-
VisMin: Visual Minimal-Change Understanding
Authors:
Rabiul Awal,
Saba Ahmadi,
Le Zhang,
Aishwarya Agrawal
Abstract:
Fine-grained understanding of objects, attributes, and relationships between objects is crucial for visual-language models (VLMs). Existing benchmarks primarily focus on evaluating VLMs' capability to distinguish between two very similar \textit{captions} given an image. In this paper, we introduce a new, challenging benchmark termed \textbf{Vis}ual \textbf{Min}imal-Change Understanding (VisMin),…
▽ More
Fine-grained understanding of objects, attributes, and relationships between objects is crucial for visual-language models (VLMs). Existing benchmarks primarily focus on evaluating VLMs' capability to distinguish between two very similar \textit{captions} given an image. In this paper, we introduce a new, challenging benchmark termed \textbf{Vis}ual \textbf{Min}imal-Change Understanding (VisMin), which requires models to predict the correct image-caption match given two images and two captions. The image pair and caption pair contain minimal changes, i.e., only one aspect changes at a time from among the following: \textit{object}, \textit{attribute}, \textit{count}, and \textit{spatial relation}. These changes test the models' understanding of objects, attributes (such as color, material, shape), counts, and spatial relationships between objects. We built an automatic framework using large language models and diffusion models, followed by a rigorous 4-step verification process by human annotators. Empirical experiments reveal that current VLMs exhibit notable deficiencies in understanding spatial relationships and counting abilities. We also generate a large-scale training dataset to finetune CLIP and Idefics2, showing significant improvements in fine-grained understanding across benchmarks and in CLIP's general image-text alignment. We release all resources, including the benchmark, training data, and finetuned model checkpoints, at \url{https://vismin.net/}.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Strategic Littlestone Dimension: Improved Bounds on Online Strategic Classification
Authors:
Saba Ahmadi,
Kunhe Yang,
Hanrui Zhang
Abstract:
We study the problem of online binary classification in settings where strategic agents can modify their observable features to receive a positive classification. We model the set of feasible manipulations by a directed graph over the feature space, and assume the learner only observes the manipulated features instead of the original ones. We introduce the Strategic Littlestone Dimension, a new co…
▽ More
We study the problem of online binary classification in settings where strategic agents can modify their observable features to receive a positive classification. We model the set of feasible manipulations by a directed graph over the feature space, and assume the learner only observes the manipulated features instead of the original ones. We introduce the Strategic Littlestone Dimension, a new combinatorial measure that captures the joint complexity of the hypothesis class and the manipulation graph. We demonstrate that it characterizes the instance-optimal mistake bounds for deterministic learning algorithms in the realizable setting. We also achieve improved regret in the agnostic setting by a refined agnostic-to-realizable reduction that accounts for the additional challenge of not observing agents' original features. Finally, we relax the assumption that the learner knows the manipulation graph, instead assuming their knowledge is captured by a family of graphs. We derive regret bounds in both the realizable setting where all agents manipulate according to the same graph within the graph family, and the agnostic setting where the manipulation graphs are chosen adversarially and not consistently modeled by a single graph in the family.
△ Less
Submitted 16 July, 2024;
originally announced July 2024.
-
On the Design and Security of Collective Remote Attestation Protocols
Authors:
Sharar Ahmadi,
Jay Le-Papin,
Liqun Chen,
Brijesh Dongol,
Sasa Radomirovic,
Helen Treharne
Abstract:
Collective remote attestation (CRA) is a security service that aims to efficiently identify compromised (often low-powered) devices in a (heterogeneous) network. The last few years have seen an extensive growth in CRA protocol proposals, showing a variety of designs guided by different network topologies, hardware assumptions and other functional requirements. However, they differ in their trust a…
▽ More
Collective remote attestation (CRA) is a security service that aims to efficiently identify compromised (often low-powered) devices in a (heterogeneous) network. The last few years have seen an extensive growth in CRA protocol proposals, showing a variety of designs guided by different network topologies, hardware assumptions and other functional requirements. However, they differ in their trust assumptions, adversary models and role descriptions making it difficult to uniformly assess their security guarantees. In this paper we present Catt, a unifying framework for CRA protocols that enables them to be compared systematically, based on a comprehensive study of 40 CRA protocols and their adversary models. Catt characterises the roles that devices can take and based on these we develop a novel set of security properties for CRA protocols. We then classify the security aims of all the studied protocols. We illustrate the applicability of our security properties by encoding them in the tamarin prover and verifying the SIMPLE+ protocol against them.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
A Bayesian dynamic stopping method for evoked response brain-computer interfacing
Authors:
Sara Ahmadi,
Peter Desain,
Jordy Thielen
Abstract:
As brain-computer interfacing (BCI) systems transition from assistive technology to more diverse applications, their speed, reliability, and user experience become increasingly important. Dynamic stopping methods enhance BCI system speed by deciding at any moment whether to output a result or wait for more information. Such approach leverages trial variance, allowing good trials to be detected ear…
▽ More
As brain-computer interfacing (BCI) systems transition from assistive technology to more diverse applications, their speed, reliability, and user experience become increasingly important. Dynamic stopping methods enhance BCI system speed by deciding at any moment whether to output a result or wait for more information. Such approach leverages trial variance, allowing good trials to be detected earlier, thereby speeding up the process without significantly compromising accuracy. Existing dynamic stopping algorithms typically optimize measures such as symbols per minute (SPM) and information transfer rate (ITR). However, these metrics may not accurately reflect system performance for specific applications or user types. Moreover, many methods depend on arbitrary thresholds or parameters that require extensive training data. We propose a model-based approach that takes advantage of the analytical knowledge that we have about the underlying classification model. By using a risk minimisation approach, our model allows precise control over the types of errors and the balance between precision and speed. This adaptability makes it ideal for customizing BCI systems to meet the diverse needs of various applications. We validate our proposed method on a publicly available dataset, comparing it with established static and dynamic stopping methods. Our results demonstrate that our approach offers a broad range of accuracy-speed trade-offs and achieves higher precision than baseline stopping methods.
△ Less
Submitted 16 June, 2024;
originally announced June 2024.
-
Distributional Adversarial Loss
Authors:
Saba Ahmadi,
Siddharth Bhandari,
Avrim Blum,
Chen Dan,
Prabhav Jain
Abstract:
A major challenge in defending against adversarial attacks is the enormous space of possible attacks that even a simple adversary might perform. To address this, prior work has proposed a variety of defenses that effectively reduce the size of this space. These include randomized smoothing methods that add noise to the input to take away some of the adversary's impact. Another approach is input di…
▽ More
A major challenge in defending against adversarial attacks is the enormous space of possible attacks that even a simple adversary might perform. To address this, prior work has proposed a variety of defenses that effectively reduce the size of this space. These include randomized smoothing methods that add noise to the input to take away some of the adversary's impact. Another approach is input discretization which limits the adversary's possible number of actions.
Motivated by these two approaches, we introduce a new notion of adversarial loss which we call distributional adversarial loss, to unify these two forms of effectively weakening an adversary. In this notion, we assume for each original example, the allowed adversarial perturbation set is a family of distributions (e.g., induced by a smoothing procedure), and the adversarial loss over each example is the maximum loss over all the associated distributions. The goal is to minimize the overall adversarial loss.
We show generalization guarantees for our notion of adversarial loss in terms of the VC-dimension of the hypothesis class and the size of the set of allowed adversarial distributions associated with each input. We also investigate the role of randomness in achieving robustness against adversarial attacks in the methods described above. We show a general derandomization technique that preserves the extent of a randomized classifier's robustness against adversarial attacks. We corroborate the procedure experimentally via derandomizing the Random Projection Filters framework of \cite{dong2023adversarial}. Our procedure also improves the robustness of the model against various adversarial attacks.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Review of Deep Representation Learning Techniques for Brain-Computer Interfaces and Recommendations
Authors:
Pierre Guetschel,
Sara Ahmadi,
Michael Tangermann
Abstract:
In the field of brain-computer interfaces (BCIs), the potential for leveraging deep learning techniques for representing electroencephalogram (EEG) signals has gained substantial interest. This review synthesizes empirical findings from a collection of articles using deep representation learning techniques for BCI decoding, to provide a comprehensive analysis of the current state-of-the-art. Each…
▽ More
In the field of brain-computer interfaces (BCIs), the potential for leveraging deep learning techniques for representing electroencephalogram (EEG) signals has gained substantial interest. This review synthesizes empirical findings from a collection of articles using deep representation learning techniques for BCI decoding, to provide a comprehensive analysis of the current state-of-the-art. Each article was scrutinized based on three criteria: (1) the deep representation learning technique employed, (2) the underlying motivation for its utilization, and (3) the approaches adopted for characterizing the learned representations. Among the 81 articles finally reviewed in depth, our analysis reveals a predominance of 31 articles using autoencoders. We identified 13 studies employing self-supervised learning (SSL) techniques, among which ten were published in 2022 or later, attesting to the relative youth of the field. However, at the time being, none of these have led to standard foundation models that are picked up by the BCI community. Likewise, only a few studies have introspected their learned representations. We observed that the motivation in most studies for using representation learning techniques is for solving transfer learning tasks, but we also found more specific motivations such as to learn robustness or invariances, as an algorithmic bridge, or finally to uncover the structure of the data. Given the potential of foundation models to effectively tackle these challenges, we advocate for a continued dedication to the advancement of foundation models specifically designed for EEG signal decoding by using SSL techniques. We also underline the imperative of establishing specialized benchmarks and datasets to facilitate the development and continuous improvement of such foundation models.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
On k-(total) limited packing in graphs
Authors:
Azam Sadat Ahmadi,
Nasrin Soltankhah
Abstract:
A set $B\subseteq V(G)$ is called a $k$-total limited packing set in a graph $G$ if $|B\cap N(v)|\leq k$ for any vertex $v\in V(G)$. The $k$-total limited packing number $L_{k,t}(G)$ is the maximum cardinality of a $k$-total limited packing set in $G$. Here, we give some results on the $k$-total limited packing number of graphs emphasizing trees, especially when $k=2$. We also study the $2$-(total…
▽ More
A set $B\subseteq V(G)$ is called a $k$-total limited packing set in a graph $G$ if $|B\cap N(v)|\leq k$ for any vertex $v\in V(G)$. The $k$-total limited packing number $L_{k,t}(G)$ is the maximum cardinality of a $k$-total limited packing set in $G$. Here, we give some results on the $k$-total limited packing number of graphs emphasizing trees, especially when $k=2$. We also study the $2$-(total) limited packing number of some product graphs.
