-
Origin of the Anisotropic Beer-Lambert Law from Dichroism and Birefringence in $β$-Ga$_2$O$_3$
Authors:
Md Mohsinur Rahman Adnan,
Mathias Schubert,
Roberto C. Myers
Abstract:
The anisotropic optical absorption edge of $β$-Ga$_2$O$_3$ follows a modified Beer-Lambert law having two effective absorption coefficients. The absorption coefficient of linearly polarized light reduces to the least absorbing direction beyond a critical penetration depth, which itself depends on polarization and wavelength. To understand this behavior, a Stokes vector analysis is performed to tra…
▽ More
The anisotropic optical absorption edge of $β$-Ga$_2$O$_3$ follows a modified Beer-Lambert law having two effective absorption coefficients. The absorption coefficient of linearly polarized light reduces to the least absorbing direction beyond a critical penetration depth, which itself depends on polarization and wavelength. To understand this behavior, a Stokes vector analysis is performed to track the polarization state as a function of depth. The weakening of the absorption coefficient is associated with a gradual shift of linear polarization to the least absorbing crystallographic direction in the plane, which is along the a-exciton within the (010) plane or along the b-exciton in the (001) plane. We show that strong linear dichroism near the optical absorption edge causes this shift in $β$-Ga$_2$O$_3$, which arises from the anisotropy and spectral splitting of the physical absorbers i.e., excitons. The linear polarization shift is accompanied by a variation in the ellipticity due to the birefringence of $β$-Ga$_2$O$_3$. Analysis of the phase relationship between the incoming electric field to that at a certain depth reveals the phase speed as an effective refractive index, which varies along different crystallographic directions. The critical penetration depth is shown to be correlated with the depth at which the ellipticity is maximal. Thus, the anisotropic Beer-Lambert law arises from the interplay of both the dichroic and birefringent properties of $β$-Ga$_2$O$_3$.
△ Less
Submitted 28 June, 2024;
originally announced July 2024.
-
Workload-Aware Hardware Accelerator Mining for Distributed Deep Learning Training
Authors:
Muhammad Adnan,
Amar Phanishayee,
Janardhan Kulkarni,
Prashant J. Nair,
Divya Mahajan
Abstract:
In this paper, we present a novel technique to search for hardware architectures of accelerators optimized for end-to-end training of deep neural networks (DNNs). Our approach addresses both single-device and distributed pipeline and tensor model parallel scenarios, latter being addressed for the first time. The search optimized accelerators for training relevant metrics such as throughput/TDP und…
▽ More
In this paper, we present a novel technique to search for hardware architectures of accelerators optimized for end-to-end training of deep neural networks (DNNs). Our approach addresses both single-device and distributed pipeline and tensor model parallel scenarios, latter being addressed for the first time. The search optimized accelerators for training relevant metrics such as throughput/TDP under a fixed area and power constraints. However, with the proliferation of specialized architectures and complex distributed training mechanisms, the design space exploration of hardware accelerators is very large. Prior work in this space has tried to tackle this by reducing the search space to either a single accelerator execution that too only for inference, or tuning the architecture for specific layers (e.g., convolution). Instead, we take a unique heuristic-based critical path-based approach to determine the best use of available resources (power and area) either for a set of DNN workloads or each workload individually. First, we perform local search to determine the architecture for each pipeline and tensor model stage. Specifically, the system iteratively generates architectural configurations and tunes the design using a novel heuristic-based approach that prioritizes accelerator resources and scheduling to critical operators in a machine learning workload. Second, to address the complexities of distributed training, the local search selects multiple (k) designs per stage. A global search then identifies an accelerator from the top-k sets to optimize training throughput across the stages. We evaluate this work on 11 different DNN models. Compared to a recent inference-only work Spotlight, our method converges to a design in, on average, 31x less time and offers 12x higher throughput. Moreover, designs generated using our method achieve 12% throughput improvement over TPU architecture.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Structured Model Pruning for Efficient Inference in Computational Pathology
Authors:
Mohammed Adnan,
Qinle Ba,
Nazim Shaikh,
Shivam Kalra,
Satarupa Mukherjee,
Auranuch Lorsakul
Abstract:
Recent years have seen significant efforts to adopt Artificial Intelligence (AI) in healthcare for various use cases, from computer-aided diagnosis to ICU triage. However, the size of AI models has been rapidly growing due to scaling laws and the success of foundational models, which poses an increasing challenge to leverage advanced models in practical applications. It is thus imperative to devel…
▽ More
Recent years have seen significant efforts to adopt Artificial Intelligence (AI) in healthcare for various use cases, from computer-aided diagnosis to ICU triage. However, the size of AI models has been rapidly growing due to scaling laws and the success of foundational models, which poses an increasing challenge to leverage advanced models in practical applications. It is thus imperative to develop efficient models, especially for deploying AI solutions under resource-constrains or with time sensitivity. One potential solution is to perform model compression, a set of techniques that remove less important model components or reduce parameter precision, to reduce model computation demand. In this work, we demonstrate that model pruning, as a model compression technique, can effectively reduce inference cost for computational and digital pathology based analysis with a negligible loss of analysis performance. To this end, we develop a methodology for pruning the widely used U-Net-style architectures in biomedical imaging, with which we evaluate multiple pruning heuristics on nuclei instance segmentation and classification, and empirically demonstrate that pruning can compress models by at least 70% with a negligible drop in performance.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
Accelerating Recommender Model Training by Dynamically Skipping Stale Embeddings
Authors:
Yassaman Ebrahimzadeh Maboud,
Muhammad Adnan,
Divya Mahajan,
Prashant J. Nair
Abstract:
Training recommendation models pose significant challenges regarding resource utilization and performance. Prior research has proposed an approach that categorizes embeddings into popular and non-popular classes to reduce the training time for recommendation models. We observe that, even among the popular embeddings, certain embeddings undergo rapid training and exhibit minimal subsequent variatio…
▽ More
Training recommendation models pose significant challenges regarding resource utilization and performance. Prior research has proposed an approach that categorizes embeddings into popular and non-popular classes to reduce the training time for recommendation models. We observe that, even among the popular embeddings, certain embeddings undergo rapid training and exhibit minimal subsequent variation, resulting in saturation. Consequently, updates to these embeddings lack any contribution to model quality. This paper presents Slipstream, a software framework that identifies stale embeddings on the fly and skips their updates to enhance performance. This capability enables Slipstream to achieve substantial speedup, optimize CPU-GPU bandwidth usage, and eliminate unnecessary memory access. SlipStream showcases training time reductions of 2x, 2.4x, 1.2x, and 1.175x across real-world datasets and configurations, compared to Baseline XDL, Intel-optimized DRLM, FAE, and Hotline, respectively.
△ Less
Submitted 21 March, 2024;
originally announced April 2024.
-
Cross-layer Modeling and Design of Content Addressable Memories in Advanced Technology Nodes for Similarity Search
Authors:
Siri Narla,
Piyush Kumar,
Mohammad Adnaan,
Azad Naeemi
Abstract:
In this paper we present a comprehensive design and benchmarking study of Content Addressable Memory (CAM) at the 7nm technology node in the context of similarity search applications. We design CAM cells based on SRAM, spin-orbit torque, and ferroelectric field effect transistor devices and from their layouts extract cell parasitics using state of the art EDA tools. These parasitics are used to de…
▽ More
In this paper we present a comprehensive design and benchmarking study of Content Addressable Memory (CAM) at the 7nm technology node in the context of similarity search applications. We design CAM cells based on SRAM, spin-orbit torque, and ferroelectric field effect transistor devices and from their layouts extract cell parasitics using state of the art EDA tools. These parasitics are used to develop SPICE netlists to model search operations. We use a CAM-based dataset search and a sequential recommendation system to highlight the application-level performance degradation due to interconnect parasitics. We propose and evaluate two solutions to mitigate interconnect effects.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Keyformer: KV Cache Reduction through Key Tokens Selection for Efficient Generative Inference
Authors:
Muhammad Adnan,
Akhil Arunkumar,
Gaurav Jain,
Prashant J. Nair,
Ilya Soloveychik,
Purushotham Kamath
Abstract:
Transformers have emerged as the underpinning architecture for Large Language Models (LLMs). In generative language models, the inference process involves two primary phases: prompt processing and token generation. Token generation, which constitutes the majority of the computational workload, primarily entails vector-matrix multiplications and interactions with the Key-Value (KV) Cache. This phas…
▽ More
Transformers have emerged as the underpinning architecture for Large Language Models (LLMs). In generative language models, the inference process involves two primary phases: prompt processing and token generation. Token generation, which constitutes the majority of the computational workload, primarily entails vector-matrix multiplications and interactions with the Key-Value (KV) Cache. This phase is constrained by memory bandwidth due to the overhead of transferring weights and KV cache values from the memory system to the computing units. This memory bottleneck becomes particularly pronounced in applications that require long-context and extensive text generation, both of which are increasingly crucial for LLMs.
