-
Anyone Can Code: Algorithmic Thinking
Authors:
Ali Arya
Abstract:
As the second book in the Anyone Can Code series, Algorithmic Thinking focuses on the logic behind computer programming and software design. With a data-centred approach, it starts with simple algorithms that work on simple data items and advances to more complex ones covering data structures and classes. Examples are given in C/C++ and Python and use both plain text and graphics applications to i…
▽ More
As the second book in the Anyone Can Code series, Algorithmic Thinking focuses on the logic behind computer programming and software design. With a data-centred approach, it starts with simple algorithms that work on simple data items and advances to more complex ones covering data structures and classes. Examples are given in C/C++ and Python and use both plain text and graphics applications to illustrate the concepts in different languages and forms. With the advances in artificial intelligence and automated code generators, it is essential to learn about the logic of what a code needs to do, not just how to write the code. Anyone Can Code: Algorithmic Thinking is suitable for anyone who aims to improve their programming skills and go beyond the simple craft of programming, stepping into the world of algorithm design.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
Inclusion in Virtual Reality Technology: A Scoping Review
Authors:
Xiaofeng Yong,
Ali Arya
Abstract:
Despite the significant growth in virtual reality applications and research, the notion of inclusion in virtual reality is not well studied. Inclusion refers to the active involvement of different groups of people in the adoption, use, design, and development of VR technology and applications. In this review, we provide a scoping analysis of existing virtual reality research literature about inclu…
▽ More
Despite the significant growth in virtual reality applications and research, the notion of inclusion in virtual reality is not well studied. Inclusion refers to the active involvement of different groups of people in the adoption, use, design, and development of VR technology and applications. In this review, we provide a scoping analysis of existing virtual reality research literature about inclusion. We categorize the literature based on target group into ability, gender, and age, followed by those that study community-based design of VR experiences. In the latter group, we focus mainly on Indigenous Peoples as a clearer and more important example. We also briefly review the approaches to model and consider the role of users in technology adoption and design as a background for inclusion studies. We identify a series of generic barriers and research gaps and some specific ones for each group, resulting in suggested directions for future research.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
SBFT Tool Competition 2023 -- Fuzzing Track
Authors:
Dongge Liu,
Jonathan Metzman,
Marcel Böhme,
Oliver Chang,
Abhishek Arya
Abstract:
This report outlines the objectives, methodology, challenges, and results of the first Fuzzing Competition held at SBFT 2023. The competition utilized FuzzBench to assess the code-coverage performance and bug-finding efficacy of eight participating fuzzers over 23 hours. The competition was organized in three phases. In the first phase, participants were asked to integrate their fuzzers into FuzzB…
▽ More
This report outlines the objectives, methodology, challenges, and results of the first Fuzzing Competition held at SBFT 2023. The competition utilized FuzzBench to assess the code-coverage performance and bug-finding efficacy of eight participating fuzzers over 23 hours. The competition was organized in three phases. In the first phase, participants were asked to integrate their fuzzers into FuzzBench and allowed them to privately run local experiments against the publicly available benchmarks. In the second phase, we publicly ran all submitted fuzzers on the publicly available benchmarks and allowed participants to fix any remaining bugs in their fuzzers. In the third phase, we publicly ran all submitted fuzzers plus three widely-used baseline fuzzers on a hidden set and the publicly available set of benchmark programs to establish the final results.
△ Less
Submitted 15 May, 2023; v1 submitted 19 April, 2023;
originally announced April 2023.
