-
AURORA: Navigating UI Tarpits via Automated Neural Screen Understanding
Authors:
Safwat Ali Khan,
Wenyu Wang,
Yiran Ren,
Bin Zhu,
Jiangfan Shi,
Alyssa McGowan,
Wing Lam,
Kevin Moran
Abstract:
Nearly a decade of research in software engineering has focused on automating mobile app testing to help engineers in overcoming the unique challenges associated with the software platform. Much of this work has come in the form of Automated Input Generation tools (AIG tools) that dynamically explore app screens. However, such tools have repeatedly been demonstrated to achieve lower-than-expected…
▽ More
Nearly a decade of research in software engineering has focused on automating mobile app testing to help engineers in overcoming the unique challenges associated with the software platform. Much of this work has come in the form of Automated Input Generation tools (AIG tools) that dynamically explore app screens. However, such tools have repeatedly been demonstrated to achieve lower-than-expected code coverage - particularly on sophisticated proprietary apps. Prior work has illustrated that a primary cause of these coverage deficiencies is related to so-called tarpits, or complex screens that are difficult to navigate.
In this paper, we take a critical step toward enabling AIG tools to effectively navigate tarpits during app exploration through a new form of automated semantic screen understanding. We introduce AURORA, a technique that learns from the visual and textual patterns that exist in mobile app UIs to automatically detect common screen designs and navigate them accordingly. The key idea of AURORA is that there are a finite number of mobile app screen designs, albeit with subtle variations, such that the general patterns of different categories of UI designs can be learned. As such, AURORA employs a multi-modal, neural screen classifier that is able to recognize the most common types of UI screen designs. After recognizing a given screen, it then applies a set of flexible and generalizable heuristics to properly navigate the screen. We evaluated AURORA both on a set of 12 apps with known tarpits from prior work, and on a new set of five of the most popular apps from the Google Play store. Our results indicate that AURORA is able to effectively navigate tarpit screens, outperforming prior approaches that avoid tarpits by 19.6% in terms of method coverage. The improvements can be attributed to AURORA's UI design classification and heuristic navigation techniques.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Joint AP-UE Association and Power Factor Optimization for Distributed Massive MIMO
Authors:
Mohd Saif Ali Khan,
Samar Agnihotri,
Karthik R. M
Abstract:
The uplink sum-throughput of distributed massive multiple-input-multiple-output (mMIMO) networks depends majorly on Access point (AP)-User Equipment (UE) association and power control. The AP-UE association and power control both are important problems in their own right in distributed mMIMO networks to improve scalability and reduce front-haul load of the network, and to enhance the system perfor…
▽ More
The uplink sum-throughput of distributed massive multiple-input-multiple-output (mMIMO) networks depends majorly on Access point (AP)-User Equipment (UE) association and power control. The AP-UE association and power control both are important problems in their own right in distributed mMIMO networks to improve scalability and reduce front-haul load of the network, and to enhance the system performance by mitigating the interference and boosting the desired signals, respectively. Unlike previous studies, which focused primarily on addressing these two problems separately, this work addresses the uplink sum-throughput maximization problem in distributed mMIMO networks by solving the joint AP-UE association and power control problem, while maintaining Quality-of-Service (QoS) requirements for each UE. To improve scalability, we present an l1-penalty function that delicately balances the trade-off between spectral efficiency (SE) and front-haul signaling load. Our proposed methodology leverages fractional programming, Lagrangian dual formation, and penalty functions to provide an elegant and effective iterative solution with guaranteed convergence. Extensive numerical simulations validate the efficacy of the proposed technique for maximizing sum-throughput while considering the joint AP-UE association and power control problem, demonstrating its superiority over approaches that address these problems individually. Furthermore, the results show that the introduced penalty function can help us effectively control the maximum front-haul load.
△ Less
Submitted 1 July, 2024; v1 submitted 22 February, 2024;
originally announced February 2024.
-
CLIPping the Deception: Adapting Vision-Language Models for Universal Deepfake Detection
Authors:
Sohail Ahmed Khan,
Duc-Tien Dang-Nguyen
Abstract:
The recent advancements in Generative Adversarial Networks (GANs) and the emergence of Diffusion models have significantly streamlined the production of highly realistic and widely accessible synthetic content. As a result, there is a pressing need for effective general purpose detection mechanisms to mitigate the potential risks posed by deepfakes. In this paper, we explore the effectiveness of p…
▽ More
The recent advancements in Generative Adversarial Networks (GANs) and the emergence of Diffusion models have significantly streamlined the production of highly realistic and widely accessible synthetic content. As a result, there is a pressing need for effective general purpose detection mechanisms to mitigate the potential risks posed by deepfakes. In this paper, we explore the effectiveness of pre-trained vision-language models (VLMs) when paired with recent adaptation methods for universal deepfake detection. Following previous studies in this domain, we employ only a single dataset (ProGAN) in order to adapt CLIP for deepfake detection. However, in contrast to prior research, which rely solely on the visual part of CLIP while ignoring its textual component, our analysis reveals that retaining the text part is crucial. Consequently, the simple and lightweight Prompt Tuning based adaptation strategy that we employ outperforms the previous SOTA approach by 5.01% mAP and 6.61% accuracy while utilizing less than one third of the training data (200k images as compared to 720k). To assess the real-world applicability of our proposed models, we conduct a comprehensive evaluation across various scenarios. This involves rigorous testing on images sourced from 21 distinct datasets, including those generated by GANs-based, Diffusion-based and Commercial tools.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
An advanced data fabric architecture leveraging homomorphic encryption and federated learning
Authors:
Sakib Anwar Rieyan,
Md. Raisul Kabir News,
A. B. M. Muntasir Rahman,
Sadia Afrin Khan,
Sultan Tasneem Jawad Zaarif,
Md. Golam Rabiul Alam,
Mohammad Mehedi Hassan,
Michele Ianni,
Giancarlo Fortino
Abstract:
Data fabric is an automated and AI-driven data fusion approach to accomplish data management unification without moving data to a centralized location for solving complex data problems. In a Federated learning architecture, the global model is trained based on the learned parameters of several local models that eliminate the necessity of moving data to a centralized repository for machine learning…
▽ More
Data fabric is an automated and AI-driven data fusion approach to accomplish data management unification without moving data to a centralized location for solving complex data problems. In a Federated learning architecture, the global model is trained based on the learned parameters of several local models that eliminate the necessity of moving data to a centralized repository for machine learning. This paper introduces a secure approach for medical image analysis using federated learning and partially homomorphic encryption within a distributed data fabric architecture. With this method, multiple parties can collaborate in training a machine-learning model without exchanging raw data but using the learned or fused features. The approach complies with laws and regulations such as HIPAA and GDPR, ensuring the privacy and security of the data. The study demonstrates the method's effectiveness through a case study on pituitary tumor classification, achieving a significant level of accuracy. However, the primary focus of the study is on the development and evaluation of federated learning and partially homomorphic encryption as tools for secure medical image analysis. The results highlight the potential of these techniques to be applied to other privacy-sensitive domains and contribute to the growing body of research on secure and privacy-preserving machine learning.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
On Using GUI Interaction Data to Improve Text Retrieval-based Bug Localization
Authors:
Junayed Mahmud,
Nadeeshan De Silva,
Safwat Ali Khan,
Seyed Hooman Mostafavi,
SM Hasan Mansur,
Oscar Chaparro,
Andrian Marcus,
Kevin Moran
Abstract:
One of the most important tasks related to managing bug reports is localizing the fault so that a fix can be applied. As such, prior work has aimed to automate this task of bug localization by formulating it as an information retrieval problem, where potentially buggy files are retrieved and ranked according to their textual similarity with a given bug report. However, there is often a notable sem…
▽ More
One of the most important tasks related to managing bug reports is localizing the fault so that a fix can be applied. As such, prior work has aimed to automate this task of bug localization by formulating it as an information retrieval problem, where potentially buggy files are retrieved and ranked according to their textual similarity with a given bug report. However, there is often a notable semantic gap between the information contained in bug reports and identifiers or natural language contained within source code files. For user-facing software, there is currently a key source of information that could aid in bug localization, but has not been thoroughly investigated - information from the GUI.
We investigate the hypothesis that, for end user-facing applications, connecting information in a bug report with information from the GUI, and using this to aid in retrieving potentially buggy files, can improve upon existing techniques for bug localization. To examine this phenomenon, we conduct a comprehensive empirical study that augments four baseline techniques for bug localization with GUI interaction information from a reproduction scenario to (i) filter out potentially irrelevant files, (ii) boost potentially relevant files, and (iii) reformulate text-retrieval queries. To carry out our study, we source the current largest dataset of fully-localized and reproducible real bugs for Android apps, with corresponding bug reports, consisting of 80 bug reports from 39 popular open-source apps. Our results illustrate that augmenting traditional techniques with GUI information leads to a marked increase in effectiveness across multiple metrics, including a relative increase in Hits@10 of 13-18%. Additionally, through further analysis, we find that our studied augmentations largely complement existing techniques.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
Whispering LLaMA: A Cross-Modal Generative Error Correction Framework for Speech Recognition
Authors:
Srijith Radhakrishnan,
Chao-Han Huck Yang,
Sumeer Ahmad Khan,
Rohit Kumar,
Narsis A. Kiani,
David Gomez-Cabrero,
Jesper N. Tegner
Abstract:
We introduce a new cross-modal fusion technique designed for generative error correction in automatic speech recognition (ASR). Our methodology leverages both acoustic information and external linguistic representations to generate accurate speech transcription contexts. This marks a step towards a fresh paradigm in generative error correction within the realm of n-best hypotheses. Unlike the exis…
▽ More
We introduce a new cross-modal fusion technique designed for generative error correction in automatic speech recognition (ASR). Our methodology leverages both acoustic information and external linguistic representations to generate accurate speech transcription contexts. This marks a step towards a fresh paradigm in generative error correction within the realm of n-best hypotheses. Unlike the existing ranking-based rescoring methods, our approach adeptly uses distinct initialization techniques and parameter-efficient algorithms to boost ASR performance derived from pre-trained speech and text models. Through evaluation across diverse ASR datasets, we evaluate the stability and reproducibility of our fusion technique, demonstrating its improved word error rate relative (WERR) performance in comparison to n-best hypotheses by relatively 37.66%. To encourage future research, we have made our code and pre-trained models open source at https://github.com/Srijith-rkr/Whispering-LLaMA.