This paper introduces "Keyformer", an innovative inference-time approach, to mitigate the challenges associated with KV cache size and memory bandwidth utilization. Keyformer leverages the observation that approximately 90% of the attention weight in generative inference focuses on a specific subset of tokens, referred to as "key" tokens. Keyformer retains only the key tokens in the KV cache by identifying these crucial tokens using a novel score function. This approach effectively reduces both the KV cache size and memory bandwidth usage without compromising model accuracy. We evaluate Keyformer's performance across three foundational models: GPT-J, Cerebras-GPT, and MPT, which employ various positional embedding algorithms. Our assessment encompasses a variety of tasks, with a particular emphasis on summarization and conversation tasks involving extended contexts. Keyformer's reduction of KV cache reduces inference latency by 2.1x and improves token generation throughput by 2.4x, while preserving the model's accuracy.
△ Less
Submitted 5 April, 2024; v1 submitted 13 March, 2024;
originally announced March 2024.
-
Separation of biocrude produced from hydrothermal liquefaction of faecal sludge without any solvent
Authors:
H M Fairooz Adnan,
Md Khalekuzzaman,
Md. Atik Fayshal,
Md. Mehedi Hasan
Abstract:
In this study faecal sludge is used as raw biomass due to its abundance, low cost, and easy availability. After HTL operation, product separation is getting challenging. Current developed studies observed the separation of aqueous and biocrude oil products occurs during the HTL process more popularly with the use of an organic solvent which is quite expensive. Focusing on this critical issue, this…
▽ More
In this study faecal sludge is used as raw biomass due to its abundance, low cost, and easy availability. After HTL operation, product separation is getting challenging. Current developed studies observed the separation of aqueous and biocrude oil products occurs during the HTL process more popularly with the use of an organic solvent which is quite expensive. Focusing on this critical issue, this study aims to separate the biocrude and aqueous phase without using any solvent by gravity separation technique. From FTIR analysis data it showed that centrifuged at 6000 rpm partial separation of biocrude and aqueous phase (AP) was noticed. however, at 9000 rpm, FTIR analysis showed that biocrude samples included aliphatic hydrocarbons, phenols, and esters where no signs of any carbon chain were found at AP which indicated the products are successfully separated. The separated Crude portion had the higher A-Factor (0.68) and lower C-Factor (0.58) value which indicates the oil quality was immature grade of lower kerogen type II (i.e., moderate oil-prone). This low-cost technique can be economically advantageous for commercial-scale biocrude production.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Optimal EEG Electrode Set for Emotion Recognition From Brain Signals: An Empirical Quest
Authors:
Rumman Ahmed Prodhan,
Sumya Akter,
Tanmoy Sarkar Pias,
Md. Akhtaruzzaman Adnan
Abstract:
The human brain is a complex organ, still completely undiscovered, that controls almost all the parts of the body. Apart from survival, the human brain stimulates emotions. Recent research indicates that brain signals can be very effective for emotion recognition. However, which parts of the brain exhibit most of the emotions is still under-explored. In this study, we empirically analyze the contr…
▽ More
The human brain is a complex organ, still completely undiscovered, that controls almost all the parts of the body. Apart from survival, the human brain stimulates emotions. Recent research indicates that brain signals can be very effective for emotion recognition. However, which parts of the brain exhibit most of the emotions is still under-explored. In this study, we empirically analyze the contribution of each part of the brain in exhibiting emotions. We use the DEAP dataset to find the most optimal electrode set which eventually leads to the effective brain part associated with emotions. We use Fast Fourier Transformation for effective feature extraction and a 1D-CNN with residual connection for classification. Though 32 electrodes from the DEAP dataset got an accuracy of 97.34%, only 12 electrodes (F7, P8, O1, F8, C4, T7, PO3, Fp1, Fp2, O2, P3, and Fz) achieve 95.81% accuracy. This study also shows that adding more than 10 electrodes does not improve performance significantly. Moreover, the frontal lobe is the most important for recognizing emotion.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
On Sharp Bounds of Local Fractional Metric Dimension for Certain Symmetrical Algebraic Structure Graphs
Authors:
Amal S. Alali,
Shahbaz Ali,
Muhammad Adnan,
Delfim F. M. Torres
Abstract:
The smallest set of vertices needed to differentiate or categorize every other vertex in a graph is referred to as the graph's metric dimension. Finding the class of graphs for a particular given metric dimension is an NP-hard problem. This concept has applications in many different domains, including graph theory, network architecture, and facility location problems. A graph $G$ with order $n$ is…
▽ More
The smallest set of vertices needed to differentiate or categorize every other vertex in a graph is referred to as the graph's metric dimension. Finding the class of graphs for a particular given metric dimension is an NP-hard problem. This concept has applications in many different domains, including graph theory, network architecture, and facility location problems. A graph $G$ with order $n$ is known as a Toeplitz graph over the subset $S$ of consecutive collections of integers from one to $n$, and two vertices will be adjacent to each other if their absolute difference is a member of $S$. A graph $G(\mathbb{Z}_{n})$ is called a zero-divisor graph over the zero divisors of a commutative ring $\mathbb{Z}_{n}$, in which two vertices will be adjacent to each other if their product will leave the remainder zero under modulo $n$. Since the local fractional metric dimension problem is NP-hard, it is computationally difficult to identify an optimal solution or to precisely determine the minimal size of a local resolving set; in the worst case, the process takes exponential time. Different upper bound sequences of local fractional metric dimension are suggested in this article, along with a comparison analysis for certain families of Toeplitz and zero-divisor graphs. Furthermore, we note that the analyzed local fractional metric dimension upper bounds fall into three metric families: constant, limited, and unbounded.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Attention-Driven Multi-Modal Fusion: Enhancing Sign Language Recognition and Translation
Authors:
Zaber Ibn Abdul Hakim,
Rasman Mubtasim Swargo,
Muhammad Abdullah Adnan
Abstract:
In this paper, we devise a mechanism for the addition of multi-modal information with an existing pipeline for continuous sign language recognition and translation. In our procedure, we have incorporated optical flow information with RGB images to enrich the features with movement-related information. This work studies the feasibility of such modality inclusion using a cross-modal encoder. The plu…
▽ More
In this paper, we devise a mechanism for the addition of multi-modal information with an existing pipeline for continuous sign language recognition and translation. In our procedure, we have incorporated optical flow information with RGB images to enrich the features with movement-related information. This work studies the feasibility of such modality inclusion using a cross-modal encoder. The plugin we have used is very lightweight and doesn't need to include a separate feature extractor for the new modality in an end-to-end manner. We have applied the changes in both sign language recognition and translation, improving the result in each case. We have evaluated the performance on the RWTH-PHOENIX-2014 dataset for sign language recognition and the RWTH-PHOENIX-2014T dataset for translation. On the recognition task, our approach reduced the WER by 0.9, and on the translation task, our approach increased most of the BLEU scores by ~0.6 on the test set.
△ Less
Submitted 6 December, 2023; v1 submitted 4 September, 2023;
originally announced September 2023.
-
Ad-Rec: Advanced Feature Interactions to Address Covariate-Shifts in Recommendation Networks
Authors:
Muhammad Adnan,
Yassaman Ebrahimzadeh Maboud,
Divya Mahajan,
Prashant J. Nair
Abstract:
Recommendation models are vital in delivering personalized user experiences by leveraging the correlation between multiple input features. However, deep learning-based recommendation models often face challenges due to evolving user behaviour and item features, leading to covariate shifts. Effective cross-feature learning is crucial to handle data distribution drift and adapting to changing user b…
▽ More
Recommendation models are vital in delivering personalized user experiences by leveraging the correlation between multiple input features. However, deep learning-based recommendation models often face challenges due to evolving user behaviour and item features, leading to covariate shifts. Effective cross-feature learning is crucial to handle data distribution drift and adapting to changing user behaviour. Traditional feature interaction techniques have limitations in achieving optimal performance in this context.
This work introduces Ad-Rec, an advanced network that leverages feature interaction techniques to address covariate shifts. This helps eliminate irrelevant interactions in recommendation tasks. Ad-Rec leverages masked transformers to enable the learning of higher-order cross-features while mitigating the impact of data distribution drift. Our approach improves model quality, accelerates convergence, and reduces training time, as measured by the Area Under Curve (AUC) metric. We demonstrate the scalability of Ad-Rec and its ability to achieve superior model quality through comprehensive ablation studies.
