e.g classification, clustering, or anomaly detection) on graph-structured data which have numerous applications in multiple domains. State-of-the-art algorithms for computing descriptors require the entire graph to be in memory, entailing a huge memory footprint, and thus do not scale well to increasing sizes of real-world networks. In this work, we propose streaming algorithms to efficiently approximate descriptors by estimating counts of sub-graphs of order $k\leq 4$, and thereby devise extensions of two existing graph comparison paradigms: the Graphlet Kernel and NetSimile. Our algorithms require a single scan over the edge stream, have space complexity that is a fraction of the input size, and approximate embeddings via a simple sampling scheme. Our design exploits the trade-off between available memory and estimation accuracy to provide a method that works well for limited memory requirements. We perform extensive experiments on real-world networks and demonstrate that our algorithms scale well to massive graphs.
△ Less
Submitted 19 February, 2020; v1 submitted 28 January, 2020;
originally announced January 2020.
-
UMDuluth-CS8761 at SemEval-2018 Task 9: Hypernym Discovery using Hearst Patterns, Co-occurrence frequencies and Word Embeddings
Authors:
Arshia Z. Hassan,
Manikya S. Vallabhajosyula,
Ted Pedersen
Abstract:
Hypernym Discovery is the task of identifying potential hypernyms for a given term. A hypernym is a more generalized word that is super-ordinate to more specific words. This paper explores several approaches that rely on co-occurrence frequencies of word pairs, Hearst Patterns based on regular expressions, and word embeddings created from the UMBC corpus. Our system Babbage participated in Subtask…
▽ More
Hypernym Discovery is the task of identifying potential hypernyms for a given term. A hypernym is a more generalized word that is super-ordinate to more specific words. This paper explores several approaches that rely on co-occurrence frequencies of word pairs, Hearst Patterns based on regular expressions, and word embeddings created from the UMBC corpus. Our system Babbage participated in Subtask 1A for English and placed 6th of 19 systems when identifying concept hypernyms, and 12th of 18 systems for entity hypernyms.
△ Less
Submitted 25 May, 2018;
originally announced May 2018.
-
An Edge Computing Empowered Radio Access Network With UAV-Mounted FSO Fronthaul and Backhaul: Key Challenges and Approaches
Authors:
Yanjie Dong,
Md. Zoheb Hassan,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network archi…
▽ More
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network architecture where the fronthaul and backhaul links are mounted on the UAVs for rapid event response and flexible deployment. The implementation of hardware and networking technologies for the proposed architecture are investigated. Due to the limited payload and endurance as well as the high mobility of UAVs, research challenges related to the communication resource management and recent research progress are reported.
△ Less
Submitted 16 March, 2018;
originally announced March 2018.
-
Dynamic scaling, data-collapse and self-similarity in Barabási-Albert networks
Authors:
M. Kamrul Hassan,
M. Zahedul Hassan,
Neeaj I. Pavel
Abstract:
In this article, we show that if each node of the Barabási-Albert (BA) network is characterized by the generalized degree $q$, i.e. the product of their degree $k$ and the square root of their respective birth time, then the distribution function $F(q,t)$ exhibits dynamic scaling $F(q,t\rightarrow \infty)\sim t^{-1/2}φ(q/t^{1/2})$ where $φ(x)$ is the scaling function. We verified it by showing tha…
▽ More
In this article, we show that if each node of the Barabási-Albert (BA) network is characterized by the generalized degree $q$, i.e. the product of their degree $k$ and the square root of their respective birth time, then the distribution function $F(q,t)$ exhibits dynamic scaling $F(q,t\rightarrow \infty)\sim t^{-1/2}φ(q/t^{1/2})$ where $φ(x)$ is the scaling function. We verified it by showing that a series of distinct $F(q,t)$ vs $q$ curves for different network sizes $N$ collapse onto a single universal curve if we plot $t^{1/2}F(q,t)$ vs $q/t^{1/2}$ instead. Finally, we show that the BA network falls into two universality classes depending on whether new nodes arrive with single edge ($m=1$) or with multiple edges ($m>1$).
△ Less
Submitted 7 April, 2011; v1 submitted 25 January, 2011;
originally announced January 2011.