△ Less
Submitted 16 October, 2023; v1 submitted 10 October, 2023;
originally announced October 2023.
-
Online Multimedia Verification with Computational Tools and OSINT: Russia-Ukraine Conflict Case Studies
Authors:
Sohail Ahmed Khan,
Jan Gunnar Furuly,
Henrik Brattli Vold,
Rano Tahseen,
Duc-Tien Dang-Nguyen
Abstract:
This paper investigates the use of computational tools and Open-Source Intelligence (OSINT) techniques for verifying online multimedia content, with a specific focus on real-world cases from the Russia-Ukraine conflict. Over a nine-month period from April to December 2022, we examine verification workflows, tools, and case studies published by \faktiskbar. Our study showcases the effectiveness of…
▽ More
This paper investigates the use of computational tools and Open-Source Intelligence (OSINT) techniques for verifying online multimedia content, with a specific focus on real-world cases from the Russia-Ukraine conflict. Over a nine-month period from April to December 2022, we examine verification workflows, tools, and case studies published by \faktiskbar. Our study showcases the effectiveness of diverse resources, including AI tools, geolocation tools, internet archives, and social media monitoring platforms, in enabling journalists and fact-checkers to efficiently process and corroborate evidence, ensuring the dissemination of accurate information. This research underscores the vital role of computational tools and OSINT techniques in promoting evidence-based reporting and combatting misinformation. We also touch on the current limitations of available tools and prospects for future developments in multimedia verification.
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
Distributed Pilot Assignment for Distributed Massive-MIMO Networks
Authors:
Mohd Saif Ali Khan,
Samar Agnihotri,
Karthik R. M
Abstract:
Pilot contamination is a critical issue in distributed massive MIMO networks, where the reuse of pilot sequences due to limited availability of orthogonal pilots for channel estimation leads to performance degradation. In this work, we propose a novel distributed pilot assignment scheme to effectively mitigate the impact of pilot contamination. Our proposed scheme not only reduces signaling overhe…
▽ More
Pilot contamination is a critical issue in distributed massive MIMO networks, where the reuse of pilot sequences due to limited availability of orthogonal pilots for channel estimation leads to performance degradation. In this work, we propose a novel distributed pilot assignment scheme to effectively mitigate the impact of pilot contamination. Our proposed scheme not only reduces signaling overhead, but it also enhances fault-tolerance. Extensive numerical simulations are conducted to evaluate the performance of the proposed scheme. Our results establish that the proposed scheme outperforms existing centralized and distributed schemes in terms of mitigating pilot contamination and significantly enhancing network throughput.
△ Less
Submitted 1 July, 2024; v1 submitted 27 September, 2023;
originally announced September 2023.
-
Distributed Resource Allocation for D2D Multicast in Underlay Cellular Networks
Authors:
Mohd Saif Ali Khan,
Ajay Bhardwaj,
Samar Agnihotri
Abstract:
We address the problem of distributed resource allocation for multicast communication in device-to-device (D2D) enabled underlay cellular networks. The optimal resource allocation is crucial for maximizing the performance of such networks, which are limited by the severe co-channel interference between cellular users (CU) and D2D multicast groups. However, finding such optimal allocation for netwo…
▽ More
We address the problem of distributed resource allocation for multicast communication in device-to-device (D2D) enabled underlay cellular networks. The optimal resource allocation is crucial for maximizing the performance of such networks, which are limited by the severe co-channel interference between cellular users (CU) and D2D multicast groups. However, finding such optimal allocation for networks with large number of CUs and D2D users is challenging. Therefore, we propose a pragmatic scheme that allocates resources distributively, reducing signaling overhead and improving network scalability. Numerical simulations establish the efficacy of the proposed solution in improving the overall system throughout, compared to various existing schemes.
△ Less
Submitted 25 September, 2023;
originally announced September 2023.
-
SAGE: Structured Attribute Value Generation for Billion-Scale Product Catalogs
Authors:
Athanasios N. Nikolakopoulos,
Swati Kaul,
Siva Karthik Gade,
Bella Dubrov,
Umit Batur,
Suleiman Ali Khan
Abstract:
We introduce SAGE; a Generative LLM for inferring attribute values for products across world-wide e-Commerce catalogs. We introduce a novel formulation of the attribute-value prediction problem as a Seq2Seq summarization task, across languages, product types and target attributes. Our novel modeling approach lifts the restriction of predicting attribute values within a pre-specified set of choices…
▽ More
We introduce SAGE; a Generative LLM for inferring attribute values for products across world-wide e-Commerce catalogs. We introduce a novel formulation of the attribute-value prediction problem as a Seq2Seq summarization task, across languages, product types and target attributes. Our novel modeling approach lifts the restriction of predicting attribute values within a pre-specified set of choices, as well as, the requirement that the sought attribute values need to be explicitly mentioned in the text. SAGE can infer attribute values even when such values are mentioned implicitly using periphrastic language, or not-at-all-as is the case for common-sense defaults. Additionally, SAGE is capable of predicting whether an attribute is inapplicable for the product at hand, or non-obtainable from the available information. SAGE is the first method able to tackle all aspects of the attribute-value-prediction task as they arise in practical settings in e-Commerce catalogs. A comprehensive set of experiments demonstrates the effectiveness of the proposed approach, as well as, its superiority against state-of-the-art competing alternatives. Moreover, our experiments highlight SAGE's ability to tackle the task of predicting attribute values in zero-shot setting; thereby, opening up opportunities for significantly reducing the overall number of labeled examples required for training.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Detecting Out-of-Context Image-Caption Pairs in News: A Counter-Intuitive Method
Authors:
Eivind Moholdt,
Sohail Ahmed Khan,
Duc-Tien Dang-Nguyen
Abstract:
The growth of misinformation and re-contextualized media in social media and news leads to an increasing need for fact-checking methods. Concurrently, the advancement in generative models makes cheapfakes and deepfakes both easier to make and harder to detect. In this paper, we present a novel approach using generative image models to our advantage for detecting Out-of-Context (OOC) use of images-…
▽ More
The growth of misinformation and re-contextualized media in social media and news leads to an increasing need for fact-checking methods. Concurrently, the advancement in generative models makes cheapfakes and deepfakes both easier to make and harder to detect. In this paper, we present a novel approach using generative image models to our advantage for detecting Out-of-Context (OOC) use of images-caption pairs in news. We present two new datasets with a total of $6800$ images generated using two different generative models including (1) DALL-E 2, and (2) Stable-Diffusion. We are confident that the method proposed in this paper can further research on generative models in the field of cheapfake detection, and that the resulting datasets can be used to train and evaluate new models aimed at detecting cheapfakes. We run a preliminary qualitative and quantitative analysis to evaluate the performance of each image generation model for this task, and evaluate a handful of methods for computing image similarity.
