94,405 results on '"Sadeghi A"'
Search Results
2. Mutual Influence of Photon Sphere and Non-Commutative Parameter in Various Non-Commutative Black Holes: Part I- Towards evidence for WGC
- Author
-
Afshar, Mohammad Ali S. and Sadeghi, Jafar
- Subjects
General Relativity and Quantum Cosmology - Abstract
Non-commutative black holes(NCBH), due to the non-commutativity of spacetime coordinates, lead to a modification of the spacetime metric. By replacing the Dirac delta function with a Gaussian distribution, the mass is effectively smeared, eliminating point-like singularities. Our objective is to investigate the impact of this change on spacetime geodesics, including photon spheres and time-like orbits. We will demonstrate how the photon sphere can serve as a tool to classify spacetime, illustrating the influence of the NC parameter and constraining its values in various modes of these black holes. Additionally, using this classification, we will show how the addition of the nonlinear Einstein-Born-Infeld(BI) field to the model enhances its physical alignment with reality compared to the charged model. In the dS BI model, we will show how the study of the effective potential and photon sphere can provide insights into the initial structural status of the model, thereby establishing this potential as an effective tool for examining the initial conditions of black holes. Finally, by examining super-extremality conditions, we will show that the AdS BI model, with the necessary conditions, can be a suitable candidate for studying and observing the effects of the Weak Gravity Conjecture (WGC)., Comment: 24 pages, 15 figures
- Published
- 2024
3. Topology Bench: Systematic Graph Based Benchmarking for Core Optical Networks
- Author
-
Matzner, Robin, Ahuja, Akanksha, Sadeghi, Rasoul, Doherty, Michael, Beghelli, Alejandra, Savory, Seb J., and Bayvel, Polina
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Topology Bench is a comprehensive topology dataset designed to accelerate benchmarking studies in optical networks. The dataset, focusing on core optical networks, comprises publicly accessible and ready-to-use topologies, including (a) 105 georeferenced real-world optical networks and (b) 270,900 validated synthetic topologies. Prior research on real-world core optical networks has been characterised by fragmented open data sources and disparate individual studies. Moreover, previous efforts have notably failed to provide synthetic data at a scale comparable to our present study. Topology Bench addresses this limitation, offering a unified resource and represents a 61.5% increase in spatially-referenced real world optical networks. To benchmark and identify the fundamental nature of optical network topologies through the lens of graph-theoretical analysis, we analyse both real and synthetic networks using structural, spatial and spectral metrics. Our comparative analysis identifies constraints in real optical network diversity and illustrates how synthetic networks can complement and expand the range of topologies available for use. Currently, topologies are selected based on subjective criteria, such as preference, data availability, or perceived suitability, leading to potential biases and limited representativeness. Our framework enhances the generalisability of optical network research by providing a more objective and systematic approach to topology selection. A statistical and correlation analysis reveals the quantitative range of all of these graph metrics and the relationships between them. Finally, we apply unsupervised machine learning to cluster real-world topologies into distinctive groups using nine optimal graph metrics using K-means. We conclude the analysis by providing guidance on how to use such clusters to select a diverse set of topologies for future studies.
- Published
- 2024
4. Joint Beamforming and Speaker-Attributed ASR for Real Distant-Microphone Meeting Transcription
- Author
-
Cui, Can, Sheikh, Imran Ahamad, Sadeghi, Mostafa, and Vincent, Emmanuel
- Subjects
Computer Science - Computation and Language - Abstract
Distant-microphone meeting transcription is a challenging task. State-of-the-art end-to-end speaker-attributed automatic speech recognition (SA-ASR) architectures lack a multichannel noise and reverberation reduction front-end, which limits their performance. In this paper, we introduce a joint beamforming and SA-ASR approach for real meeting transcription. We first describe a data alignment and augmentation method to pretrain a neural beamformer on real meeting data. We then compare fixed, hybrid, and fully neural beamformers as front-ends to the SA-ASR model. Finally, we jointly optimize the fully neural beamformer and the SA-ASR model. Experiments on the real AMI corpus show that,while state-of-the-art multi-frame cross-channel attention based channel fusion fails to improve ASR performance, fine-tuning SA-ASR on the fixed beamformer's output and jointly fine-tuning SA-ASR with the neural beamformer reduce the word error rate by 8% and 9% relative, respectively.
- Published
- 2024
5. Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
- Author
-
Rostami, Mohamadreza, Chen, Chen, Kande, Rahul, Li, Huimin, Rajendran, Jeyavijayan, and Sadeghi, Ahmad-Reza
- Subjects
Computer Science - Cryptography and Security - Abstract
Hardware-level memory vulnerabilities severely threaten computing systems. However, hardware patching is inefficient or difficult postfabrication. We investigate the effectiveness of hardware fuzzing in detecting hardware memory vulnerabilities and highlight challenges and potential future research directions to enhance hardware fuzzing for memory safety.
- Published
- 2024
- Full Text
- View/download PDF
6. Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection
- Author
-
Rostami, Mohamadreza, Zeitouni, Shaza, Kande, Rahul, Chen, Chen, Mahmoody, Pouya, Jeyavijayan, Rajendran, and Sadeghi, Ahmad-Reza
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Hardware Architecture - Abstract
Microarchitectural attacks represent a challenging and persistent threat to modern processors, exploiting inherent design vulnerabilities in processors to leak sensitive information or compromise systems. Of particular concern is the susceptibility of Speculative Execution, a fundamental part of performance enhancement, to such attacks. We introduce Specure, a novel pre-silicon verification method composing hardware fuzzing with Information Flow Tracking (IFT) to address speculative execution leakages. Integrating IFT enables two significant and non-trivial enhancements over the existing fuzzing approaches: i) automatic detection of microarchitectural information leakages vulnerabilities without golden model and ii) a novel Leakage Path coverage metric for efficient vulnerability detection. Specure identifies previously overlooked speculative execution vulnerabilities on the RISC-V BOOM processor and explores the vulnerability search space 6.45x faster than existing fuzzing techniques. Moreover, Specure detected known vulnerabilities 20x faster.
