-
ALINA: Advanced Line Identification and Notation Algorithm
Authors:
Mohammed Abdul Hafeez Khan,
Parth Ganeriwala,
Siddhartha Bhattacharyya,
Natasha Neogi,
Raja Muthalagu
Abstract:
Labels are the cornerstone of supervised machine learning algorithms. Most visual recognition methods are fully supervised, using bounding boxes or pixel-wise segmentations for object localization. Traditional labeling methods, such as crowd-sourcing, are prohibitive due to cost, data privacy, amount of time, and potential errors on large datasets. To address these issues, we propose a novel annot…
▽ More
Labels are the cornerstone of supervised machine learning algorithms. Most visual recognition methods are fully supervised, using bounding boxes or pixel-wise segmentations for object localization. Traditional labeling methods, such as crowd-sourcing, are prohibitive due to cost, data privacy, amount of time, and potential errors on large datasets. To address these issues, we propose a novel annotation framework, Advanced Line Identification and Notation Algorithm (ALINA), which can be used for labeling taxiway datasets that consist of different camera perspectives and variable weather attributes (sunny and cloudy). Additionally, the CIRCular threshoLd pixEl Discovery And Traversal (CIRCLEDAT) algorithm has been proposed, which is an integral step in determining the pixels corresponding to taxiway line markings. Once the pixels are identified, ALINA generates corresponding pixel coordinate annotations on the frame. Using this approach, 60,249 frames from the taxiway dataset, AssistTaxi have been labeled. To evaluate the performance, a context-based edge map (CBEM) set was generated manually based on edge features and connectivity. The detection rate after testing the annotated labels with the CBEM set was recorded as 98.45%, attesting its dependability and effectiveness.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
Authors:
Mohammad Masum,
Mohammad Nazim,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Md Abdullah Hafiz Khan,
Gias Uddin,
Shabir Barzanjeh,
Erhan Saglamyurek,
Akond Rahman,
Sheikh Iqbal Ahamed
Abstract:
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This pap…
▽ More
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This paper analyzes speed up performance of QC when applied to machine learning algorithms, known as Quantum Machine Learning (QML). We applied QML methods such as Quantum Support Vector Machine (QSVM), and Quantum Neural Network (QNN) to detect Software Supply Chain (SSC) attacks. Due to the access limitations of real quantum computers, the QML methods were implemented on open-source quantum simulators such as IBM Qiskit and TensorFlow Quantum. We evaluated the performance of QML in terms of processing speed and accuracy and finally, compared with its classical counterparts. Interestingly, the experimental results differ to the speed up promises of QC by demonstrating higher computational time and lower accuracy in comparison to the classical approaches for SSC attacks.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Braille to Text Translation for Bengali Language: A Geometric Approach
Authors:
Minhas Kamal,
Dr. Amin Ahsan Ali,
Dr. Muhammad Asif Hossain Khan,
Dr. Mohammad Shoyaib
Abstract:
Braille is the only system to visually impaired people for reading and writing. However, general people cannot read Braille. So, teachers and relatives find it hard to assist them with learning. Almost every major language has software solutions for this translation purpose. However, in Bengali there is an absence of this useful tool. Here, we propose Braille to Text Translator, which takes image…
▽ More
Braille is the only system to visually impaired people for reading and writing. However, general people cannot read Braille. So, teachers and relatives find it hard to assist them with learning. Almost every major language has software solutions for this translation purpose. However, in Bengali there is an absence of this useful tool. Here, we propose Braille to Text Translator, which takes image of these tactile alphabets, and translates them to plain text. Image deterioration, scan-time page rotation, and braille dot deformation are the principal issues in this scheme. All of these challenges are directly checked using special image processing and geometric structure analysis. The technique yields 97.25% accuracy in recognizing Braille characters.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Interpolatory projection technique for Riccati-based feedback stabilization of index-1 descriptor systems
Authors:
Mahtab Uddin,
M. Monir Uddin,
M. A. H. Khan,
Md. Motlubar Rahman
Abstract:
The work aims to stabilize the unstable index-1 descriptor systems by Riccati-based feedback stabilization via a modified form of Iterative Rational Krylov Algorithm (IRKA), which is a bi-tangential interpolation-based technique. In the basic IRKA, for the stable systems the Reduced Order Models (ROMs) can be found conveniently, but it is unsuitable for the unstable ones. In the proposed technique…
▽ More
The work aims to stabilize the unstable index-1 descriptor systems by Riccati-based feedback stabilization via a modified form of Iterative Rational Krylov Algorithm (IRKA), which is a bi-tangential interpolation-based technique. In the basic IRKA, for the stable systems the Reduced Order Models (ROMs) can be found conveniently, but it is unsuitable for the unstable ones. In the proposed technique, the initial feedback is implemented within the construction of the projectors of the IRKA approach. The solution of the Riccati equation is estimated from the ROM achieved by IRKA and hence the low-rank feedback matrix is attained. Using the reverse projecting process, for the full model the optimal feedback matrix is retrieved from the low-rank feedback matrix. Finally, to validate the aptness and competency of the proposed technique it is applied to unstable index-1 descriptor systems. The comparison of the present work with two previous works is narrated. The simulation is done by numerical computation using MATLAB, and both the tabular method and graphical method are used as the supporting tools of comparative analysis.
