-
Towards a Formal Specification for Self-organized Shape Formation in Swarm Robotics
Authors:
YR Darr,
MA Niazi
Abstract:
The self-organization of robots for the formation of structures and shapes is a stimulating application of the swarm robotic system. It involves a large number of autonomous robots of heterogeneous behavior, coordination among them, and their interaction with the dynamic environment. This process of complex structure formation is considered a complex system, which needs to be modeled by using any…
▽ More
The self-organization of robots for the formation of structures and shapes is a stimulating application of the swarm robotic system. It involves a large number of autonomous robots of heterogeneous behavior, coordination among them, and their interaction with the dynamic environment. This process of complex structure formation is considered a complex system, which needs to be modeled by using any modeling approach. Although the formal specification approach along with other formal methods has been used to model the behavior of robots in a swarm. However, to the best of our knowledge, the formal specification approach has not been used to model the self-organization process in swarm robotic systems for shape formation. In this paper, we use a formal specification approach to model the shape formation task of swarm robots. We use Z (Zed) language of formal specification, which is a state-based language, to model the states of the entities of the systems. We demonstrate the effectiveness of Z for the self-organized shape formation. The presented formal specification model gives the outlines for designing and implementing the swarm robotic system for the formation of complex shapes and structures. It also provides the foundation for modeling the complex shape formation process for swarm robotics using a multi-agent system in a simulation-based environment. Keywords: Swarm robotics, Self-organization, Formal specification, Complex systems
△ Less
Submitted 16 June, 2025;
originally announced June 2025.
-
Predicting Neo-Adjuvant Chemotherapy Response in Triple-Negative Breast Cancer Using Pre-Treatment Histopathologic Images
Authors:
Hikmat Khan,
Ziyu Su,
Huina Zhang,
Yihong Wang,
Bohan Ning,
Shi Wei,
Hua Guo,
Zaibo Li,
Muhammad Khalid Khan Niazi
Abstract:
Triple-negative breast cancer (TNBC) is an aggressive subtype defined by the lack of estrogen receptor (ER), progesterone receptor (PR), and human epidermal growth factor receptor 2 (HER2) expression, resulting in limited targeted treatment options. Neoadjuvant chemotherapy (NACT) is the standard treatment for early-stage TNBC, with pathologic complete response (pCR) serving as a key prognostic ma…
▽ More
Triple-negative breast cancer (TNBC) is an aggressive subtype defined by the lack of estrogen receptor (ER), progesterone receptor (PR), and human epidermal growth factor receptor 2 (HER2) expression, resulting in limited targeted treatment options. Neoadjuvant chemotherapy (NACT) is the standard treatment for early-stage TNBC, with pathologic complete response (pCR) serving as a key prognostic marker; however, only 40-50% of patients with TNBC achieve pCR. Accurate prediction of NACT response is crucial to optimize therapy, avoid ineffective treatments, and improve patient outcomes. In this study, we developed a deep learning model to predict NACT response using pre-treatment hematoxylin and eosin (H&E)-stained biopsy images. Our model achieved promising results in five-fold cross-validation (accuracy: 82%, AUC: 0.86, F1-score: 0.84, sensitivity: 0.85, specificity: 0.81, precision: 0.80). Analysis of model attention maps in conjunction with multiplexed immunohistochemistry (mIHC) data revealed that regions of high predictive importance consistently colocalized with tumor areas showing elevated PD-L1 expression, CD8+ T-cell infiltration, and CD163+ macrophage density - all established biomarkers of treatment response. Our findings indicate that incorporating IHC-derived immune profiling data could substantially improve model interpretability and predictive performance. Furthermore, this approach may accelerate the discovery of novel histopathological biomarkers for NACT and advance the development of personalized treatment strategies for TNBC patients.
△ Less
Submitted 19 May, 2025;
originally announced May 2025.
-
Sequential Binary Hypothesis Testing with Competing Agents under Information Asymmetry
Authors:
Aneesh Raghavan,
M. Umar B. Niazi,
Karl H. Johansson
Abstract:
This paper concerns sequential hypothesis testing in competitive multi-agent systems where agents exchange potentially manipulated information. Specifically, a two-agent scenario is studied where each agent aims to correctly infer the true state of nature while optimizing decision speed and accuracy. At each iteration, agents collect private observations, update their beliefs, and share (possibly…
▽ More
This paper concerns sequential hypothesis testing in competitive multi-agent systems where agents exchange potentially manipulated information. Specifically, a two-agent scenario is studied where each agent aims to correctly infer the true state of nature while optimizing decision speed and accuracy. At each iteration, agents collect private observations, update their beliefs, and share (possibly corrupted) belief signals with their counterparts before deciding whether to stop and declare a state, or continue gathering more information. The analysis yields three main results: (1)~when agents share information strategically, the optimal signaling policy involves equal-probability randomization between truthful and inverted beliefs; (2)~agents maximize performance by relying solely on their own observations for belief updating while using received information only to anticipate their counterpart's stopping decision; and (3)~the agent reaching their confidence threshold first cause the other agent to achieve a higher conditional probability of error. Numerical simulations further demonstrate that agents with higher KL divergence in their conditional distributions gain competitive advantage. Furthermore, our results establish that information sharing -- despite strategic manipulation -- reduces overall system stopping time compared to non-interactive scenarios, which highlights the inherent value of communication even in this competitive setup.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
KKL Observer Synthesis for Nonlinear Systems via Physics-Informed Learning
Authors:
M. Umar B. Niazi,
John Cao,
Matthieu Barreau,
Karl Henrik Johansson
Abstract:
This paper proposes a novel learning approach for designing Kazantzis-Kravaris/Luenberger (KKL) observers for autonomous nonlinear systems. The design of a KKL observer involves finding an injective map that transforms the system state into a higher-dimensional observer state, whose dynamics is linear and stable. The observer's state is then mapped back to the original system coordinates via the i…
▽ More
This paper proposes a novel learning approach for designing Kazantzis-Kravaris/Luenberger (KKL) observers for autonomous nonlinear systems. The design of a KKL observer involves finding an injective map that transforms the system state into a higher-dimensional observer state, whose dynamics is linear and stable. The observer's state is then mapped back to the original system coordinates via the inverse map to obtain the state estimate. However, finding this transformation and its inverse is quite challenging. We propose to sequentially approximate these maps by neural networks that are trained using physics-informed learning. We generate synthetic data for training by numerically solving the system and observer dynamics. Theoretical guarantees for the robustness of state estimation against approximation error and system uncertainties are provided. Additionally, a systematic method for optimizing observer performance through parameter selection is presented. The effectiveness of the proposed approach is demonstrated through numerical simulations on benchmark examples and its application to sensor fault detection and isolation in a network of Kuramoto oscillators using learned KKL observers.
△ Less
Submitted 20 January, 2025;
originally announced January 2025.
-
Eco-driving Incentive Mechanisms for Mitigating Emissions in Urban Transportation
Authors:
M. Umar B. Niazi,
Jung-Hoon Cho,
Munther A. Dahleh,
Roy Dong,
Cathy Wu
Abstract:
This paper proposes incentive mechanisms that promote eco-driving in transportation networks with the over-arching objective of minimizing emissions. The transportation system operator provides the drivers with energy-efficient driving guidance throughout their trips, and their eco-driving levels are measured by how closely they follow this guidance via vehicle telematics. Drivers choose their eco…
▽ More
This paper proposes incentive mechanisms that promote eco-driving in transportation networks with the over-arching objective of minimizing emissions. The transportation system operator provides the drivers with energy-efficient driving guidance throughout their trips, and their eco-driving levels are measured by how closely they follow this guidance via vehicle telematics. Drivers choose their eco-driving levels to optimize a combination of their travel times and their emissions. To obtain optimal budget allocation and recommendations for the incentive mechanism, the system operator gathers drivers' preferences, or types, to assess each driver's trip urgency and natural willingness to eco-drive. In a setting where drivers truthfully report their types, we introduce the first-best incentive mechanism and show that the obedience condition holds (i.e., drivers find it optimal to comply with the system operator's recommendations) when the recommended eco-driving profile constitutes a Nash equilibrium. Moreover, in a setting where drivers can strategically report their types, we introduce the second-best incentive mechanism and show that the proposed mechanism is incentive-compatible (i.e., drivers find it optimal to be truthful). Under this mechanism, we also show that all equilibrium outcomes are at least as good as the recommended eco-driving profile in terms of the system operator's objective. Overall, this work offers a framework for designing eco-driving incentive mechanisms while considering both the strategic behavior of individual drivers and the network effects of collective decision-making.
△ Less
Submitted 10 October, 2024;
originally announced October 2024.