- Published
- 2024
- Full Text
- View/download PDF
7. Privacy-Preserving for Images in Satellite Communications: A Comprehensive Review of Chaos-Based Encryption
- Author
-
Rashid, Farrukh Bin, Rankothge, Windhya, Sadeghi, Somayeh, Mohammadian, Hesamodin, and Ghorbani, Ali
- Subjects
Computer Science - Cryptography and Security - Abstract
In an era where global connectivity has become critical, satellite communication is essential for businesses, governments, and individuals. Widely used services with satellite communication such as climate change monitoring, military surveillance and real-time event broadcasting, involve data in the form of images rather text. Therefore, securing image transmission in satellite communication using efficient and effective encryption approaches, has gained a significant attention from academia as well as the industry. In this paper, we specifically focus on chaos based image encryption as one of the key privacy-preserving techniques for satellite communication. While there are several privacy enhancing techniques for protecting image data but chaos based encryption has distinct advantages such as high flexibility, high security, less computational overheads, less computing power and ease of implementation. First, we present a solid background about satellite communication and image encryption in satellite communication, covering theoretical aspects of chaotic systems and their practical usage for image encryption. Next we present a comprehensive literature review on all state-of-the-art studies specifically for chaos based satellite image encryption, with a detailed analysis of the evaluation process, including evaluation parameters and conditions. Finally, we discuss about existing challenges and open research problems for chaos based satellite image encryption.
- Published
- 2024
8. E2E-Swin-Unet++: An Enhanced End-to-End Swin-Unet Architecture With Dual Decoders For PTMC Segmentation
- Author
-
Dialameh, Maryam, Rajabzadeh, Hossein, Sadeghi-Goughari, Moslem, Sim, Jung Suk, and Kwon, Hyock Ju
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Efficiently managing papillary thyroid microcarcinoma (PTMC) while minimizing patient discomfort poses a significant clinical challenge. Radiofrequency ablation (RFA) offers a less invasive alternative to surgery and radiation therapy for PTMC treatment, characterized by shorter recovery times and reduced pain. As an image-guided procedure, RFA generates localized heat by delivering high-frequency electrical currents through electrodes to the targeted area under ultrasound imaging guidance. However, the precision and skill required by operators for accurate guidance using current ultrasound B-mode imaging technologies remain significant challenges. To address these challenges, we develop a novel AI segmentation model, E2E-Swin-Unet++. This model enhances ultrasound B-mode imaging by enabling real-time identification and segmentation of PTMC tumors and monitoring of the region of interest for precise targeting during treatment. E2E-Swin- Unet++ is an advanced end-to-end extension of the Swin-Unet architecture, incorporating thyroid region information to minimize the risk of false PTMC segmentation while providing fast inference capabilities. Experimental results on a real clinical RFA dataset demonstrate the superior performance of E2E-Swin-Unet++ compared to related models. Our proposed solution significantly improves the precision and control of RFA ablation treatment by enabling real-time identification and segmentation of PTMC margins during the procedure.
- Published
- 2024
9. Weak Gravity Conjecture Validation with Photon Spheres of Quantum Corrected AdS-Reissner-Nordstrom Black Holes in Kiselev Spacetime
- Author
-
Alipour, Mohammad Reza, Afshar, Mohammad Ali S., Gashti, Saeed Noori, and Sadeghi, Jafar
- Subjects
General Relativity and Quantum Cosmology ,High Energy Physics - Theory - Abstract
In this study, we investigate the Weak Gravity Conjecture (WGC) in the context of quantum-corrected AdS-Reissner-Nordstrom (AdS-RN) black holes within Kiselev spacetime. Our focus is on photon spheres, which serve as markers for stable and unstable photon spheres. We confirm the validity of the WGC by demonstrating that quantum corrections do not alter the essential charge-to-mass ratio, thereby supporting the conjecture's universality. Our analysis reveals that black holes with a charge greater than their mass ($Q > M$) possess photon spheres or exhibit a total topological charge of the photon sphere (PS = -1), which upholds the WGC. This finding is significant as it reinforces the conjecture's applicability even in the presence of quantum corrections. Furthermore, we examine various parameter configurations to understand their impact on the WGC. Specifically, we find that configurations with $\omega = -\frac{1}{3}$ and $\omega = -1$ maintain the conjecture, indicating that these values do not disrupt the charge-to-mass ratio required by the WGC. However, for $\omega = -\frac{4}{3}$, the conjecture does not hold, suggesting that this particular parameter value leads to deviations from the expected behavior. These results open new directions for research in quantum gravity, as they highlight the importance of specific parameter values in maintaining the WGC. The findings suggest that while the WGC is robust under certain conditions, there are scenarios where it may be challenged, prompting further investigation into the underlying principles of quantum gravity, Comment: 13 pages, 6 figures, 1 Table
- Published
- 2024
10. Technical Report of 1:10 Scale Autonomous Vehicle Robot
- Author
-
Holighi, Amirhossein Kheiri, Hajibekandeh, Seyed Sobhan Hosseini, Behbahani, Amirhossein Gholizadeh, Khatibi, Kian, Shabestari, Saina Najafi, Ghoreishi, Ghazal, Dadnavi, Aria, Sadeghi, Saba, Makhsous, Shahriar Karimi, Jamshidi, Matin, Abadi, Mandana Shabanzadeh Nasrolah, and Moaiyeri, Mohammad Hossein
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
This paper presents Auriga Robotics' autonomous vehicle, developed at Shahid Beheshti University's Robotics and Intelligent Automation Lab, as part of the team's entry for the 2024 RoboCup IranOpen competition. The vehicle is a 1:10 scale car equipped with a custom-designed chassis, a stepper motor for precision, and a range of sensors for autonomous navigation. Key hardware includes ESP32 microcontrollers that manage motor control and sensor data acquisition. The software system integrates computer vision, including YOLOv8 for sign detection and PiNet for lane detection, combined with control algorithms such as the Stanley, PID, and Pure Pursuit controllers. The vehicle's design emphasizes real-time decision-making, environmental mapping, and efficient localization, ensuring its ability to navigate complex driving scenarios.