-
A VR-based Priming Framework and Technology Implementation to Improve Learning Mindsets and Academic Performance in Post-Secondary Students
Authors:
Dan Hawes,
Ali Arya
Abstract:
Recent research indicates that most post-secondary students in North America "felt overwhelming anxiety" in the past few years, negatively affecting well-being and academic performance. Further research revealed that other emotions, biases, perceptions, and negative thoughts, can similarly affect student academic performance. To address this problem, we classify these counterproductive mindsets, i…
▽ More
Recent research indicates that most post-secondary students in North America "felt overwhelming anxiety" in the past few years, negatively affecting well-being and academic performance. Further research revealed that other emotions, biases, perceptions, and negative thoughts, can similarly affect student academic performance. To address this problem, we classify these counterproductive mindsets, including anxiety, into Scarcity Mindset, a self-limiting perspective that appropriates cognitive bandwidth required for essential processes like learning in favour of addressing more critical needs or perceived insufficiencies. Through a multi-disciplinary literature analysis of ideas in cognitive science, learning theories and mindsets, and current technology approaches that are suited to address the limitations of scarcity thinking, we identify strategies to help transition students to a more positive Abundance Mindsets. We demonstrate that these priming intervention strategies can transfer to leading-edge digital environments, particularly Virtual Reality (VR). Offering further insights into the findings of our two previously presented studies, we argue that priming interventions related to preparatory activities and the context priming are transferable to virtual reality environments. As such, building on our multidisciplinary research insights, we propose a comprehensive priming model that exploits priming techniques in an iterative process called Cyclical Priming Methodology (CPM). These intervention strategies can focus on student preparation, motivation, reflection, the context of the learning environment, and other aspects of the learning process. Building on CPM, we further propose a technology implementation within VR called Virtual Reality Experience Priming (VREP) and discuss the process to embed CPM/VREP activities within the Experiential Learning Theory (ELT) cycle.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
An Ensemble-based approach for assigning text to correct Harmonized system code
Authors:
Shubham,
Avinash Arya,
Subarna Roy,
Sridhar Jonnala
Abstract:
Industries must follow government rules and regulations around the world to classify products when assessing duties and taxes for international shipment. Harmonized System (HS) is the most standardized numerical method of classifying traded products among industry classification systems. A hierarchical ensemble model comprising of Bert-transformer, NER, distance-based approaches, and knowledge-gra…
▽ More
Industries must follow government rules and regulations around the world to classify products when assessing duties and taxes for international shipment. Harmonized System (HS) is the most standardized numerical method of classifying traded products among industry classification systems. A hierarchical ensemble model comprising of Bert-transformer, NER, distance-based approaches, and knowledge-graphs have been developed to address scalability, coverage, ability to capture nuances, automation and auditing requirements when classifying unknown text-descriptions as per HS method.
△ Less
Submitted 8 November, 2022;
originally announced November 2022.
-
Information and Communication Technology in Migration: A Framework for Applications, Customization, and Research
Authors:
Ali Arya,
Luciara Nardon,
Md Riyadh
Abstract:
This paper addresses the role of Information and Communication Technology (ICT) in migration governance, support, and experience with particular attention to emerging technologies such as artificial intelligence, social media, and virtual reality. We propose a framework for technology use based on user groups and process types. We provide examples of using emerging technologies for migration-relat…
▽ More
This paper addresses the role of Information and Communication Technology (ICT) in migration governance, support, and experience with particular attention to emerging technologies such as artificial intelligence, social media, and virtual reality. We propose a framework for technology use based on user groups and process types. We provide examples of using emerging technologies for migration-related tasks within the context of this framework. We then identify how such technologies can be applied to migration-related tasks, developed for customized use, and improved through research to add new features that can help different migration stakeholders. We suggest a series of possible directions for future research and development to take advantage of specific affordances of those emerging technologies more effectively.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
Closed Ranks: The Discursive Value of Military Support for Indian Politicians on Social Media
Authors:
Agrima Seth,
Soham De,
Arshia Arya,
Steven Wilkinson,
Sushant Singh,
Joyojeet Pal
Abstract:
Influencers play a crucial role in shaping public narratives through information creation and diffusion in the Global South. While public figures from various walks of life and their impact on public discourse have been studied, defence veterans as influencers of the political discourse have been largely overlooked. Veterans matter in the public spehere as a normatively important political lobby.…
▽ More
Influencers play a crucial role in shaping public narratives through information creation and diffusion in the Global South. While public figures from various walks of life and their impact on public discourse have been studied, defence veterans as influencers of the political discourse have been largely overlooked. Veterans matter in the public spehere as a normatively important political lobby. They are also interesting because, unlike active-duty military officers, they are not restricted from taking public sides on politics, so their posts may provide a window into the views of those still in the service. In this work, we systematically analyze the engagement on Twitter of self-described defence-related accounts and politician accounts that post on defence-related issues. We find that self-described defence-related accounts disproportionately engage with the current ruling party in India. We find that politicians promote their closeness to the defence services and nationalist credentials through engagements with defence-related influencers. We briefly consider the institutional implications of these patterns and connections
△ Less
Submitted 8 April, 2022; v1 submitted 6 April, 2022;
originally announced April 2022.