-
Computational Pathology for Accurate Prediction of Breast Cancer Recurrence: Development and Validation of a Deep Learning-based Tool
Authors:
Ziyu Su,
Yongxin Guo,
Robert Wesolowski,
Gary Tozbikian,
Nathaniel S. O'Connell,
M. Khalid Khan Niazi,
Metin N. Gurcan
Abstract:
Accurate recurrence risk stratification is crucial for optimizing treatment plans for breast cancer patients. Current prognostic tools like Oncotype DX (ODX) offer valuable genomic insights for HR+/HER2- patients but are limited by cost and accessibility, particularly in underserved populations. In this study, we present Deep-BCR-Auto, a deep learning-based computational pathology approach that pr…
▽ More
Accurate recurrence risk stratification is crucial for optimizing treatment plans for breast cancer patients. Current prognostic tools like Oncotype DX (ODX) offer valuable genomic insights for HR+/HER2- patients but are limited by cost and accessibility, particularly in underserved populations. In this study, we present Deep-BCR-Auto, a deep learning-based computational pathology approach that predicts breast cancer recurrence risk from routine H&E-stained whole slide images (WSIs). Our methodology was validated on two independent cohorts: the TCGA-BRCA dataset and an in-house dataset from The Ohio State University (OSU). Deep-BCR-Auto demonstrated robust performance in stratifying patients into low- and high-recurrence risk categories. On the TCGA-BRCA dataset, the model achieved an area under the receiver operating characteristic curve (AUROC) of 0.827, significantly outperforming existing weakly supervised models (p=0.041). In the independent OSU dataset, Deep-BCR-Auto maintained strong generalizability, achieving an AUROC of 0.832, along with 82.0% accuracy, 85.0% specificity, and 67.7% sensitivity. These findings highlight the potential of computational pathology as a cost-effective alternative for recurrence risk assessment, broadening access to personalized treatment strategies. This study underscores the clinical utility of integrating deep learning-based computational pathology into routine pathological assessment for breast cancer prognosis across diverse clinical settings.
△ Less
Submitted 23 September, 2024;
originally announced September 2024.
-
Mitigating Information Asymmetry in Two-Stage Contracts with Non-Myopic Agents
Authors:
Munther A. Dahleh,
Thibaut Horel,
M. Umar B. Niazi
Abstract:
We consider a Stackelberg game in which a principal (she) establishes a two-stage contract with a non-myopic agent (he) whose type is unknown. The contract takes the form of an incentive function mapping the agent's first-stage action to his second-stage incentive. While the first-stage action reveals the agent's type under truthful play, a non-myopic agent could benefit from portraying a false ty…
▽ More
We consider a Stackelberg game in which a principal (she) establishes a two-stage contract with a non-myopic agent (he) whose type is unknown. The contract takes the form of an incentive function mapping the agent's first-stage action to his second-stage incentive. While the first-stage action reveals the agent's type under truthful play, a non-myopic agent could benefit from portraying a false type in the first stage to obtain a larger incentive in the second stage. The challenge is thus for the principal to design the incentive function so as to induce truthful play. We show that this is only possible with a constant, non-reactive incentive functions when the type space is continuous, whereas it can be achieved with reactive functions for discrete types. Additionally, we show that introducing an adjustment mechanism that penalizes inconsistent behavior across both stages allows the principal to design more flexible incentive functions.
△ Less
Submitted 23 October, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
Machine Learning-Based Analysis of Ebola Virus' Impact on Gene Expression in Nonhuman Primates
Authors:
Mostafa Rezapour,
Muhammad Khalid Khan Niazi,
Hao Lu,
Aarthi Narayanan,
Metin Nafi Gurcan
Abstract:
This study introduces the Supervised Magnitude-Altitude Scoring (SMAS) methodology, a machine learning-based approach, for analyzing gene expression data obtained from nonhuman primates (NHPs) infected with Ebola virus (EBOV). We utilize a comprehensive dataset of NanoString gene expression profiles from Ebola-infected NHPs, deploying the SMAS system for nuanced host-pathogen interaction analysis.…
▽ More
This study introduces the Supervised Magnitude-Altitude Scoring (SMAS) methodology, a machine learning-based approach, for analyzing gene expression data obtained from nonhuman primates (NHPs) infected with Ebola virus (EBOV). We utilize a comprehensive dataset of NanoString gene expression profiles from Ebola-infected NHPs, deploying the SMAS system for nuanced host-pathogen interaction analysis. SMAS effectively combines gene selection based on statistical significance and expression changes, employing linear classifiers such as logistic regression to accurately differentiate between RT-qPCR positive and negative NHP samples. A key finding of our research is the identification of IFI6 and IFI27 as critical biomarkers, demonstrating exceptional predictive performance with 100% accuracy and Area Under the Curve (AUC) metrics in classifying various stages of Ebola infection. Alongside IFI6 and IFI27, genes, including MX1, OAS1, and ISG15, were significantly upregulated, highlighting their essential roles in the immune response to EBOV. Our results underscore the efficacy of the SMAS method in revealing complex genetic interactions and response mechanisms during EBOV infection. This research provides valuable insights into EBOV pathogenesis and aids in developing more precise diagnostic tools and therapeutic strategies to address EBOV infection in particular and viral infection in general.
△ Less
Submitted 22 January, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
Agile Meets Quantum: A Novel Genetic Algorithm Model for Predicting the Success of Quantum Software Development Project
Authors:
Arif Ali Khan,
Muhammad Azeem Akbar,
Valtteri Lahtinen,
Marko Paavola,
Mahmood Niazi,
Mohammed Naif Alatawi,
Shoayee Dlaim Alotaibi
Abstract:
Context: Quantum software systems represent a new realm in software engineering, utilizing quantum bits (Qubits) and quantum gates (Qgates) to solve the complex problems more efficiently than classical counterparts . Agile software development approaches are considered to address many inherent challenges in quantum software development, but their effective integration remains unexplored Objective:…
▽ More
Context: Quantum software systems represent a new realm in software engineering, utilizing quantum bits (Qubits) and quantum gates (Qgates) to solve the complex problems more efficiently than classical counterparts . Agile software development approaches are considered to address many inherent challenges in quantum software development, but their effective integration remains unexplored Objective: This study investigates key causes of challenges that could hinders the adoption of traditional agile approaches in quantum software projects and develop an Agile Quantum Software Project Success Prediction Model (AQSSPM). Methodology: Firstly, w e identified 19 causes of challenging factors discussed in our previous study, which are potentially impacting agile quantum project success. Secondly, a survey was conducted to collect expert opinions on these causes and applied Genetic Algorithm (GA) with Na i ve Bayes Classifier (NBC) and Logistic Regression (LR) to develop the AQSSPM Results: Utilizing GA with NBC, project success probability improved from 53.17% to 99.68%, with cost reductions from 0.463% to 0.403%. Similarly, GA with LR increased success rates from 55.52% to 98.99%, and costs decreased from 0.496% to 0.409% after 100 iterati ons. Both methods result showed a strong positive correlation (rs=0.955) in causes ranking, with no significant difference between them (t=1.195, p=0.240>0.05). Conclusion: The AQSSPM highlights critical focus areas for efficiently and successfully implementing agile quantum projects considering the cost factor of a particular project
△ Less
Submitted 21 May, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
Incentive Design for Eco-driving in Urban Transportation Networks
Authors:
M. Umar B. Niazi,
Jung-Hoon Cho,
Munther A. Dahleh,
Roy Dong,
Cathy Wu
Abstract:
Eco-driving emerges as a cost-effective and efficient strategy to mitigate greenhouse gas emissions in urban transportation networks. Acknowledging the persuasive influence of incentives in shaping driver behavior, this paper presents the `eco-planner,' a digital platform devised to promote eco-driving practices in urban transportation. At the outset of their trips, users provide the platform with…
▽ More
Eco-driving emerges as a cost-effective and efficient strategy to mitigate greenhouse gas emissions in urban transportation networks. Acknowledging the persuasive influence of incentives in shaping driver behavior, this paper presents the `eco-planner,' a digital platform devised to promote eco-driving practices in urban transportation. At the outset of their trips, users provide the platform with their trip details and travel time preferences, enabling the eco-planner to formulate personalized eco-driving recommendations and corresponding incentives, while adhering to its budgetary constraints. Upon trip completion, incentives are transferred to users who comply with the recommendations and effectively reduce their emissions. By comparing our proposed incentive mechanism with a baseline scheme that offers uniform incentives to all users, we demonstrate that our approach achieves superior emission reductions and increased user compliance with a smaller budget.
△ Less
Submitted 16 May, 2024; v1 submitted 6 November, 2023;
originally announced November 2023.