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
Deepfake Detection: A Comparative Analysis
Authors:
Sohail Ahmed Khan,
Duc-Tien Dang-Nguyen
Abstract:
This paper present a comprehensive comparative analysis of supervised and self-supervised models for deepfake detection. We evaluate eight supervised deep learning architectures and two transformer-based models pre-trained using self-supervised strategies (DINO, CLIP) on four benchmarks (FakeAVCeleb, CelebDF-V2, DFDC, and FaceForensics++). Our analysis includes intra-dataset and inter-dataset eval…
▽ More
This paper present a comprehensive comparative analysis of supervised and self-supervised models for deepfake detection. We evaluate eight supervised deep learning architectures and two transformer-based models pre-trained using self-supervised strategies (DINO, CLIP) on four benchmarks (FakeAVCeleb, CelebDF-V2, DFDC, and FaceForensics++). Our analysis includes intra-dataset and inter-dataset evaluations, examining the best performing models, generalisation capabilities, and impact of augmentations. We also investigate the trade-off between model size and performance. Our main goal is to provide insights into the effectiveness of different deep learning architectures (transformers, CNNs), training strategies (supervised, self-supervised), and deepfake detection benchmarks. These insights can help guide the development of more accurate and reliable deepfake detection systems, which are crucial in mitigating the harmful impact of deepfakes on individuals and society.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation
Authors:
Muhammad Irfan Khan,
Esa Alhoniemi,
Elina Kontio,
Suleiman A. Khan,
Mojtaba Jafaritadi
Abstract:
Federated Learning (FL) is a distributed machine learning approach that safeguards privacy by creating an impartial global model while respecting the privacy of individual client data. However, the conventional FL method can introduce security risks when dealing with diverse client data, potentially compromising privacy and data integrity. To address these challenges, we present a differential pri…
▽ More
Federated Learning (FL) is a distributed machine learning approach that safeguards privacy by creating an impartial global model while respecting the privacy of individual client data. However, the conventional FL method can introduce security risks when dealing with diverse client data, potentially compromising privacy and data integrity. To address these challenges, we present a differential privacy (DP) federated deep learning framework in medical image segmentation. In this paper, we extend our similarity weight aggregation (SimAgg) method to DP-SimAgg algorithm, a differentially private similarity-weighted aggregation algorithm for brain tumor segmentation in multi-modal magnetic resonance imaging (MRI). Our DP-SimAgg method not only enhances model segmentation capabilities but also provides an additional layer of privacy preservation. Extensive benchmarking and evaluation of our framework, with computational performance as a key consideration, demonstrate that DP-SimAgg enables accurate and robust brain tumor segmentation while minimizing communication costs during model training. This advancement is crucial for preserving the privacy of medical image data and safeguarding sensitive information. In conclusion, adding a differential privacy layer in the global weight aggregation phase of the federated brain tumor segmentation provides a promising solution to privacy concerns without compromising segmentation model efficacy. By leveraging DP, we ensure the protection of client data against adversarial attacks and malicious participants.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Cross-Corpus Multilingual Speech Emotion Recognition: Amharic vs. Other Languages
Authors:
Ephrem Afele Retta,
Richard Sutcliffe,
Jabar Mahmood,
Michael Abebe Berwo,
Eiad Almekhlafi,
Sajjad Ahmed Khan,
Shehzad Ashraf Chaudhry,
Mustafa Mhamed,
Jun Feng
Abstract:
In a conventional Speech emotion recognition (SER) task, a classifier for a given language is trained on a pre-existing dataset for that same language. However, where training data for a language does not exist, data from other languages can be used instead. We experiment with cross-lingual and multilingual SER, working with Amharic, English, German and URDU. For Amharic, we use our own publicly-a…
▽ More
In a conventional Speech emotion recognition (SER) task, a classifier for a given language is trained on a pre-existing dataset for that same language. However, where training data for a language does not exist, data from other languages can be used instead. We experiment with cross-lingual and multilingual SER, working with Amharic, English, German and URDU. For Amharic, we use our own publicly-available Amharic Speech Emotion Dataset (ASED). For English, German and Urdu we use the existing RAVDESS, EMO-DB and URDU datasets. We followed previous research in mapping labels for all datasets to just two classes, positive and negative. Thus we can compare performance on different languages directly, and combine languages for training and testing. In Experiment 1, monolingual SER trials were carried out using three classifiers, AlexNet, VGGE (a proposed variant of VGG), and ResNet50. Results averaged for the three models were very similar for ASED and RAVDESS, suggesting that Amharic and English SER are equally difficult. Similarly, German SER is more difficult, and Urdu SER is easier. In Experiment 2, we trained on one language and tested on another, in both directions for each pair: Amharic<->German, Amharic<->English, and Amharic<->Urdu. Results with Amharic as target suggested that using English or German as source will give the best result. In Experiment 3, we trained on several non-Amharic languages and then tested on Amharic. The best accuracy obtained was several percent greater than the best accuracy in Experiment 2, suggesting that a better result can be obtained when using two or three non-Amharic languages for training than when using just one non-Amharic language. Overall, the results suggest that cross-lingual and multilingual training can be an effective strategy for training a SER classifier when resources for a language are scarce.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
A Parameter-Efficient Learning Approach to Arabic Dialect Identification with Pre-Trained General-Purpose Speech Model
Authors:
Srijith Radhakrishnan,
Chao-Han Huck Yang,
Sumeer Ahmad Khan,
Narsis A. Kiani,
David Gomez-Cabrero,
Jesper N. Tegner
Abstract:
In this work, we explore Parameter-Efficient-Learning (PEL) techniques to repurpose a General-Purpose-Speech (GSM) model for Arabic dialect identification (ADI). Specifically, we investigate different setups to incorporate trainable features into a multi-layer encoder-decoder GSM formulation under frozen pre-trained settings. Our architecture includes residual adapter and model reprogramming (inpu…
▽ More
In this work, we explore Parameter-Efficient-Learning (PEL) techniques to repurpose a General-Purpose-Speech (GSM) model for Arabic dialect identification (ADI). Specifically, we investigate different setups to incorporate trainable features into a multi-layer encoder-decoder GSM formulation under frozen pre-trained settings. Our architecture includes residual adapter and model reprogramming (input-prompting). We design a token-level label mapping to condition the GSM for Arabic Dialect Identification (ADI). This is challenging due to the high variation in vocabulary and pronunciation among the numerous regional dialects. We achieve new state-of-the-art accuracy on the ADI-17 dataset by vanilla fine-tuning. We further reduce the training budgets with the PEL method, which performs within 1.86% accuracy to fine-tuning using only 2.5% of (extra) network trainable parameters. Our study demonstrates how to identify Arabic dialects using a small dataset and limited computation with open source code and pre-trained models.
△ Less
Submitted 3 October, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
Grand Challenge On Detecting Cheapfakes
Authors:
Duc-Tien Dang-Nguyen,
Sohail Ahmed Khan,
Cise Midoglu,
Michael Riegler,
Pål Halvorsen,
Minh-Son Dao
Abstract:
Cheapfake is a recently coined term that encompasses non-AI ("cheap") manipulations of multimedia content. Cheapfakes are known to be more prevalent than deepfakes. Cheapfake media can be created using editing software for image/video manipulations, or even without using any software, by simply altering the context of an image/video by sharing the media alongside misleading claims. This alteration…
▽ More
Cheapfake is a recently coined term that encompasses non-AI ("cheap") manipulations of multimedia content. Cheapfakes are known to be more prevalent than deepfakes. Cheapfake media can be created using editing software for image/video manipulations, or even without using any software, by simply altering the context of an image/video by sharing the media alongside misleading claims. This alteration of context is referred to as out-of-context (OOC) misuse of media. OOC media is much harder to detect than fake media, since the images and videos are not tampered. In this challenge, we focus on detecting OOC images, and more specifically the misuse of real photographs with conflicting image captions in news items. The aim of this challenge is to develop and benchmark models that can be used to detect whether given samples (news image and associated captions) are OOC, based on the recently compiled COSMOS dataset.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Regularized Weight Aggregation in Networked Federated Learning for Glioblastoma Segmentation
Authors:
Muhammad Irfan Khan,
Mohammad Ayyaz Azeem,
Esa Alhoniemi,
Elina Kontio,
Suleiman A. Khan,
Mojtaba Jafaritadi
Abstract:
In federated learning (FL), the global model at the server requires an efficient mechanism for weight aggregation and a systematic strategy for collaboration selection to manage and optimize communication payload. We introduce a practical and cost-efficient method for regularized weight aggregation and propose a laborsaving technique to select collaborators per round. We illustrate the performance…
▽ More
In federated learning (FL), the global model at the server requires an efficient mechanism for weight aggregation and a systematic strategy for collaboration selection to manage and optimize communication payload. We introduce a practical and cost-efficient method for regularized weight aggregation and propose a laborsaving technique to select collaborators per round. We illustrate the performance of our method, regularized similarity weight aggregation (RegSimAgg), on the Federated Tumor Segmentation (FeTS) 2022 challenge's federated training (weight aggregation) problem. Our scalable approach is principled, frugal, and suitable for heterogeneous non-IID collaborators. Using FeTS2021 evaluation criterion, our proposed algorithm RegSimAgg stands at 3rd position in the final rankings of FeTS2022 challenge in the weight aggregation task. Our solution is open sourced at: \url{https://github.com/dskhanirfan/FeTS2022}
△ Less
Submitted 29 January, 2023;
originally announced January 2023.
-
Biomedical image analysis competitions: The state of current participation practice
Authors:
Matthias Eisenmann,
Annika Reinke,
Vivienn Weru,
Minu Dietlinde Tizabi,
Fabian Isensee,
Tim J. Adler,
Patrick Godau,
Veronika Cheplygina,
Michal Kozubek,
Sharib Ali,
Anubha Gupta,
Jan Kybic,
Alison Noble,
Carlos Ortiz de Solórzano,
Samiksha Pachade,
Caroline Petitjean,
Daniel Sage,
Donglai Wei,
Elizabeth Wilden,
Deepak Alapatt,
Vincent Andrearczyk,
Ujjwal Baid,
Spyridon Bakas,
Niranjan Balu,
Sophia Bano
, et al. (331 additional authors not shown)
Abstract:
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,…
▽ More
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis, we designed an international survey that was issued to all participants of challenges conducted in conjunction with the IEEE ISBI 2021 and MICCAI 2021 conferences (80 competitions in total). The survey covered participants' expertise and working environments, their chosen strategies, as well as algorithm characteristics. A median of 72% challenge participants took part in the survey. According to our results, knowledge exchange was the primary incentive (70%) for participation, while the reception of prize money played only a minor role (16%). While a median of 80 working hours was spent on method development, a large portion of participants stated that they did not have enough time for method development (32%). 25% perceived the infrastructure to be a bottleneck. Overall, 94% of all solutions were deep learning-based. Of these, 84% were based on standard architectures. 43% of the respondents reported that the data samples (e.g., images) were too large to be processed at once. This was most commonly addressed by patch-based training (69%), downsampling (37%), and solving 3D analysis tasks as a series of 2D tasks. K-fold cross-validation on the training set was performed by only 37% of the participants and only 50% of the participants performed ensembling based on multiple identical models (61%) or heterogeneous models (39%). 48% of the respondents applied postprocessing steps.