A $k$-limited packing partition ($k$LPP) of graph $G$ is a partition of $V(G)$ into $k$-limited packing sets. The minimum cardinality of a $k$LPP is called the $k$LPP number of $G$ and is denoted by $χ_{\times k}(G)$, and we obtain some results for this parameter.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
A numerical analysis of the impact of gas pressure and dielectric material on the generation of body force in an air gas plasma actuator
Authors:
Sajad Hajikhani,
Ramin Mehrabifard,
Hamed Soltani Ahmadi
Abstract:
Plasma technology has undeniably revolutionized industrial processes in recent decades. Atmospheric pressure plasma (APP) has emerged as a prominent and widely applicable tool in various scientific disciplines. Notably, plasma-assisted flow control has become a subject of intense interest, particularly applying surface dielectric barrier discharge (SDBD) plasma actuators for aerodynamic flow contr…
▽ More
Plasma technology has undeniably revolutionized industrial processes in recent decades. Atmospheric pressure plasma (APP) has emerged as a prominent and widely applicable tool in various scientific disciplines. Notably, plasma-assisted flow control has become a subject of intense interest, particularly applying surface dielectric barrier discharge (SDBD) plasma actuators for aerodynamic flow control. In this study, a two-dimensional model of the SDBD plasma actuator is developed using the COMSOL Multiphysics program, incorporating air gas discharge reactions with N2/O2/Ar gases in specific ratios (0.78, 0.21, 0.01). The investigation focuses on the impact of dielectric materials (mica, silica glass, quartz, and polytetrafluoroethylene (PTFE)) on plasma characteristics and body force within the plasma actuator under constant input parameters. Moreover, the study explores how variable pressure (760, 660, and 560 torr) in different applications influences plasma properties, ultimately affecting the magnitude of the body force in the plasma actuator. These findings contribute to optimizing plasma technology for flow control applications and enhance industrial efficiency and performance.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
Towards gaze-independent c-VEP BCI: A pilot study
Authors:
S. Narayanan,
S. Ahmadi,
P. Desain,
J. Thielen
Abstract:
A limitation of brain-computer interface (BCI) spellers is that they require the user to be able to move the eyes to fixate on targets. This poses an issue for users who cannot voluntarily control their eye movements, for instance, people living with late-stage amyotrophic lateral sclerosis (ALS). This pilot study makes the first step towards a gaze-independent speller based on the code-modulated…
▽ More
A limitation of brain-computer interface (BCI) spellers is that they require the user to be able to move the eyes to fixate on targets. This poses an issue for users who cannot voluntarily control their eye movements, for instance, people living with late-stage amyotrophic lateral sclerosis (ALS). This pilot study makes the first step towards a gaze-independent speller based on the code-modulated visual evoked potential (c-VEP). Participants were presented with two bi-laterally located stimuli, one of which was flashing, and were tasked to attend to one of these stimuli either by directly looking at the stimuli (overt condition) or by using spatial attention, eliminating the need for eye movement (covert condition). The attended stimuli were decoded from electroencephalography (EEG) and classification accuracies of 88% and 100% were obtained for the covert and overt conditions, respectively. These fundamental insights show the promising feasibility of utilizing the c-VEP protocol for gaze-independent BCIs that use covert spatial attention when both stimuli flash simultaneously.
△ Less
Submitted 17 May, 2024; v1 submitted 22 March, 2024;
originally announced April 2024.
-
Scaling up ridge regression for brain encoding in a massive individual fMRI dataset
Authors:
Sana Ahmadi,
Pierre Bellec,
Tristan Glatard
Abstract:
Brain encoding with neuroimaging data is an established analysis aimed at predicting human brain activity directly from complex stimuli features such as movie frames. Typically, these features are the latent space representation from an artificial neural network, and the stimuli are image, audio, or text inputs. Ridge regression is a popular prediction model for brain encoding due to its good out-…
▽ More
Brain encoding with neuroimaging data is an established analysis aimed at predicting human brain activity directly from complex stimuli features such as movie frames. Typically, these features are the latent space representation from an artificial neural network, and the stimuli are image, audio, or text inputs. Ridge regression is a popular prediction model for brain encoding due to its good out-of-sample generalization performance. However, training a ridge regression model can be highly time-consuming when dealing with large-scale deep functional magnetic resonance imaging (fMRI) datasets that include many space-time samples of brain activity. This paper evaluates different parallelization techniques to reduce the training time of brain encoding with ridge regression on the CNeuroMod Friends dataset, one of the largest deep fMRI resource currently available. With multi-threading, our results show that the Intel Math Kernel Library (MKL) significantly outperforms the OpenBLAS library, being 1.9 times faster using 32 threads on a single machine. We then evaluated the Dask multi-CPU implementation of ridge regression readily available in scikit-learn (MultiOutput), and we proposed a new "batch" version of Dask parallelization, motivated by a time complexity analysis. In line with our theoretical analysis, MultiOutput parallelization was found to be impractical, i.e., slower than multi-threading on a single machine. In contrast, the Batch-MultiOutput regression scaled well across compute nodes and threads, providing speed-ups of up to 33 times with 8 compute nodes and 32 threads compared to a single-threaded scikit-learn execution. Batch parallelization using Dask thus emerges as a scalable approach for brain encoding with ridge regression on high-performance computing systems using scikit-learn and large fMRI datasets.
△ Less
Submitted 28 March, 2024;
originally announced March 2024.
-
Towards auditory attention decoding with noise-tagging: A pilot study
Authors:
H. A. Scheppink,
S. Ahmadi,
P. Desain,
M. Tangermann,
J. Thielen
Abstract:
Auditory attention decoding (AAD) aims to extract from brain activity the attended speaker amidst candidate speakers, offering promising applications for neuro-steered hearing devices and brain-computer interfacing. This pilot study makes a first step towards AAD using the noise-tagging stimulus protocol, which evokes reliable code-modulated evoked potentials, but is minimally explored in the audi…
▽ More
Auditory attention decoding (AAD) aims to extract from brain activity the attended speaker amidst candidate speakers, offering promising applications for neuro-steered hearing devices and brain-computer interfacing. This pilot study makes a first step towards AAD using the noise-tagging stimulus protocol, which evokes reliable code-modulated evoked potentials, but is minimally explored in the auditory modality. Participants were sequentially presented with two Dutch speech stimuli that were amplitude-modulated with a unique binary pseudo-random noise-code, effectively tagging these with additional decodable information. We compared the decoding of unmodulated audio against audio modulated with various modulation depths, and a conventional AAD method against a standard method to decode noise-codes. Our pilot study revealed higher performances for the conventional method with 70 to 100 percent modulation depths compared to unmodulated audio. The noise-code decoder did not further improve these results. These fundamental insights highlight the potential of integrating noise-codes in speech to enhance auditory speaker detection when multiple speakers are presented simultaneously.
△ Less
Submitted 17 May, 2024; v1 submitted 22 March, 2024;
originally announced March 2024.
-
Language and Speech Technology for Central Kurdish Varieties
Authors:
Sina Ahmadi,
Daban Q. Jaff,
Md Mahfuz Ibn Alam,
Antonios Anastasopoulos
Abstract:
Kurdish, an Indo-European language spoken by over 30 million speakers, is considered a dialect continuum and known for its diversity in language varieties. Previous studies addressing language and speech technology for Kurdish handle it in a monolithic way as a macro-language, resulting in disparities for dialects and varieties for which there are few resources and tools available. In this paper,…
▽ More
Kurdish, an Indo-European language spoken by over 30 million speakers, is considered a dialect continuum and known for its diversity in language varieties. Previous studies addressing language and speech technology for Kurdish handle it in a monolithic way as a macro-language, resulting in disparities for dialects and varieties for which there are few resources and tools available. In this paper, we take a step towards developing resources for language and speech technology for varieties of Central Kurdish, creating a corpus by transcribing movies and TV series as an alternative to fieldwork. Additionally, we report the performance of machine translation, automatic speech recognition, and language identification as downstream tasks evaluated on Central Kurdish varieties. Data and models are publicly available under an open license at https://github.com/sinaahmadi/CORDI.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Security and Privacy Enhancing in Blockchain-based IoT Environments via Anonym Auditing
Authors:
Peyman Khordadpour,
Saeed Ahmadi
Abstract:
The integration of blockchain technology in Internet of Things (IoT) environments is a revolutionary step towards ensuring robust security and enhanced privacy. This paper delves into the unique challenges and solutions associated with securing blockchain-based IoT systems, with a specific focus on anonymous auditing to reinforce privacy and security. We propose a novel framework that combines the…
▽ More
The integration of blockchain technology in Internet of Things (IoT) environments is a revolutionary step towards ensuring robust security and enhanced privacy. This paper delves into the unique challenges and solutions associated with securing blockchain-based IoT systems, with a specific focus on anonymous auditing to reinforce privacy and security. We propose a novel framework that combines the decentralized nature of blockchain with advanced security protocols tailored for IoT contexts. Central to our approach is the implementation of anonymization techniques in auditing processes, ensuring user privacy while maintaining the integrity and transparency of blockchain transactions. We outline the architecture of blockchain in IoT environments, emphasizing the workflow and specific security mechanisms employed. Additionally, we introduce a security protocol that integrates privacy-enhancing tools and anonymous auditing methods, including the use of advanced cryptographic techniques for anonymity. This study also includes a comparative analysis of our proposed framework against existing models in the domain. Our work aims to provide a comprehensive blueprint for enhancing security and privacy in blockchain-based IoT environments, paving the way for more secure and private digital ecosystems.