-
Replication of Multi-agent Reinforcement Learning for the "Hide and Seek" Problem
Authors:
Haider Kamal,
Muaz A. Niazi,
Hammad Afzal
Abstract:
Reinforcement learning generates policies based on reward functions and hyperparameters. Slight changes in these can significantly affect results. The lack of documentation and reproducibility in Reinforcement learning research makes it difficult to replicate once-deduced strategies. While previous research has identified strategies using grounded maneuvers, there is limited work in more complex e…
▽ More
Reinforcement learning generates policies based on reward functions and hyperparameters. Slight changes in these can significantly affect results. The lack of documentation and reproducibility in Reinforcement learning research makes it difficult to replicate once-deduced strategies. While previous research has identified strategies using grounded maneuvers, there is limited work in more complex environments. The agents in this study are simulated similarly to Open Al's hider and seek agents, in addition to a flying mechanism, enhancing their mobility, and expanding their range of possible actions and strategies. This added functionality improves the Hider agents to develop a chasing strategy from approximately 2 million steps to 1.6 million steps and hiders
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
Cross-attention-based saliency inference for predicting cancer metastasis on whole slide images
Authors:
Ziyu Su,
Mostafa Rezapour,
Usama Sajjad,
Shuo Niu,
Metin Nafi Gurcan,
Muhammad Khalid Khan Niazi
Abstract:
Although multiple instance learning (MIL) methods are widely used for automatic tumor detection on whole slide images (WSI), they suffer from the extreme class imbalance within the small tumor WSIs. This occurs when the tumor comprises only a few isolated cells. For early detection, it is of utmost importance that MIL algorithms can identify small tumors, even when they are less than 1% of the siz…
▽ More
Although multiple instance learning (MIL) methods are widely used for automatic tumor detection on whole slide images (WSI), they suffer from the extreme class imbalance within the small tumor WSIs. This occurs when the tumor comprises only a few isolated cells. For early detection, it is of utmost importance that MIL algorithms can identify small tumors, even when they are less than 1% of the size of the WSI. Existing studies have attempted to address this issue using attention-based architectures and instance selection-based methodologies, but have not yielded significant improvements. This paper proposes cross-attention-based salient instance inference MIL (CASiiMIL), which involves a novel saliency-informed attention mechanism, to identify breast cancer lymph node micro-metastasis on WSIs without the need for any annotations. Apart from this new attention mechanism, we introduce a negative representation learning algorithm to facilitate the learning of saliency-informed attention weights for improved sensitivity on tumor WSIs. The proposed model outperforms the state-of-the-art MIL methods on two popular tumor metastasis detection datasets, and demonstrates great cross-center generalizability. In addition, it exhibits excellent accuracy in classifying WSIs with small tumor lesions. Moreover, we show that the proposed model has excellent interpretability attributed to the saliency-informed attention weights. We strongly believe that the proposed method will pave the way for training algorithms for early tumor detection on large datasets where acquiring fine-grained annotations is practically impossible.
△ Less
Submitted 17 September, 2023;
originally announced September 2023.
-
Sensor Fault Detection and Isolation in Autonomous Nonlinear Systems Using Neural Network-Based Observers
Authors:
John Cao,
Muhammad Umar B. Niazi,
Matthieu Barreau,
Karl Henrik Johansson
Abstract:
This paper presents a novel observer-based approach to detect and isolate faulty sensors in nonlinear systems. The proposed sensor fault detection and isolation (s-FDI) method applies to a general class of nonlinear systems. Our focus is on s-FDI for two types of faults: complete failure and sensor degradation. The key aspect of this approach lies in the utilization of a neural network-based Kazan…
▽ More
This paper presents a novel observer-based approach to detect and isolate faulty sensors in nonlinear systems. The proposed sensor fault detection and isolation (s-FDI) method applies to a general class of nonlinear systems. Our focus is on s-FDI for two types of faults: complete failure and sensor degradation. The key aspect of this approach lies in the utilization of a neural network-based Kazantzis-Kravaris/Luenberger (KKL) observer. The neural network is trained to learn the dynamics of the observer, enabling accurate output predictions of the system. Sensor faults are detected by comparing the actual output measurements with the predicted values. If the difference surpasses a theoretical threshold, a sensor fault is detected. To identify and isolate which sensor is faulty, we compare the numerical difference of each sensor meassurement with an empirically derived threshold. We derive both theoretical and empirical thresholds for detection and isolation, respectively. Notably, the proposed approach is robust to measurement noise and system uncertainties. Its effectiveness is demonstrated through numerical simulations of sensor faults in a network of Kuramoto oscillators.
△ Less
Submitted 22 November, 2023; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Attention2Minority: A salient instance inference-based multiple instance learning for classifying small lesions in whole slide images
Authors:
Ziyu Su,
Mostafa Rezapour,
Usama Sajjad,
Metin Nafi Gurcan,
Muhammad Khalid Khan Niazi
Abstract:
Multiple instance learning (MIL) models have achieved remarkable success in analyzing whole slide images (WSIs) for disease classification problems. However, with regard to gigapixel WSI classification problems, current MIL models are often incapable of differentiating a WSI with extremely small tumor lesions. This minute tumor-to-normal area ratio in a MIL bag inhibits the attention mechanism fro…
▽ More
Multiple instance learning (MIL) models have achieved remarkable success in analyzing whole slide images (WSIs) for disease classification problems. However, with regard to gigapixel WSI classification problems, current MIL models are often incapable of differentiating a WSI with extremely small tumor lesions. This minute tumor-to-normal area ratio in a MIL bag inhibits the attention mechanism from properly weighting the areas corresponding to minor tumor lesions. To overcome this challenge, we propose salient instance inference MIL (SiiMIL), a weakly-supervised MIL model for WSI classification. Our method initially learns representations of normal WSIs, and it then compares the normal WSIs representations with all the input patches to infer the salient instances of the input WSI. Finally, it employs attention-based MIL to perform the slide-level classification based on the selected patches of the WSI. Our experiments imply that SiiMIL can accurately identify tumor instances, which could only take up less than 1% of a WSI, so that the ratio of tumor to normal instances within a bag can increase by two to four times. It is worth mentioning that it performs equally well for large tumor lesions. As a result, SiiMIL achieves a significant improvement in performance over the state-of-the-art MIL methods.
△ Less
Submitted 11 December, 2023; v1 submitted 18 January, 2023;
originally announced January 2023.
-
Resilient Set-based State Estimation for Linear Time-Invariant Systems Using Zonotopes
Authors:
Muhammad Umar B. Niazi,
Amr Alanwar,
Michelle S. Chong,
Karl Henrik Johansson
Abstract:
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and observable via every single sensor and that at least one sensor is uncompromised, we guarantee that the true state is always contained in the estimated set. We use zonotopes to represent these sets for computational eff…
▽ More
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and observable via every single sensor and that at least one sensor is uncompromised, we guarantee that the true state is always contained in the estimated set. We use zonotopes to represent these sets for computational efficiency. However, we show that intelligently designed stealthy attacks may cause exponential growth in the algorithm's worst-case complexity. We present several strategies to handle this complexity issue and illustrate our resilient zonotope-based state estimation algorithm on a rotating target system.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Learning-based Design of Luenberger Observers for Autonomous Nonlinear Systems
Authors:
Muhammad Umar B. Niazi,
John Cao,
Xudong Sun,
Amritam Das,
Karl Henrik Johansson
Abstract:
Designing Luenberger observers for nonlinear systems involves the challenging task of transforming the state to an alternate coordinate system, possibly of higher dimensions, where the system is asymptotically stable and linear up to output injection. The observer then estimates the system's state in the original coordinates by inverting the transformation map. However, finding a suitable injectiv…
▽ More
Designing Luenberger observers for nonlinear systems involves the challenging task of transforming the state to an alternate coordinate system, possibly of higher dimensions, where the system is asymptotically stable and linear up to output injection. The observer then estimates the system's state in the original coordinates by inverting the transformation map. However, finding a suitable injective transformation whose inverse can be derived remains a primary challenge for general nonlinear systems. We propose a novel approach that uses supervised physics-informed neural networks to approximate both the transformation and its inverse. Our method exhibits superior generalization capabilities to contemporary methods and demonstrates robustness to both neural network's approximation errors and system uncertainties.
△ Less
Submitted 5 April, 2023; v1 submitted 4 October, 2022;
originally announced October 2022.