- Published
- 2024
11. Strong Purity and Phantom Morphisms
- Author
-
Hafezi, R., Asadollahi, J., Sadeghi, S., and Zhang, Y.
- Subjects
Mathematics - Commutative Algebra ,13B30, 13C60, 13D07, 13D09, 13C11 - Abstract
Let $R$ be a commutative ring and $S \subseteq R$ be a multiplicative subset. We introduce and study the concept of $S$-purity based on the notion of $S$-strongly flat modules. The class of $S$-pure injective modules will be studied. We demonstrate that this class is enveloping and explore its closedness under extension. The concept of purity is closely connected to the existence of phantom maps. So we will delve into the study of the $S$-phantom morphisms. We will establish that the $S$-phantom ideal is a precovering ideal and examine the situations where it becomes a covering ideal. Finally, in the last section, we will investigate an ideal version of the `Optimistic Conjecture', raised by Positselski and Sl\'{a}vik.
- Published
- 2024
12. Diffusion-based Unsupervised Audio-visual Speech Enhancement
- Author
-
Ayilo, Jean-Eudes, Sadeghi, Mostafa, Serizel, Romain, and Alameda-Pineda, Xavier
- Subjects
Computer Science - Sound ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Audio and Speech Processing ,Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper proposes a new unsupervised audiovisual speech enhancement (AVSE) approach that combines a diffusion-based audio-visual speech generative model with a non-negative matrix factorization (NMF) noise model. First, the diffusion model is pre-trained on clean speech conditioned on corresponding video data to simulate the speech generative distribution. This pre-trained model is then paired with the NMF-based noise model to iteratively estimate clean speech. Specifically, a diffusion-based posterior sampling approach is implemented within the reverse diffusion process, where after each iteration, a speech estimate is obtained and used to update the noise parameters. Experimental results confirm that the proposed AVSE approach not only outperforms its audio-only counterpart but also generalizes better than a recent supervisedgenerative AVSE method. Additionally, the new inference algorithm offers a better balance between inference speed and performance compared to the previous diffusion-based method.
- Published
- 2024
13. Thermodynamic Topology of Kiselev-AdS Black Holes within f (R, T) gravity
- Author
-
Gashti, Saeed Noori, Afshar, Mohammad Ali S., Alipour, Mohammad Reza, Sekhmani, Yassine, Sadeghi, Jafar, and Rayimbaeva, Javlon
- Subjects
General Relativity and Quantum Cosmology ,High Energy Physics - Theory - Abstract
In this paper, we investigate the topological charge and the conditions for the existence of the photon sphere (PS) in Kiselev-AdS black holes within \(f(R, T)\) gravity. We employ two different methods based on Duan's topological current \(\phi\)-mapping theory viz analize of temperature and the generalized Helmholtz free energy methods to study the topological classes of our black hole. By considering the mentioned black hole, we discuss the critical and zero points (topological charges and topological numbers) for different parameters. Our findings reveal that the Kiselev parameter \(\omega\) and the \(f(R, T)\) gravity parameter \(\gamma\) influence the number of topological charges of black holes, leading to novel insights into topological classifications. We observe that for given values of the free parameters, there exist total topological charges (\(Q_{total} = -1\)) for T-method and total topological numbers (\(W = +1\)) for the generalized Helmholtz free energy method. Our research findings elucidate that, in contrast to the scenario where \(\omega = 1/3\), in other cases, increasing the parameter \(\gamma\) increases the number of total topological charges for the black hole. Interestingly, for the phantom field (\(\omega = -4/3\)), we observed that decreasing the parameter \(\gamma\) increases the number of topological charges. Additionally, we study the results for the photon sphere. The studied models clearly reveal that the simultaneous presence of \(\gamma\) and \(\omega\) effectively expands the permissible range for \(\gamma\). In other words, the model can exhibit black hole behavior over a larger domain. Additionally, it is evident that with the stepwise reduction of \(\omega\), the region covered by singularity also diminishes and becomes more restricted. However, An interesting point about all three ranges is the elimination of the forbidden region in this model., Comment: 25 pages, 19 figures, 4 table
- Published
- 2024
14. Quadratic magneto-optical Kerr effect spectroscopy: Polarization variation method for investigation of magnetic and magneto-optical anisotropies
- Author
-
Wohlrath, V., Sadeghi, Z., Kimák, J., Hovořáková, K., Kubaščík, P., Schmoranzerová, E., Nádvorník, L., Trojánek, F., Němec, P., and Ostatnický, T.