△ Less
Submitted 28 August, 2023;
originally announced August 2023.
-
Go Together: Bridging the Gap between Learners and Teachers
Authors:
Asim Irfan,
Atif Nawaz,
Muhammad Turab,
Muhmmad Azeem,
Mashal Adnan,
Ahsan Mehmood,
Sarfaraz Ahmed,
Adnan Ashraf
Abstract:
After the pandemic, humanity has been facing different types of challenges. Social relationships, societal values, and academic and professional behavior have been hit the most. People are shifting their routines to social media and gadgets, and getting addicted to their isolation. This sudden change in their lives has caused an unusual social breakdown and endangered their mental health. In mid-2…
▽ More
After the pandemic, humanity has been facing different types of challenges. Social relationships, societal values, and academic and professional behavior have been hit the most. People are shifting their routines to social media and gadgets, and getting addicted to their isolation. This sudden change in their lives has caused an unusual social breakdown and endangered their mental health. In mid-2021, Pakistan's first Human Library was established under HelpingMind to overcome these effects. Despite online sessions and webinars, HelpingMind needs technology to reach the masses. In this work, we customized the UI or UX of a Go Together Mobile Application (GTMA) to meet the requirements of the client organization. A very interesting concept of the book (expert listener or psychologist) and the reader is introduced in GTMA. It offers separate dashboards, separate reviews or rating systems, booking, and venue information to engage the human reader with his or her favorite human book. The loyalty program enables the members to avail discounts through a mobile application and its membership is global where both the human-reader and human-books can register under the platform. The minimum viable product has been approved by our client organization.
△ Less
Submitted 23 July, 2023;
originally announced August 2023.
-
The anisotropic Beer-Lambert law in $β$-Ga$_{2}$O$_{3}$: Spectral and polarization dependent absorption and photoresponsivity
Authors:
Md Mohsinur Rahman Adnan,
Darpan Verma,
Chris Sturm,
Matthias Schubert,
Roberto C. Myers
Abstract:
Due to its low symmetry, $β$-Ga$_{2}$O$_{3}$ exhibits a strongly anisotropic optical response. As a result, the absorption spectra change with the polarization state of the incoming photons. To understand this phenomenon, here we calculate the complete electromagnetic wave equation solutions as a function of linear polarization angle and photon energy for $β$-Ga$_{2}$O$_{3}$ using its previously m…
▽ More
Due to its low symmetry, $β$-Ga$_{2}$O$_{3}$ exhibits a strongly anisotropic optical response. As a result, the absorption spectra change with the polarization state of the incoming photons. To understand this phenomenon, here we calculate the complete electromagnetic wave equation solutions as a function of linear polarization angle and photon energy for $β$-Ga$_{2}$O$_{3}$ using its previously measured complex dielectric function tensor. The significant off-diagonal terms in this tensor can result in a non-exponential decay in the photon flux, indicating that the Beer-Lambert law is not generally valid in this anisotropic material. However, for above-band-gap spectral regions which depend on crystallographic orientations (> 5.8 eV (001 plane),>5.2 eV (010 plane)) an effective absorption coefficient well approximates the photon flux decay with depth. On the other hand, near the optical absorption edge (4.9 - 5.8 eV (001 plane),4.65 - 5.2 eV (010 plane)) the photon flux decay exhibits a sum of two exponential decays, such that two effective absorption coefficients are necessary to model the loss behavior versus the absorption depth. This behavior manifests from the presence of dichroism in $β$-Ga$_{2}$O$_{3}$. A single effective absorption coefficient can only be recovered for this energy range by augmenting the isotropic Beer-Lambert law with a critical penetration depth and polarization dependence. Using these results, we calculate the polarization-dependent photoresponsivity spectra for light polarized along different crystallographic directions.
△ Less
Submitted 30 January, 2024; v1 submitted 30 May, 2023;
originally announced May 2023.
-
Design and Development of a Java Parallel I/O Library
Authors:
Muhammad Sohaib Ayub,
Muhammad Adnan,
Muhammad Yasir Shafi
Abstract:
Parallel I/O refers to the ability of scientific programs to concurrently read/write from/to a single file from multiple processes executing on distributed memory platforms like compute clusters. In the HPC world, I/O becomes a significant bottleneck for many real-world scientific applications. In the last two decades, there has been significant research in improving the performance of I/O operati…
▽ More
Parallel I/O refers to the ability of scientific programs to concurrently read/write from/to a single file from multiple processes executing on distributed memory platforms like compute clusters. In the HPC world, I/O becomes a significant bottleneck for many real-world scientific applications. In the last two decades, there has been significant research in improving the performance of I/O operations in scientific computing for traditional languages including C, C++, and Fortran. As a result of this, several mature and high-performance libraries including ROMIO (implementation of MPI-IO), parallel HDF5, Parallel I/O (PIO), and parallel netCDF are available today that provide efficient I/O for scientific applications. However, there is very little research done to evaluate and improve I/O performance of Java-based HPC applications. The main hindrance in the development of efficient parallel I/O Java libraries is the lack of a standard API (something equivalent to MPI-IO). Some adhoc solutions have been developed and used in proprietary applications, but there is no general-purpose solution that can be used by performance hungry applications. As part of this project, we plan to develop a Java-based parallel I/O API inspired by the MPI-IO bindings (MPI 2.0 standard document) for C, C++, and Fortran. Once the Java equivalent API of MPI-IO has been developed, we will develop a reference implementation on top of existing Java messaging libraries. Later, we will evaluate and compare performance of our reference Java Parallel I/O library with C/C++ counterparts using benchmarks and real-world applications.
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
Anisotropic excitonic photocurrent in $β$-Ga$_{2}$O$_{3}$
Authors:
Darpan Verma,
Md Mohsinur Rahman Adnan,
Sushovan Dhara,
Chris Sturm,
Siddharth Rajan,
Roberto C. Myers
Abstract:
Polarization dependent photocurrent spectra are measured on a (001) $β$-Ga$_{2}$O$_{3}$ Schottky photodetector, where the linear polarization of light is rotated within the ab plane. Three spectral peaks at 4.92 eV, 5.15 eV, and 5.44 eV are observed that vary in intensity with the optical polarization direction. The peak transition energies are consistent with excitons previously reported in $β$-G…
▽ More
Polarization dependent photocurrent spectra are measured on a (001) $β$-Ga$_{2}$O$_{3}$ Schottky photodetector, where the linear polarization of light is rotated within the ab plane. Three spectral peaks at 4.92 eV, 5.15 eV, and 5.44 eV are observed that vary in intensity with the optical polarization direction. The peak transition energies are consistent with excitons previously reported in $β$-Ga$_{2}$O$_{3}$ due to interband transitions modified by the valence band p-orbital anisotropy and the electron-hole Coulombic attraction. The measured polarization-dependence of the photocurrent matches our predictions based on electromagnetic simulations of anisotropic absorption using the complex dielectric function tensor extracted from previous ellipsometry studies. These results illustrate the dominance of excitonic absorption and photocurrent in $β$-Ga$_{2}$O$_{3}$ both below and above the band gap, demonstrate a combined theoretical/experimental understanding of anisotropic photocarrier generation, and validate previous atomistic band structure calculations in this low-symmetry ultra-wide band gap semiconductor.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
Integration of Data Driven Technologies in Smart Grids for Resilient and Sustainable Smart Cities: A Comprehensive Review
Authors:
Mansoor Ali,
Faisal Naeem,
Nadir Adam,
Georges Kaddoum,
Noor ul Huda,
Muhammad Adnan,
Muhammad Tariq
Abstract:
A modern-day society demands resilient, reliable, and smart urban infrastructure for effective and in telligent operations and deployment. However, unexpected, high-impact, and low-probability events such as earthquakes, tsunamis, tornadoes, and hurricanes make the design of such robust infrastructure more complex. As a result of such events, a power system infrastructure can be severely affected,…
▽ More
A modern-day society demands resilient, reliable, and smart urban infrastructure for effective and in telligent operations and deployment. However, unexpected, high-impact, and low-probability events such as earthquakes, tsunamis, tornadoes, and hurricanes make the design of such robust infrastructure more complex. As a result of such events, a power system infrastructure can be severely affected, leading to unprecedented events, such as blackouts. Nevertheless, the integration of smart grids into the existing framework of smart cities adds to their resilience. Therefore, designing a resilient and reliable power system network is an inevitable requirement of modern smart city infras tructure. With the deployment of the Internet of Things (IoT), smart cities infrastructures have taken a transformational turn towards introducing technologies that do not only provide ease and comfort to the citizens but are also feasible in terms of sustainability and dependability. This paper presents a holistic view of a resilient and sustainable smart city architecture that utilizes IoT, big data analytics, unmanned aerial vehicles, and smart grids through intelligent integration of renew able energy resources. In addition, the impact of disasters on the power system infrastructure is investigated and different types of optimization techniques that can be used to sustain the power flow in the network during disturbances are compared and analyzed. Furthermore, a comparative review analysis of different data-driven machine learning techniques for sustainable smart cities is performed along with the discussion on open research issues and challenges.