-
AI Ethics: An Empirical Study on the Views of Practitioners and Lawmakers
Authors:
Arif Ali Khan,
Muhammad Azeem Akbar,
Mahdi Fahmideh,
Peng Liang,
Muhammad Waseem,
Aakash Ahmad,
Mahmood Niazi,
Pekka Abrahamsson
Abstract:
Artificial Intelligence (AI) solutions and technologies are being increasingly adopted in smart systems context, however, such technologies are continuously concerned with ethical uncertainties. Various guidelines, principles, and regulatory frameworks are designed to ensure that AI technologies bring ethical well-being. However, the implications of AI ethics principles and guidelines are still be…
▽ More
Artificial Intelligence (AI) solutions and technologies are being increasingly adopted in smart systems context, however, such technologies are continuously concerned with ethical uncertainties. Various guidelines, principles, and regulatory frameworks are designed to ensure that AI technologies bring ethical well-being. However, the implications of AI ethics principles and guidelines are still being debated. To further explore the significance of AI ethics principles and relevant challenges, we conducted a survey of 99 representative AI practitioners and lawmakers (e.g., AI engineers, lawyers) from twenty countries across five continents. To the best of our knowledge, this is the first empirical study that encapsulates the perceptions of two different types of population (AI practitioners and lawmakers) and the study findings confirm that transparency, accountability, and privacy are the most critical AI ethics principles. On the other hand, lack of ethical knowledge, no legal frameworks, and lacking monitoring bodies are found the most common AI ethics challenges. The impact analysis of the challenges across AI ethics principles reveals that conflict in practice is a highly severe challenge. Moreover, the perceptions of practitioners and lawmakers are statistically correlated with significant differences for particular principles (e.g. fairness, freedom) and challenges (e.g. lacking monitoring bodies, machine distortion). Our findings stimulate further research, especially empowering existing capability maturity models to support the development and quality assessment of ethics-aware AI systems.
△ Less
Submitted 15 November, 2022; v1 submitted 30 June, 2022;
originally announced July 2022.
-
Data-driven Set-based Estimation of Polynomial Systems with Application to SIR Epidemics
Authors:
Amr Alanwar,
Muhammad Umar B. Niazi,
Karl H. Johansson
Abstract:
This paper proposes a data-driven set-based estimation algorithm for a class of nonlinear systems with polynomial nonlinearities. Using the system's input-output data, the proposed method computes a set that guarantees the inclusion of the system's state in real-time. Although the system is assumed to be a polynomial type, the exact polynomial functions, and their coefficients are assumed to be un…
▽ More
This paper proposes a data-driven set-based estimation algorithm for a class of nonlinear systems with polynomial nonlinearities. Using the system's input-output data, the proposed method computes a set that guarantees the inclusion of the system's state in real-time. Although the system is assumed to be a polynomial type, the exact polynomial functions, and their coefficients are assumed to be unknown. To this end, the estimator relies on offline and online phases. The offline phase utilizes past input-output data to estimate a set of possible coefficients of the polynomial system. Then, using this estimated set of coefficients and the side information about the system, the online phase provides a set estimate of the state. Finally, the proposed methodology is evaluated through its application on SIR (Susceptible, Infected, Recovered) epidemic model.
△ Less
Submitted 30 March, 2022; v1 submitted 8 November, 2021;
originally announced November 2021.
-
Ethics of AI: A Systematic Literature Review of Principles and Challenges
Authors:
Arif Ali Khan,
Sher Badshah,
Peng Liang,
Bilal Khan,
Muhammad Waseem,
Mahmood Niazi,
Muhammad Azeem Akbar
Abstract:
Ethics in AI becomes a global topic of interest for both policymakers and academic researchers. In the last few years, various research organizations, lawyers, think tankers and regulatory bodies get involved in developing AI ethics guidelines and principles. However, there is still debate about the implications of these principles. We conducted a systematic literature review (SLR) study to invest…
▽ More
Ethics in AI becomes a global topic of interest for both policymakers and academic researchers. In the last few years, various research organizations, lawyers, think tankers and regulatory bodies get involved in developing AI ethics guidelines and principles. However, there is still debate about the implications of these principles. We conducted a systematic literature review (SLR) study to investigate the agreement on the significance of AI principles and identify the challenging factors that could negatively impact the adoption of AI ethics principles. The results reveal that the global convergence set consists of 22 ethical principles and 15 challenges. Transparency, privacy, accountability and fairness are identified as the most common AI ethics principles. Similarly, lack of ethical knowledge and vague principles are reported as the significant challenges for considering ethics in AI. The findings of this study are the preliminary inputs for proposing a maturity model that assess the ethical capabilities of AI systems and provide best practices for further improvements.
△ Less
Submitted 12 September, 2021;
originally announced September 2021.
-
Personal vs. Know-How Contacts: Which Matter More in Wiki Elections?
Authors:
Yousra Asim,
Muaz A. Niazi,
Basit Raza,
Ahmad Kamran Malik
Abstract:
The use of social media affects the real world as well. This study relies on specific social network measures to investigate the interactions between election participants and the importance of their contacts. It investigates whether personal contacts matter more than know-how contacts in wiki election nominations and voting participation by using standard tools such as Pajek and Gephi. It further…
▽ More
The use of social media affects the real world as well. This study relies on specific social network measures to investigate the interactions between election participants and the importance of their contacts. It investigates whether personal contacts matter more than know-how contacts in wiki election nominations and voting participation by using standard tools such as Pajek and Gephi. It further evaluates the significance of a personal contacts in online wiki elections through a number of different graph-based influence identification methods. Additionally, the basic characteristics and cohesive groups in the wiki vote network are explored. This work contributes by discovering the significance of personal contacts over know-how contacts of a person in online elections. It is found that personal contacts, i.e. immediate neighbors (degree centrality) and neighborhood (k-neighbors) of a person have a positive effect on a person's nomination as an administrator and also contribute to the active participation of voters in voting. Moreover, know-how contacts, analyzed by means of measures such as betweenness and closeness centralities, have a relatively insignificant effect on the selection of a person. However, know-how contacts in terms of betweenness centrality for passing information in the network can positively contribute only to the voting process. These contacts also measured in terms of influence domain and PageRank can play a vital role in the selection of an admin. Additionally, such contacts in terms of reachability and brokerage roles have a positive association with the voting process.
△ Less
Submitted 20 April, 2018;
originally announced April 2018.
-
Modeling the Multiple Sclerosis Brain Disease Using Agents: What Works and What Doesn't?
Authors:
Ayesha Muqaddas,
Muaz A. Niazi
Abstract:
The human brain is one of the most complex living structures in the known Universe. It consists of billions of neurons and synapses. Due to its intrinsic complexity, it can be a formidable task to accurately depict brain's structure and functionality. In the past, numerous studies have been conducted on modeling brain disease, structure, and functionality. Some of these studies have employed Agent…
▽ More
The human brain is one of the most complex living structures in the known Universe. It consists of billions of neurons and synapses. Due to its intrinsic complexity, it can be a formidable task to accurately depict brain's structure and functionality. In the past, numerous studies have been conducted on modeling brain disease, structure, and functionality. Some of these studies have employed Agent-based approaches including multiagent-based simulation models as well as brain complex networks. While these models have all been developed using agent-based computing, however, to our best knowledge, none of them have employed the use of Agent-Oriented Software Engineering (AOSE) methodologies in developing the brain or disease model. This is a problem because without due process, developed models can miss out on important requirements. AOSE has the unique capability of merging concepts from multiagent systems, agent-based modeling, artificial intelligence, besides concepts from distributed systems. AOSE involves the various tested software engineering principles in various phases of the model development ranging from analysis, design, implementation, and testing phases. In this paper, we employ the use of three different AOSE methodologies for modeling the Multiple Sclerosis brain disease namely GAIA, TROPOS, and MASE. After developing the models, we further employ the use of Exploratory Agent-based Modeling (EABM) to develop an actual model replicating previous results as a proof of concept. The key objective of this study is to demonstrate and explore the viability and effectiveness of AOSE methodologies in the development of complex brain structure and cognitive process models. Our key finding include demonstration that AOSE methodologies can be considerably helpful in modeling various living complex systems, in general, and the human brain, in particular.
△ Less
Submitted 30 November, 2017;
originally announced December 2017.
-
A Formal Specification Framework for Smart Grid Components
Authors:
Waseem Akram,
Muaz A. Niazi
Abstract:
Smart grid can be considered as the next step in the evolution of power systems. It comprises of different entities and objects ranging from smart appliances, smart meters, generators, smart storages, and more. One key problem in modeling smart grid is that while currently there is a considerable focus on the practical aspects of smart grid, there are very few modeling attempts and even lesser att…
▽ More
Smart grid can be considered as the next step in the evolution of power systems. It comprises of different entities and objects ranging from smart appliances, smart meters, generators, smart storages, and more. One key problem in modeling smart grid is that while currently there is a considerable focus on the practical aspects of smart grid, there are very few modeling attempts and even lesser attempts at formalization. To the best of our knowledge, among other formal methods, formal specification has previously not been applied in the domain of smart grid. In this paper, we attempt to bridge this gap by presenting a novel approach to modeling smart grid components using a formal specification approach. We use a state-based formal specification language namely Z (pronounced as `Zed') since we believe Z is particularly suited for modeling smart grid components.We demonstrate the application of Z on key smart grid components. The presented formal specification can be considered as first steps towards modeling of smart grid using a Software Engineering formalism. It also demonstrates how complex systems, such as the smart grid, can be modeled elegantly using formal specification.