△ Less
Submitted 2 March, 2024;
originally announced March 2024.
-
A Morphologically-Aware Dictionary-based Data Augmentation Technique for Machine Translation of Under-Represented Languages
Authors:
Md Mahfuz Ibn Alam,
Sina Ahmadi,
Antonios Anastasopoulos
Abstract:
The availability of parallel texts is crucial to the performance of machine translation models. However, most of the world's languages face the predominant challenge of data scarcity. In this paper, we propose strategies to synthesize parallel data relying on morpho-syntactic information and using bilingual lexicons along with a small amount of seed parallel data. Our methodology adheres to a real…
▽ More
The availability of parallel texts is crucial to the performance of machine translation models. However, most of the world's languages face the predominant challenge of data scarcity. In this paper, we propose strategies to synthesize parallel data relying on morpho-syntactic information and using bilingual lexicons along with a small amount of seed parallel data. Our methodology adheres to a realistic scenario backed by the small parallel seed data. It is linguistically informed, as it aims to create augmented data that is more likely to be grammatically correct. We analyze how our synthetic data can be combined with raw parallel data and demonstrate a consistent improvement in performance in our experiments on 14 languages (28 English <-> X pairs) ranging from well- to very low-resource ones. Our method leads to improvements even when using only five seed sentences and a bilingual lexicon.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Incorporating the Cosmological Constant in a Modified Uncertainty Principle
Authors:
S. Ahmadi,
E. Yusofi,
M. A. Ramzanpour
Abstract:
This study explores the cosmological constant problem and modified uncertainty principle within a unified framework inspired by a void-dominated scenario. In a recent paper~\cite{Yusofi:2022hgg}, voids were modeled as spherical bubbles of similar average sizes, and the surface energy on the voids' borders was calculated across various scales in a heuristic manner. We show that this results in a si…
▽ More
This study explores the cosmological constant problem and modified uncertainty principle within a unified framework inspired by a void-dominated scenario. In a recent paper~\cite{Yusofi:2022hgg}, voids were modeled as spherical bubbles of similar average sizes, and the surface energy on the voids' borders was calculated across various scales in a heuristic manner. We show that this results in a significant discrepancy of approximately $\mathcal{O}(+122)$ between the cosmological constant values from the minimum to the maximum radii of bubbles. Furthermore, when considering the generalized form of the uncertainty principle with both minimum and maximum lengths, i.e. $ΔX ΔP \geq \frac{\hbar}{2} \frac{1}{1- βΔP^2} \frac{1}{1- αΔX^2}$, a similar order of discrepancy is observed between $α_{\rm max}$ and $α_{\rm min}$, indicating that $α\proptoβ^{-1}\proptoΛ\propto{\rm length}^{-2}~(m^{-2})$. As a primary outcome of this finding, we offer a novel uncertainty principle that incorporates a non-zero cosmological constant.
△ Less
Submitted 11 May, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Analytical Insights into Constant-Roll Condition: Extending the Paradigm to Non-Canonical Models
Authors:
S. Mohammad Ahmadi,
Nahid Ahmadi,
Mehdi Shokri
Abstract:
In this work, we explore the prospect of generalizing the constant-roll condition in canonical inflationary model to non-canonical models. To find a natural generalization, we focus on three manifestations of this condition and construct constant-roll models corresponding to each manifestation. These models are not equivalent but reduce to the familiar constant-roll model in canonical limit. To sh…
▽ More
In this work, we explore the prospect of generalizing the constant-roll condition in canonical inflationary model to non-canonical models. To find a natural generalization, we focus on three manifestations of this condition and construct constant-roll models corresponding to each manifestation. These models are not equivalent but reduce to the familiar constant-roll model in canonical limit. To showcase the applicability of our generalized mechanism, we examine a specific class of non-canonical models, which can be viewed as extensions of k/G inflation. In these models sound speed is constant. We conduct a comparative study, and with an analytical examination of the model, specify instances when our constant-roll conditions yield dissimilar outcomes and when they exhibit analogies. We also apply our findings to scrutinize another kinetically driven inflationary model with varying sound speed. We demonstrate that each of our constant-roll conditions leads to a unique set of solutions. Afterward, we construct a four-stage constant-roll kinetically driven inflation that complies with CMB constraints, it sustains for a sufficiently long period of time, and finally gracefully exits. In this model the spectrum of curvature perturbations is enhanced in a brief phase of non-slow-roll inflationary evolution. Employing numerical methods, we analyse this scenario to elucidate how altering the constant-roll condition impacts the power spectrum and the model's dynamics.
△ Less
Submitted 4 May, 2024; v1 submitted 10 December, 2023;
originally announced December 2023.
-
AI Chatbot for Generating Episodic Future Thinking (EFT) Cue Texts for Health
Authors:
Sareh Ahmadi,
Edward A. Fox
Abstract:
We describe an AI-powered chatbot to aid with health improvement by generating Episodic Future Thinking (EFT) cue texts that should reduce delay discounting. In prior studies, EFT has been shown to address maladaptive health behaviors. Those studies involved participants, working with researchers, vividly imagining future events, and writing a description that they subsequently will frequently rev…
▽ More
We describe an AI-powered chatbot to aid with health improvement by generating Episodic Future Thinking (EFT) cue texts that should reduce delay discounting. In prior studies, EFT has been shown to address maladaptive health behaviors. Those studies involved participants, working with researchers, vividly imagining future events, and writing a description that they subsequently will frequently review, to ensure a shift from an inclination towards immediate rewards. That should promote behavior change, aiding in health tasks such as treatment adherence and lifestyle modifications. The AI chatbot is designed to guide users in generating personalized EFTs, automating the current labor-intensive interview-based process. This can enhance the efficiency of EFT interventions and make them more accessible, targeting specifically those with limited educational backgrounds or communication challenges. By leveraging AI for EFT intervention, we anticipate broadened access and improved health outcomes across diverse populations
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
There Are No Data Like More Data- Datasets for Deep Learning in Earth Observation
Authors:
Michael Schmitt,
Seyed Ali Ahmadi,
Yonghao Xu,
Gulsen Taskin,
Ujjwal Verma,
Francescopaolo Sica,
Ronny Hansch
Abstract:
Carefully curated and annotated datasets are the foundation of machine learning, with particularly data-hungry deep neural networks forming the core of what is often called Artificial Intelligence (AI). Due to the massive success of deep learning applied to Earth Observation (EO) problems, the focus of the community has been largely on the development of ever-more sophisticated deep neural network…
▽ More
Carefully curated and annotated datasets are the foundation of machine learning, with particularly data-hungry deep neural networks forming the core of what is often called Artificial Intelligence (AI). Due to the massive success of deep learning applied to Earth Observation (EO) problems, the focus of the community has been largely on the development of ever-more sophisticated deep neural network architectures and training strategies largely ignoring the overall importance of datasets. For that purpose, numerous task-specific datasets have been created that were largely ignored by previously published review articles on AI for Earth observation. With this article, we want to change the perspective and put machine learning datasets dedicated to Earth observation data and applications into the spotlight. Based on a review of the historical developments, currently available resources are described and a perspective for future developments is formed. We hope to contribute to an understanding that the nature of our data is what distinguishes the Earth observation community from many other communities that apply deep learning techniques to image data, and that a detailed understanding of EO data peculiarities is among the core competencies of our discipline.
△ Less
Submitted 29 October, 2023;
originally announced October 2023.
-
Human trajectory prediction using LSTM with Attention mechanism
Authors:
Amin Manafi Soltan Ahmadi,
Samaneh Hoseini Semnani
Abstract:
In this paper, we propose a human trajectory prediction model that combines a Long Short-Term Memory (LSTM) network with an attention mechanism. To do that, we use attention scores to determine which parts of the input data the model should focus on when making predictions. Attention scores are calculated for each input feature, with a higher score indicating the greater significance of that featu…
▽ More
In this paper, we propose a human trajectory prediction model that combines a Long Short-Term Memory (LSTM) network with an attention mechanism. To do that, we use attention scores to determine which parts of the input data the model should focus on when making predictions. Attention scores are calculated for each input feature, with a higher score indicating the greater significance of that feature in predicting the output. Initially, these scores are determined for the target human position, velocity, and their neighboring individual's positions and velocities. By using attention scores, our model can prioritize the most relevant information in the input data and make more accurate predictions. We extract attention scores from our attention mechanism and integrate them into the trajectory prediction module to predict human future trajectories. To achieve this, we introduce a new neural layer that processes attention scores after extracting them and concatenates them with positional information. We evaluate our approach on the publicly available ETH and UCY datasets and measure its performance using the final displacement error (FDE) and average displacement error (ADE) metrics. We show that our modified algorithm performs better than the Social LSTM in predicting the future trajectory of pedestrians in crowded spaces. Specifically, our model achieves an improvement of 6.2% in ADE and 6.3% in FDE compared to the Social LSTM results in the literature.
△ Less
Submitted 1 September, 2023;
originally announced September 2023.