△ Less
Submitted 3 August, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
Nanoimprint strain-engineering of 2D semiconductors
Authors:
Jannis Bensmann,
Robert Schmidt,
Robert Schneider,
Johannes Kern,
Paul Steeger,
Mohammad Adnan,
Steffen Michaelis de Vasconcellos,
Rudolf Bratschitsch
Abstract:
Mechanical strain is a powerful tool to tune the optical and optoelectronic properties of atomically thin semiconductors. Inhomogeneous strain plays an important role in exciton funneling and the activation of single-photon emitters in 2D materials. Here, we create an inhomogeneous strain profile in a 2D semiconductor on a micrometer scale by a nanoimprint process. We present a nanoimprint setup,…
▽ More
Mechanical strain is a powerful tool to tune the optical and optoelectronic properties of atomically thin semiconductors. Inhomogeneous strain plays an important role in exciton funneling and the activation of single-photon emitters in 2D materials. Here, we create an inhomogeneous strain profile in a 2D semiconductor on a micrometer scale by a nanoimprint process. We present a nanoimprint setup, where a mold is used to apply pressure in a controlled way to a WS2 monolayer on a heated polymer layer. After printing, the strain created in the 2D semiconductor is verified by hyperspectral optical imaging. The developed nanoimprint technique is scalable and could be transferred to commercial nanoimprint machines.
△ Less
Submitted 22 December, 2022;
originally announced December 2022.
-
A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique
Authors:
Abdur Rehman,
Sagheer Abbas,
M. A. Khan,
Taher M. Ghazal,
Khan Muhammad Adnan,
Amir Mosavi
Abstract:
In recent years, the global Internet of Medical Things (IoMT) industry has evolved at a tremendous speed. Security and privacy are key concerns on the IoMT, owing to the huge scale and deployment of IoMT networks. Machine learning (ML) and blockchain (BC) technologies have significantly enhanced the capabilities and facilities of healthcare 5.0, spawning a new area known as "Smart Healthcare." By…
▽ More
In recent years, the global Internet of Medical Things (IoMT) industry has evolved at a tremendous speed. Security and privacy are key concerns on the IoMT, owing to the huge scale and deployment of IoMT networks. Machine learning (ML) and blockchain (BC) technologies have significantly enhanced the capabilities and facilities of healthcare 5.0, spawning a new area known as "Smart Healthcare." By identifying concerns early, a smart healthcare system can help avoid long-term damage. This will enhance the quality of life for patients while reducing their stress and healthcare costs. The IoMT enables a range of functionalities in the field of information technology, one of which is smart and interactive health care. However, combining medical data into a single storage location to train a powerful machine learning model raises concerns about privacy, ownership, and compliance with greater concentration. Federated learning (FL) overcomes the preceding difficulties by utilizing a centralized aggregate server to disseminate a global learning model. Simultaneously, the local participant keeps control of patient information, assuring data confidentiality and security. This article conducts a comprehensive analysis of the findings on blockchain technology entangled with federated learning in healthcare. 5.0. The purpose of this study is to construct a secure health monitoring system in healthcare 5.0 by utilizing a blockchain technology and Intrusion Detection System (IDS) to detect any malicious activity in a healthcare network and enables physicians to monitor patients through medical sensors and take necessary measures periodically by predicting diseases.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
Traffic Congestion Prediction using Deep Convolutional Neural Networks: A Color-coding Approach
Authors:
Mirza Fuad Adnan,
Nadim Ahmed,
Imrez Ishraque,
Md. Sifath Al Amin,
Md. Sumit Hasan
Abstract:
The traffic video data has become a critical factor in confining the state of traffic congestion due to the recent advancements in computer vision. This work proposes a unique technique for traffic video classification using a color-coding scheme before training the traffic data in a Deep convolutional neural network. At first, the video data is transformed into an imagery data set; then, the vehi…
▽ More
The traffic video data has become a critical factor in confining the state of traffic congestion due to the recent advancements in computer vision. This work proposes a unique technique for traffic video classification using a color-coding scheme before training the traffic data in a Deep convolutional neural network. At first, the video data is transformed into an imagery data set; then, the vehicle detection is performed using the You Only Look Once algorithm. A color-coded scheme has been adopted to transform the imagery dataset into a binary image dataset. These binary images are fed to a Deep Convolutional Neural Network. Using the UCSD dataset, we have obtained a classification accuracy of 98.2%.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
Realizing Giant Spin-Selective Reflection based on a Chiral Meta-structure Operating in the Visible-Infrared Regime
Authors:
Asif Ali,
Syeda Rida Tahir,
Muhammad Adnan
Abstract:
The spin-selective reflection to introduce chirality which can have a lot of applications in real life such as spectroscopy, optical setups, media industry etc. In this paper, a reflection based metasurface proposed to introduce the giant chiroptical effects at broadband visible and infrared (IR) regimes. The optimization and results of basic unit also termed as nanostructure are demonstrated here…
▽ More
The spin-selective reflection to introduce chirality which can have a lot of applications in real life such as spectroscopy, optical setups, media industry etc. In this paper, a reflection based metasurface proposed to introduce the giant chiroptical effects at broadband visible and infrared (IR) regimes. The optimization and results of basic unit also termed as nanostructure are demonstrated here. The reflectance at the optimal parameters for the proposed nanostructure shows the inclusion of multiband giant chiroptical effects in reflection mode. The results show that this metasurface can elicit large spin-selective reflection coefficients with moderate chirality covering the broadband wavelength. The circular dichroism in the visible and IR regime shows its potential applicability for a lot of applications in our daily life. This work also provides a new approach to achieve giant Spin Hall Effect at broadband wavelength ranges with low loss.
△ Less
Submitted 22 February, 2023; v1 submitted 14 August, 2022;
originally announced August 2022.
-
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection
Authors:
Mohammad Masum,
Hossain Shahriar,
Hisham Haddad,
Md Jobair Hossain Faruk,
Maria Valero,
Md Abdullah Khan,
Mohammad A. Rahman,
Muhaiminul I. Adnan,
Alfredo Cuzzocrea
Abstract:
Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, ti…
▽ More
Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, time-consuming, and computationally expensive. Hence, there is a need for an automatic technique to find optimal hyperparameters for the best use of DNN in intrusion detection. This paper proposes a novel Bayesian optimization-based framework for the automatic optimization of hyperparameters, ensuring the best DNN architecture. We evaluated the performance of the proposed framework on NSL-KDD, a benchmark dataset for network intrusion detection. The experimental results show the framework's effectiveness as the resultant DNN architecture demonstrates significantly higher intrusion detection performance than the random search optimization-based approach in terms of accuracy, precision, recall, and f1-score.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Ransomware Classification and Detection With Machine Learning Algorithms
Authors:
Mohammad Masum,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Kai Qian,
Dan Lo,
Muhaiminul Islam Adnan
Abstract:
Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause catastrophic damages to computer systems, data centers, web, and mobile applications across various industries and businesses. Traditional anti-ransomware systems struggle to fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional a…
▽ More
Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause catastrophic damages to computer systems, data centers, web, and mobile applications across various industries and businesses. Traditional anti-ransomware systems struggle to fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional and neural network-based architectures can be immensely utilized in the development of innovative ransomware solutions. In this paper, we present a feature selection-based framework with adopting different machine learning algorithms including neural network-based architectures to classify the security level for ransomware detection and prevention. We applied multiple machine learning algorithms: Decision Tree (DT), Random Forest (RF), Naive Bayes (NB), Logistic Regression (LR) as well as Neural Network (NN)-based classifiers on a selected number of features for ransomware classification. We performed all the experiments on one ransomware dataset to evaluate our proposed framework. The experimental results demonstrate that RF classifiers outperform other methods in terms of accuracy, F-beta, and precision scores.
△ Less
Submitted 2 July, 2022;
originally announced July 2022.