△ Less
Submitted 24 November, 2017;
originally announced November 2017.
-
Evaluating Roles of Central Users in Online Communication Networks: A Case Study of #PanamaLeaks
Authors:
Mohsin Adalat,
Muaz A. Niazi
Abstract:
Social media has changed the ways of communication, where everyone is equipped with the power to express their opinions to others in online discussion platforms. Previously, a number of stud- ies have been presented to identify opinion leaders in online discussion networks. Feng ("Are you connected? Evaluating information cascade in online discussion about the #RaceTogether campaign", Computers in…
▽ More
Social media has changed the ways of communication, where everyone is equipped with the power to express their opinions to others in online discussion platforms. Previously, a number of stud- ies have been presented to identify opinion leaders in online discussion networks. Feng ("Are you connected? Evaluating information cascade in online discussion about the #RaceTogether campaign", Computers in Human Behavior, 2016) identified five types of central users and their communication patterns in an online communication network of a limited time span. However, to trace the change in communication pattern, a long-term analysis is required. In this study, we critically analyzed framework presented by Feng based on five types of central users in online communication network and their communication pattern in a long-term manner. We take another case study presented by Udnor et al. ("Determining social media impact on the politics of developing countries using social network analytics", Program, 2016) to further understand the dynamics as well as to perform validation . Results indicate that there may not exist all of these central users in an online communication network in a long-term manner. Furthermore, we discuss the changing positions of opinion leaders and their power to keep isolates interested in an online discussion network.
△ Less
Submitted 18 November, 2017;
originally announced November 2017.
-
Towards Self-organized Large-Scale Shape Formation: A Cognitive Agent-Based Computing Approach
Authors:
Yasir R. Darr,
Muaz A. Niazi
Abstract:
Swarm robotic systems are currently being used to address many real-world problems. One interesting application of swarm robotics is the self-organized formation of structures and shapes. Some of the key challenges in the swarm robotic systems include swarm size constraint, random motion, coordination among robots, localization, and adaptability in a decentralized environment. Rubenstein et al. pr…
▽ More
Swarm robotic systems are currently being used to address many real-world problems. One interesting application of swarm robotics is the self-organized formation of structures and shapes. Some of the key challenges in the swarm robotic systems include swarm size constraint, random motion, coordination among robots, localization, and adaptability in a decentralized environment. Rubenstein et al. presented a system ("Programmable self-assembly in a thousand-robot swarm", Science, 2014) for thousand-robot swarm able to form only solid shapes with the robots in aggregated form by applying the collective behavior algorithm. Even though agent-based approaches have been presented in various studies for self-organized formation, however these studies lack agent-based modeling (ABM) approach along with the constraints in term of structure complexity and heterogeneity in large swarms with dynamic localization. The cognitive agent-based computing (CABC) approach is capable of modeling such self-organization based multi-agents systems (MAS). In this paper, we develop a simulation model using ABM under CABC approach for self-organized shape formation in swarm robots. We propose a shape formation algorithm for validating our model and perform simulation-based experiments for six different shapes including hole-based shapes. We also demonstrate the formal specification for our model. The simulation result shows the robustness of the proposed approach having the emergent behavior of robots for the self-organized shape formation. The performance of the proposed approach is evaluated by robots convergence rate.
△ Less
Submitted 17 November, 2017;
originally announced November 2017.
-
Towards Agent-Based Model Specification in Smart Grid: A Cognitive Agent-based Computing Approach
Authors:
Waseem Akram,
Muaz A. Niazi,
Laszlo Barna Iantovics
Abstract:
A smart grid can be considered as a complex network where each node represents a generation unit or a consumer. Whereas links can be used to represent transmission lines. One way to study complex systems is by using the agent-based modeling (ABM) paradigm. An ABM is a way of representing a complex system of autonomous agents interacting with each other. Previously, a number of studies have been pr…
▽ More
A smart grid can be considered as a complex network where each node represents a generation unit or a consumer. Whereas links can be used to represent transmission lines. One way to study complex systems is by using the agent-based modeling (ABM) paradigm. An ABM is a way of representing a complex system of autonomous agents interacting with each other. Previously, a number of studies have been presented in the smart grid domain making use of the ABM paradigm. However, to the best of our knowledge, none of these studies have focused on the specification aspect of ABM. An ABM specification is important not only for understanding but also for replication of the model. In this study, we focus on development as well as specification of ABM for smart grid. We propose an ABM by using a combination of agent-based and complex network-based approaches. For ABM specification, we use ODD and DREAM specification approaches. We analyze these two specification approaches qualitatively as well as quantitatively. Extensive experiments demonstrate that DREAM is a most useful approach as compared with ODD for modeling as well as for replication of models for smart grid.
△ Less
Submitted 18 November, 2017; v1 submitted 30 September, 2017;
originally announced October 2017.
-
Clinical Decision Support Systems: A Visual Survey
Authors:
Kamran Farooq,
Bisma S Khan,
Muaz A Niazi,
Stephen J Leslie,
Amir Hussain
Abstract:
Clinical Decision Support Systems (CDSS) form an important area of research. In spite of its importance, it is difficult for researchers to evaluate the domain primarily because of a considerable spread of relevant literature in interdisciplinary domains. Previous surveys of CDSS have examined the domain from the perspective of individual disciplines. However, to the best of our knowledge, no visu…
▽ More
Clinical Decision Support Systems (CDSS) form an important area of research. In spite of its importance, it is difficult for researchers to evaluate the domain primarily because of a considerable spread of relevant literature in interdisciplinary domains. Previous surveys of CDSS have examined the domain from the perspective of individual disciplines. However, to the best of our knowledge, no visual scientometric survey of CDSS has previously been conducted which provides a broader spectrum of the domain with a horizon covering multiple disciplines. While traditional systematic literature surveys focus on analyzing literature using arbitrary results, visual surveys allow for the analysis of domains by using complex network-based analytical models. In this paper, we present a detailed visual survey of CDSS literature using important papers selected from highly cited sources in the Thomson Reuters web of science. We analyze the entire set of relevant literature indexed in the Web of Science database. Our key results include the discovery of the articles which have served as key turning points in literature. Additionally, we have identified highly cited authors and the key country of origin of top publications. We also present the Universities with the strongest citation bursts. Finally, our network analysis has also identified the key journals and subject categories both in terms of centrality and frequency. It is our belief that this paper will thus serve as an important role for researchers as well as clinical practitioners interested in identifying key literature and resources in the domain of clinical decision support.
△ Less
Submitted 19 August, 2017;
originally announced August 2017.
-
Towards a Formal, Visual Framework of Emergent Cognitive Development of Scholars
Authors:
Amir Hussain,
Muaz A. Niazi
Abstract:
Understanding the cognitive evolution of researchers as they progress in the academia is an important but complex problem, a problem belonging to a class of problems, which often require the development of models for gaining further understanding in the intricacies of the domain. The research question that we address in this paper is how to effectively model this temporal cognitive mental developm…
▽ More
Understanding the cognitive evolution of researchers as they progress in the academia is an important but complex problem, a problem belonging to a class of problems, which often require the development of models for gaining further understanding in the intricacies of the domain. The research question that we address in this paper is how to effectively model this temporal cognitive mental development of prolific researchers. Our proposed solution to this problem is based on noting that the academic progression and notability of a researcher are linked with a progressive increase in the citation count for the scholar's refereed publications quantified using indices such as the Hirsch index. In other words, we propose the use of yearly cognitive increment of a scholar's cognition to be quantifiable using a function of the scholar's citation index, thereby considering the index as an indicator of the discrete approximation of the scholar's cognitive development. Using validated agent-based modeling, a paradigm presented as part of our previous work i.e. Cognitive Agent-based Computing framework, we present both formal as well as visual agent-based complex network representations for this cognitive evolution in the form of a Temporal Cognitive Level Network (TCLN) model. As a proof of the effectiveness of this approach, we demonstrate validation of the model using historic data of citations.
△ Less
Submitted 22 August, 2017;
originally announced August 2017.
-
Tamper-Evident Complex Genomic Networks
Authors:
Komal Batool,
Muaz A. Niazi
Abstract:
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individua…
▽ More
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamper-evident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamper-evident networks using a combination of Cryptographic and Ego-based Network analytic methods. Using actual published data-sets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.
△ Less
Submitted 19 August, 2017;
originally announced August 2017.
-
A novel agent-based simulation framework for sensing in complex adaptive environments
Authors:
Muaz A. Niazi,
Amir Hussain
Abstract:
In this paper we present a novel Formal Agent-Based Simulation framework (FABS). FABS uses formal specification as a means of clear description of wireless sensor networks (WSN) sensing a Complex Adaptive Environment. This specification model is then used to develop an agent-based model of both the wireless sensor network as well as the environment. As proof of concept, we demonstrate the applicat…
▽ More
In this paper we present a novel Formal Agent-Based Simulation framework (FABS). FABS uses formal specification as a means of clear description of wireless sensor networks (WSN) sensing a Complex Adaptive Environment. This specification model is then used to develop an agent-based model of both the wireless sensor network as well as the environment. As proof of concept, we demonstrate the application of FABS to a boids model of self-organized flocking of animals monitored by a random deployment of proximity sensors.