△ Less
Submitted 12 September, 2023; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Avgust: Automating Usage-Based Test Generation from Videos of App Executions
Authors:
Yixue Zhao,
Saghar Talebipour,
Kesina Baral,
Hyojae Park,
Leon Yee,
Safwat Ali Khan,
Yuriy Brun,
Nenad Medvidovic,
Kevin Moran
Abstract:
Writing and maintaining UI tests for mobile apps is a time-consuming and tedious task. While decades of research have produced automated approaches for UI test generation, these approaches typically focus on testing for crashes or maximizing code coverage. By contrast, recent research has shown that developers prefer usage-based tests, which center around specific uses of app features, to help sup…
▽ More
Writing and maintaining UI tests for mobile apps is a time-consuming and tedious task. While decades of research have produced automated approaches for UI test generation, these approaches typically focus on testing for crashes or maximizing code coverage. By contrast, recent research has shown that developers prefer usage-based tests, which center around specific uses of app features, to help support activities such as regression testing. Very few existing techniques support the generation of such tests, as doing so requires automating the difficult task of understanding the semantics of UI screens and user inputs. In this paper, we introduce Avgust, which automates key steps of generating usage-based tests. Avgust uses neural models for image understanding to process video recordings of app uses to synthesize an app-agnostic state-machine encoding of those uses. Then, Avgust uses this encoding to synthesize test cases for a new target app. We evaluate Avgust on 374 videos of common uses of 18 popular apps and show that 69% of the tests Avgust generates successfully execute the desired usage, and that Avgust's classifiers outperform the state of the art.
△ Less
Submitted 1 November, 2022; v1 submitted 6 September, 2022;
originally announced September 2022.
-
Hybrid Transformer Network for Deepfake Detection
Authors:
Sohail Ahmed Khan,
Duc-Tien Dang-Nguyen
Abstract:
Deepfake media is becoming widespread nowadays because of the easily available tools and mobile apps which can generate realistic looking deepfake videos/images without requiring any technical knowledge. With further advances in this field of technology in the near future, the quantity and quality of deepfake media is also expected to flourish, while making deepfake media a likely new practical to…
▽ More
Deepfake media is becoming widespread nowadays because of the easily available tools and mobile apps which can generate realistic looking deepfake videos/images without requiring any technical knowledge. With further advances in this field of technology in the near future, the quantity and quality of deepfake media is also expected to flourish, while making deepfake media a likely new practical tool to spread mis/disinformation. Because of these concerns, the deepfake media detection tools are becoming a necessity. In this study, we propose a novel hybrid transformer network utilizing early feature fusion strategy for deepfake video detection. Our model employs two different CNN networks, i.e., (1) XceptionNet and (2) EfficientNet-B4 as feature extractors. We train both feature extractors along with the transformer in an end-to-end manner on FaceForensics++, DFDC benchmarks. Our model, while having relatively straightforward architecture, achieves comparable results to other more advanced state-of-the-art approaches when evaluated on FaceForensics++ and DFDC benchmarks. Besides this, we also propose novel face cut-out augmentations, as well as random cut-out augmentations. We show that the proposed augmentations improve the detection performance of our model and reduce overfitting. In addition to that, we show that our model is capable of learning from considerably small amount of data.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
ACM Multimedia Grand Challenge on Detecting Cheapfakes
Authors:
Shivangi Aneja,
Cise Midoglu,
Duc-Tien Dang-Nguyen,
Sohail Ahmed Khan,
Michael Riegler,
Pål Halvorsen,
Chris Bregler,
Balu Adsumilli
Abstract:
Cheapfake is a recently coined term that encompasses non-AI (``cheap'') manipulations of multimedia content. Cheapfakes are known to be more prevalent than deepfakes. Cheapfake media can be created using editing software for image/video manipulations, or even without using any software, by simply altering the context of an image/video by sharing the media alongside misleading claims. This alterati…
▽ More
Cheapfake is a recently coined term that encompasses non-AI (``cheap'') manipulations of multimedia content. Cheapfakes are known to be more prevalent than deepfakes. Cheapfake media can be created using editing software for image/video manipulations, or even without using any software, by simply altering the context of an image/video by sharing the media alongside misleading claims. This alteration of context is referred to as out-of-context (OOC) misuse of media. OOC media is much harder to detect than fake media, since the images and videos are not tampered. In this challenge, we focus on detecting OOC images, and more specifically the misuse of real photographs with conflicting image captions in news items. The aim of this challenge is to develop and benchmark models that can be used to detect whether given samples (news image and associated captions) are OOC, based on the recently compiled COSMOS dataset.
△ Less
Submitted 29 July, 2022;
originally announced July 2022.
-
An Incremental Learning Approach to Automatically Recognize Pulmonary Diseases from the Multi-vendor Chest Radiographs
Authors:
Mehreen Sirshar,
Taimur Hassan,
Muhammad Usman Akram,
Shoab Ahmed Khan
Abstract:
Pulmonary diseases can cause severe respiratory problems, leading to sudden death if not treated timely. Many researchers have utilized deep learning systems to diagnose pulmonary disorders using chest X-rays (CXRs). However, such systems require exhaustive training efforts on large-scale data to effectively diagnose chest abnormalities. Furthermore, procuring such large-scale data is often infeas…
▽ More
Pulmonary diseases can cause severe respiratory problems, leading to sudden death if not treated timely. Many researchers have utilized deep learning systems to diagnose pulmonary disorders using chest X-rays (CXRs). However, such systems require exhaustive training efforts on large-scale data to effectively diagnose chest abnormalities. Furthermore, procuring such large-scale data is often infeasible and impractical, especially for rare diseases. With the recent advances in incremental learning, researchers have periodically tuned deep neural networks to learn different classification tasks with few training examples. Although, such systems can resist catastrophic forgetting, they treat the knowledge representations independently of each other, and this limits their classification performance. Also, to the best of our knowledge, there is no incremental learning-driven image diagnostic framework that is specifically designed to screen pulmonary disorders from the CXRs. To address this, we present a novel framework that can learn to screen different chest abnormalities incrementally. In addition to this, the proposed framework is penalized through an incremental learning loss function that infers Bayesian theory to recognize structural and semantic inter-dependencies between incrementally learned knowledge representations to diagnose the pulmonary diseases effectively, regardless of the scanner specifications. We tested the proposed framework on five public CXR datasets containing different chest abnormalities, where it outperformed various state-of-the-art system through various metrics.
△ Less
Submitted 14 January, 2022; v1 submitted 7 January, 2022;
originally announced January 2022.
-
Video Transformer for Deepfake Detection with Incremental Learning
Authors:
Sohail A. Khan,
Hang Dai
Abstract:
Face forgery by deepfake is widely spread over the internet and this raises severe societal concerns. In this paper, we propose a novel video transformer with incremental learning for detecting deepfake videos. To better align the input face images, we use a 3D face reconstruction method to generate UV texture from a single input face image. The aligned face image can also provide pose, eyes blink…
▽ More
Face forgery by deepfake is widely spread over the internet and this raises severe societal concerns. In this paper, we propose a novel video transformer with incremental learning for detecting deepfake videos. To better align the input face images, we use a 3D face reconstruction method to generate UV texture from a single input face image. The aligned face image can also provide pose, eyes blink and mouth movement information that cannot be perceived in the UV texture image, so we use both face images and their UV texture maps to extract the image features. We present an incremental learning strategy to fine-tune the proposed model on a smaller amount of data and achieve better deepfake detection performance. The comprehensive experiments on various public deepfake datasets demonstrate that the proposed video transformer model with incremental learning achieves state-of-the-art performance in the deepfake video detection task with enhanced feature learning from the sequenced data.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
DeepAuditor: Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing
Authors:
Woosub Jung,
Yizhou Feng,
Sabbir Ahmed Khan,
Chunsheng Xin,
Danella Zhao,
Gang Zhou
Abstract:
As the number of IoT devices has increased rapidly, IoT botnets have exploited the vulnerabilities of IoT devices. However, it is still challenging to detect the initial intrusion on IoT devices prior to massive attacks. Recent studies have utilized power side-channel information to identify this intrusion behavior on IoT devices but still lack accurate models in real-time for ubiquitous botnet de…
▽ More
As the number of IoT devices has increased rapidly, IoT botnets have exploited the vulnerabilities of IoT devices. However, it is still challenging to detect the initial intrusion on IoT devices prior to massive attacks. Recent studies have utilized power side-channel information to identify this intrusion behavior on IoT devices but still lack accurate models in real-time for ubiquitous botnet detection.
We proposed the first online intrusion detection system called DeepAuditor for IoT devices via power auditing. To develop the real-time system, we proposed a lightweight power auditing device called Power Auditor. We also designed a distributed CNN classifier for online inference in a laboratory setting. In order to protect data leakage and reduce networking redundancy, we then proposed a privacy-preserved inference protocol via Packed Homomorphic Encryption and a sliding window protocol in our system. The classification accuracy and processing time were measured, and the proposed classifier outperformed a baseline classifier, especially against unseen patterns. We also demonstrated that the distributed CNN design is secure against any distributed components. Overall, the measurements were shown to the feasibility of our real-time distributed system for intrusion detection on IoT devices.
△ Less
Submitted 9 May, 2022; v1 submitted 23 June, 2021;
originally announced June 2021.