-
Monitoring Shortcut Learning using Mutual Information
Authors:
Mohammed Adnan,
Yani Ioannou,
Chuan-Yung Tsai,
Angus Galloway,
H. R. Tizhoosh,
Graham W. Taylor
Abstract:
The failure of deep neural networks to generalize to out-of-distribution data is a well-known problem and raises concerns about the deployment of trained networks in safety-critical domains such as healthcare, finance and autonomous vehicles. We study a particular kind of distribution shift $\unicode{x2013}$ shortcuts or spurious correlations in the training data. Shortcut learning is often only e…
▽ More
The failure of deep neural networks to generalize to out-of-distribution data is a well-known problem and raises concerns about the deployment of trained networks in safety-critical domains such as healthcare, finance and autonomous vehicles. We study a particular kind of distribution shift $\unicode{x2013}$ shortcuts or spurious correlations in the training data. Shortcut learning is often only exposed when models are evaluated on real-world data that does not contain the same spurious correlations, posing a serious dilemma for AI practitioners to properly assess the effectiveness of a trained model for real-world applications. In this work, we propose to use the mutual information (MI) between the learned representation and the input as a metric to find where in training, the network latches onto shortcuts. Experiments demonstrate that MI can be used as a domain-agnostic metric for monitoring shortcut learning.
△ Less
Submitted 26 June, 2022;
originally announced June 2022.
-
Heterogeneous Acceleration Pipeline for Recommendation System Training
Authors:
Muhammad Adnan,
Yassaman Ebrahimzadeh Maboud,
Divya Mahajan,
Prashant J. Nair
Abstract:
Recommendation models rely on deep learning networks and large embedding tables, resulting in computationally and memory-intensive processes. These models are typically trained using hybrid CPU-GPU or GPU-only configurations. The hybrid mode combines the GPU's neural network acceleration with the CPUs' memory storage and supply for embedding tables but may incur significant CPU-to-GPU transfer tim…
▽ More
Recommendation models rely on deep learning networks and large embedding tables, resulting in computationally and memory-intensive processes. These models are typically trained using hybrid CPU-GPU or GPU-only configurations. The hybrid mode combines the GPU's neural network acceleration with the CPUs' memory storage and supply for embedding tables but may incur significant CPU-to-GPU transfer time. In contrast, the GPU-only mode utilizes High Bandwidth Memory (HBM) across multiple GPUs for storing embedding tables. However, this approach is expensive and presents scaling concerns.
This paper introduces Hotline, a heterogeneous acceleration pipeline that addresses these concerns. Hotline develops a data-aware and model-aware scheduling pipeline by leveraging the insight that only a few embedding entries are frequently accessed (popular). This approach utilizes CPU main memory for non-popular embeddings and GPUs' HBM for popular embeddings. To achieve this, Hotline accelerator fragments a mini-batch into popular and non-popular micro-batches. It gathers the necessary working parameters for non-popular micro-batches from the CPU, while GPUs execute popular micro-batches. The hardware accelerator dynamically coordinates the execution of popular embeddings on GPUs and non-popular embeddings from the CPU's main memory. Real-world datasets and models confirm Hotline's effectiveness, reducing average end-to-end training time by 2.2x compared to Intel-optimized CPU-GPU DLRM baseline.
△ Less
Submitted 28 April, 2024; v1 submitted 11 April, 2022;
originally announced April 2022.
-
A Systematic Study and Analysis of Bengali Folklore with Natural Language Processing Systems
Authors:
Mustain Billah,
Md. Mynoddin,
Mostafijur Rahman Akhond,
Md. Nasim Adnan,
Syed Md. Galib,
Rizwanur Rahad,
M Nurujjaman Khan
Abstract:
Folklore, a solid branch of folk literature, is the hallmark of any nation or any society. Such as oral tradition; as proverbs or jokes, it also includes material culture as well as traditional folk beliefs, and various customs. Bengali folklore is as rich in-depth as it is amazing. Nevertheless, in the womb of time, it is determined to sustain its existence. Therefore, our aim in this study is to…
▽ More
Folklore, a solid branch of folk literature, is the hallmark of any nation or any society. Such as oral tradition; as proverbs or jokes, it also includes material culture as well as traditional folk beliefs, and various customs. Bengali folklore is as rich in-depth as it is amazing. Nevertheless, in the womb of time, it is determined to sustain its existence. Therefore, our aim in this study is to make our rich folklore more comprehensible to everyone in a more sophisticated computational way. Some studies concluded various aspects of the Bengali language with NLP. Our proposed model is to be specific for Bengali folklore. Technically, it will be the first step towards Bengali natural language processing for studying and analyzing the folklore of Bengal.
△ Less
Submitted 13 March, 2022;
originally announced March 2022.
-
Domain-Agnostic Clustering with Self-Distillation
Authors:
Mohammed Adnan,
Yani A. Ioannou,
Chuan-Yung Tsai,
Graham W. Taylor
Abstract:
Recent advancements in self-supervised learning have reduced the gap between supervised and unsupervised representation learning. However, most self-supervised and deep clustering techniques rely heavily on data augmentation, rendering them ineffective for many learning tasks where insufficient domain knowledge exists for performing augmentation. We propose a new self-distillation based algorithm…
▽ More
Recent advancements in self-supervised learning have reduced the gap between supervised and unsupervised representation learning. However, most self-supervised and deep clustering techniques rely heavily on data augmentation, rendering them ineffective for many learning tasks where insufficient domain knowledge exists for performing augmentation. We propose a new self-distillation based algorithm for domain-agnostic clustering. Our method builds upon the existing deep clustering frameworks and requires no separate student model. The proposed method outperforms existing domain agnostic (augmentation-free) algorithms on CIFAR-10. We empirically demonstrate that knowledge distillation can improve unsupervised representation learning by extracting richer `dark knowledge' from the model than using predicted labels alone. Preliminary experiments also suggest that self-distillation improves the convergence of DeepCluster-v2.
△ Less
Submitted 20 December, 2021; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Pay Attention with Focus: A Novel Learning Scheme for Classification of Whole Slide Images
Authors:
Shivam Kalra,
Mohammed Adnan,
Sobhan Hemati,
Taher Dehkharghanian,
Shahryar Rahnamayan,
Hamid Tizhoosh
Abstract:
Deep learning methods such as convolutional neural networks (CNNs) are difficult to directly utilize to analyze whole slide images (WSIs) due to the large image dimensions. We overcome this limitation by proposing a novel two-stage approach. First, we extract a set of representative patches (called mosaic) from a WSI. Each patch of a mosaic is encoded to a feature vector using a deep network. The…
▽ More
Deep learning methods such as convolutional neural networks (CNNs) are difficult to directly utilize to analyze whole slide images (WSIs) due to the large image dimensions. We overcome this limitation by proposing a novel two-stage approach. First, we extract a set of representative patches (called mosaic) from a WSI. Each patch of a mosaic is encoded to a feature vector using a deep network. The feature extractor model is fine-tuned using hierarchical target labels of WSIs, i.e., anatomic site and primary diagnosis. In the second stage, a set of encoded patch-level features from a WSI is used to compute the primary diagnosis probability through the proposed Pay Attention with Focus scheme, an attention-weighted averaging of predicted probabilities for all patches of a mosaic modulated by a trainable focal factor. Experimental results show that the proposed model can be robust, and effective for the classification of WSIs.
△ Less
Submitted 11 June, 2021;
originally announced June 2021.
-
A Bagging and Boosting Based Convexly Combined Optimum Mixture Probabilistic Model
Authors:
Mian Arif Shams Adnan,
H. M. Miraz Mahmud
Abstract:
Unlike previous studies on mixture distributions, a bagging and boosting based convexly combined mixture probabilistic model has been suggested. This model is a result of iteratively searching for obtaining the optimum probabilistic model that provides the maximum p value.
Unlike previous studies on mixture distributions, a bagging and boosting based convexly combined mixture probabilistic model has been suggested. This model is a result of iteratively searching for obtaining the optimum probabilistic model that provides the maximum p value.
△ Less
Submitted 8 June, 2021;
originally announced June 2021.