△ Less
Submitted 19 August, 2017;
originally announced August 2017.
-
Agent-based computing from multi-agent systems to agent-based Models: a visual survey
Authors:
Muaz A. Niazi,
Amir Hussain
Abstract:
Agent-Based Computing is a diverse research domain concerned with the building of intelligent software based on the concept of "agents". In this paper, we use Scientometric analysis to analyze all sub-domains of agent-based computing. Our data consists of 1,064 journal articles indexed in the ISI web of knowledge published during a twenty year period: 1990-2010. These were retrieved using a topic…
▽ More
Agent-Based Computing is a diverse research domain concerned with the building of intelligent software based on the concept of "agents". In this paper, we use Scientometric analysis to analyze all sub-domains of agent-based computing. Our data consists of 1,064 journal articles indexed in the ISI web of knowledge published during a twenty year period: 1990-2010. These were retrieved using a topic search with various keywords commonly used in sub-domains of agent-based computing. In our proposed approach, we have employed a combination of two applications for analysis, namely Network Workbench and CiteSpace - wherein Network Workbench allowed for the analysis of complex network aspects of the domain, detailed visualization-based analysis of the bibliographic data was performed using CiteSpace. Our results include the identification of the largest cluster based on keywords, the timeline of publication of index terms, the core journals and key subject categories. We also identify the core authors, top countries of origin of the manuscripts along with core research institutes. Finally, our results have interestingly revealed the strong presence of agent-based computing in a number of non-computing related scientific domains including Life Sciences, Ecological Sciences and Social Sciences.
△ Less
Submitted 19 August, 2017;
originally announced August 2017.
-
A discrete event system specification (DEVS)-based model of consanguinity
Authors:
Noreen Akhtar,
Muaz A. Niazi,
Farah Mustafa,
Amir Hussain
Abstract:
Consanguinity or inter-cousin marriage is a phenomenon quite prevalent in certain regions around the globe. Consanguineous parents have a higher risk of having offspring with congenital disorders. It is difficult to model large scale consanguineous parental populations because of disparate cultural issues unique to regions and cultures across the globe. Although consanguinity, as a social problem…
▽ More
Consanguinity or inter-cousin marriage is a phenomenon quite prevalent in certain regions around the globe. Consanguineous parents have a higher risk of having offspring with congenital disorders. It is difficult to model large scale consanguineous parental populations because of disparate cultural issues unique to regions and cultures across the globe. Although consanguinity, as a social problem has been studied previously, consanguinity from a biological perspective has yet to be modeled. Discrete Event System Specification (DEVS) formalism is a powerful modeling formalism for the study of intricate details of real-world complex systems. In this article, we develop a DEVS model to get an insight into the role of consanguineous marriages in the evolution of congenital disorders in a population. As proof-of-concept, we develop a consanguinity simulation model in Simio simulation software. Our results show the effectiveness of DEVS in the modeling of consanguinity effects in causing congenital defects.
△ Less
Submitted 10 August, 2017;
originally announced August 2017.
-
Technical Problems With "Programmable self-assembly in a thousand-robot swarm"
Authors:
Muaz A. Niazi
Abstract:
Rubenstein et al. present an interesting system of programmable self-assembled structure formation using 1000 Kilobot robots. The paper claims to advance work in artificial swarms similar to capabilities of natural systems besides being highly robust. However, the system lacks in terms of matching motility and complex shapes with holes, thereby limiting practical similarity to self-assembly in liv…
▽ More
Rubenstein et al. present an interesting system of programmable self-assembled structure formation using 1000 Kilobot robots. The paper claims to advance work in artificial swarms similar to capabilities of natural systems besides being highly robust. However, the system lacks in terms of matching motility and complex shapes with holes, thereby limiting practical similarity to self-assembly in living systems.
△ Less
Submitted 10 August, 2017;
originally announced August 2017.
-
A Novel Formal Agent-based Simulation Modeling Framework of an AIDS Complex Adaptive System
Authors:
Amnah Siddiqa,
Muaz A. Niazi
Abstract:
HIV/AIDS spread depends upon complex patterns of interaction among various sub-sets emerging at population level. This added complexity makes it difficult to study and model AIDS and its dynamics. AIDS is therefore a natural candidate to be modeled using agent-based modeling, a paradigm well-known for modeling Complex Adaptive Systems (CAS). While agent-based models are also well-known to effectiv…
▽ More
HIV/AIDS spread depends upon complex patterns of interaction among various sub-sets emerging at population level. This added complexity makes it difficult to study and model AIDS and its dynamics. AIDS is therefore a natural candidate to be modeled using agent-based modeling, a paradigm well-known for modeling Complex Adaptive Systems (CAS). While agent-based models are also well-known to effectively model CAS, often times models can tend to be ambiguous and the use of purely text-based specifications (such as ODD) can make models difficult to be replicated. Previous work has shown how formal specification may be used in conjunction with agent-based modeling to develop models of various CAS. However, to the best of our knowledge, no such model has been developed in conjunction with AIDS. In this paper, we present a Formal Agent-Based Simulation modeling framework (FABS-AIDS) for an AIDS-based CAS. FABS-AIDS employs the use of a formal specification model in conjunction with an agent-based model to reduce ambiguity as well as improve clarity in the model definition. The proposed model demonstrates the effectiveness of using formal specification in conjunction with agent-based simulation for developing models of CAS in general and, social network-based agent-based models, in particular.
△ Less
Submitted 9 August, 2017;
originally announced August 2017.
-
Verification & Validation of Agent Based Simulations using the VOMAS (Virtual Overlay Multi-agent System) approach
Authors:
Muaz A. Niazi,
Amir Hussain,
Mario Kolberg
Abstract:
Agent Based Models are very popular in a number of different areas. For example, they have been used in a range of domains ranging from modeling of tumor growth, immune systems, molecules to models of social networks, crowds and computer and mobile self-organizing networks. One reason for their success is their intuitiveness and similarity to human cognition. However, with this power of abstractio…
▽ More
Agent Based Models are very popular in a number of different areas. For example, they have been used in a range of domains ranging from modeling of tumor growth, immune systems, molecules to models of social networks, crowds and computer and mobile self-organizing networks. One reason for their success is their intuitiveness and similarity to human cognition. However, with this power of abstraction, in spite of being easily applicable to such a wide number of domains, it is hard to validate agent-based models. In addition, building valid and credible simulations is not just a challenging task but also a crucial exercise to ensure that what we are modeling is, at some level of abstraction, a model of our conceptual system; the system that we have in mind. In this paper, we address this important area of validation of agent based models by presenting a novel technique which has broad applicability and can be applied to all kinds of agent-based models. We present a framework, where a virtual overlay multi-agent system can be used to validate simulation models. In addition, since agent-based models have been typically growing, in parallel, in multiple domains, to cater for all of these, we present a new single validation technique applicable to all agent based models. Our technique, which allows for the validation of agent based simulations uses VOMAS: a Virtual Overlay Multi-agent System. This overlay multi-agent system can comprise various types of agents, which form an overlay on top of the agent based simulation model that needs to be validated. Other than being able to watch and log, each of these agents contains clearly defined constraints, which, if violated, can be logged in real time. To demonstrate its effectiveness, we show its broad applicability in a wide variety of simulation models ranging from social sciences to computer networks in spatial and non-spatial conceptual models.
△ Less
Submitted 7 August, 2017;
originally announced August 2017.
-
Towards A Novel Unified Framework for Developing Formal, Network and Validated Agent-Based Simulation Models of Complex Adaptive Systems
Authors:
Muaz A. Niazi
Abstract:
Literature on the modeling and simulation of complex adaptive systems (cas) has primarily advanced vertically in different scientific domains with scientists developing a variety of domain-specific approaches and applications. However, while cas researchers are inher-ently interested in an interdisciplinary comparison of models, to the best of our knowledge, there is currently no single unified fr…
▽ More
Literature on the modeling and simulation of complex adaptive systems (cas) has primarily advanced vertically in different scientific domains with scientists developing a variety of domain-specific approaches and applications. However, while cas researchers are inher-ently interested in an interdisciplinary comparison of models, to the best of our knowledge, there is currently no single unified framework for facilitating the development, comparison, communication and validation of models across different scientific domains. In this thesis, we propose first steps towards such a unified framework using a combination of agent-based and complex network-based modeling approaches and guidelines formulated in the form of a set of four levels of usage, which allow multidisciplinary researchers to adopt a suitable framework level on the basis of available data types, their research study objectives and expected outcomes, thus allowing them to better plan and conduct their respective re-search case studies.