-
Benchmarking the Performance of Bayesian Optimization across Multiple Experimental Materials Science Domains
Authors:
Qiaohao Liang,
Aldair E. Gongora,
Zekun Ren,
Armi Tiihonen,
Zhe Liu,
Shijing Sun,
James R. Deneault,
Daniil Bash,
Flore Mekki-Berrada,
Saif A. Khan,
Kedar Hippalgaonkar,
Benji Maruyama,
Keith A. Brown,
John Fisher III,
Tonio Buonassisi
Abstract:
In the field of machine learning (ML) for materials optimization, active learning algorithms, such as Bayesian Optimization (BO), have been leveraged for guiding autonomous and high-throughput experimentation systems. However, very few studies have evaluated the efficiency of BO as a general optimization algorithm across a broad range of experimental materials science domains. In this work, we eva…
▽ More
In the field of machine learning (ML) for materials optimization, active learning algorithms, such as Bayesian Optimization (BO), have been leveraged for guiding autonomous and high-throughput experimentation systems. However, very few studies have evaluated the efficiency of BO as a general optimization algorithm across a broad range of experimental materials science domains. In this work, we evaluate the performance of BO algorithms with a collection of surrogate model and acquisition function pairs across five diverse experimental materials systems, namely carbon nanotube polymer blends, silver nanoparticles, lead-halide perovskites, as well as additively manufactured polymer structures and shapes. By defining acceleration and enhancement metrics for general materials optimization objectives, we find that for surrogate model selection, Gaussian Process (GP) with anisotropic kernels (automatic relevance detection, ARD) and Random Forests (RF) have comparable performance and both outperform the commonly used GP without ARD. We discuss the implicit distributional assumptions of RF and GP, and the benefits of using GP with anisotropic kernels in detail. We provide practical insights for experimentalists on surrogate model selection of BO during materials optimization campaigns.
△ Less
Submitted 23 May, 2021;
originally announced June 2021.
-
Comparative Analysis of Machine Learning Approaches to Analyze and Predict the Covid-19 Outbreak
Authors:
Muhammad Naeem,
Jian Yu,
Muhammad Aamir,
Sajjad Ahmad Khan,
Olayinka Adeleye,
Zardad Khan
Abstract:
Background. Forecasting the time of forthcoming pandemic reduces the impact of diseases by taking precautionary steps such as public health messaging and raising the consciousness of doctors. With the continuous and rapid increase in the cumulative incidence of COVID-19, statistical and outbreak prediction models including various machine learning (ML) models are being used by the research communi…
▽ More
Background. Forecasting the time of forthcoming pandemic reduces the impact of diseases by taking precautionary steps such as public health messaging and raising the consciousness of doctors. With the continuous and rapid increase in the cumulative incidence of COVID-19, statistical and outbreak prediction models including various machine learning (ML) models are being used by the research community to track and predict the trend of the epidemic, and also in developing appropriate strategies to combat and manage its spread. Methods. In this paper, we present a comparative analysis of various ML approaches including Support Vector Machine, Random Forest, K-Nearest Neighbor and Artificial Neural Network in predicting the COVID-19 outbreak in the epidemiological domain. We first apply the autoregressive distributed lag (ARDL) method to identify and model the short and long-run relationships of the time-series COVID-19 datasets. That is, we determine the lags between a response variable and its respective explanatory time series variables as independent variables. Then, the resulting significant variables concerning their lags are used in the regression model selected by the ARDL for predicting and forecasting the trend of the epidemic. Results. Statistical measures i.e., Root Mean Square Error (RMSE), Mean Absolute Error (MAE) and Mean Absolute Percentage Error (MAPE) are used for model accuracy. The values of MAPE for the best selected models for confirmed, recovered and deaths cases are 0.407, 0.094 and 0.124 respectively, which falls under the category of highly accurate forecasts. In addition, we computed fifteen days ahead forecast for the daily deaths, recover, and confirm patients and the cases fluctuated across time in all aspects. Besides, the results reveal the advantages of ML algorithms for supporting decision making of evolving short term policies.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Adversarially robust deepfake media detection using fused convolutional neural network predictions
Authors:
Sohail Ahmed Khan,
Alessandro Artusi,
Hang Dai
Abstract:
Deepfakes are synthetically generated images, videos or audios, which fraudsters use to manipulate legitimate information. Current deepfake detection systems struggle against unseen data. To address this, we employ three different deep Convolutional Neural Network (CNN) models, (1) VGG16, (2) InceptionV3, and (3) XceptionNet to classify fake and real images extracted from videos. We also construct…
▽ More
Deepfakes are synthetically generated images, videos or audios, which fraudsters use to manipulate legitimate information. Current deepfake detection systems struggle against unseen data. To address this, we employ three different deep Convolutional Neural Network (CNN) models, (1) VGG16, (2) InceptionV3, and (3) XceptionNet to classify fake and real images extracted from videos. We also constructed a fusion of the deep CNN models to improve the robustness and generalisation capability. The proposed technique outperforms state-of-the-art models with 96.5% accuracy, when tested on publicly available DeepFake Detection Challenge (DFDC) test data, comprising of 400 videos. The fusion model achieves 99% accuracy on lower quality DeepFake-TIMIT dataset videos and 91.88% on higher quality DeepFake-TIMIT videos. In addition to this, we prove that prediction fusion is more robust against adversarial attacks. If one model is compromised by an adversarial attack, the prediction fusion does not let it affect the overall classification.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)
Authors:
Sohail Ahmed Khan,
Wasiq Khan,
Abir Hussain
Abstract:
Phishing attacks are the most common type of cyber-attacks used to obtain sensitive information and have been affecting individuals as well as organisations across the globe. Various techniques have been proposed to identify the phishing attacks specifically, deployment of machine intelligence in recent years. However, the deployed algorithms and discriminating factors are very diverse in existing…
▽ More
Phishing attacks are the most common type of cyber-attacks used to obtain sensitive information and have been affecting individuals as well as organisations across the globe. Various techniques have been proposed to identify the phishing attacks specifically, deployment of machine intelligence in recent years. However, the deployed algorithms and discriminating factors are very diverse in existing works. In this study, we present a comprehensive analysis of various machine learning algorithms to evaluate their performances over multiple datasets. We further investigate the most significant features within multiple datasets and compare the classification performance with the reduced dimensional datasets. The statistical results indicate that random forest and artificial neural network outperform other classification algorithms, achieving over 97% accuracy using the identified features.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
Exploring Deep 3D Spatial Encodings for Large-Scale 3D Scene Understanding
Authors:
Saqib Ali Khan,
Yilei Shi,
Muhammad Shahzad,
Xiao Xiang Zhu
Abstract:
Semantic segmentation of raw 3D point clouds is an essential component in 3D scene analysis, but it poses several challenges, primarily due to the non-Euclidean nature of 3D point clouds. Although, several deep learning based approaches have been proposed to address this task, but almost all of them emphasized on using the latent (global) feature representations from traditional convolutional neur…
▽ More
Semantic segmentation of raw 3D point clouds is an essential component in 3D scene analysis, but it poses several challenges, primarily due to the non-Euclidean nature of 3D point clouds. Although, several deep learning based approaches have been proposed to address this task, but almost all of them emphasized on using the latent (global) feature representations from traditional convolutional neural networks (CNN), resulting in severe loss of spatial information, thus failing to model the geometry of the underlying 3D objects, that plays an important role in remote sensing 3D scenes. In this letter, we have proposed an alternative approach to overcome the limitations of CNN based approaches by encoding the spatial features of raw 3D point clouds into undirected symmetrical graph models. These encodings are then combined with a high-dimensional feature vector extracted from a traditional CNN into a localized graph convolution operator that outputs the required 3D segmentation map. We have performed experiments on two standard benchmark datasets (including an outdoor aerial remote sensing dataset and an indoor synthetic dataset). The proposed method achieves on par state-of-the-art accuracy with improved training time and model stability thus indicating strong potential for further research towards a generalized state-of-the-art method for 3D scene understanding.
△ Less
Submitted 29 November, 2020;
originally announced November 2020.