-
Accelerating Recommendation System Training by Leveraging Popular Choices
Authors:
Muhammad Adnan,
Yassaman Ebrahimzadeh Maboud,
Divya Mahajan,
Prashant J. Nair
Abstract:
Recommender models are commonly used to suggest relevant items to a user for e-commerce and online advertisement-based applications. These models use massive embedding tables to store numerical representation of items' and users' categorical variables (memory intensive) and employ neural networks (compute intensive) to generate final recommendations. Training these large-scale recommendation model…
▽ More
Recommender models are commonly used to suggest relevant items to a user for e-commerce and online advertisement-based applications. These models use massive embedding tables to store numerical representation of items' and users' categorical variables (memory intensive) and employ neural networks (compute intensive) to generate final recommendations. Training these large-scale recommendation models is evolving to require increasing data and compute resources. The highly parallel neural networks portion of these models can benefit from GPU acceleration however, large embedding tables often cannot fit in the limited-capacity GPU device memory. Hence, this paper deep dives into the semantics of training data and obtains insights about the feature access, transfer, and usage patterns of these models. We observe that, due to the popularity of certain inputs, the accesses to the embeddings are highly skewed with a few embedding entries being accessed up to 10000x more. This paper leverages this asymmetrical access pattern to offer a framework, called FAE, and proposes a hot-embedding aware data layout for training recommender models. This layout utilizes the scarce GPU memory for storing the highly accessed embeddings, thus reduces the data transfers from CPU to GPU. At the same time, FAE engages the GPU to accelerate the executions of these hot embedding entries. Experiments on production-scale recommendation models with real datasets show that FAE reduces the overall training time by 2.3x and 1.52x in comparison to XDL CPU-only and XDL CPU-GPU execution while maintaining baseline accuracy
△ Less
Submitted 28 September, 2021; v1 submitted 28 February, 2021;
originally announced March 2021.
-
Fine-Tuning and Training of DenseNet for Histopathology Image Representation Using TCGA Diagnostic Slides
Authors:
Abtin Riasatian,
Morteza Babaie,
Danial Maleki,
Shivam Kalra,
Mojtaba Valipour,
Sobhan Hemati,
Manit Zaveri,
Amir Safarpoor,
Sobhan Shafiei,
Mehdi Afshari,
Maral Rasoolijaberi,
Milad Sikaroudi,
Mohd Adnan,
Sultaan Shah,
Charles Choi,
Savvas Damaskinos,
Clinton JV Campbell,
Phedias Diamandis,
Liron Pantanowitz,
Hany Kashani,
Ali Ghodsi,
H. R. Tizhoosh
Abstract:
Feature vectors provided by pre-trained deep artificial neural networks have become a dominant source for image representation in recent literature. Their contribution to the performance of image analysis can be improved through finetuning. As an ultimate solution, one might even train a deep network from scratch with the domain-relevant images, a highly desirable option which is generally impeded…
▽ More
Feature vectors provided by pre-trained deep artificial neural networks have become a dominant source for image representation in recent literature. Their contribution to the performance of image analysis can be improved through finetuning. As an ultimate solution, one might even train a deep network from scratch with the domain-relevant images, a highly desirable option which is generally impeded in pathology by lack of labeled images and the computational expense. In this study, we propose a new network, namely KimiaNet, that employs the topology of the DenseNet with four dense blocks, fine-tuned and trained with histopathology images in different configurations. We used more than 240,000 image patches with 1000x1000 pixels acquired at 20x magnification through our proposed "highcellularity mosaic" approach to enable the usage of weak labels of 7,126 whole slide images of formalin-fixed paraffin-embedded human pathology samples publicly available through the The Cancer Genome Atlas (TCGA) repository. We tested KimiaNet using three public datasets, namely TCGA, endometrial cancer images, and colorectal cancer images by evaluating the performance of search and classification when corresponding features of different networks are used for image representation. As well, we designed and trained multiple convolutional batch-normalized ReLU (CBR) networks. The results show that KimiaNet provides superior results compared to the original DenseNet and smaller CBR networks when used as feature extractor to represent histopathology images.
△ Less
Submitted 19 January, 2021;
originally announced January 2021.
-
Spectral measurement of the breakdown limit of $β-Ga_{2}O_{3}$ and tunnel ionization of self-trapped excitons and holes
Authors:
Md M. Adnan,
Darpan Verma,
Zhanbo Xia,
Nidhin K. Kalarickal,
Siddharth Rajan,
Roberto C. Myers
Abstract:
$β-Ga_{2}O_{3}…
▽ More
$β-Ga_{2}O_{3}$ is an unusual semiconductor where large electric fields (~1-6 MV/cm) can be applied while still maintaining a dominant excitonic absorption peak below its ultra-wide bandgap. This provides a rare opportunity in the solid-state to examine exciton and carrier self-trapping dynamics in the strong-field limit at steady-state. Under sub-bandgap photon excitation, we observe a field-induced red-shift of the spectral photocurrent peak associated with exciton absorption and threshold-like increase in peak amplitude at high-field associated with self-trapped hole ionization. The field-dependent spectral response is quantitatively fit with an eXciton-modified Franz-Keldysh (XFK) effect model, which includes the electric-field dependent exciton binding energy due to the quadratic Stark effect. A saturation of the spectral red-shift with reverse bias is observed exactly at the onset of dielectric breakdown providing a spectral means to detect and quantify the local electric field and dielectric breakdown behavior. Additionally, the field-dependent responsivity provides insight to the photocurrent production pathway revealing the photocurrent contributions of self-trapped excitons (STXs) and self-trapped holes (STHs). Photocurrent and p-type transport in $β-Ga_{2}O_{3}$ are quantitatively explained by field-dependent tunnel ionization of excitons and self-trapped holes. We employ a quantum mechanical model of the field-dependent tunnel ionization of STX and STH to model the non-linear field-dependence of the photocurrent amplitude. Fitting to the data, we estimate an effective mass of valence band holes $(18.8 m_{0})$ and an ultrafast self-trapping time of holes (0.045 fs). This indicates that minority-hole transport in $β-Ga_{2}O_{3}$ can only arise through tunnel ionization of STH under strong fields.
△ Less
Submitted 13 August, 2021; v1 submitted 31 October, 2020;
originally announced November 2020.
-
A Route to School Informational Intervention for Air Pollution Exposure Reduction
Authors:
Shiraz Ahmed,
Muhammad Adnan,
Davy Janssens,
Geert Wets
Abstract:
Walking and cycling are promoted to encourage sustainable travel behavior among children and adults. School children during their travel episode to-and-from school are disproportionately exposed to air pollution due to multiple reasons such as proximity to high traffic roads and peak volumes. This paper presents a route to school informational intervention that was developed incorporating approach…
▽ More
Walking and cycling are promoted to encourage sustainable travel behavior among children and adults. School children during their travel episode to-and-from school are disproportionately exposed to air pollution due to multiple reasons such as proximity to high traffic roads and peak volumes. This paper presents a route to school informational intervention that was developed incorporating approaches and methods suggested in the literature for effective behavioral interventions. The intervention was implemented using escorting parents/guardians (N=104) of school children of Antwerp, Belgium to adopt school routes with least exposure to pollutants. Collected data and its analysis revealed that 60% participants (N= 62) could benefit themselves by adopting the suggested cleanest routes to school, of whom a significant proportion of participants (i.e. 34%, N= 35) have a difference of average NO2 concentration between the alternative and current route of around 10μg/m3. This information about alternatives routes with their potential benefits was presented to each participant via defined study protocols. 18 Based on the feedback of participants that could potentially adopt suggested alternatives, 77% (N=48) have switched their routes. These results indicated that intervention was effective, and it can bring higher benefits when implemented on a wider scale.
△ Less
Submitted 20 May, 2020;
originally announced May 2020.
-
Representation Learning of Histopathology Images using Graph Neural Networks
Authors:
Mohammed Adnan,
Shivam Kalra,
Hamid R. Tizhoosh
Abstract:
Representation learning for Whole Slide Images (WSIs) is pivotal in developing image-based systems to achieve higher precision in diagnostic pathology. We propose a two-stage framework for WSI representation learning. We sample relevant patches using a color-based method and use graph neural networks to learn relations among sampled patches to aggregate the image information into a single vector r…
▽ More
Representation learning for Whole Slide Images (WSIs) is pivotal in developing image-based systems to achieve higher precision in diagnostic pathology. We propose a two-stage framework for WSI representation learning. We sample relevant patches using a color-based method and use graph neural networks to learn relations among sampled patches to aggregate the image information into a single vector representation. We introduce attention via graph pooling to automatically infer patches with higher relevance. We demonstrate the performance of our approach for discriminating two sub-types of lung cancers, Lung Adenocarcinoma (LUAD) & Lung Squamous Cell Carcinoma (LUSC). We collected 1,026 lung cancer WSIs with the 40$\times$ magnification from The Cancer Genome Atlas (TCGA) dataset, the largest public repository of histopathology images and achieved state-of-the-art accuracy of 88.8% and AUC of 0.89 on lung cancer sub-type classification by extracting features from a pre-trained DenseNet
△ Less
Submitted 17 April, 2020; v1 submitted 15 April, 2020;
originally announced April 2020.