-
Limited packings: related vertex partitions and duality issues
Authors:
Azam Sadat Ahmadi,
Nasrin Soltankhah,
Babak Samadi
Abstract:
A $k$-limited packing partition ($k$LP partition) of a graph $G$ is a partition of $V(G)$ into $k$-limited packing sets. We consider the $k$LP partitions with minimum cardinality (with emphasis on $k=2$). The minimum cardinality is called $k$LP partition number of $G$ and denoted by $χ_{\times k}(G)$. This problem is the dual problem of $k$-tuple domatic partitioning as well as a generalization of…
▽ More
A $k$-limited packing partition ($k$LP partition) of a graph $G$ is a partition of $V(G)$ into $k$-limited packing sets. We consider the $k$LP partitions with minimum cardinality (with emphasis on $k=2$). The minimum cardinality is called $k$LP partition number of $G$ and denoted by $χ_{\times k}(G)$. This problem is the dual problem of $k$-tuple domatic partitioning as well as a generalization of the well-studied $2$-distance coloring problem in graphs.
We give the exact value of $χ_{\times2}$ for trees and bound it for general graphs. A section of this paper is devoted to the dual of this problem, where we give a solution to an open problem posed in $1998$. We also revisit the total limited packing number in this paper and prove that the problem of computing this parameter is NP-hard even for some special families of graphs. We give some inequalities concerning this parameter and discuss the difference between $2$TLP number and $2$LP number with emphasis on trees.
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
MedShapeNet -- A Large-Scale Dataset of 3D Medical Shapes for Computer Vision
Authors:
Jianning Li,
Zongwei Zhou,
Jiancheng Yang,
Antonio Pepe,
Christina Gsaxner,
Gijs Luijten,
Chongyu Qu,
Tiezheng Zhang,
Xiaoxi Chen,
Wenxuan Li,
Marek Wodzinski,
Paul Friedrich,
Kangxian Xie,
Yuan Jin,
Narmada Ambigapathy,
Enrico Nasca,
Naida Solak,
Gian Marco Melito,
Viet Duc Vu,
Afaque R. Memon,
Christopher Schlachta,
Sandrine De Ribaupierre,
Rajnikant Patel,
Roy Eagleson,
Xiaojun Chen
, et al. (132 additional authors not shown)
Abstract:
Prior to the deep learning era, shape was commonly used to describe the objects. Nowadays, state-of-the-art (SOTA) algorithms in medical imaging are predominantly diverging from computer vision, where voxel grids, meshes, point clouds, and implicit surface models are used. This is seen from numerous shape-related publications in premier vision conferences as well as the growing popularity of Shape…
▽ More
Prior to the deep learning era, shape was commonly used to describe the objects. Nowadays, state-of-the-art (SOTA) algorithms in medical imaging are predominantly diverging from computer vision, where voxel grids, meshes, point clouds, and implicit surface models are used. This is seen from numerous shape-related publications in premier vision conferences as well as the growing popularity of ShapeNet (about 51,300 models) and Princeton ModelNet (127,915 models). For the medical domain, we present a large collection of anatomical shapes (e.g., bones, organs, vessels) and 3D models of surgical instrument, called MedShapeNet, created to facilitate the translation of data-driven vision algorithms to medical applications and to adapt SOTA vision algorithms to medical problems. As a unique feature, we directly model the majority of shapes on the imaging data of real patients. As of today, MedShapeNet includes 23 dataset with more than 100,000 shapes that are paired with annotations (ground truth). Our data is freely accessible via a web interface and a Python application programming interface (API) and can be used for discriminative, reconstructive, and variational benchmarks as well as various applications in virtual, augmented, or mixed reality, and 3D printing. Exemplary, we present use cases in the fields of classification of brain tumors, facial and skull reconstructions, multi-class anatomy completion, education, and 3D printing. In future, we will extend the data and improve the interfaces. The project pages are: https://medshapenet.ikim.nrw/ and https://github.com/Jianningli/medshapenet-feedback
△ Less
Submitted 12 December, 2023; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Retrieval-based Text Selection for Addressing Class-Imbalanced Data in Classification
Authors:
Sareh Ahmadi,
Aditya Shah,
Edward Fox
Abstract:
This paper addresses the problem of selecting of a set of texts for annotation in text classification using retrieval methods when there are limits on the number of annotations due to constraints on human resources. An additional challenge addressed is dealing with binary categories that have a small number of positive instances, reflecting severe class imbalance. In our situation, where annotatio…
▽ More
This paper addresses the problem of selecting of a set of texts for annotation in text classification using retrieval methods when there are limits on the number of annotations due to constraints on human resources. An additional challenge addressed is dealing with binary categories that have a small number of positive instances, reflecting severe class imbalance. In our situation, where annotation occurs over a long time period, the selection of texts to be annotated can be made in batches, with previous annotations guiding the choice of the next set. To address these challenges, the paper proposes leveraging SHAP to construct a quality set of queries for Elasticsearch and semantic search, to try to identify optimal sets of texts for annotation that will help with class imbalance. The approach is tested on sets of cue texts describing possible future events, constructed by participants involved in studies aimed to help with the management of obesity and diabetes. We introduce an effective method for selecting a small set of texts for annotation and building high-quality classifiers. We integrate vector search, semantic search, and machine learning classifiers to yield a good solution. Our experiments demonstrate improved F1 scores for the minority classes in binary classification.
△ Less
Submitted 9 November, 2023; v1 submitted 27 July, 2023;
originally announced July 2023.
-
CODET: A Benchmark for Contrastive Dialectal Evaluation of Machine Translation
Authors:
Md Mahfuz Ibn Alam,
Sina Ahmadi,
Antonios Anastasopoulos
Abstract:
Neural machine translation (NMT) systems exhibit limited robustness in handling source-side linguistic variations. Their performance tends to degrade when faced with even slight deviations in language usage, such as different domains or variations introduced by second-language speakers. It is intuitive to extend this observation to encompass dialectal variations as well, but the work allowing the…
▽ More
Neural machine translation (NMT) systems exhibit limited robustness in handling source-side linguistic variations. Their performance tends to degrade when faced with even slight deviations in language usage, such as different domains or variations introduced by second-language speakers. It is intuitive to extend this observation to encompass dialectal variations as well, but the work allowing the community to evaluate MT systems on this dimension is limited. To alleviate this issue, we compile and release CODET, a contrastive dialectal benchmark encompassing 891 different variations from twelve different languages. We also quantitatively demonstrate the challenges large MT models face in effectively translating dialectal variants. All the data and code have been released.
△ Less
Submitted 2 February, 2024; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Script Normalization for Unconventional Writing of Under-Resourced Languages in Bilingual Communities
Authors:
Sina Ahmadi,
Antonios Anastasopoulos
Abstract:
The wide accessibility of social media has provided linguistically under-represented communities with an extraordinary opportunity to create content in their native languages. This, however, comes with certain challenges in script normalization, particularly where the speakers of a language in a bilingual community rely on another script or orthography to write their native language. This paper ad…
▽ More
The wide accessibility of social media has provided linguistically under-represented communities with an extraordinary opportunity to create content in their native languages. This, however, comes with certain challenges in script normalization, particularly where the speakers of a language in a bilingual community rely on another script or orthography to write their native language. This paper addresses the problem of script normalization for several such languages that are mainly written in a Perso-Arabic script. Using synthetic data with various levels of noise and a transformer-based model, we demonstrate that the problem can be effectively remediated. We conduct a small-scale evaluation of real data as well. Our experiments indicate that script normalization is also beneficial to improve the performance of downstream tasks such as machine translation and language identification.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing
Authors:
Peyman Khordadpour,
Saeed Ahmadi
Abstract:
In recent times, I've encountered a principle known as cloud computing, a model that simplifies user access to data and computing power on a demand basis. The main objective of cloud computing is to accommodate users' growing needs by decreasing dependence on human resources, minimizing expenses, and enhancing the speed of data access. Nevertheless, preserving security and privacy in cloud computi…
▽ More
In recent times, I've encountered a principle known as cloud computing, a model that simplifies user access to data and computing power on a demand basis. The main objective of cloud computing is to accommodate users' growing needs by decreasing dependence on human resources, minimizing expenses, and enhancing the speed of data access. Nevertheless, preserving security and privacy in cloud computing systems pose notable challenges. This issue arises because these systems have a distributed structure, which is susceptible to unsanctioned access - a fundamental problem. In the context of cloud computing, the provision of services on demand makes them targets for common assaults like Denial of Service (DoS) attacks, which include Economic Denial of Sustainability (EDoS) and Distributed Denial of Service (DDoS). These onslaughts can be classified into three categories: bandwidth consumption attacks, specific application attacks, and connection layer attacks. Most of the studies conducted in this arena have concentrated on a singular type of attack, with the concurrent detection of multiple DoS attacks often overlooked. This article proposes a suitable method to identify four types of assaults: HTTP, Database, TCP SYN, and DNS Flood. The aim is to present a universal algorithm that performs effectively in detecting all four attacks instead of using separate algorithms for each one. In this technique, seventeen server parameters like memory usage, CPU usage, and input/output counts are extracted and monitored for changes, identifying the failure point using the CUSUM algorithm to calculate the likelihood of each attack. Subsequently, a fuzzy neural network is employed to determine the occurrence of an attack. When compared to the Snort software, the proposed method's results show a significant improvement in the average detection rate, jumping from 57% to 95%.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
An Examination of the Robustness of Reference-Free Image Captioning Evaluation Metrics
Authors:
Saba Ahmadi,
Aishwarya Agrawal
Abstract:
Recently, reference-free metrics such as CLIPScore (Hessel et al., 2021), UMIC (Lee et al., 2021), and PAC-S (Sarto et al., 2023) have been proposed for automatic reference-free evaluation of image captions. Our focus lies in evaluating the robustness of these metrics in scenarios that require distinguishing between two captions with high lexical overlap but very different meanings. Our findings r…
▽ More
Recently, reference-free metrics such as CLIPScore (Hessel et al., 2021), UMIC (Lee et al., 2021), and PAC-S (Sarto et al., 2023) have been proposed for automatic reference-free evaluation of image captions. Our focus lies in evaluating the robustness of these metrics in scenarios that require distinguishing between two captions with high lexical overlap but very different meanings. Our findings reveal that despite their high correlation with human judgments, CLIPScore, UMIC, and PAC-S struggle to identify fine-grained errors. While all metrics exhibit strong sensitivity to visual grounding errors, their sensitivity to caption implausibility errors is limited. Furthermore, we found that all metrics are sensitive to variations in the size of image-relevant objects mentioned in the caption, while CLIPScore and PAC-S are also sensitive to the number of mentions of image-relevant objects in the caption. Regarding linguistic aspects of a caption, all metrics show weak comprehension of negation, and CLIPScore and PAC-S are insensitive to the structure of the caption to a great extent. We hope our findings will guide further improvements in reference-free evaluation of image captioning.