-
A generalized deep learning model for multi-disease Chest X-Ray diagnostics
Authors:
Nabit Bajwa,
Kedar Bajwa,
Atif Rana,
M. Faique Shakeel,
Kashif Haqqi,
Suleiman Ali Khan
Abstract:
We investigate the generalizability of deep convolutional neural network (CNN) on the task of disease classification from chest x-rays collected over multiple sites. We systematically train the model using datasets from three independent sites with different patient populations: National Institute of Health (NIH), Stanford University Medical Centre (CheXpert), and Shifa International Hospital (SIH…
▽ More
We investigate the generalizability of deep convolutional neural network (CNN) on the task of disease classification from chest x-rays collected over multiple sites. We systematically train the model using datasets from three independent sites with different patient populations: National Institute of Health (NIH), Stanford University Medical Centre (CheXpert), and Shifa International Hospital (SIH). We formulate a sequential training approach and demonstrate that the model produces generalized prediction performance using held out test sets from the three sites. Our model generalizes better when trained on multiple datasets, with the CheXpert-Shifa-NET model performing significantly better (p-values < 0.05) than the models trained on individual datasets for 3 out of the 4 distinct disease classes. The code for training the model will be made available open source at: www.github.com/link-to-code at the time of publication.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
Analysing the impact of global demographic characteristics over the COVID-19 spread using class rule mining and pattern matching
Authors:
Wasiq Khan,
Abir Hussain,
Sohail Ahmed Khan,
Mohammed Al-Jumailey,
Raheel Nawaz,
Panos Liatsis
Abstract:
Since the coronavirus disease (COVID-19) outbreak in December 2019, studies have been addressing diverse aspects in relation to COVID-19 and Variant of Concern 202012/01 (VOC 202012/01) such as potential symptoms and predictive tools. However, limited work has been performed towards the modelling of complex associations between the combined demographic attributes and varying nature of the COVID-19…
▽ More
Since the coronavirus disease (COVID-19) outbreak in December 2019, studies have been addressing diverse aspects in relation to COVID-19 and Variant of Concern 202012/01 (VOC 202012/01) such as potential symptoms and predictive tools. However, limited work has been performed towards the modelling of complex associations between the combined demographic attributes and varying nature of the COVID-19 infections across the globe. This study presents an intelligent approach to investigate the multi-dimensional associations between demographic attributes and COVID-19 global variations. We gather multiple demographic attributes and COVID-19 infection data (by 8 January 2021) from reliable sources, which are then processed by intelligent algorithms to identify the significant associations and patterns within the data. Statistical results and experts' reports indicate strong associations between COVID-19 severity levels across the globe and certain demographic attributes, e.g. female smokers, when combined together with other attributes. The outcomes will aid the understanding of the dynamics of disease spread and its progression, which in turn may support policy makers, medical specialists and society, in better understanding and effective management of the disease.
△ Less
Submitted 31 January, 2021; v1 submitted 27 September, 2020;
originally announced September 2020.
-
VacSIM: Learning Effective Strategies for COVID-19 Vaccine Distribution using Reinforcement Learning
Authors:
Raghav Awasthi,
Keerat Kaur Guliani,
Saif Ahmad Khan,
Aniket Vashishtha,
Mehrab Singh Gill,
Arshita Bhatt,
Aditya Nagori,
Aniket Gupta,
Ponnurangam Kumaraguru,
Tavpritesh Sethi
Abstract:
A COVID-19 vaccine is our best bet for mitigating the ongoing onslaught of the pandemic. However, vaccine is also expected to be a limited resource. An optimal allocation strategy, especially in countries with access inequities and temporal separation of hot-spots, might be an effective way of halting the disease spread. We approach this problem by proposing a novel pipeline VacSIM that dovetails…
▽ More
A COVID-19 vaccine is our best bet for mitigating the ongoing onslaught of the pandemic. However, vaccine is also expected to be a limited resource. An optimal allocation strategy, especially in countries with access inequities and temporal separation of hot-spots, might be an effective way of halting the disease spread. We approach this problem by proposing a novel pipeline VacSIM that dovetails Deep Reinforcement Learning models into a Contextual Bandits approach for optimizing the distribution of COVID-19 vaccine. Whereas the Reinforcement Learning models suggest better actions and rewards, Contextual Bandits allow online modifications that may need to be implemented on a day-to-day basis in the real world scenario. We evaluate this framework against a naive allocation approach of distributing vaccine proportional to the incidence of COVID-19 cases in five different States across India (Assam, Delhi, Jharkhand, Maharashtra and Nagaland) and demonstrate up to 9039 potential infections prevented and a significant increase in the efficacy of limiting the spread over a period of 45 days through the VacSIM approach. Our models and the platform are extensible to all states of India and potentially across the globe. We also propose novel evaluation strategies including standard compartmental model-based projections and a causality-preserving evaluation of our model. Since all models carry assumptions that may need to be tested in various contexts, we open source our model VacSIM and contribute a new reinforcement learning environment compatible with OpenAI gym to make it extensible for real-world applications across the globe. (http://vacsim.tavlab.iiitd.edu.in:8000/).
△ Less
Submitted 4 December, 2021; v1 submitted 14 September, 2020;
originally announced September 2020.
-
Federated Multi-view Matrix Factorization for Personalized Recommendations
Authors:
Adrian Flanagan,
Were Oyomno,
Alexander Grigorievskiy,
Kuan Eeik Tan,
Suleiman A. Khan,
Muhammad Ammad-Ud-Din
Abstract:
We introduce the federated multi-view matrix factorization method that extends the federated learning framework to matrix factorization with multiple data sources. Our method is able to learn the multi-view model without transferring the user's personal data to a central server. As far as we are aware this is the first federated model to provide recommendations using multi-view matrix factorizatio…
▽ More
We introduce the federated multi-view matrix factorization method that extends the federated learning framework to matrix factorization with multiple data sources. Our method is able to learn the multi-view model without transferring the user's personal data to a central server. As far as we are aware this is the first federated model to provide recommendations using multi-view matrix factorization. The model is rigorously evaluated on three datasets on production settings. Empirical validation confirms that federated multi-view matrix factorization outperforms simpler methods that do not take into account the multi-view structure of the data, in addition, it demonstrates the usefulness of the proposed method for the challenging prediction tasks of cold-start federated recommendations.
△ Less
Submitted 8 April, 2020;
originally announced April 2020.
-
Table Structure Extraction with Bi-directional Gated Recurrent Unit Networks
Authors:
Saqib Ali Khan,
Syed Muhammad Daniyal Khalid,
Muhammad Ali Shahzad,
Faisal Shafait
Abstract:
Tables present summarized and structured information to the reader, which makes table structure extraction an important part of document understanding applications. However, table structure identification is a hard problem not only because of the large variation in the table layouts and styles, but also owing to the variations in the page layouts and the noise contamination levels. A lot of resear…
▽ More
Tables present summarized and structured information to the reader, which makes table structure extraction an important part of document understanding applications. However, table structure identification is a hard problem not only because of the large variation in the table layouts and styles, but also owing to the variations in the page layouts and the noise contamination levels. A lot of research has been done to identify table structure, most of which is based on applying heuristics with the aid of optical character recognition (OCR) to hand pick layout features of the tables. These methods fail to generalize well because of the variations in the table layouts and the errors generated by OCR. In this paper, we have proposed a robust deep learning based approach to extract rows and columns from a detected table in document images with a high precision. In the proposed solution, the table images are first pre-processed and then fed to a bi-directional Recurrent Neural Network with Gated Recurrent Units (GRU) followed by a fully-connected layer with soft max activation. The network scans the images from top-to-bottom as well as left-to-right and classifies each input as either a row-separator or a column-separator. We have benchmarked our system on publicly available UNLV as well as ICDAR 2013 datasets on which it outperformed the state-of-the-art table structure extraction systems by a significant margin.
△ Less
Submitted 8 January, 2020;
originally announced January 2020.
-
Low PAPR Reference Signal Transceiver Design for 3GPP 5G NR Uplink
Authors:
M. Sibgath Ali Khan,
Sai Dhiraj Amuru,
Kiran Kuchi
Abstract:
Low peak-to-average-power ratio (PAPR) transmissions significantly improve the cell coverage as they enable high power transmissions without saturating the power amplifier. A new modulation scheme, namely, pi/2-BPSK was introduced in the Rel-15 3GPP 5G NR specifications to support low PAPR transmissions using the DFT-spread-OFDM waveform in the uplink transmissions. To enable data demodulation usi…
▽ More
Low peak-to-average-power ratio (PAPR) transmissions significantly improve the cell coverage as they enable high power transmissions without saturating the power amplifier. A new modulation scheme, namely, pi/2-BPSK was introduced in the Rel-15 3GPP 5G NR specifications to support low PAPR transmissions using the DFT-spread-OFDM waveform in the uplink transmissions. To enable data demodulation using this modulation scheme, Zadoff-Chu sequences are used as reference signals. However, the PAPR of Zadoff-Chu sequences is higher when compared to the pi/2-BPSK data. Therefore, even though the data transmissions have low PAPR, the high PAPR of the reference signal limits the cell coverage in the uplink of Rel-15 3GPP 5G NR design. In this paper we propose a transceiver design which minimizes the PAPR of the reference signals to avoid the aforementioned issues. We show via simulations that the proposed architecture results in more than 2 dB PAPR reduction when compared to the existing design. In addition, when multiple stream transmission is supported, we show that PAPR of the reference signal transmission remains the same for any stream (also referred to as baseband antenna port in 3GPP terminology) when the proposed transceiver design is employed, which is not the case for the current 3GPP 5G NR design
△ Less
Submitted 12 July, 2019;
originally announced July 2019.
-
Federated Collaborative Filtering for Privacy-Preserving Personalized Recommendation System
Authors:
Muhammad Ammad-ud-din,
Elena Ivannikova,
Suleiman A. Khan,
Were Oyomno,
Qiang Fu,
Kuan Eeik Tan,
Adrian Flanagan
Abstract:
The increasing interest in user privacy is leading to new privacy preserving machine learning paradigms. In the Federated Learning paradigm, a master machine learning model is distributed to user clients, the clients use their locally stored data and model for both inference and calculating model updates. The model updates are sent back and aggregated on the server to update the master model then…
▽ More
The increasing interest in user privacy is leading to new privacy preserving machine learning paradigms. In the Federated Learning paradigm, a master machine learning model is distributed to user clients, the clients use their locally stored data and model for both inference and calculating model updates. The model updates are sent back and aggregated on the server to update the master model then redistributed to the clients. In this paradigm, the user data never leaves the client, greatly enhancing the user' privacy, in contrast to the traditional paradigm of collecting, storing and processing user data on a backend server beyond the user's control. In this paper we introduce, as far as we are aware, the first federated implementation of a Collaborative Filter. The federated updates to the model are based on a stochastic gradient approach. As a classical case study in machine learning, we explore a personalized recommendation system based on users' implicit feedback and demonstrate the method's applicability to both the MovieLens and an in-house dataset. Empirical validation confirms a collaborative filter can be federated without a loss of accuracy compared to a standard implementation, hence enhancing the user's privacy in a widely used recommender application while maintaining recommender performance.