-
Database of Indian Social Media Influencers on Twitter
Authors:
Arshia Arya,
Soham De,
Dibyendu Mishra,
Gazal Shekhawat,
Ankur Sharma,
Anmol Panda,
Faisal Lalani,
Parantak Singh,
Ramaravind Kommiya Mothilal,
Rynaa Grover,
Sachita Nishal,
Saloni Dash,
Shehla Shora,
Syeda Zainab Akbar,
Joyojeet Pal
Abstract:
Databases of highly networked individuals have been indispensable in studying narratives and influence on social media. To support studies on Twitter in India, we present a systematically categorised database of accounts of influence on Twitter in India, identified and annotated through an iterative process of friends, networks, and self-described profile information, verified manually. We built a…
▽ More
Databases of highly networked individuals have been indispensable in studying narratives and influence on social media. To support studies on Twitter in India, we present a systematically categorised database of accounts of influence on Twitter in India, identified and annotated through an iterative process of friends, networks, and self-described profile information, verified manually. We built an initial set of accounts based on the friend network of a seed set of accounts based on real-world renown in various fields, and then snowballed "friends of friends" multiple times, and rank ordered individuals based on the number of in-group connections, and overall followers. We then manually classified identified accounts under the categories of entertainment, sports, business, government, institutions, journalism, civil society accounts that have independent standing outside of social media, as well as a category of "digital first" referring to accounts that derive their primary influence from online activity. Overall, we annotated 11580 unique accounts across all categories. The database is useful studying various questions related to the role of influencers in polarisation, misinformation, extreme speech, political discourse etc.
△ Less
Submitted 5 May, 2022; v1 submitted 17 March, 2022;
originally announced March 2022.
-
Music Composition Using Quantum Annealing
Authors:
Ashish Arya,
Ludmila Botelho,
Fabiola Cañete,
Dhruvi Kapadia,
Özlem Salehi
Abstract:
With the emergence of quantum computers, a new field of algorithmic music composition has been initiated. The vast majority of previous work focuses on music generation using gate-based quantum computers. An alternative model of computation is adiabatic quantum computing (AQC), and a heuristic algorithm known as quantum annealing running in the framework of AQC is a promising method for solving op…
▽ More
With the emergence of quantum computers, a new field of algorithmic music composition has been initiated. The vast majority of previous work focuses on music generation using gate-based quantum computers. An alternative model of computation is adiabatic quantum computing (AQC), and a heuristic algorithm known as quantum annealing running in the framework of AQC is a promising method for solving optimization problems. In this chapter, we lay the groundwork of music composition using quantum annealing. We approach the process of music composition as an optimization problem. We describe the fundamental methodologies needed for generating different aspects of music including melody, rhythm, and harmony. The discussed techniques are illustrated through examples to ease the understanding. The music pieces generated using D-Wave quantum annealers are among the first examples of their kind and presented within the scope of the chapter. The text is an unedited pre-publication version of a chapter which will appear in the book "Quantum Computer Music", Miranda, E. R. (Editor).
△ Less
Submitted 24 January, 2022;
originally announced January 2022.