-
Integrated Agent-based Microsimulation Framework for Examining Impacts of Mobility-oriented Policies
Authors:
Muhammad Adnan,
Fatma Outay,
Shiraz Ahmed,
Erika Brattich,
Silvana di Sabatino,
Davy Janssens
Abstract:
Travel demand management measures/policies are important to sustain positive changes among individuals' travel behaviour. An integrated agent-based microsimulation platform provides a rich framework for examining such interventions to assess their impacts using indicators about demand as well as supply side. This paper presents an approach, where individual schedules, derived from a lighter versio…
▽ More
Travel demand management measures/policies are important to sustain positive changes among individuals' travel behaviour. An integrated agent-based microsimulation platform provides a rich framework for examining such interventions to assess their impacts using indicators about demand as well as supply side. This paper presents an approach, where individual schedules, derived from a lighter version of an activity-based model, are fed into a MATSIM simulation framework. Simulations are performed for two European cities i.e. Hasselt (Belgium), Bologna (Italy). After calibrating the modelling framework against aggregate traffic counts for the base case, the impacts of a few traffic management policies (restricting car access, increase in bus frequency) are examined. The results indicate that restricting car access is more effective in terms of reducing traffic from the network and also shifting car drivers/passengers to other modes of travel. The enhancement of bus infrastructure in relation to increase in frequency caused shifting of bicyclist towards public transport, which is an undesirable result of the policy if the objective is to improve sustainability and environment. In future research, the framework will be enhanced to integrate emission and air dispersion models to ascertain effects on air quality as a result of such interventions.
△ Less
Submitted 11 May, 2020; v1 submitted 22 January, 2020;
originally announced January 2020.
-
Local Electric Field Measurement in GaN Diodes by exciton Franz-Keldysh Photocurrent Spectroscopy
Authors:
Darpan Verma,
Md Mohsinur Rahman Adnan,
Mohammad Wahidur Rahman,
Siddharth Rajan,
Roberto C. Myers
Abstract:
The eXciton Franz-Keldysh (XFK) effect is observed in GaN p-n junction diodes via the spectral variation of photocurrent responsivity data that redshift and broaden with increasing reverse bias. Photocurrent spectra are quantitatively fit over a broad photon energy range to an XFK model using only a single fit parameter that determines the lineshape, the local bias ($V_{l}$), uniquely determining…
▽ More
The eXciton Franz-Keldysh (XFK) effect is observed in GaN p-n junction diodes via the spectral variation of photocurrent responsivity data that redshift and broaden with increasing reverse bias. Photocurrent spectra are quantitatively fit over a broad photon energy range to an XFK model using only a single fit parameter that determines the lineshape, the local bias ($V_{l}$), uniquely determining the local electric field maximum and depletion widths. As expected, the spectrally determined values of $V_{l}$ vary linearly with the applied bias ($V$) and reveal a large reduction in the local electric field due to electrostatic non-uniformity. The built-in bias ($V_{bi}$) is estimated by extrapolating $V_{l}$ at $V=0$, which compared with independent C-V measurements indicates an overall $\pm$0.31 V accuracy of $V_{l}$. This demonstrates sub-bandgap photocurrent spectroscopy as a local probe of electric field in wide bandgap diodes that can be used to map out regions of device breakdown (hot spots) for improving electrostatic design of high voltage devices.
△ Less
Submitted 1 April, 2020; v1 submitted 10 January, 2020;
originally announced January 2020.
-
Learning Permutation Invariant Representations using Memory Networks
Authors:
Shivam Kalra,
Mohammed Adnan,
Graham Taylor,
Hamid Tizhoosh
Abstract:
Many real-world tasks such as classification of digital histopathology images and 3D object detection involve learning from a set of instances. In these cases, only a group of instances or a set, collectively, contains meaningful information and therefore only the sets have labels, and not individual data instances. In this work, we present a permutation invariant neural network called Memory-base…
▽ More
Many real-world tasks such as classification of digital histopathology images and 3D object detection involve learning from a set of instances. In these cases, only a group of instances or a set, collectively, contains meaningful information and therefore only the sets have labels, and not individual data instances. In this work, we present a permutation invariant neural network called Memory-based Exchangeable Model (MEM) for learning set functions. The MEM model consists of memory units that embed an input sequence to high-level features enabling the model to learn inter-dependencies among instances through a self-attention mechanism. We evaluated the learning ability of MEM on various toy datasets, point cloud classification, and classification of lung whole slide images (WSIs) into two subtypes of lung cancer---Lung Adenocarcinoma, and Lung Squamous Cell Carcinoma. We systematically extracted patches from lung WSIs downloaded from The Cancer Genome Atlas~(TCGA) dataset, the largest public repository of WSIs, achieving a competitive accuracy of 84.84\% for classification of two sub-types of lung cancer. The results on other datasets are promising as well, and demonstrate the efficacy of our model.
△ Less
Submitted 3 July, 2020; v1 submitted 18 November, 2019;
originally announced November 2019.
-
ICT Convergence in Internet of Things - The Birth of Smart Factories (A Technical Note)
Authors:
Mahmood Adnan,
Hushairi Zen
Abstract:
Over the past decade, most factories across developed parts of the world employ a varying amount of the manufacturing technologies including autonomous robots, RFID (radio frequency identification) technology, NCs (numerically controlled machines), wireless sensor networks embedded with specialized computerized softwares for sophisticated product designs, engineering analysis, and remote control o…
▽ More
Over the past decade, most factories across developed parts of the world employ a varying amount of the manufacturing technologies including autonomous robots, RFID (radio frequency identification) technology, NCs (numerically controlled machines), wireless sensor networks embedded with specialized computerized softwares for sophisticated product designs, engineering analysis, and remote control of machinery, etc. The ultimate aim of these all dramatic developments in manufacturing sector is thus to achieve aspects such as shorter innovation / product life cycles and raising overall productivity via efficiently handling complex interactions among the various stages (functions, departments) of a production line. The notion, Factory of the Future, is an unpredictable heaven of efficaciousness, wherein, issues such as the flaws and downtime would be issues of the long forgotten age. This technical note thus provides an overview of this awesome revolution waiting to be soon realized in the manufacturing sector.
△ Less
Submitted 29 November, 2017;
originally announced December 2017.
-
A Review on Cooperative Diversity Techniques Bypassing Channel Estimation
Authors:
Sylvia Ong Ai Ling,
Hushairi Zen,
Al-Khalid B Hj Othman,
Mahmood Adnan,
Olalekan Bello
Abstract:
Wireless communication technology has seen a remarkably fast evolution due to its capability to provide a quality, reliable and high-speed data transmission amongst the users. However, transmission of information in wireless channels is primarily impaired by deleterious multipath fading, which affects the quality and reliability of the system. In order to overcome the detrimental effects of fading…
▽ More
Wireless communication technology has seen a remarkably fast evolution due to its capability to provide a quality, reliable and high-speed data transmission amongst the users. However, transmission of information in wireless channels is primarily impaired by deleterious multipath fading, which affects the quality and reliability of the system. In order to overcome the detrimental effects of fading, Multiple-Input Multiple-Output (MIMO) technology is an attractive scheme that employs multiple transceiver antennas to carry the data over the same frequency band over a variety of signal paths. This technology has shown great solutions due to its ability to provide better spectral efficiency, capacity, throughput and robustness of the data transmission. But in practice, it is impractical to install multiple antennas on small-sized devices. Hence, to overcome the limitations of MIMO gain in the future wireless networks, cooperative diversity has recently draw in attention due to its ability to circumvent the difficulties of implementing actual antenna arrays in Multiple-Input and Multiple-Output (MIMO). By exploiting the broadcast feature of the wireless medium, cooperation among multiple nearby nodes is formed for data transmission. At the receiver, the signals are either coherently or differentially detected. Coherent detection requires exact channel estimation, which is difficult to apply in a time-varying channel. Hence, when the nodes are mobile, or when the channel is inaccurately estimated, the differential detection techniques that omit channel estimation become an alternative as compared to coherent detection. This article presents a review of the differential transmission techniques for cooperative diversity networks.
△ Less
Submitted 28 November, 2017;
originally announced November 2017.