△ Less
Submitted 7 August, 2017;
originally announced August 2017.
-
Towards Social Autonomous Vehicles: Efficient Collision Avoidance Scheme Using Richardson's Arms Race Model
Authors:
Faisal Riaz,
Muaz A. Niazi
Abstract:
Background Road collisions and casualties pose a serious threat to commuters around the globe. Autonomous Vehicles (AVs) aim to make the use of technology to reduce the road accidents. However, the most of research work in the context of collision avoidance has been performed to address, separately, the rear end, front end and lateral collisions in less congested and with high inter-vehicular dist…
▽ More
Background Road collisions and casualties pose a serious threat to commuters around the globe. Autonomous Vehicles (AVs) aim to make the use of technology to reduce the road accidents. However, the most of research work in the context of collision avoidance has been performed to address, separately, the rear end, front end and lateral collisions in less congested and with high inter-vehicular distances. Purpose The goal of this paper is to introduce the concept of a social agent, which interact with other AVs in social manners like humans are social having the capability of predicting intentions, i.e. mentalizing and copying the actions of each other, i.e. mirroring. The proposed social agent is based on a human-brain inspired mentalizing and mirroring capabilities and has been modelled for collision detection and avoidance under congested urban road traffic.
Method We designed our social agent having the capabilities of mentalizing and mirroring and for this purpose we utilized Exploratory Agent Based Modeling (EABM) level of Cognitive Agent Based Computing (CABC) framework proposed by Niazi and Hussain.
Results Our simulation and practical experiments reveal that by embedding Richardson's arms race model within AVs, collisions can be avoided while travelling on congested urban roads in a flock like topologies. The performance of the proposed social agent has been compared at two different levels.
△ Less
Submitted 6 August, 2017;
originally announced August 2017.
-
Enhanced Emotion Enabled Cognitive Agent Based Rear End Collision Avoidance Controller for Autonomous Vehicles
Authors:
Faisal Riaz,
Muaz A. Niazi
Abstract:
Rear end collisions are deadliest in nature and cause most of traffic casualties and injuries. In the existing research, many rear end collision avoidance solutions have been proposed. However, the problem with these proposed solutions is that they are highly dependent on precise mathematical models. Whereas, the real road driving is influenced by non-linear factors such as road surface situations…
▽ More
Rear end collisions are deadliest in nature and cause most of traffic casualties and injuries. In the existing research, many rear end collision avoidance solutions have been proposed. However, the problem with these proposed solutions is that they are highly dependent on precise mathematical models. Whereas, the real road driving is influenced by non-linear factors such as road surface situations, driver reaction time, pedestrian flow and vehicle dynamics, hence obtaining the accurate mathematical model of the vehicle control system is challenging. This problem with precise control based rear end collision avoidance schemes has been addressed using fuzzy logic, but the excessive number of fuzzy rules straightforwardly prejudice their efficiency. Furthermore, these fuzzy logic based controllers have been proposed without using proper agent based modeling that helps in mimicking the functions of an artificial human driver executing these fuzzy rules. Keeping in view these limitations, we have proposed an Enhanced Emotion Enabled Cognitive Agent (EEEC_Agent) based controller that helps the Autonomous Vehicles (AVs) to perform rear end collision avoidance with less number of rules, designed after fear emotion, and high efficiency. To introduce a fear emotion generation mechanism in EEEC_Agent, Orton, Clore & Collins (OCC) model has been employed. The fear generation mechanism of EEEC_Agent has been verified using NetLogo simulation. Furthermore, practical validation of EEEC_Agent functions has been performed using specially built prototype AV platform. Eventually, the qualitative comparative study with existing state of the art research works reflect that proposed model outperforms recent research.
△ Less
Submitted 6 August, 2017;
originally announced August 2017.
-
Emotion Controlled Spectrum Mobility Scheme for Efficient Syntactic Interoperability In Cognitive Radio Based Internet of Vehicles
Authors:
Faisal Riaz,
Muaz A. Niazi
Abstract:
Blind spots are one of the causes of road accidents in the hilly and flat areas. These blind spot accidents can be decreased by establishing an Internet of Vehicles (IoV) using Vehicle-2-Vehicle (V2V) and Vehicle-2-Infrastrtructure (V2I) communication systems. But the problem with these IoV is that most of them are using DSRC or single Radio Access Technology (RAT) as a wireless technology, which…
▽ More
Blind spots are one of the causes of road accidents in the hilly and flat areas. These blind spot accidents can be decreased by establishing an Internet of Vehicles (IoV) using Vehicle-2-Vehicle (V2V) and Vehicle-2-Infrastrtructure (V2I) communication systems. But the problem with these IoV is that most of them are using DSRC or single Radio Access Technology (RAT) as a wireless technology, which has been proven to be failed for efficient communication between vehicles. Recently, Cognitive Radio (CR) based IoV have to be proven best wireless communication systems for vehicular networks. However, the spectrum mobility is a challenging task to keep CR based vehicular networks interoperable and has not been addressed sufficiently in existing research. In our previous research work, the Cognitive Radio Site (CR-Site) has been proposed as in-vehicle CR-device, which can be utilized to establish efficient IoV systems. H In this paper, we have introduced the Emotions Inspired Cognitive Agent (EIC_Agent) based spectrum mobility mechanism in CR-Site and proposed a novel emotions controlled spectrum mobility scheme for efficient syntactic interoperability between vehicles. For this purpose, a probabilistic deterministic finite automaton using fear factor is proposed to perform efficient spectrum mobility using fuzzy logic. In addition, the quantitative computation of different fear intensity levels has been performed with the help of fuzzy logic. The system has been tested using active data from different GSM service providers on Mangla-Mirpur road. This is supplemented by extensive simulation experiments which validate the proposed scheme for CR based high-speed vehicular networks. The qualitative comparison with the existing-state-of the-art has proven the superiority of the proposed emotions controlled syntactic interoperable spectrum mobility scheme within cognitive radio based IoV systems.
△ Less
Submitted 6 August, 2017;
originally announced August 2017.
-
Designing Autonomous Vehicles: Evaluating the Role of Human Emotions and Social Norms
Authors:
Faisal Riaz,
Muaz A. Niazi
Abstract:
Humans are going to delegate the rights of driving to the autonomous vehicles in near future. However, to fulfill this complicated task, there is a need for a mechanism, which enforces the autonomous vehicles to obey the road and social rules that have been practiced by well-behaved drivers. This task can be achieved by introducing social norms compliance mechanism in the autonomous vehicles. This…
▽ More
Humans are going to delegate the rights of driving to the autonomous vehicles in near future. However, to fulfill this complicated task, there is a need for a mechanism, which enforces the autonomous vehicles to obey the road and social rules that have been practiced by well-behaved drivers. This task can be achieved by introducing social norms compliance mechanism in the autonomous vehicles. This research paper is proposing an artificial society of autonomous vehicles as an analogy of human social society. Each AV has been assigned a social personality having different social influence. Social norms have been introduced which help the AVs in making the decisions, influenced by emotions, regarding road collision avoidance. Furthermore, social norms compliance mechanism, by artificial social AVs, has been proposed using prospect based emotion i.e. fear, which is conceived from OCC model. Fuzzy logic has been employed to compute the emotions quantitatively. Then, using SimConnect approach, fuzzy values of fear has been provided to the Netlogo simulation environment to simulate artificial society of AVs. Extensive testing has been performed using the behavior space tool to find out the performance of the proposed approach in terms of the number of collisions. For comparison, the random-walk model based artificial society of AVs has been proposed as well. A comparative study with a random walk, prove that proposed approach provides a better option to tailor the autopilots of future AVS, Which will be more socially acceptable and trustworthy by their riders in terms of safe road travel.
△ Less
Submitted 6 August, 2017;
originally announced August 2017.
-
Game theory models for communication between agents: a review
Authors:
Aisha D. Farooqui,
Muaz A. Niazi
Abstract:
In the real world, agents or entities are in a continuous state of interactions. These inter- actions lead to various types of complexity dynamics. One key difficulty in the study of complex agent interactions is the difficulty of modeling agent communication on the basis of rewards. Game theory offers a perspective of analysis and modeling these interactions. Previously, while a large amount of l…
▽ More
In the real world, agents or entities are in a continuous state of interactions. These inter- actions lead to various types of complexity dynamics. One key difficulty in the study of complex agent interactions is the difficulty of modeling agent communication on the basis of rewards. Game theory offers a perspective of analysis and modeling these interactions. Previously, while a large amount of literature is available on game theory, most of it is from specific domains and does not cater for the concepts from an agent- based perspective. Here in this paper, we present a comprehensive multidisciplinary state-of-the-art review and taxonomy of game theory models of complex interactions between agents.