△ Less
Submitted 29 January, 2019;
originally announced January 2019.
-
Cancer classification and pathway discovery using non-negative matrix factorization
Authors:
Zexian Zeng,
Andy Vo,
Chengsheng Mao,
Susan E Clare,
Seema A Khan,
Yuan Luo
Abstract:
Extracting genetic information from a full range of sequencing data is important for understanding diseases. We propose a novel method to effectively explore the landscape of genetic mutations and aggregate them to predict cancer type. We used multinomial logistic regression, nonsmooth non-negative matrix factorization (nsNMF), and support vector machine (SVM) to utilize the full range of sequenci…
▽ More
Extracting genetic information from a full range of sequencing data is important for understanding diseases. We propose a novel method to effectively explore the landscape of genetic mutations and aggregate them to predict cancer type. We used multinomial logistic regression, nonsmooth non-negative matrix factorization (nsNMF), and support vector machine (SVM) to utilize the full range of sequencing data, aiming at better aggregating genetic mutations and improving their power in predicting cancer types. Specifically, we introduced a classifier to distinguish cancer types using somatic mutations obtained from whole-exome sequencing data. Mutations were identified from multiple cancers and scored using SIFT, PP2, and CADD, and grouped at the individual gene level. The nsNMF was then applied to reduce dimensionality and to obtain coefficient and basis matrices. A feature matrix was derived from the obtained matrices to train a classifier for cancer type classification with the SVM model. We have demonstrated that the classifier was able to distinguish the cancer types with reasonable accuracy. In five-fold cross-validations using mutation counts as features, the average prediction accuracy was 77.1% (SEM=0.1%), significantly outperforming baselines and outperforming models using mutation scores as features. Using the factor matrices derived from the nsNMF, we identified multiple genes and pathways that are significantly associated with each cancer type. This study presents a generic and complete pipeline to study the associations between somatic mutations and cancers. The discovered genes and pathways associated with each cancer type can lead to biological insights. The proposed method can be adapted to other studies for disease classification and pathway discovery.
△ Less
Submitted 8 October, 2018; v1 submitted 27 September, 2018;
originally announced September 2018.
-
Towards a computational model of social norms
Authors:
Ladislau Bölöni,
Taranjeet Singh Bhatia,
Saad Ahmad Khan,
Jonathan Streater,
Stephen M. Fiore
Abstract:
We describe a computational model of social norms based on identifying values that a certain culture finds desirable such as dignity, generosity and politeness. The model quantifies these values in the form of Culture-Sanctioned Social Metrics (CSSMs) and treats social norms as the requirement to maximize these metrics from the perspective of the self, peers and public. This model can be used to c…
▽ More
We describe a computational model of social norms based on identifying values that a certain culture finds desirable such as dignity, generosity and politeness. The model quantifies these values in the form of Culture-Sanctioned Social Metrics (CSSMs) and treats social norms as the requirement to maximize these metrics from the perspective of the self, peers and public. This model can be used to create realistic social simulations, to explain or predict human behavior in specific scenarios, or as a component of robots or agents that need to interact with humans in specific social-cultural settings. We validate the model by using it to represent a complex deception scenario and showing that it can yield non-trivial insights such as the explanation of apparently irrational human behavior.
△ Less
Submitted 17 January, 2018;
originally announced January 2018.
-
Towards a Crowd Analytic Framework For Crowd Management in Majid-al-Haram
Authors:
Sultan Daud Khan,
Muhammad Tayyab,
Muhammad Khurram Amin,
Akram Nour,
Anas Basalamah,
Saleh Basalamah,
Sohaib Ahmad Khan
Abstract:
The scared cities of Makkah Al Mukarramah and Madina Al Munawarah host millions of pilgrims every year. During Hajj, the movement of large number of people has a unique spatial and temporal constraints, which makes Hajj one of toughest challenges for crowd management. In this paper, we propose a computer vision based framework that automatically analyses video sequence and computes important measu…
▽ More
The scared cities of Makkah Al Mukarramah and Madina Al Munawarah host millions of pilgrims every year. During Hajj, the movement of large number of people has a unique spatial and temporal constraints, which makes Hajj one of toughest challenges for crowd management. In this paper, we propose a computer vision based framework that automatically analyses video sequence and computes important measurements which include estimation of crowd density, identification of dominant patterns, detection and localization of congestion. In addition, we analyze helpful statistics of the crowd like speed, and direction, that could provide support to crowd management personnel. The framework presented in this paper indicate that new advances in computer vision and machine learning can be leveraged effectively for challenging and high density crowd management applications. However, significant customization of existing approaches is required to apply them to the challenging crowd management situations in Masjid Al Haram. Our results paint a promising picture for deployment of computer vision technologies to assist in quantitative measurement of crowd size, density and congestion.
△ Less
Submitted 14 September, 2017;
originally announced September 2017.
-
Leveraging Decoupling in Enabling Energy Aware D2D Communications
Authors:
Mukesh Kumar Giluka,
M Sigbath Ali Khan,
Vanlin Sathya,
Antony A Franklin
Abstract:
Downlink/Uplink decoupling (DUDe) in LTE net- works has caught the attention of researchers as it provides better uplink SINR and reduced power consumption per device due to decoupled connection of a device with the Macro (in downlink) and a small cell (in uplink). These characteristics of DUDe can be exploited to encourage more D2D communications in the network. This paper first proposes a model…
▽ More
Downlink/Uplink decoupling (DUDe) in LTE net- works has caught the attention of researchers as it provides better uplink SINR and reduced power consumption per device due to decoupled connection of a device with the Macro (in downlink) and a small cell (in uplink). These characteristics of DUDe can be exploited to encourage more D2D communications in the network. This paper first proposes a model to estimate decoupling region within which a device is allowed to perform DUDe. Then, it formulates an equation to calculate the total power saved by devices due to decoupling. Finally, the extra area due to decoupling which can be used to enable D2D pairs is calculated. Simulation results are shown based on different simulation scenarios for different objectives for better understanding the idea proposed.
△ Less
Submitted 16 November, 2016;
originally announced November 2016.
-
Retrofitting mutual authentication to GSM using RAND hijacking
Authors:
Mohammed Shafiul Alam Khan,
Chris J Mitchell
Abstract:
As has been widely discussed, the GSM mobile telephony system only offers unilateral authentication of the mobile phone to the network; this limitation permits a range of attacks. While adding support for mutual authentication would be highly beneficial, changing the way GSM serving networks operate is not practical. This paper proposes a novel modification to the relationship between a Subscriber…
▽ More
As has been widely discussed, the GSM mobile telephony system only offers unilateral authentication of the mobile phone to the network; this limitation permits a range of attacks. While adding support for mutual authentication would be highly beneficial, changing the way GSM serving networks operate is not practical. This paper proposes a novel modification to the relationship between a Subscriber Identity Module (SIM) and its home network which allows mutual authentication without changing any of the existing mobile infrastructure, including the phones; the only necessary changes are to the authentication centres and the SIMs. This enhancement, which could be deployed piecemeal in a completely transparent way, not only addresses a number of serious vulnerabilities in GSM but is also the first proposal for enhancing GSM authentication that possesses such transparency properties.
△ Less
Submitted 4 July, 2016; v1 submitted 3 July, 2016;
originally announced July 2016.
-
Drug response prediction by inferring pathway-response associations with Kernelized Bayesian Matrix Factorization
Authors:
Muhammad Ammad-ud-din,
Suleiman A. Khan,
Disha Malani,
Astrid Murumägi,
Olli Kallioniemi,
Tero Aittokallio,
Samuel Kaski
Abstract:
A key goal of computational personalized medicine is to systematically utilize genomic and other molecular features of samples to predict drug responses for a previously unseen sample. Such predictions are valuable for developing hypotheses for selecting therapies tailored for individual patients. This is especially valuable in oncology, where molecular and genetic heterogeneity of the cells has a…
▽ More
A key goal of computational personalized medicine is to systematically utilize genomic and other molecular features of samples to predict drug responses for a previously unseen sample. Such predictions are valuable for developing hypotheses for selecting therapies tailored for individual patients. This is especially valuable in oncology, where molecular and genetic heterogeneity of the cells has a major impact on the response. However, the prediction task is extremely challenging, raising the need for methods that can effectively model and predict drug responses. In this study, we propose a novel formulation of multi-task matrix factorization that allows selective data integration for predicting drug responses. To solve the modeling task, we extend the state-of-the-art kernelized Bayesian matrix factorization (KBMF) method with component-wise multiple kernel learning. In addition, our approach exploits the known pathway information in a novel and biologically meaningful fashion to learn the drug response associations. Our method quantitatively outperforms the state of the art on predicting drug responses in two publicly available cancer data sets as well as on a synthetic data set. In addition, we validated our model predictions with lab experiments using an in-house cancer cell line panel. We finally show the practical applicability of the proposed method by utilizing prior knowledge to infer pathway-drug response associations, opening up the opportunity for elucidating drug action mechanisms. We demonstrate that pathway-response associations can be learned by the proposed model for the well known EGFR and MEK inhibitors.