-
Positivity of sums and integrals for higher order nabla-convex and completely monotonic functions
Authors:
Faraz Mehmood,
Asif R. Khan,
Muhammad Adnan
Abstract:
We extend the definitions of $\nabla-$convex and completely monotonic functions for two variables. Some general identities of Popoviciu type for sum $\sum \sum p_{ij} f(y_i, z_j)$ and integrals $\int P(y)f(y) dy$, $\int \int P(y,z) f(y,z) dy \, dz$ are deduced. Using obtained identities, positivity of these expressions are characterized for higher order $\nabla-$convex and completely monotonic fun…
▽ More
We extend the definitions of $\nabla-$convex and completely monotonic functions for two variables. Some general identities of Popoviciu type for sum $\sum \sum p_{ij} f(y_i, z_j)$ and integrals $\int P(y)f(y) dy$, $\int \int P(y,z) f(y,z) dy \, dz$ are deduced. Using obtained identities, positivity of these expressions are characterized for higher order $\nabla-$convex and completely monotonic functions. Some applications in terms of generalized Cauchy means and exponential convexity are given.
△ Less
Submitted 13 October, 2017;
originally announced October 2017.
-
Efficient Kernel Fusion Techniques for Massive Video Data Analysis on GPGPUs
Authors:
Asif M Adnan,
Sridhar Radhakrishnan,
Suleyman Karabuk
Abstract:
Kernels are executable code segments and kernel fusion is a technique for combing the segments in a coherent manner to improve execution time. For the first time, we have developed a technique to fuse image processing kernels to be executed on GPGPUs for improving execution time and total throughput (amount of data processed in unit time). We have applied our techniques for feature tracking on vid…
▽ More
Kernels are executable code segments and kernel fusion is a technique for combing the segments in a coherent manner to improve execution time. For the first time, we have developed a technique to fuse image processing kernels to be executed on GPGPUs for improving execution time and total throughput (amount of data processed in unit time). We have applied our techniques for feature tracking on video images captured by a high speed digital video camera where the number of frames captured varies between 600-1000 frames per second. Image processing kernels are composed of multiple simple kernels, which executes on the input image in a given sequence. A set of kernels that can be fused together forms a partition (or fused kernel). Given a set of Kernels and the data dependencies between them, it is difficult to determine the partitions of kernels such that the total performance is maximized (execution time and throughput). We have developed and implemented an optimization model to find such a partition. We also developed an algorithm to fuse multiple kernels based on their data dependencies. Additionally, to further improve performance on GPGPU systems, we have provided methods to distribute data and threads to processors. Our model was able to reduce data traffic, which resulted better performance.The performance (both execution time and throughput) of the proposed method for kernel fusing and its subsequent execution is shown to be 2 to 3 times higher than executing kernels in sequence. We have demonstrated our technique for facial feature tracking with applications to Neuroscience.
△ Less
Submitted 15 September, 2015;
originally announced September 2015.
-
Properties of Stochastic Kronecker Graph
Authors:
Ahmed Mehedi Nizam,
Md. Nasim Adnan,
Md. Rashedul Islam,
Mohammad Akbar Kabir
Abstract:
The stochastic Kronecker Graph model can generate large random graph that closely resembles many real world networks. For example, the output graph has a heavy-tailed degree distribution, has a (low) diameter that effectively remains constant over time and obeys the so-called densification power law [1]. Aside from this list of very important graph properties, one may ask for some additional infor…
▽ More
The stochastic Kronecker Graph model can generate large random graph that closely resembles many real world networks. For example, the output graph has a heavy-tailed degree distribution, has a (low) diameter that effectively remains constant over time and obeys the so-called densification power law [1]. Aside from this list of very important graph properties, one may ask for some additional information about the output graph: What will be the expected number of isolated vertices? How many edges, self loops are there in the graph? What will be the expected number of triangles in a random realization? Here we try to answer the above questions. In the first phase, we bound the expected values of the aforementioned features from above. Next we establish the sufficient conditions to generate stochastic Kronecker graph with a wide range of interesting properties. Finally we show two phase transitions for the appearance of edges and self loops in stochastic Kronecker graph.
△ Less
Submitted 4 October, 2012;
originally announced October 2012.
-
Design and implementation of a digital clock showing digits in Bangla font using microcontroller AT89C4051
Authors:
Nasif Muslim,
Md. Tanvir Adnan,
Mohammad Zahidul Kabir,
Md. Humayun Kabir,
Sheikh Mominul Islam
Abstract:
In this paper, a digital clock is designed where the microcontroller is used for timing controller and the font of the Bangla digits are designed, and programmed within the microcontroller. The design is cost effective, simple and easy for maintenance.
In this paper, a digital clock is designed where the microcontroller is used for timing controller and the font of the Bangla digits are designed, and programmed within the microcontroller. The design is cost effective, simple and easy for maintenance.
△ Less
Submitted 5 August, 2012;
originally announced August 2012.
-
Energy Efficient Geographical Load Balancing via Dynamic Deferral of Workload
Authors:
Muhammad Abdullah Adnan,
Ryo Sugihara,
Rajesh Gupta
Abstract:
With the increasing popularity of Cloud computing and Mobile computing, individuals, enterprises and research centers have started outsourcing their IT and computational needs to on-demand cloud services. Recently geographical load balancing techniques have been suggested for data centers hosting cloud computation in order to reduce energy cost by exploiting the electricity price differences acros…
▽ More
With the increasing popularity of Cloud computing and Mobile computing, individuals, enterprises and research centers have started outsourcing their IT and computational needs to on-demand cloud services. Recently geographical load balancing techniques have been suggested for data centers hosting cloud computation in order to reduce energy cost by exploiting the electricity price differences across regions. However, these algorithms do not draw distinction among diverse requirements for responsiveness across various workloads. In this paper, we use the flexibility from the Service Level Agreements (SLAs) to differentiate among workloads under bounded latency requirements and propose a novel approach for cost savings for geographical load balancing. We investigate how much workload to be executed in each data center and how much workload to be delayed and migrated to other data centers for energy saving while meeting deadlines. We present an offline formulation for geographical load balancing problem with dynamic deferral and give online algorithms to determine the assignment of workload to the data centers and the migration of workload between data centers in order to adapt with dynamic electricity price changes. We compare our algorithms with the greedy approach and show that significant cost savings can be achieved by migration of workload and dynamic deferral with future electricity price prediction. We validate our algorithms on MapReduce traces and show that geographic load balancing with dynamic deferral can provide 20-30% cost-savings.
△ Less
Submitted 10 April, 2012;
originally announced April 2012.
-
Dynamic Deferral of Workload for Capacity Provisioning in Data Centers
Authors:
Muhammad Abdullah Adnan,
Ryo Sugihara,
Yan Ma,
Rajesh Gupta
Abstract:
Recent increase in energy prices has led researchers to find better ways for capacity provisioning in data centers to reduce energy wastage due to the variation in workload. This paper explores the opportunity for cost saving utilizing the flexibility from the Service Level Agreements (SLAs) and proposes a novel approach for capacity provisioning under bounded latency requirements of the workload.…
▽ More
Recent increase in energy prices has led researchers to find better ways for capacity provisioning in data centers to reduce energy wastage due to the variation in workload. This paper explores the opportunity for cost saving utilizing the flexibility from the Service Level Agreements (SLAs) and proposes a novel approach for capacity provisioning under bounded latency requirements of the workload. We investigate how many servers to be kept active and how much workload to be delayed for energy saving while meeting every deadline. We present an offline LP formulation for capacity provisioning by dynamic deferral and give two online algorithms to determine the capacity of the data center and the assignment of workload to servers dynamically. We prove the feasibility of the online algorithms and show that their worst case performance are bounded by a constant factor with respect to the offline formulation. We validate our algorithms on a MapReduce workload by provisioning capacity on a Hadoop cluster and show that the algorithms actually perform much better in practice compared to the naive `follow the workload' provisioning, resulting in 20-40% cost-savings.
△ Less
Submitted 13 November, 2012; v1 submitted 17 September, 2011;
originally announced September 2011.
-
Characterizing Graphs of Zonohedra
Authors:
Muhammad Abdullah Adnan,
Masud Hasan
Abstract:
A classic theorem by Steinitz states that a graph G is realizable by a convex polyhedron if and only if G is 3-connected planar. Zonohedra are an important subclass of convex polyhedra having the property that the faces of a zonohedron are parallelograms and are in parallel pairs. In this paper we give characterization of graphs of zonohedra. We also give a linear time algorithm to recognize suc…
▽ More
A classic theorem by Steinitz states that a graph G is realizable by a convex polyhedron if and only if G is 3-connected planar. Zonohedra are an important subclass of convex polyhedra having the property that the faces of a zonohedron are parallelograms and are in parallel pairs. In this paper we give characterization of graphs of zonohedra. We also give a linear time algorithm to recognize such a graph. In our quest for finding the algorithm, we prove that in a zonohedron P both the number of zones and the number of faces in each zone is O(square root{n}), where n is the number of vertices of P.
△ Less
Submitted 3 November, 2008;
originally announced November 2008.