- Subjects
Physics - Optics - Abstract
We present a method for a precise determination of magnetic anisotropy and anisotropy of quadratic magneto-optical response of thin films of ferromagnetic and ferrimagnetic materials. The method is based on measurements of a magneto-optical response for light close to the normal incidence on the sample with a fixed position. The measurement is performed for a set of orientations of an external magnetic field and a series of incident light linear polarizations beyond the standard s and p orientations. Based on the symmetry of the signal, we are able to separate the part of magneto-optical response that is even with respect to magnetization and, in turn, to exclude all non-magnetic contributions which come from imperfections of the experimental setup or from the sample itself. It is, therefore, possible to study the sample placed inside a cryostat: the polarization changes due to cryostat windows and possible strain-induced optical anisotropy of the sample are removed by the applied data processing. Thanks to this, we can perform measurements on low or elevated temperatures (from 15 to 800 K in our case), making it possible to study the behavior of magnetic materials in different magnetic phases and/or close to phase transitions. The applicability of this experimental technique was tested by measuring the low-temperature response of two samples of ferromagnetic semiconductor (Ga,Mn)As with a different Mn content at several wavelengths, which enabled us to deduce the magnetic and quadratic magneto-optical anisotropies in this material. In particular, we observed that the anisotropy of quadratic magneto-optical coefficients in (Ga,Mn)As is much weaker than that reported previously for other magnetic material systems., Comment: 41 pages, 16 figures
- Published
- 2024
15. Efficient Noise Mitigation for Enhancing Inference Accuracy in DNNs on Mixed-Signal Accelerators
- Author
-
Azizi, Seyedarmin, Sadeghi, Mohammad Erfan, Kamal, Mehdi, and Pedram, Massoud
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition - Abstract
In this paper, we propose a framework to enhance the robustness of the neural models by mitigating the effects of process-induced and aging-related variations of analog computing components on the accuracy of the analog neural networks. We model these variations as the noise affecting the precision of the activations and introduce a denoising block inserted between selected layers of a pre-trained model. We demonstrate that training the denoising block significantly increases the model's robustness against various noise levels. To minimize the overhead associated with adding these blocks, we present an exploration algorithm to identify optimal insertion points for the denoising blocks. Additionally, we propose a specialized architecture to efficiently execute the denoising blocks, which can be integrated into mixed-signal accelerators. We evaluate the effectiveness of our approach using Deep Neural Network (DNN) models trained on the ImageNet and CIFAR-10 datasets. The results show that on average, by accepting 2.03% parameter count overhead, the accuracy drop due to the variations reduces from 31.7% to 1.15%.
- Published
- 2024
16. Hydrodynamics of Arcsin AdS Black Brane
- Author
-
Sadeghi, Mehdi
- Subjects
High Energy Physics - Theory - Abstract
In this paper, we explore a modified black brane within AdS spacetime, characterized by the Lagrangian density $\frac{1}{q} \text{arcsin}(qR)-2\Lambda$. Due to the absence of an analytic solution, we approach the Einstein equations using a perturbative method, extending our analysis to the second order in $q$. Subsequently, we compute the ratio of shear viscosity to entropy density. Our results suggest that the KSS Bound is not saturated in this model., Comment: 10 Pages, no figure, accepted for publication in Int. J. Mod. Phys. A (IJMPA)
- Published
- 2024
- Full Text
- View/download PDF
17. Learning Unstable Continuous-Time Stochastic Linear Control Systems
- Author
-
Hafshejani, Reza Sadeghi and Fradonbeh, Mohamad Kazem Shirani
- Subjects
Statistics - Machine Learning ,Computer Science - Machine Learning - Abstract
We study the problem of system identification for stochastic continuous-time dynamics, based on a single finite-length state trajectory. We present a method for estimating the possibly unstable open-loop matrix by employing properly randomized control inputs. Then, we establish theoretical performance guarantees showing that the estimation error decays with trajectory length, a measure of excitability, and the signal-to-noise ratio, while it grows with dimension. Numerical illustrations that showcase the rates of learning the dynamics, will be provided as well. To perform the theoretical analysis, we develop new technical tools that are of independent interest. That includes non-asymptotic stochastic bounds for highly non-stationary martingales and generalized laws of iterated logarithms, among others.
- Published
- 2024
18. Technical Report of Mobile Manipulator Robot for Industrial Environments
- Author
-
Khalili, Erfan Amoozad, Ghasemzadeh, Kiarash, Gohari, Hossein, Jafari, Mohammadreza, Jamshidi, Matin, Khaksar, Mahdi, AkramiFard, AmirReza, Hatamzadeh, Mana, Sadeghi, Saba, and Moaiyeri, Mohammad Hossein
- Subjects
Computer Science - Robotics - Abstract
This paper describes Auriga's @Work team and their robot, developed at Shahid Beheshti University Faculty of Electrical Engineering's Robotics and Intelligent Automation Lab for RoboCup 2024 competitions. The robot is designed for industrial tasks, optimizing efficiency in repetitive or hazardous environments. It features a 4-wheel Mecanum system for omnidirectional movement and a 5-degree-of-freedom manipulator arm with a 3D-printed gripper for object handling and navigation. The electronics include custom boards with ESP32 microcontrollers and an Nvidia Jetson Nano for real-time control. Key software components include Hector SLAM for mapping, A* path planning, and YOLO for object detection, supported by integrated sensors for enhanced navigation and collision avoidance.