△ Less
Submitted 5 February, 2024; v1 submitted 24 May, 2023;
originally announced May 2023.
-
Salt-rejecting continuous passive solar thermal desalination via convective flow and thin-film condensation
Authors:
Patrick I. Babb,
S. Farzad Ahmadi,
Forrest Brent,
Ruby Gans,
Mabel Aceves Lopez,
Jiuxu Song,
Qixian Wang,
Brandon Zou,
Xiangying Zuo,
Amanda Strom,
Jaya Nolt,
Tyler Susko,
Kirk Fields,
Yangying Zhu
Abstract:
Passive solar desalination is an emerging low-cost technology for fresh water production. State of the art desalinators typically evaporate water using wicking structures to achieve high solar-to-vapor efficiency by minimizing heat loss. However, wicking structures cannot reject salt continuously which limits the operating duration of the desalinators to several hours before the devices are turned…
▽ More
Passive solar desalination is an emerging low-cost technology for fresh water production. State of the art desalinators typically evaporate water using wicking structures to achieve high solar-to-vapor efficiency by minimizing heat loss. However, wicking structures cannot reject salt continuously which limits the operating duration of the desalinators to several hours before the devices are turned off to reject salt. While significant research has focused on developing efficient evaporators to achieve high solar-to-vapor efficiency, inefficient condensers have become the bottleneck for the overall solar-to-water efficiency. To overcome these challenges, we designed a passive inverted single stage solar membrane desalinator that achieves continuous desalination and salt rejection. By flowing salt water on a radiative absorbing, porous, hydrophobic evaporator membrane using gravity, salt continuously diffuses away from the membrane while allowing heated water vapor to transport to and condense on a cooler microporous membrane below. Our design utilizes thin-film condensation on a microporous membrane which offers ample three-phase contact region to enhance condensation phase change heat transfer. By condensing within the microporous membrane, we reduce the gap distance between the condenser and evaporator membranes, which reduces the vapor transport resistance. We experimentally demonstrated a record-high continuous desalination and salt rejection test duration of 7 days under one-sun. Despite an increased convection heat loss necessary for salt rejection on the evaporator, our desalinator still achieved a water-collection rate of 0.487 $kg$ $m^{-2}h^{-1}$, which corresponds to a 32.2% solar-to-water efficiency. This work signifies an improvement in the robustness of current state of the art desalinators and presents a new architecture to further optimize passive solar desalinators.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
DIAMANT: Dual Image-Attention Map Encoders For Medical Image Segmentation
Authors:
Yousef Yeganeh,
Azade Farshad,
Peter Weinberger,
Seyed-Ahmad Ahmadi,
Ehsan Adeli,
Nassir Navab
Abstract:
Although purely transformer-based architectures showed promising performance in many computer vision tasks, many hybrid models consisting of CNN and transformer blocks are introduced to fit more specialized tasks. Nevertheless, despite the performance gain of both pure and hybrid transformer-based architectures compared to CNNs in medical imaging segmentation, their high training cost and complexi…
▽ More
Although purely transformer-based architectures showed promising performance in many computer vision tasks, many hybrid models consisting of CNN and transformer blocks are introduced to fit more specialized tasks. Nevertheless, despite the performance gain of both pure and hybrid transformer-based architectures compared to CNNs in medical imaging segmentation, their high training cost and complexity make it challenging to use them in real scenarios. In this work, we propose simple architectures based on purely convolutional layers, and show that by just taking advantage of the attention map visualizations obtained from a self-supervised pretrained vision transformer network (e.g., DINO) one can outperform complex transformer-based networks with much less computation costs. The proposed architecture is composed of two encoder branches with the original image as input in one branch and the attention map visualizations of the same image from multiple self-attention heads from a pre-trained DINO model (as multiple channels) in the other branch. The results of our experiments on two publicly available medical imaging datasets show that the proposed pipeline outperforms U-Net and the state-of-the-art medical image segmentation models.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Transfer Learning for Low-Resource Sentiment Analysis
Authors:
Razhan Hameed,
Sina Ahmadi,
Fatemeh Daneshfar
Abstract:
Sentiment analysis is the process of identifying and extracting subjective information from text. Despite the advances to employ cross-lingual approaches in an automatic way, the implementation and evaluation of sentiment analysis systems require language-specific data to consider various sociocultural and linguistic peculiarities. In this paper, the collection and annotation of a dataset are desc…
▽ More
Sentiment analysis is the process of identifying and extracting subjective information from text. Despite the advances to employ cross-lingual approaches in an automatic way, the implementation and evaluation of sentiment analysis systems require language-specific data to consider various sociocultural and linguistic peculiarities. In this paper, the collection and annotation of a dataset are described for sentiment analysis of Central Kurdish. We explore a few classical machine learning and neural network-based techniques for this task. Additionally, we employ an approach in transfer learning to leverage pretrained models for data augmentation. We demonstrate that data augmentation achieves a high F$_1$ score and accuracy despite the difficulty of the task.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
PALI: A Language Identification Benchmark for Perso-Arabic Scripts
Authors:
Sina Ahmadi,
Milind Agarwal,
Antonios Anastasopoulos
Abstract:
The Perso-Arabic scripts are a family of scripts that are widely adopted and used by various linguistic communities around the globe. Identifying various languages using such scripts is crucial to language technologies and challenging in low-resource setups. As such, this paper sheds light on the challenges of detecting languages using Perso-Arabic scripts, especially in bilingual communities wher…
▽ More
The Perso-Arabic scripts are a family of scripts that are widely adopted and used by various linguistic communities around the globe. Identifying various languages using such scripts is crucial to language technologies and challenging in low-resource setups. As such, this paper sheds light on the challenges of detecting languages using Perso-Arabic scripts, especially in bilingual communities where ``unconventional'' writing is practiced. To address this, we use a set of supervised techniques to classify sentences into their languages. Building on these, we also propose a hierarchical model that targets clusters of languages that are more often confused by the classifiers. Our experiment results indicate the effectiveness of our solutions.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Approaches to Corpus Creation for Low-Resource Language Technology: the Case of Southern Kurdish and Laki
Authors:
Sina Ahmadi,
Zahra Azin,
Sara Belelli,
Antonios Anastasopoulos
Abstract:
One of the major challenges that under-represented and endangered language communities face in language technology is the lack or paucity of language data. This is also the case of the Southern varieties of the Kurdish and Laki languages for which very limited resources are available with insubstantial progress in tools. To tackle this, we provide a few approaches that rely on the content of local…
▽ More
One of the major challenges that under-represented and endangered language communities face in language technology is the lack or paucity of language data. This is also the case of the Southern varieties of the Kurdish and Laki languages for which very limited resources are available with insubstantial progress in tools. To tackle this, we provide a few approaches that rely on the content of local news websites, a local radio station that broadcasts content in Southern Kurdish and fieldwork for Laki. In this paper, we describe some of the challenges of such under-represented languages, particularly in writing and standardization, and also, in retrieving sources of data and retro-digitizing handwritten content to create a corpus for Southern Kurdish and Laki. In addition, we study the task of language identification in light of the other variants of Kurdish and Zaza-Gorani languages.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Agnostic Multi-Robust Learning Using ERM
Authors:
Saba Ahmadi,
Avrim Blum,
Omar Montasser,
Kevin Stangl
Abstract:
A fundamental problem in robust learning is asymmetry: a learner needs to correctly classify every one of exponentially-many perturbations that an adversary might make to a test-time natural example. In contrast, the attacker only needs to find one successful perturbation. Xiang et al.[2022] proposed an algorithm that in the context of patch attacks for image classification, reduces the effective…
▽ More
A fundamental problem in robust learning is asymmetry: a learner needs to correctly classify every one of exponentially-many perturbations that an adversary might make to a test-time natural example. In contrast, the attacker only needs to find one successful perturbation. Xiang et al.[2022] proposed an algorithm that in the context of patch attacks for image classification, reduces the effective number of perturbations from an exponential to a polynomial number of perturbations and learns using an ERM oracle. However, to achieve its guarantee, their algorithm requires the natural examples to be robustly realizable. This prompts the natural question; can we extend their approach to the non-robustly-realizable case where there is no classifier with zero robust error?
Our first contribution is to answer this question affirmatively by reducing this problem to a setting in which an algorithm proposed by Feige et al.[2015] can be applied, and in the process extend their guarantees. Next, we extend our results to a multi-group setting and introduce a novel agnostic multi-robust learning problem where the goal is to learn a predictor that achieves low robust loss on a (potentially) rich collection of subgroups.
△ Less
Submitted 12 February, 2024; v1 submitted 15 March, 2023;
originally announced March 2023.