-
Adversarial Attack by Limited Point Cloud Surface Modifications
Authors:
Atrin Arya,
Hanieh Naderi,
Shohreh Kasaei
Abstract:
Recent research has revealed that the security of deep neural networks that directly process 3D point clouds to classify objects can be threatened by adversarial samples. Although existing adversarial attack methods achieve high success rates, they do not restrict the point modifications enough to preserve the point cloud appearance. To overcome this shortcoming, two constraints are proposed. Thes…
▽ More
Recent research has revealed that the security of deep neural networks that directly process 3D point clouds to classify objects can be threatened by adversarial samples. Although existing adversarial attack methods achieve high success rates, they do not restrict the point modifications enough to preserve the point cloud appearance. To overcome this shortcoming, two constraints are proposed. These include applying hard boundary constraints on the number of modified points and on the point perturbation norms. Due to the restrictive nature of the problem, the search space contains many local maxima. The proposed method addresses this issue by using a high step-size at the beginning of the algorithm to search the main surface of the point cloud fast and effectively. Then, in order to converge to the desired output, the step-size is gradually decreased. To evaluate the performance of the proposed method, it is run on the ModelNet40 and ScanObjectNN datasets by employing the state-of-the-art point cloud classification models; including PointNet, PointNet++, and DGCNN. The obtained results show that it can perform successful attacks and achieve state-of-the-art results by only a limited number of point modifications while preserving the appearance of the point cloud. Moreover, due to the effective search algorithm, it can perform successful attacks in just a few steps. Additionally, the proposed step-size scheduling algorithm shows an improvement of up to $14.5\%$ when adopted by other methods as well. The proposed method also performs effectively against popular defense methods.
△ Less
Submitted 7 October, 2021;
originally announced October 2021.
-
Rihanna versus Bollywood: Twitter Influencers and the Indian Farmers' Protest
Authors:
Dibyendu Mishra,
Syeda Zainab Akbar,
Arshia Arya,
Saloni Dash,
Rynaa Grover,
Joyojeet Pal
Abstract:
A tweet from popular entertainer and businesswoman, Rihanna, bringing attention to farmers' protests around Delhi set off heightened activity on Indian social media. An immediate consequence was the weighing in by Indian politicians, entertainers, media and other influencers on the issue. In this paper, we use data from Twitter and an archive of debunked misinformation stories to understand some o…
▽ More
A tweet from popular entertainer and businesswoman, Rihanna, bringing attention to farmers' protests around Delhi set off heightened activity on Indian social media. An immediate consequence was the weighing in by Indian politicians, entertainers, media and other influencers on the issue. In this paper, we use data from Twitter and an archive of debunked misinformation stories to understand some of the patterns around influencer engagement with a political issue. We found that more followed influencers were less likely to come out in support of the tweet. We also find that the later engagement of major influencers on the side of the government's position shows suggestion's of collusion. Irrespective of their position on the issue, influencers who engaged saw a significant rise in their following after their tweets. While a number of tweets thanked Rihanna for raising awareness on the issue, she was systematically trolled on the grounds of her gender, race, nationality and religion. Finally, we observed how misinformation existing prior to the tweet set up the grounds for alternative narratives that emerged.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
ARAE: Adversarially Robust Training of Autoencoders Improves Novelty Detection
Authors:
Mohammadreza Salehi,
Atrin Arya,
Barbod Pajoum,
Mohammad Otoofi,
Amirreza Shaeiri,
Mohammad Hossein Rohban,
Hamid R. Rabiee
Abstract:
Autoencoders (AE) have recently been widely employed to approach the novelty detection problem. Trained only on the normal data, the AE is expected to reconstruct the normal data effectively while fail to regenerate the anomalous data, which could be utilized for novelty detection. However, in this paper, it is demonstrated that this does not always hold. AE often generalizes so perfectly that it…
▽ More
Autoencoders (AE) have recently been widely employed to approach the novelty detection problem. Trained only on the normal data, the AE is expected to reconstruct the normal data effectively while fail to regenerate the anomalous data, which could be utilized for novelty detection. However, in this paper, it is demonstrated that this does not always hold. AE often generalizes so perfectly that it can also reconstruct the anomalous data well. To address this problem, we propose a novel AE that can learn more semantically meaningful features. Specifically, we exploit the fact that adversarial robustness promotes learning of meaningful features. Therefore, we force the AE to learn such features by penalizing networks with a bottleneck layer that is unstable against adversarial perturbations. We show that despite using a much simpler architecture in comparison to the prior methods, the proposed AE outperforms or is competitive to state-of-the-art on three benchmark datasets.
△ Less
Submitted 24 October, 2020; v1 submitted 12 March, 2020;
originally announced March 2020.