- Published
- 2024
19. Thermodynamic topology of Black Holes in $F(R)$-Euler-Heisenberg gravity's Rainbow
- Author
-
Sekhmani, Yassine, Gashti, Saeed Noori, Afshar, Mohammad Ali S., Alipour, Mohammad Reza, Sadeghi, Jafar, and Rayimbaev, Javlon
- Subjects
General Relativity and Quantum Cosmology ,High Energy Physics - Theory - Abstract
The topology of black hole thermodynamics is a fascinating area of study that explores the connections between thermodynamic properties and topological features of black holes. This paper has led to several significant findings: We successfully derive the field equations for $F(R)$-Euler-Heisenberg theory, providing a framework for studying the interplay between modified gravity and non-linear electromagnetic effects. We obtain an analytical solution for a static, spherically symmetric, energy-dependent black hole with constant scalar curvature. Also, our analysis of black holes in F(R)-Euler-Heisenberg gravity's Rainbow reveals significant insights into their topological properties. We identified the total topological charges by examining the normalized field lines along various free parameters. Our findings indicate that the parameters $( R_0 )$ and $( f_{\epsilon} = g_{\epsilon} )$ influence the topological charges. These results are comprehensively summarized in Table I. Additionally, a general overview of Tables II, III, and IV related to the photon sphere of the mentioned black hole reveals that with an increase in $f_{\varepsilon}$, the permissible range of negative $\lambda$ in the first case gradually transitions into a non-permissible region in the third case. On the other hand, it is known that the QED parameter, which measures the strength of nonlinear effects, can be either positive or negative. A positive QED parameter reduces the electric field near the horizon and increases the black hole's mass, whereas a negative QED parameter increases the electric field and decreases the mass. According to the two statements above, it can be concluded that the increase in $f_{\varepsilon}$ actually decreases the strength of the electric field near the horizon and strengthens the effects of gravity., Comment: 21 pages, 11 figures, 4 Tables
- Published
- 2024
20. A Generalization of Axiomatic Approach to Information Leakage
- Author
-
Zarrabian, Mohammad Amin and Sadeghi, Parastoo
- Subjects
Computer Science - Information Theory - Abstract
In this paper, we extend the framework of quantitative information flow (QIF) to include adversaries that use Kolmogorov-Nagumo $f$-mean to infer secrets of a private system. Specifically, in our setting, an adversary uses Kolmogorov-Nagumo $f$-mean to compute its best actions before and after observing the system's randomized outputs. This leads to generalized notions of prior and posterior vulnerability and generalized axiomatic relations that we will derive to elucidate how these $f$-mean based vulnerabilities interact with each other. We demonstrate usefulness of this framework by showing how some notions of leakage that had been derived outside of the QIF framework and so far seemed incompatible with it are indeed explainable via such extension of QIF. These leakage measures include $\alpha$-leakage, which is the same as Arimoto mutual information of order $\alpha$, maximal $\alpha$-leakage which is the $\alpha$-leakage capacity, and $(\alpha,\beta)$ leakage, which is a generalization of the above and captures local differential privacy as a special case. We also propose a new pointwise notion of gain function, which we coin pointwise information gain. We show that this pointwise information gain can explain R\'eyni divergence and Sibson mutual information of order $\alpha \in [0,\infty]$ as the Kolmogorov-Nagumo average of the gain with a proper choice of function $f$.
- Published
- 2024
21. Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning (Full Version)
- Author
-
Knauer, Jonathan, Rieger, Phillip, Fereidooni, Hossein, and Sadeghi, Ahmad-Reza
- Subjects
Computer Science - Cryptography and Security - Abstract
Deep Neural Networks (DNNs) can handle increasingly complex tasks, albeit they require rapidly expanding training datasets. Collecting data from platforms with user-generated content, such as social networks, has significantly eased the acquisition of large datasets for training DNNs. Despite these advancements, the manual labeling process remains a substantial challenge in terms of both time and cost. In response, Semi-Supervised Learning (SSL) approaches have emerged, where only a small fraction of the dataset needs to be labeled, leaving the majority unlabeled. However, leveraging data from untrusted sources like social networks also creates new security risks, as potential attackers can easily inject manipulated samples. Previous research on the security of SSL primarily focused on injecting backdoors into trained models, while less attention was given to the more challenging untargeted poisoning attacks. In this paper, we introduce Phantom, the first untargeted poisoning attack in SSL that disrupts the training process by injecting a small number of manipulated images into the unlabeled dataset. Unlike existing attacks, our approach only requires adding few manipulated samples, such as posting images on social networks, without the need to control the victim. Phantom causes SSL algorithms to overlook the actual images' pixels and to rely only on maliciously crafted patterns that \ourname superimposed on the real images. We show Phantom's effectiveness for 6 different datasets and 3 real-world social-media platforms (Facebook, Instagram, Pinterest). Already small fractions of manipulated samples (e.g., 5\%) reduce the accuracy of the resulting model by 10\%, with higher percentages leading to a performance comparable to a naive classifier. Our findings demonstrate the threat of poisoning user-generated content platforms, rendering them unsuitable for SSL in specific tasks., Comment: To Appear at ACM CCS 2024
- Published
- 2024
- Full Text
- View/download PDF
22. Streptomyces strains modulate dynamics of soil bacterial communities and their efficacy in disease suppression caused by Phytophthora capsici
- Author
-
Abbasi Sakineh, Spor Ayme, Sadeghi Akram, and Safaie Naser
- Subjects
Medicine ,Science - Abstract
Abstract The responses of rhizosphere bacterial communities of Streptomyces (SS14 and IT20 stains) treated-pepper plants following inoculation by Phytophthora capsici (PC) was investigated using Illumina MiSeq sequencing. Distinct modulation of the bacteriome composition was found for PC samples with the highest relative abundance (RA) of Chitinophaga (22 ± 0.03%). The RA of several bacterial operational taxonomic units (OTUs) was affected and caused changes in alpha and beta-diversity measures. In IT20, the RA of Cyanobacteria was enriched compared to SS14 (72%) and control samples (47%). Phylotypes belonging to Devosia, Promicromonospora, Kribbella, Microbacterium, Amylocolatopsis, and Pseudomonas genera in the rhizosphere were positively responding against the pathogen. Our findings show that the phosphate solubilizing strain IT20 has higher microbial community responders than the melanin-producing strain SS14. Also, positive interactions were identified by comparing bacterial community profiles between treatments that might allow designing synthetic bio-inoculants to solve agronomic problems in an eco-friendly way.