-
Fundamental Bounds on Online Strategic Classification
Authors:
Saba Ahmadi,
Avrim Blum,
Kunhe Yang
Abstract:
We study the problem of online binary classification where strategic agents can manipulate their observable features in predefined ways, modeled by a manipulation graph, in order to receive a positive classification. We show this setting differs in fundamental ways from non-strategic online classification. For instance, whereas in the non-strategic case, a mistake bound of $\ln|H|$ is achievable v…
▽ More
We study the problem of online binary classification where strategic agents can manipulate their observable features in predefined ways, modeled by a manipulation graph, in order to receive a positive classification. We show this setting differs in fundamental ways from non-strategic online classification. For instance, whereas in the non-strategic case, a mistake bound of $\ln|H|$ is achievable via the halving algorithm when the target function belongs to a known class $H$, we show that no deterministic algorithm can achieve a mistake bound $o(Δ)$ in the strategic setting, where $Δ$ is the maximum degree of the manipulation graph (even when $|H|=O(Δ)$). We obtain an algorithm achieving mistake bound $O(Δ\ln|H|)$. We also extend this to the agnostic setting and obtain an algorithm with a $Δ$ multiplicative regret, and we show no deterministic algorithm can achieve $o(Δ)$ multiplicative regret.
Next, we study two randomized models based on whether the random choices are made before or after agents respond, and show they exhibit fundamental differences. In the first model, at each round the learner deterministically chooses a probability distribution over classifiers inducing expected values on each vertex (probabilities of being classified as positive), which the strategic agents respond to. We show that any learner in this model has to suffer linear regret. On the other hand, in the second model, while the adversary who selects the next agent must respond to the learner's probability distribution over classifiers, the agent then responds to the actual hypothesis classifier drawn from this distribution. Surprisingly, we show this model is more advantageous to the learner, and we design randomized algorithms that achieve sublinear regret bounds against both oblivious and adaptive adversaries.
△ Less
Submitted 25 June, 2024; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Open-Source Skull Reconstruction with MONAI
Authors:
Jianning Li,
André Ferreira,
Behrus Puladi,
Victor Alves,
Michael Kamp,
Moon-Sung Kim,
Felix Nensa,
Jens Kleesiek,
Seyed-Ahmad Ahmadi,
Jan Egger
Abstract:
We present a deep learning-based approach for skull reconstruction for MONAI, which has been pre-trained on the MUG500+ skull dataset. The implementation follows the MONAI contribution guidelines, hence, it can be easily tried out and used, and extended by MONAI users. The primary goal of this paper lies in the investigation of open-sourcing codes and pre-trained deep learning models under the MON…
▽ More
We present a deep learning-based approach for skull reconstruction for MONAI, which has been pre-trained on the MUG500+ skull dataset. The implementation follows the MONAI contribution guidelines, hence, it can be easily tried out and used, and extended by MONAI users. The primary goal of this paper lies in the investigation of open-sourcing codes and pre-trained deep learning models under the MONAI framework. Nowadays, open-sourcing software, especially (pre-trained) deep learning models, has become increasingly important. Over the years, medical image analysis experienced a tremendous transformation. Over a decade ago, algorithms had to be implemented and optimized with low-level programming languages, like C or C++, to run in a reasonable time on a desktop PC, which was not as powerful as today's computers. Nowadays, users have high-level scripting languages like Python, and frameworks like PyTorch and TensorFlow, along with a sea of public code repositories at hand. As a result, implementations that had thousands of lines of C or C++ code in the past, can now be scripted with a few lines and in addition executed in a fraction of the time. To put this even on a higher level, the Medical Open Network for Artificial Intelligence (MONAI) framework tailors medical imaging research to an even more convenient process, which can boost and push the whole field. The MONAI framework is a freely available, community-supported, open-source and PyTorch-based framework, that also enables to provide research contributions with pre-trained models to others. Codes and pre-trained weights for skull reconstruction are publicly available at: https://github.com/Project-MONAI/research-contributions/tree/master/SkullRec
△ Less
Submitted 15 June, 2023; v1 submitted 25 November, 2022;
originally announced November 2022.
-
MAPL: Parameter-Efficient Adaptation of Unimodal Pre-Trained Models for Vision-Language Few-Shot Prompting
Authors:
Oscar Mañas,
Pau Rodriguez,
Saba Ahmadi,
Aida Nematzadeh,
Yash Goyal,
Aishwarya Agrawal
Abstract:
Large pre-trained models have proved to be remarkable zero- and (prompt-based) few-shot learners in unimodal vision and language tasks. We propose MAPL, a simple and parameter-efficient method that reuses frozen pre-trained unimodal models and leverages their strong generalization capabilities in multimodal vision-language (VL) settings. MAPL learns a lightweight mapping between the representation…
▽ More
Large pre-trained models have proved to be remarkable zero- and (prompt-based) few-shot learners in unimodal vision and language tasks. We propose MAPL, a simple and parameter-efficient method that reuses frozen pre-trained unimodal models and leverages their strong generalization capabilities in multimodal vision-language (VL) settings. MAPL learns a lightweight mapping between the representation spaces of unimodal models using aligned image-text data, and can generalize to unseen VL tasks from just a few in-context examples. The small number of trainable parameters makes MAPL effective at low-data and in-domain learning. Moreover, MAPL's modularity enables easy extension to other pre-trained models. Extensive experiments on several visual question answering and image captioning benchmarks show that MAPL achieves superior or competitive performance compared to similar methods while training orders of magnitude fewer parameters. MAPL can be trained in just a few hours using modest computational resources and public datasets. We release our code and pre-trained model weights at https://github.com/mair-lab/mapl.
△ Less
Submitted 14 March, 2023; v1 submitted 13 October, 2022;
originally announced October 2022.
-
Training β-VAE by Aggregating a Learned Gaussian Posterior with a Decoupled Decoder
Authors:
Jianning Li,
Jana Fragemann,
Seyed-Ahmad Ahmadi,
Jens Kleesiek,
Jan Egger
Abstract:
The reconstruction loss and the Kullback-Leibler divergence (KLD) loss in a variational autoencoder (VAE) often play antagonistic roles, and tuning the weight of the KLD loss in $β$-VAE to achieve a balance between the two losses is a tricky and dataset-specific task. As a result, current practices in VAE training often result in a trade-off between the reconstruction fidelity and the continuity…
▽ More
The reconstruction loss and the Kullback-Leibler divergence (KLD) loss in a variational autoencoder (VAE) often play antagonistic roles, and tuning the weight of the KLD loss in $β$-VAE to achieve a balance between the two losses is a tricky and dataset-specific task. As a result, current practices in VAE training often result in a trade-off between the reconstruction fidelity and the continuity$/$disentanglement of the latent space, if the weight $β$ is not carefully tuned. In this paper, we present intuitions and a careful analysis of the antagonistic mechanism of the two losses, and propose, based on the insights, a simple yet effective two-stage method for training a VAE. Specifically, the method aggregates a learned Gaussian posterior $z \sim q_θ (z|x)$ with a decoder decoupled from the KLD loss, which is trained to learn a new conditional distribution $p_φ (x|z)$ of the input data $x$. Experimentally, we show that the aggregated VAE maximally satisfies the Gaussian assumption about the latent space, while still achieves a reconstruction error comparable to when the latent space is only loosely regularized by $\mathcal{N}(\mathbf{0},I)$. The proposed approach does not require hyperparameter (i.e., the KLD weight $β$) tuning given a specific dataset as required in common VAE training practices. We evaluate the method using a medical dataset intended for 3D skull reconstruction and shape completion, and the results indicate promising generative capabilities of the VAE trained using the proposed method. Besides, through guided manipulation of the latent variables, we establish a connection between existing autoencoder (AE)-based approaches and generative approaches, such as VAE, for the shape completion problem. Codes and pre-trained weights are available at https://github.com/Jianningli/skullVAE
△ Less
Submitted 29 September, 2022;
originally announced September 2022.
-
Prompt-guided Scene Generation for 3D Zero-Shot Learning
Authors:
Majid Nasiri,
Ali Cheraghian,
Townim Faisal Chowdhury,
Sahar Ahmadi,
Morteza Saberi,
Shafin Rahman
Abstract:
Zero-shot learning on 3D point cloud data is a related underexplored problem compared to its 2D image counterpart. 3D data brings new challenges for ZSL due to the unavailability of robust pre-trained feature extraction models. To address this problem, we propose a prompt-guided 3D scene generation and supervision method that augments 3D data to learn the network better, exploring the complex inte…
▽ More
Zero-shot learning on 3D point cloud data is a related underexplored problem compared to its 2D image counterpart. 3D data brings new challenges for ZSL due to the unavailability of robust pre-trained feature extraction models. To address this problem, we propose a prompt-guided 3D scene generation and supervision method that augments 3D data to learn the network better, exploring the complex interplay of seen and unseen objects. First, we merge point clouds of two 3D models in certain ways described by a prompt. The prompt acts like the annotation describing each 3D scene. Later, we perform contrastive learning to train our proposed architecture in an end-to-end manner. We argue that 3D scenes can relate objects more efficiently than single objects because popular language models (like BERT) can achieve high performance when objects appear in a context. Our proposed prompt-guided scene generation method encapsulates data augmentation and prompt-based annotation/captioning to improve 3D ZSL performance. We have achieved state-of-the-art ZSL and generalized ZSL performance on synthetic (ModelNet40, ModelNet10) and real-scanned (ScanOjbectNN) 3D object datasets.
△ Less
Submitted 29 September, 2022;
originally announced September 2022.