△ Less
Submitted 11 June, 2016;
originally announced June 2016.
-
Convex Factorization Machine for Regression
Authors:
Makoto Yamada,
Wenzhao Lian,
Amit Goyal,
Jianhui Chen,
Kishan Wimalawarne,
Suleiman A Khan,
Samuel Kaski,
Hiroshi Mamitsuka,
Yi Chang
Abstract:
We propose the convex factorization machine (CFM), which is a convex variant of the widely used Factorization Machines (FMs). Specifically, we employ a linear+quadratic model and regularize the linear term with the $\ell_2$-regularizer and the quadratic term with the trace norm regularizer. Then, we formulate the CFM optimization as a semidefinite programming problem and propose an efficient optim…
▽ More
We propose the convex factorization machine (CFM), which is a convex variant of the widely used Factorization Machines (FMs). Specifically, we employ a linear+quadratic model and regularize the linear term with the $\ell_2$-regularizer and the quadratic term with the trace norm regularizer. Then, we formulate the CFM optimization as a semidefinite programming problem and propose an efficient optimization procedure with Hazan's algorithm. A key advantage of CFM over existing FMs is that it can find a globally optimal solution, while FMs may get a poor locally optimal solution since the objective function of FMs is non-convex. In addition, the proposed algorithm is simple yet effective and can be implemented easily. Finally, CFM is a general factorization method and can also be used for other factorization problems including including multi-view matrix factorization and tensor completion problems. Through synthetic and movielens datasets, we first show that the proposed CFM achieves results competitive to FMs. Furthermore, in a toxicogenomics prediction task, we show that CFM outperforms a state-of-the-art tensor factorization method.
△ Less
Submitted 9 August, 2016; v1 submitted 4 July, 2015;
originally announced July 2015.
-
Improving Air Interface User Privacy in Mobile Telephony
Authors:
Mohammed Shafiul Alam Khan,
Chris J Mitchell
Abstract:
Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G (GSM), significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant modifications to existing deployed infrastructures, which…
▽ More
Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G (GSM), significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant modifications to existing deployed infrastructures, which are almost certainly impractical to achieve in practice. In this article we propose an approach which does not require any changes to the existing deployed network infrastructures or mobile devices, but offers improved user identity protection over the air interface. The proposed scheme makes use of multiple IMSIs for an individual USIM to offer a degree of pseudonymity for a user. The only changes required are to the operation of the authentication centre in the home network and to the USIM, and the scheme could be deployed immediately since it is completely transparent to the existing mobile telephony infrastructure. We present two different approaches to the use and management of multiple IMSIs.
△ Less
Submitted 13 April, 2015;
originally announced April 2015.
-
Agent-based modeling of a price information trading business
Authors:
Saad Ahmad Khan,
Ladislau Boloni
Abstract:
We describe an agent-based simulation of a fictional (but feasible) information trading business. The Gas Price Information Trader (GPIT) buys information about real-time gas prices in a metropolitan area from drivers and resells the information to drivers who need to refuel their vehicles.
Our simulation uses real world geographic data, lifestyle-dependent driving patterns and vehicle models to…
▽ More
We describe an agent-based simulation of a fictional (but feasible) information trading business. The Gas Price Information Trader (GPIT) buys information about real-time gas prices in a metropolitan area from drivers and resells the information to drivers who need to refuel their vehicles.
Our simulation uses real world geographic data, lifestyle-dependent driving patterns and vehicle models to create an agent-based model of the drivers. We use real world statistics of gas price fluctuation to create scenarios of temporal and spatial distribution of gas prices. The price of the information is determined on a case-by-case basis through a simple negotiation model. The trader and the customers are adapting their negotiation strategies based on their historical profits.
We are interested in the general properties of the emerging information market: the amount of realizable profit and its distribution between the trader and customers, the business strategies necessary to keep the market operational (such as promotional deals), the price elasticity of demand and the impact of pricing strategies on the profit.
△ Less
Submitted 29 March, 2013;
originally announced March 2013.
-
An Approach of Digital Image Copyright Protection by Using Watermarking Technology
Authors:
Md. Selim Reza,
Mohammed Shafiul Alam Khan,
Md. Golam Robiul Alam,
Serajul Islam
Abstract:
Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of internet content. The proposed system is able to protect…
▽ More
Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of internet content. The proposed system is able to protect copyright or owner identification of digital media, such as audio, image, video, or text. The system permutated the watermark and embed the permutated watermark into the wavelet coefficients of the original image by using a key. The key is randomly generated and used to select the locations in the wavelet domain in which to embed the permutated watermark. Finally, the system combines the concept of cryptography and digital watermarking techniques to implement a more secure digital watermarking system.
△ Less
Submitted 28 May, 2012;
originally announced May 2012.
-
A Reliable Semi-Distributed Load Balancing Architecture of Heterogeneous Wireless Networks
Authors:
Md. Golam Rabiul Alam,
Chayan Biswas,
Naushin Nower,
Mohammed Shafiul Alam Khan
Abstract:
Now a day's Heterogeneous wireless network is a promising field of research interest. Various challenges exist in this hybrid combination like load balancing, resource management and so on. In this paper we introduce a reliable load balancing architecture for heterogeneous wireless communications to ensure certain level of quality of service. To conquer the problem of centralized and distributed d…
▽ More
Now a day's Heterogeneous wireless network is a promising field of research interest. Various challenges exist in this hybrid combination like load balancing, resource management and so on. In this paper we introduce a reliable load balancing architecture for heterogeneous wireless communications to ensure certain level of quality of service. To conquer the problem of centralized and distributed design, a semi distributed load balancing architecture for multiple access networks is introduced. In this grid based design multiple Load and Mobile Agent Management Units is incorporated. To prove the compactness of the design, integrated reliability, signalling overhead and total processing time is calculated. And finally simulation result shows that overall system performance is improved by enhancing reliability, reducing signalling overhead and processing time.
△ Less
Submitted 9 February, 2012;
originally announced February 2012.
-
A Capacity Improvement Method for CDMA based Mesh Networks in SUI Multipath Fading Channels
Authors:
Muhammad Zeeshan,
Shoab A Khan,
Muhammad Yasir Malik
Abstract:
Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. This is due to the advantage of soft limit on the number of active mobile devices. Many wireless mesh systems impose an upper bound on the BER performance which restricts the increase in number of mobile users. Capacity is further reduced in Multipath Fading Environment (MFE). This paper presents an effe…
▽ More
Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. This is due to the advantage of soft limit on the number of active mobile devices. Many wireless mesh systems impose an upper bound on the BER performance which restricts the increase in number of mobile users. Capacity is further reduced in Multipath Fading Environment (MFE). This paper presents an effective method of improving the capacity of a CDMA based mesh network by managing the transmitted powers of the mobile devices and using MMSE based Multiuser Detection (MUD). The proposed scheme improves the capacity two times as compared to the conventional CDMA based mesh network. Simulation results have been presented to demonstrate the effectiveness of the proposed scheme.
△ Less
Submitted 11 December, 2012; v1 submitted 8 September, 2011;
originally announced September 2011.
-
An Efficient Hybrid Power Control Algorithm for Capacity Improvement of CDMA-based Fixed Wireless Applications
Authors:
Muhammad Zeeshan,
Shoab A Khan,
Muhammad Yasir Malik
Abstract:
In Fixed Wireless Applications (FWA), the Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. The reason is the soft limit on the number of active mobile devices. Many Fixed Wireless Applications impose an upper bound on the BER performance which restricts the increase in number of mobile users. The number of active mobile users or Capacity is further red…
▽ More
In Fixed Wireless Applications (FWA), the Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. The reason is the soft limit on the number of active mobile devices. Many Fixed Wireless Applications impose an upper bound on the BER performance which restricts the increase in number of mobile users. The number of active mobile users or Capacity is further reduced in Multipath Fading Environment (MFE). This paper presents an effective method of improving the capacity of CDMA based Fixed Wireless Networks by using a hybrid power control algorithm. The proposed scheme improves the capacity two times as compared to the conventional CDMA based networks. Simulation results have been presented to demonstrate the effectiveness of the proposed scheme.
△ Less
Submitted 11 December, 2012; v1 submitted 8 September, 2011;
originally announced September 2011.
-
Software Development Standard and Software Engineering Practice: A Case Study of Bangladesh
Authors:
Zerina Begum,
Mohammed Shafiul Alam Khan,
Mohd. Zulfiquar Hafiz,
Md. Saiful Islam,
Md. Shoyaib
Abstract:
Improving software process to achieve high quality in a software development organization is the key factor to success. Bangladeshi software firms have not experienced much in this particular area in comparison to other countries. The ISO 9001 and CMM standard has become a basic part of software development. The main objectives of our study are: 1) To understand the software development process us…
▽ More
Improving software process to achieve high quality in a software development organization is the key factor to success. Bangladeshi software firms have not experienced much in this particular area in comparison to other countries. The ISO 9001 and CMM standard has become a basic part of software development. The main objectives of our study are: 1) To understand the software development process uses by the software developer firms in Bangladesh 2) To identify the development practices based on established quality standard and 3) To establish a standardized and coherent process for the development of software for a specific project. It is revealed from this research that software industries of Bangladesh are lacking in target set for software process and improvement, involvement of quality control activities, and standardize business expertise practice. This paper investigates the Bangladeshi software industry in the light of the above challenges.
△ Less
Submitted 19 August, 2010;
originally announced August 2010.