- Published
- 2021
- Full Text
- View/download PDF
23. Multi-Objective Design of DNA-Stabilized Nanoclusters Using Variational Autoencoders With Automatic Feature Extraction.
- Author
-
Sadeghi, Elham, Mastracco, Peter, Gonzàlez-Rosell, Anna, Copp, Stacy M, and Bogdanov, Petko
- Subjects
DNA ,fluorescence ,interpretable machine learning ,near-infrared ,silver nanocluster ,variational autoencoder ,Nanoscience & Nanotechnology - Abstract
DNA-stabilized silver nanoclusters (AgN-DNAs) have sequence-tuned compositions and fluorescence colors. High-throughput experiments together with supervised machine learning models have recently enabled design of DNA templates that select for AgN-DNA properties, including near-infrared (NIR) emission that holds promise for deep tissue bioimaging. However, these existing models do not enable simultaneous selection of multiple AgN-DNA properties, and require significant expert input for feature engineering and class definitions. This work presents a model for multiobjective, continuous-property design of AgN-DNAs with automatic feature extraction, based on variational autoencoders (VAEs). This model is generative, i.e., it learns both the forward mapping from DNA sequence to AgN-DNA properties and the inverse mapping from properties to sequence, and is trained on an experimental data set of DNA sequences paired with AgN-DNA fluorescence properties. Experimental testing shows that the model enables effective design of AgN-DNA emission, including bright NIR AgN-DNAs with 4-fold greater abundance compared to training data. In addition, Shapley analysis is employed to discern learned nucleobase patterns that correspond to fluorescence color and brightness. This generative model can be adapted for a range of biomolecular systems with sequence-dependent properties, enabling precise design of emerging biomolecular nanomaterials.
- Published
- 2024
24. Thermodynamic Topology of Quantum Corrected AdS-Reissner-Nordstrom Black Holes in Kiselev Spacetime
- Author
-
Sadeghi, Jafar, Gashti, Saeed Noori, Alipour, Mohammad Reza, and Afshar, Mohammad Ali S.
- Subjects
General Relativity and Quantum Cosmology ,High Energy Physics - Theory - Abstract
In this paper, we delve into the intricate thermodynamic topology of quantum-corrected Anti-de Sitter-Reissner-Nordstrm (AdS-RN) black hole within the framework of Kiselev spacetime. By employing the generalized off-shell Helmholtz free energy approach, we meticulously compute the thermodynamic topology of these selected black holes. Furthermore, we establish their topological classifications. Our findings reveal that quantum correction terms influence the topological charges of black holes in Kiselev spacetime, leading to novel insights into topological classifications. Our research findings elucidate that, in contrast to the scenario in which $\omega=0$ and $a=0.7$ with total topological charge $W=0$ and $\omega=-4/3$ with total topological charge $W=-1$, in other cases, the total topological charge for the black hole under consideration predominantly stabilizes at +1. This stabilization occurs with the significant influence of the parameters a, c, and $\omega$ on the number of topological charges. Specifically, when $\omega$ assumes the values of $\omega=-1/3$, $\omega=-2/3$ , $\omega=-1$, the total topological charge consistently be to W = +1., Comment: 17 pages, 5 figures. Accepted for publication in Chinese Physics C
- Published
- 2024
- Full Text
- View/download PDF
25. An Algorithm for Enhancing Privacy-Utility Tradeoff in the Privacy Funnel and Other Lift-based Measures
- Author
-
Zarrabian, Mohammad Amin and Sadeghi, Parastoo
- Subjects
Computer Science - Information Theory - Abstract
This paper investigates the privacy funnel, a privacy-utility tradeoff problem in which mutual information quantifies both privacy and utility. The objective is to maximize utility while adhering to a specified privacy budget. However, the privacy funnel represents a non-convex optimization problem, making it challenging to achieve an optimal solution. An existing proposed approach to this problem involves substituting the mutual information with the lift (the exponent of information density) and then solving the optimization. Since mutual information is the expectation of the information density, this substitution overestimates the privacy loss and results in a final smaller bound on the privacy of mutual information than what is allowed in the budget. This significantly compromises the utility. To overcome this limitation, we propose using a privacy measure that is more relaxed than the lift but stricter than mutual information while still allowing the optimization to be efficiently solved. Instead of directly using information density, our proposed measure is the average of information density over the sensitive data distribution for each observed data realization. We then introduce a heuristic algorithm capable of achieving solutions that produce extreme privacy values, which enhances utility. The numerical results confirm improved utility at the same privacy budget compared to existing solutions in the literature. Additionally, we explore two other privacy measures, $\ell_{1}$-norm and strong $\chi^2$-divergence, demonstrating the applicability of our algorithm to these lift-based measures. We evaluate the performance of our method by comparing its output with previous works. Finally, we validate our heuristic approach with a theoretical framework that estimates the optimal utility for strong $\chi^2$-divergence, numerically showing a perfect match.