-
Monolingual alignment of word senses and definitions in lexicographical resources
Authors:
Sina Ahmadi
Abstract:
The focus of this thesis is broadly on the alignment of lexicographical data, particularly dictionaries. In order to tackle some of the challenges in this field, two main tasks of word sense alignment and translation inference are addressed. The first task aims to find an optimal alignment given the sense definitions of a headword in two different monolingual dictionaries. This is a challenging ta…
▽ More
The focus of this thesis is broadly on the alignment of lexicographical data, particularly dictionaries. In order to tackle some of the challenges in this field, two main tasks of word sense alignment and translation inference are addressed. The first task aims to find an optimal alignment given the sense definitions of a headword in two different monolingual dictionaries. This is a challenging task, especially due to differences in sense granularity, coverage and description in two resources. After describing the characteristics of various lexical semantic resources, we introduce a benchmark containing 17 datasets of 15 languages where monolingual word senses and definitions are manually annotated across different resources by experts. In the creation of the benchmark, lexicographers' knowledge is incorporated through the annotations where a semantic relation, namely exact, narrower, broader, related or none, is selected for each sense pair. This benchmark can be used for evaluation purposes of word-sense alignment systems. The performance of a few alignment techniques based on textual and non-textual semantic similarity detection and semantic relation induction is evaluated using the benchmark. Finally, we extend this work to translation inference where translation pairs are induced to generate bilingual lexicons in an unsupervised way using various approaches based on graph analysis. This task is of particular interest for the creation of lexicographical resources for less-resourced and under-represented languages and also, assists in increasing coverage of the existing resources. From a practical point of view, the techniques and methods that are developed in this thesis are implemented within a tool that can facilitate the alignment task.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
Enhanced Methods for the Weight Constrained Shortest Path Problem
Authors:
Saman Ahmadi,
Guido Tack,
Daniel Harabor,
Philip Kilby,
Mahdi Jalili
Abstract:
The classic problem of constrained pathfinding is a well-studied, yet challenging, topic in AI with a broad range of applications in various areas such as communication and transportation. The Weight Constrained Shortest Path Problem (WCSPP), the base form of constrained pathfinding with only one side constraint, aims to plan a cost-optimum path with limited weight/resource usage. Given the bi-cri…
▽ More
The classic problem of constrained pathfinding is a well-studied, yet challenging, topic in AI with a broad range of applications in various areas such as communication and transportation. The Weight Constrained Shortest Path Problem (WCSPP), the base form of constrained pathfinding with only one side constraint, aims to plan a cost-optimum path with limited weight/resource usage. Given the bi-criteria nature of the problem (i.e., dealing with the cost and weight of paths), methods addressing the WCSPP have some common properties with bi-objective search. This paper leverages the recent state-of-the-art techniques in both constrained pathfinding and bi-objective search and presents two new solution approaches to the WCSPP on the basis of A* search, both capable of solving hard WCSPP instances on very large graphs. We empirically evaluate the performance of our algorithms on a set of large and realistic problem instances and show their advantages over the state-of-the-art algorithms in both time and space metrics. This paper also investigates the importance of priority queues in constrained search with A*. We show with extensive experiments on both realistic and randomised graphs how bucket-based queues without tie-breaking can effectively improve the algorithmic performance of exhaustive A*-based bi-criteria searches.
△ Less
Submitted 30 June, 2023; v1 submitted 29 July, 2022;
originally announced July 2022.
-
Individual Preference Stability for Clustering
Authors:
Saba Ahmadi,
Pranjal Awasthi,
Samir Khuller,
Matthäus Kleindessner,
Jamie Morgenstern,
Pattara Sukprasert,
Ali Vakilian
Abstract:
In this paper, we propose a natural notion of individual preference (IP) stability for clustering, which asks that every data point, on average, is closer to the points in its own cluster than to the points in any other cluster. Our notion can be motivated from several perspectives, including game theory and algorithmic fairness. We study several questions related to our proposed notion. We first…
▽ More
In this paper, we propose a natural notion of individual preference (IP) stability for clustering, which asks that every data point, on average, is closer to the points in its own cluster than to the points in any other cluster. Our notion can be motivated from several perspectives, including game theory and algorithmic fairness. We study several questions related to our proposed notion. We first show that deciding whether a given data set allows for an IP-stable clustering in general is NP-hard. As a result, we explore the design of efficient algorithms for finding IP-stable clusterings in some restricted metric spaces. We present a polytime algorithm to find a clustering satisfying exact IP-stability on the real line, and an efficient algorithm to find an IP-stable 2-clustering for a tree metric. We also consider relaxing the stability constraint, i.e., every data point should not be too far from its own cluster compared to any other cluster. For this case, we provide polytime algorithms with different guarantees. We evaluate some of our algorithms and several standard clustering approaches on real data sets.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Few-shot Class-incremental Learning for 3D Point Cloud Objects
Authors:
Townim Chowdhury,
Ali Cheraghian,
Sameera Ramasinghe,
Sahar Ahmadi,
Morteza Saberi,
Shafin Rahman
Abstract:
Few-shot class-incremental learning (FSCIL) aims to incrementally fine-tune a model (trained on base classes) for a novel set of classes using a few examples without forgetting the previous training. Recent efforts address this problem primarily on 2D images. However, due to the advancement of camera technology, 3D point cloud data has become more available than ever, which warrants considering FS…
▽ More
Few-shot class-incremental learning (FSCIL) aims to incrementally fine-tune a model (trained on base classes) for a novel set of classes using a few examples without forgetting the previous training. Recent efforts address this problem primarily on 2D images. However, due to the advancement of camera technology, 3D point cloud data has become more available than ever, which warrants considering FSCIL on 3D data. This paper addresses FSCIL in the 3D domain. In addition to well-known issues of catastrophic forgetting of past knowledge and overfitting of few-shot data, 3D FSCIL can bring newer challenges. For example, base classes may contain many synthetic instances in a realistic scenario. In contrast, only a few real-scanned samples (from RGBD sensors) of novel classes are available in incremental steps. Due to the data variation from synthetic to real, FSCIL endures additional challenges, degrading performance in later incremental steps. We attempt to solve this problem using Microshapes (orthogonal basis vectors) by describing any 3D objects using a pre-defined set of rules. It supports incremental training with few-shot examples minimizing synthetic to real data variation. We propose new test protocols for 3D FSCIL using popular synthetic datasets (ModelNet and ShapeNet) and 3D real-scanned datasets (ScanObjectNN and CO3D). By comparing state-of-the-art methods, we establish the effectiveness of our approach in the 3D domain.
△ Less
Submitted 22 July, 2022; v1 submitted 30 May, 2022;
originally announced May 2022.
-
Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap
Authors:
Saeed Ahmadi,
Maliheh Salehfar
Abstract:
Privacy-Preserving Cloud Computing is an emerging technology with many applications in various fields. Cloud computing is important because it allows for scalability, adaptability, and improved security. Likewise, privacy in cloud computing is important because it ensures that the integrity of data stored on the cloud maintains intact. This survey paper on privacy-preserving cloud computing can he…
▽ More
Privacy-Preserving Cloud Computing is an emerging technology with many applications in various fields. Cloud computing is important because it allows for scalability, adaptability, and improved security. Likewise, privacy in cloud computing is important because it ensures that the integrity of data stored on the cloud maintains intact. This survey paper on privacy-preserving cloud computing can help pave the way for future research in related areas. This paper helps to identify existing trends by establishing a layered architecture along with a life cycle and an ecosystem for privacy-preserving cloud systems in addition to identifying the existing trends in research on this area.
△ Less
Submitted 23 April, 2022;
originally announced April 2022.
-
Upside Risk Effect on Reliability of Microgrids Considering Demand Response Program and COVID-19: An Investigation on Health System and Power System Interactions
Authors:
Tohid Khalili,
Seyed Iman Habibi,
Seyyed Ali Ghorashi Khalil Abadi,
Sadaf Ahmadi,
Ali Bidram
Abstract:
COVID-19 has a vast impact on the power systems considering the customers demand and human resources. During this situation, the utilization of microgrids (MGs) may help the power systems balance the generation and consumption of power, which leads to customer satisfaction. In this paper, the optimal power scheduling of energy sources in an islanded MG by considering the upside risk (UR) is propos…
▽ More
COVID-19 has a vast impact on the power systems considering the customers demand and human resources. During this situation, the utilization of microgrids (MGs) may help the power systems balance the generation and consumption of power, which leads to customer satisfaction. In this paper, the optimal power scheduling of energy sources in an islanded MG by considering the upside risk (UR) is proposed for the very first time. The intended islanded MG consists of various sources such as wind turbine (WT), photovoltaic (PV), diesel generator (DGR), and battery. The goals of this work are minimizing the energy not supplied (ENS) in islanded mode considering the COVID-19s effect and implementing the demand response program (DRP). The difference between target ENS and actual ENS when actual ENS is less than the target is defined as UR. The results indicate that the UR related to the ENS of the islanded MG decreases significantly by slightly increasing the ENS. Moreover, COVID-19 decreases the ENS considerably and has a bigger effect than the DRP.
△ Less
Submitted 14 April, 2022;
originally announced April 2022.