△ Less
Submitted 4 August, 2017;
originally announced August 2017.
-
Validation of Enhanced Emotion Enabled Cognitive Agent Using Virtual Overlay Multi-Agent System Approach
Authors:
Faisal Riaz,
Muaz A. Niazi
Abstract:
Making roads safer by avoiding road collisions is one of the main reasons for inventing Autonomous vehicles (AVs). In this context, designing agent-based collision avoidance components of AVs which truly represent human cognition and emotions look is a more feasible approach as agents can replace human drivers. However, to the best of our knowledge, very few human emotion and cognition-inspired ag…
▽ More
Making roads safer by avoiding road collisions is one of the main reasons for inventing Autonomous vehicles (AVs). In this context, designing agent-based collision avoidance components of AVs which truly represent human cognition and emotions look is a more feasible approach as agents can replace human drivers. However, to the best of our knowledge, very few human emotion and cognition-inspired agent-based studies have previously been conducted in this domain. Furthermore, these agent-based solutions have not been validated using any key validation technique. Keeping in view this lack of validation practices, we have selected state-of-the-art Emotion Enabled Cognitive Agent (EEC_Agent), which was proposed to avoid lateral collisions between semi-AVs. The architecture of EEC_Agent has been revised using Exploratory Agent Based Modeling (EABM) level of the Cognitive Agent Based Computing (CABC) framework and real-time fear emotion generation mechanism using the Ortony, Clore & Collins (OCC) model has also been introduced. Then the proposed fear generation mechanism has been validated using the Validated Agent Based Modeling level of CABC framework using a Virtual Overlay MultiAgent System (VOMAS). Extensive simulation and practical experiments demonstrate that the Enhanced EEC_Agent exhibits the capability to feel different levels of fear, according to different traffic situations and also needs a smaller Stopping Sight Distance (SSD) and Overtaking Sight Distance (OSD) as compared to human drivers.
△ Less
Submitted 4 August, 2017;
originally announced August 2017.
-
Agent based Tools for Modeling and Simulation of Self-Organization in Peer-to-Peer, Ad-Hoc and other Complex Networks
Authors:
Muaz A. Niazi,
Amir Hussain
Abstract:
Agent-based modeling and simulation tools provide a mature platform for development of complex simulations. They however, have not been applied much in the domain of mainstream modeling and simulation of computer networks. In this article, we evaluate how and if these tools can offer any value-addition in the modeling & simulation of complex networks such as pervasive computing, large-scale peer-t…
▽ More
Agent-based modeling and simulation tools provide a mature platform for development of complex simulations. They however, have not been applied much in the domain of mainstream modeling and simulation of computer networks. In this article, we evaluate how and if these tools can offer any value-addition in the modeling & simulation of complex networks such as pervasive computing, large-scale peer-to-peer systems, and networks involving considerable environment and human/animal/habitat interaction. Specifically, we demonstrate the effectiveness of NetLogo - a tool that has been widely used in the area of agent-based social simulation.
△ Less
Submitted 4 August, 2017;
originally announced August 2017.
-
Network Community Detection: A Review and Visual Survey
Authors:
Bisma S. Khan,
Muaz A. Niazi
Abstract:
Community structure is an important area of research. It has received a considerable attention from the scientific community. Despite its importance, one of the key problems in locating information about community detection is the diverse spread of related articles across various disciplines. To the best of our knowledge, there is no current comprehensive review of recent literature which uses a s…
▽ More
Community structure is an important area of research. It has received a considerable attention from the scientific community. Despite its importance, one of the key problems in locating information about community detection is the diverse spread of related articles across various disciplines. To the best of our knowledge, there is no current comprehensive review of recent literature which uses a scientometric analysis using complex networks analysis covering all relevant articles from the Web of Science (WoS). Here we present a visual survey of key literature using CiteSpace. The idea is to identify emerging trends besides using network techniques to examine the evolution of the domain. Towards that end, we identify the most influential, central, as well as active nodes using scientometric analyses. We examine authors, key articles, cited references, core subject categories, key journals, institutions, as well as countries. The exploration of the scientometric literature of the domain reveals that Yong Wang is a pivot node with the highest centrality. Additionally, we have observed that Mark Newman is the most highly cited author in the network. We have also identified that the journal, "Reviews of Modern Physics" has the strongest citation burst. In terms of cited documents, an article by Andrea Lancichinetti has the highest centrality score. We have also discovered that the origin of the key publications in this domain is from the United States. Whereas Scotland has the strongest and longest citation burst. Additionally, we have found that the categories of "Computer Science" and "Engineering" lead other categories based on frequency and centrality respectively.
△ Less
Submitted 2 August, 2017;
originally announced August 2017.
-
Emerging Topics in Internet Technology: A Complex Networks Approach
Authors:
Bisma S. Khan,
Muaz A. Niazi
Abstract:
Communication networks, in general, and internet technology, in particular, is a fast-evolving area of research. While it is important to keep track of emerging trends in this domain, it is such a fast-growing area that it can be very difficult to keep track of literature. The problem is compounded by the fast-growing number of citation databases. While other databases are gradually indexing a lar…
▽ More
Communication networks, in general, and internet technology, in particular, is a fast-evolving area of research. While it is important to keep track of emerging trends in this domain, it is such a fast-growing area that it can be very difficult to keep track of literature. The problem is compounded by the fast-growing number of citation databases. While other databases are gradually indexing a large set of reliable content, currently the Web of Science represents one of the most highly valued databases. Research indexed in this database is known to highlight key advancements in any domain. In this paper, we present a Complex Network-based analytical approach to analyze recent data from the Web of Science in communication networks. Taking bibliographic records from the recent period of 2014 to 2017, we model and analyze complex scientometric networks. Using bibliometric coupling applied over complex citation data we present answers to co-citation patterns of documents, co-occurrence patterns of terms, as well as the most influential articles, among others, We also present key pivot points and intellectual turning points. Complex network analysis of the data demonstrates a considerably high level of interest in two key clusters labeled descriptively as "social networks" and "computer networks". In addition, key themes in highly cited literature were clearly identified as "communication networks," "social networks," and "complex networks".
△ Less
Submitted 1 August, 2017;
originally announced August 2017.
-
Modeling and Analysis of Network Dynamics in Complex Communication Networks Using Social Network Methods
Authors:
Bisma S. Khan,
Muaz A. Niazi
Abstract:
Modern communication networks are inherently complex in nature. First of all, they have a large number of heterogeneous components. Secondly, their connectivity is extremely dynamic. Nodes can come and go, links can be removed and added over time. Traditional modeling and simulation techniques amalgamate or ignore such dynamics and therefore, are unable to represent them. Complex communication net…
▽ More
Modern communication networks are inherently complex in nature. First of all, they have a large number of heterogeneous components. Secondly, their connectivity is extremely dynamic. Nodes can come and go, links can be removed and added over time. Traditional modeling and simulation techniques amalgamate or ignore such dynamics and therefore, are unable to represent them. Complex communication networks are therefore better modeled as mathematical structures called graphs. Modeling as graphs allows for the application of complex techniques such as various network based analysis techniques. While this is a very important and much needed skill for communication networks researchers and engineers, to the best of our knowledge, currently there is no resource describing these details. In this paper, we give a concise but comprehensive review of modeling complex communication networks as graphs. We also show how to apply complex social network analysis on these models besides a demonstration of formal modeling network dynamics.
△ Less
Submitted 1 August, 2017;
originally announced August 2017.
-
Relevant based structure learning for feature selection
Authors:
Hadi Zare,
Mojtaba Niazi
Abstract:
Feature selection is an important task in many problems occurring in pattern recognition, bioinformatics, machine learning and data mining applications. The feature selection approach enables us to reduce the computation burden and the falling accuracy effect of dealing with huge number of features in typical learning problems. There is a variety of techniques for feature selection in supervised l…
▽ More
Feature selection is an important task in many problems occurring in pattern recognition, bioinformatics, machine learning and data mining applications. The feature selection approach enables us to reduce the computation burden and the falling accuracy effect of dealing with huge number of features in typical learning problems. There is a variety of techniques for feature selection in supervised learning problems based on different selection metrics. In this paper, we propose a novel unified framework for feature selection built on the graphical models and information theoretic tools. The proposed approach exploits the structure learning among features to select more relevant and less redundant features to the predictive modeling problem according to a primary novel likelihood based criterion. In line with the selection of the optimal subset of features through the proposed method, it provides us the Bayesian network classifier without the additional cost of model training on the selected subset of features. The optimal properties of our method are established through empirical studies and computational complexity analysis. Furthermore the proposed approach is evaluated on a bunch of benchmark datasets based on the well-known classification algorithms. Extensive experiments confirm the significant improvement of the proposed approach compared to the earlier works.
△ Less
Submitted 29 August, 2016;
originally announced August 2016.