- Published
- 2024
26. A General Framework for Constraint-based Causal Learning
- Author
-
Teh, Kai Z., Sadeghi, Kayvan, and Soo, Terry
- Subjects
Computer Science - Artificial Intelligence ,Mathematics - Statistics Theory ,Statistics - Methodology - Abstract
By representing any constraint-based causal learning algorithm via a placeholder property, we decompose the correctness condition into a part relating the distribution and the true causal graph, and a part that depends solely on the distribution. This provides a general framework to obtain correctness conditions for causal learning, and has the following implications. We provide exact correctness conditions for the PC algorithm, which are then related to correctness conditions of some other existing causal discovery algorithms. We show that the sparsest Markov representation condition is the weakest correctness condition resulting from existing notions of minimality for maximal ancestral graphs and directed acyclic graphs. We also reason that additional knowledge than just Pearl-minimality is necessary for causal learning beyond faithfulness.
- Published
- 2024
27. Characterizing Solar Spicules and their Role in Solar Wind Production using Machine Learning and the Hough Transform
- Author
-
Sadeghi, R. and Tavabi, E.
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Physics - Space Physics - Abstract
Solar winds originate from the Sun and can be classified as fast or slow. Fast solar winds come from coronal holes at the solar poles, while slow solar winds may originate from the equatorial region or streamers. Spicules are jet-like structures observed in the Sun's chromosphere and transition region. Some spicules exhibit rotating motion, potentially indicating vorticity and Alfven waves. Machine learning and the Hough algorithm were used to analyze over 3000 frames of the Sun, identifying spicules and their characteristics. The study found that rotating spicules, accounting for 21 percent at the poles and 4 percent at the equator, play a role in energy transfer to the upper solar atmosphere. The observations suggest connections between spicules, mini-loops, magnetic reconnection, and the acceleration of fast solar winds. Understanding these small-scale structures is crucial for comprehending the origin and heating of the fast solar wind., Comment: 8 pages, 6 figs. accepted in IAU365
- Published
- 2024
28. Topological structure of projective Hilbert spaces associated with phase retrieval vectors
- Author
-
Neyshaburi, Fahimeh Arabyani, Arefijamaal, Ali Akbar, and Sadeghi, Ghadir
- Subjects
Mathematics - General Topology ,42C15, 46C05, 54A10 - Abstract
In this paper, we explore the interplay between topological structures and phase retrieval in the context of projective Hilbert spaces. This work provides not only a deeper understanding and a new classification of the phase retrieval property in Hilbert spaces but also a way for further investigations into the topological underpinnings of quantum states.
- Published
- 2024
29. Exploring the Phase Transition in Charged Gauss-Bonnet Black Holes: A Holographic Thermodynamics Perspectives
- Author
-
Sadeghi, Jafar, Alipour, Mohammad Reza, Afshar, Mohammad Ali S., and Gashti, Saeed Noori
- Subjects
General Relativity and Quantum Cosmology - Abstract
In this paper, we delve into the study of thermodynamics and phase transition of charged Gauss-Bonnet black holes within the context of anti-de Sitter (AdS) space, with particular emphasis on the central charge's role within the dual conformal field theory (CFT). We employ a holographic methodology that interprets the cosmological constant and the Newton constant as thermodynamic variables, leading to the derivation of a modified first law of thermodynamics that incorporates the thermodynamic volume and pressure. Our findings reveal that the central charge of the CFT is intrinsically linked to the variation of these constants, and its stability can be ensured by simultaneous adjustment of these constants. We further explore the phase structures of the black holes, utilizing the free energy. Our research uncovers the existence of a critical value of the central charge, beyond which the phase diagram displays a first-order phase transition between small and large black holes. We also delve into the implications of our findings on the complexity of the CFT. Our conclusions underscore the significant role of the central charge in the holographic thermodynamics and phase transition of charged Gauss-Bonnet black holes. Furthermore, we conclude that while the central charge considered provides suitable and satisfactory solutions for this black hole in 4 and 5 dimensions, it becomes necessary to introduce a unique central charge for this structure of modified gravity. In essence, the central charge in holographic thermodynamics is not a universal value and requires modification in accordance with different modified gravities. Consequently, the physics of the problem will significantly deviate from the one discussed in this article, indicating a rich and complex landscape for future work., Comment: 26 pages, 4 figures, accepted for publication in General Relativity and Gravitation
- Published
- 2024
- Full Text
- View/download PDF
30. Exploring Damping Properties of IRIS Bright Points using Deep Learning Techniques
- Author
-
Tavabi, E. and Sadeghi, R.