-
Graph-in-Graph (GiG): Learning interpretable latent graphs in non-Euclidean domain for biological and healthcare applications
Authors:
Kamilia Mullakaeva,
Luca Cosmo,
Anees Kazi,
Seyed-Ahmad Ahmadi,
Nassir Navab,
Michael M. Bronstein
Abstract:
Graphs are a powerful tool for representing and analyzing unstructured, non-Euclidean data ubiquitous in the healthcare domain. Two prominent examples are molecule property prediction and brain connectome analysis. Importantly, recent works have shown that considering relationships between input data samples have a positive regularizing effect for the downstream task in healthcare applications. Th…
▽ More
Graphs are a powerful tool for representing and analyzing unstructured, non-Euclidean data ubiquitous in the healthcare domain. Two prominent examples are molecule property prediction and brain connectome analysis. Importantly, recent works have shown that considering relationships between input data samples have a positive regularizing effect for the downstream task in healthcare applications. These relationships are naturally modeled by a (possibly unknown) graph structure between input samples. In this work, we propose Graph-in-Graph (GiG), a neural network architecture for protein classification and brain imaging applications that exploits the graph representation of the input data samples and their latent relation. We assume an initially unknown latent-graph structure between graph-valued input data and propose to learn end-to-end a parametric model for message passing within and across input graph samples, along with the latent structure connecting the input graphs. Further, we introduce a degree distribution loss that helps regularize the predicted latent relationships structure. This regularization can significantly improve the downstream task. Moreover, the obtained latent graph can represent patient population models or networks of molecule clusters, providing a level of interpretability and knowledge discovery in the input domain of particular value in healthcare.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
Thermographic detection of internal defects using 2D photothermal super resolution reconstruction with sequential laser heating
Authors:
Julien Lecompagnon,
Samim Ahmadi,
Philipp Hirsch,
Christian Rupprecht,
Mathias Ziegler
Abstract:
Thermographic photothermal super resolution reconstruction enables the resolution of internal defects/inhomogeneities below the classical limit which is governed by the diffusion properties of thermal wave propagation. Based on a combination of the application of special sampling strategies and a subsequent numerical optimization step in post-processing, thermographic super resolution has already…
▽ More
Thermographic photothermal super resolution reconstruction enables the resolution of internal defects/inhomogeneities below the classical limit which is governed by the diffusion properties of thermal wave propagation. Based on a combination of the application of special sampling strategies and a subsequent numerical optimization step in post-processing, thermographic super resolution has already proven to be superior to standard thermographic methods in the detection of one-dimensional defect/inhomogeneity structures. In our work, we report an extension of the capabilities of the method for efficient detection and resolution of defect cross sections with fully two-dimensional structured laser-based heating. The reconstruction is carried out using one of two different algorithms which are proposed within this work. Both algorithms utilize the combination of several coherent measurements using convex optimization and exploit the sparse nature of defects/inhomogeneities as is typical for most nondestructive testing scenarios. Finally, the performance of each algorithm is rated on reconstruction quality and algorithmic complexity. The presented experimental approach is based on repeated spatially structured heating by a high power laser. As a result, a two-dimensional sparse defect/inhomogeneity map can be obtained. In addition, the obtained results are compared with those of conventional thermographic inspection methods which make use of homogeneous illumination. Due to the sparse nature of the reconstructed defect/inhomogeneity map, this comparison is performed qualitatively.
△ Less
Submitted 24 April, 2022; v1 submitted 1 March, 2022;
originally announced March 2022.
-
Setting Fair Incentives to Maximize Improvement
Authors:
Saba Ahmadi,
Hedyeh Beyhaghi,
Avrim Blum,
Keziah Naggita
Abstract:
We consider the problem of helping agents improve by setting short-term goals. Given a set of target skill levels, we assume each agent will try to improve from their initial skill level to the closest target level within reach or do nothing if no target level is within reach. We consider two models: the common improvement capacity model, where agents have the same limit on how much they can impro…
▽ More
We consider the problem of helping agents improve by setting short-term goals. Given a set of target skill levels, we assume each agent will try to improve from their initial skill level to the closest target level within reach or do nothing if no target level is within reach. We consider two models: the common improvement capacity model, where agents have the same limit on how much they can improve, and the individualized improvement capacity model, where agents have individualized limits. Our goal is to optimize the target levels for social welfare and fairness objectives, where social welfare is defined as the total amount of improvement, and fairness objectives are considered where the agents belong to different underlying populations. A key technical challenge of this problem is the non-monotonicity of social welfare in the set of target levels, i.e., adding a new target level may decrease the total amount of improvement as it may get easier for some agents to improve. This is especially challenging when considering multiple groups because optimizing target levels in isolation for each group and outputting the union may result in arbitrarily low improvement for a group, failing the fairness objective. Considering these properties, we provide algorithms for optimal and near-optimal improvement for both social welfare and fairness objectives. These algorithmic results work for both the common and individualized improvement capacity models. Furthermore, we show a placement of target levels exists that is approximately optimal for the social welfare of each group. Unlike the algorithmic results, this structural statement only holds in the common improvement capacity model, and we show counterexamples in the individualized improvement capacity model. Finally, we extend our algorithms to learning settings where we have only sample access to the initial skill levels of agents.
△ Less
Submitted 28 February, 2022;
originally announced March 2022.
-
On classification of strategic agents who can both game and improve
Authors:
Saba Ahmadi,
Hedyeh Beyhaghi,
Avrim Blum,
Keziah Naggita
Abstract:
In this work, we consider classification of agents who can both game and improve. For example, people wishing to get a loan may be able to take some actions that increase their perceived credit-worthiness and others that also increase their true credit-worthiness. A decision-maker would like to define a classification rule with few false-positives (does not give out many bad loans) while yielding…
▽ More
In this work, we consider classification of agents who can both game and improve. For example, people wishing to get a loan may be able to take some actions that increase their perceived credit-worthiness and others that also increase their true credit-worthiness. A decision-maker would like to define a classification rule with few false-positives (does not give out many bad loans) while yielding many true positives (giving out many good loans), which includes encouraging agents to improve to become true positives if possible. We consider two models for this problem, a general discrete model and a linear model, and prove algorithmic, learning, and hardness results for each. For the general discrete model, we give an efficient algorithm for the problem of maximizing the number of true positives subject to no false positives, and show how to extend this to a partial-information learning setting. We also show hardness for the problem of maximizing the number of true positives subject to a nonzero bound on the number of false positives, and that this hardness holds even for a finite-point version of our linear model. We also show that maximizing the number of true positives subject to no false positive is NP-hard in our full linear model. We additionally provide an algorithm that determines whether there exists a linear classifier that classifies all agents accurately and causes all improvable agents to become qualified, and give additional results for low-dimensional data.
△ Less
Submitted 28 February, 2022;
originally announced March 2022.
-
Hunspell for Sorani Kurdish Spell Checking and Morphological Analysis
Authors:
Sina Ahmadi
Abstract:
Spell checking and morphological analysis are two fundamental tasks in text and natural language processing and are addressed in the early stages of the development of language technology. Despite the previous efforts, there is no progress in open-source to create such tools for Sorani Kurdish, also known as Central Kurdish, as a less-resourced language. In this paper, we present our efforts in an…
▽ More
Spell checking and morphological analysis are two fundamental tasks in text and natural language processing and are addressed in the early stages of the development of language technology. Despite the previous efforts, there is no progress in open-source to create such tools for Sorani Kurdish, also known as Central Kurdish, as a less-resourced language. In this paper, we present our efforts in annotating a lexicon with morphosyntactic tags and also, extracting morphological rules of Sorani Kurdish to build a morphological analyzer, a stemmer and a spell-checking system using Hunspell. This implementation can be used for further developments in the field by researchers and also, be integrated into text editors under a publicly available license.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
A Formal Description of Sorani Kurdish Morphology
Authors:
Sina Ahmadi
Abstract:
Sorani Kurdish, also known as Central Kurdish, has a complex morphology, particularly due to the patterns in which morphemes appear. Although several aspects of Kurdish morphology have been studied, such as pronominal endoclitics and Izafa constructions, Sorani Kurdish morphology has received trivial attention in computational linguistics. Moreover, some morphemes, such as the emphasis endoclitic…
▽ More
Sorani Kurdish, also known as Central Kurdish, has a complex morphology, particularly due to the patterns in which morphemes appear. Although several aspects of Kurdish morphology have been studied, such as pronominal endoclitics and Izafa constructions, Sorani Kurdish morphology has received trivial attention in computational linguistics. Moreover, some morphemes, such as the emphasis endoclitic =îş, and derivational morphemes have not been previously studied. To tackle the complex morphology of Sorani, we provide a thorough description of Sorani Kurdish morphological and morphophonological constructions in a formal way such that they can be used as finite-state transducers for morphological analysis and synthesis.
△ Less
Submitted 8 September, 2021;
originally announced September 2021.
-
Granger Causality from Quantized Measurements
Authors:
Salman Ahmadi,
Girish N. Nair,
Erik Weyer
Abstract:
An approach is proposed for inferring Granger causality between jointly stationary, Gaussian signals from quantized data. First, a necessary and sufficient rank criterion for the equality of two conditional Gaussian distributions is proved. Assuming a partial finite-order Markov property, a characterization of Granger causality in terms of the rank of a matrix involving the covariances is presente…
▽ More
An approach is proposed for inferring Granger causality between jointly stationary, Gaussian signals from quantized data. First, a necessary and sufficient rank criterion for the equality of two conditional Gaussian distributions is proved. Assuming a partial finite-order Markov property, a characterization of Granger causality in terms of the rank of a matrix involving the covariances is presented. We call this the causality matrix. The smallest singular value of the causality matrix gives a lower bound on the distance between the two conditional Gaussian distributions appearing in the definition of Granger causality and yields a new measure of causality. Then, conditions are derived under which Granger causality between jointly Gaussian processes can be reliably inferred from the second order moments of quantized measurements. A necessary and sufficient condition is proposed for Granger causality inference under binary quantization. Furthermore, sufficient conditions are introduced to infer Granger causality between jointly Gaussian signals through measurements quantized via non-uniform, uniform or high resolution quantizers. Apart from the assumed partial Markov order and joint Gaussianity, this approach does not require the parameters of a system model to be identified. No assumptions are made on the identifiability of the jointly Gaussian random processes through the quantized observations. The effectiveness of the proposed method is illustrated by simulation results.
△ Less
Submitted 4 February, 2022; v1 submitted 2 June, 2021;
originally announced June 2021.