△ Less
Submitted 30 March, 2021; v1 submitted 29 July, 2020;
originally announced July 2020.
-
Computationally efficient optimal control for unstable power system models
Authors:
Mahtab Uddin,
M. Monir Uddin,
Md. Abdul Hakim Khan
Abstract:
In this article, the focus is mainly on gaining the optimal control for the unstable power system models and stabilizing them through the Riccati-based feedback stabilization process with sparsity-preserving techniques. We are to find the solution of the Continuous-time Algebraic Riccati Equations (CAREs) governed from the unstable power system models derived from the Brazilian Inter-Connected Pow…
▽ More
In this article, the focus is mainly on gaining the optimal control for the unstable power system models and stabilizing them through the Riccati-based feedback stabilization process with sparsity-preserving techniques. We are to find the solution of the Continuous-time Algebraic Riccati Equations (CAREs) governed from the unstable power system models derived from the Brazilian Inter-Connected Power System (BIPS) models, which are large-scale sparse index-1 descriptor systems. We propose the projection-based Rational Krylov Subspace Method (RKSM) for the iterative computation of the solution of the CAREs. The novelties of RKSM are sparsity-preserving computations and the implementation of time-convenient adaptive shift parameters. We modify the Low-Rank Cholesky-Factor integrated Alternating Direction Implicit (LRCF-ADI) technique based nested iterative Kleinman-Newton (KN) method to a sparse form and adjust this to solve the desired CAREs. We compare the results achieved by the Kleinman-Newton method with that of using the RKSM. The applicability and adaptability of the proposed techniques are justified numerically with MATLAB simulations. Transient behaviors of the target models are investigated for comparative analysis through the tabular and graphical approaches.
△ Less
Submitted 1 September, 2021; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Human Activity Recognition from Wearable Sensor Data Using Self-Attention
Authors:
Saif Mahmud,
M Tanjid Hasan Tonmoy,
Kishor Kumar Bhaumik,
A K M Mahbubur Rahman,
M Ashraful Amin,
Mohammad Shoyaib,
Muhammad Asif Hossain Khan,
Amin Ahsan Ali
Abstract:
Human Activity Recognition from body-worn sensor data poses an inherent challenge in capturing spatial and temporal dependencies of time-series signals. In this regard, the existing recurrent or convolutional or their hybrid models for activity recognition struggle to capture spatio-temporal context from the feature space of sensor reading sequence. To address this complex problem, we propose a se…
▽ More
Human Activity Recognition from body-worn sensor data poses an inherent challenge in capturing spatial and temporal dependencies of time-series signals. In this regard, the existing recurrent or convolutional or their hybrid models for activity recognition struggle to capture spatio-temporal context from the feature space of sensor reading sequence. To address this complex problem, we propose a self-attention based neural network model that foregoes recurrent architectures and utilizes different types of attention mechanisms to generate higher dimensional feature representation used for classification. We performed extensive experiments on four popular publicly available HAR datasets: PAMAP2, Opportunity, Skoda and USC-HAD. Our model achieve significant performance improvement over recent state-of-the-art models in both benchmark test subjects and Leave-one-subject-out evaluation. We also observe that the sensor attention maps produced by our model is able capture the importance of the modality and placement of the sensors in predicting the different activity classes.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
Guidelines to the Problem of Location Management and Database Architecture for the Next Generation Mobile Networks
Authors:
Md. Mamun Ali Sarker,
Md. Ashraf Hossain Khan,
M. M. A. Hashem
Abstract:
In near future, anticipated large number of mobile users may introduce very large centralized databases and increase end-to-end delays in location registration and call delivery on HLR-VLR database and will become infeasible. After observing several problems we propose some guidelines. Multitree distributed database, high throughput index structure, memory oriented database organization are used.…
▽ More
In near future, anticipated large number of mobile users may introduce very large centralized databases and increase end-to-end delays in location registration and call delivery on HLR-VLR database and will become infeasible. After observing several problems we propose some guidelines. Multitree distributed database, high throughput index structure, memory oriented database organization are used. Location management guidelines for moving user in overlapping network, neighbor discovery protocol (NDP), and global roaming rule are adopted. Analytic model and examples are presented to evaluate the efficiency of proposed guidelines.
△ Less
Submitted 10 April, 2013;
originally announced April 2013.