- Subjects
Astrophysics - Solar and Stellar Astrophysics - Abstract
This study analyzed the Doppler shift in the solar spectrum using the Interface Region Imaging Spectrograph (IRIS). Two types of oscillations were investigated: long period damp and short period damp. The researchers observed periodic perturbations in the Doppler velocity oscillations of bright points (BPs) in the chromosphere and transition region (TR). Deep learning techniques were used to examine the statistical properties of damping in different solar regions. The results showed variations in damping rates, with higher damping in coronal hole areas. The study provided insights into the damping behavior of BPs and contributed to our understanding of energy dissipation processes in the solar chromosphere and TR., Comment: 8 pages, 6 figs., accepted in IAU365
- Published
- 2024
31. From Problem to Solution: Bio-inspired 3D Printing for Bonding Soft and Rigid Materials via Underextrusions
- Author
-
Goshtasbi, Arman, Grignaffini, Luca, and Sadeghi, Ali
- Subjects
Computer Science - Robotics - Abstract
Vertebrate animals benefit from a combination of rigidity for structural support and softness for adaptation. Similarly, integrating rigidity and softness can enhance the versatility of soft robotics. However, the challenges associated with creating durable bonding interfaces between soft and rigid materials have limited the development of hybrid robots. Existing solutions require specialized machinery, such as polyjet 3D printers, which are not commonly available. In response to these challenges, we have developed a 3D printing technique that can be used with almost all commercially available FDM printers. This technique leverages the common issue of underextrusion to create a strong bond between soft and rigid materials. Underextrusion generates a porous structure, similar to fibrous connective tissues, that provides a robust interface with the rigid part through layer fusion, while the porosity enables interlocking with the soft material. Our experiments demonstrated that this method outperforms conventional adhesives commonly used in soft robotics, achieving nearly 200\% of the bonding strength in both lap shear and peeling tests. Additionally, we investigated how different porosity levels affect bonding strength. We tested the technique under pressure scenarios critical to soft and hybrid robots and achieved three times more pressure than the current adhesion solution. Finally, we fabricated various hybrid robots using this technique to demonstrate the wide range of capabilities this approach and hybridity can bring to soft robotics. has context menu
- Published
- 2024
32. Investigation of thermal properties of Hulth\'{e}n potential from statistical and superstatistical perspectives with various distributions
- Author
-
manesh, Amir Hossein Khorram, Sadeghi, J., and Gashti, Saeed Noori
- Subjects
Condensed Matter - Statistical Mechanics - Abstract
The Hulth\'{e}n potential is a short-range potential that has been widely used in various fields of physics. In this paper, we investigate the distribution functions for the Hulth\'{e}n potential by using statistical and superstatistical methods. We first review the ordinary statistics and superstatistics methods. We then consider some distribution functions, such as uniform, 2-level, gamma, and log-normal and F distributions. Finally, we investigate the behavior of the Hulth\'{e}n potential for statistical and superstatistical methods and compare the results with each other. We use the Tsallis statistics of the superstatistical system. We conclude that the Tsallis behavior of different distribution functions for the Hulth\'{e}n potential exhibits better results than the statistical method. We examined the thermal properties of the Hulth\'{e}n potential for five different distributions: Uniform, 2-level, Gamma, Log-normal, and F. We plotted the Helmholtz free energy and the entropy as functions of temperature for various values of q. It shows that the two uniform and 2-level distributions have the same results due to the universal relationship and that the F distribution does not become ordinary statistics at q=1. It also reveals that the curves of the Helmholtz free energy and the entropy change their order and behavior as q increases and that some distributions disappear or coincide at certain values of q. One can discuss the physical implications of our results and their applications in nuclear and atomic physics in the future., Comment: 27 pages, 10 figures
- Published
- 2024
33. DNSSEC+: An Enhanced DNS Scheme Motivated by Benefits and Pitfalls of DNSSEC
- Author
-
Jahromi, Ali Sadeghi, Abdou, AbdelRahman, and van Oorschot, Paul C.
- Subjects
Computer Science - Cryptography and Security - Abstract
The absence of security measures between DNS recursive resolvers and authoritative nameservers has been exploited by both inline and off-path attacks. While many security proposals have been made in practice and previous literature, they typically suffer from deployability barriers and/or inadequate security properties. The absence of a broadly adopted security solution between resolvers and nameservers motivates a new scheme that mitigates these issues in previous proposals. We present DNSSEC+, which addresses security and deployability downsides of DNSSEC, while retaining its benefits. DNSSEC+ takes advantage of the existent DNSSEC trust model and authorizes the nameservers within a zone for short intervals to serve the zone data securely, facilitating real-time security properties for DNS responses, without requiring long-term private keys to be duplicated (thus put at risk) on authoritative nameservers. Regarding name resolution latency, DNSSEC+ offers a performance comparable to less secure schemes. We define nine security, privacy, and deployability properties for name resolution, and show how DNSSEC+ fulfills these properties., Comment: 15 pages, 6 figures
- Published
- 2024
34. Atomic Structure of Self-Buffered BaZr(S,Se)$_3$ Epitaxial Thin Film Interfaces
- Author
-
Xu, Michael, Ye, Kevin, Sadeghi, Ida, Jaramillo, Rafael, and LeBeau, James M.
- Subjects
Condensed Matter - Materials Science - Abstract
Understanding and controlling the growth of chalcogenide perovskite thin films through interface design is important for tailoring film properties. Here, the film and interface structure of BaZr(S,Se)$_3$ thin films grown on LaAlO$_3$ by molecular beam epitaxy and post-growth anion exchange is resolved using aberration-corrected scanning transmission electron microscopy. Epitaxial films are achieved from self-assembly of an interface ``buffer'' layer, which accommodates the large film/substrate lattice mismatch of nearly 40\% for the alloy film studied here. The self-assembled buffer layer, occurring for both the as-grown sulfide and post-selenization alloy films, is shown to have rock-salt-like atomic stacking akin to a Ruddlesden-Popper phase. Above this buffer, the film quickly transitions to the perovskite structure. Overall, these results provide insights into oxide-chalcogenide heteroepitaxial film growth, illustrating a process that yields relaxed, crystalline, epitaxial chalcogenide perovskite films that support ongoing studies of optoelectronic and device properties.
- Published
- 2024
35. Phase Transition Dynamics of Black Holes Influenced by Kaniadakis and Barrow Statistics
- Author
-
Sadeghi, Jafar, Afshar, Mohammad Ali S., Alipour, Mohammad Reza, and Gashti, Saeed Noori
- Subjects
General Relativity and Quantum Cosmology ,High Energy Physics - Theory - Abstract
In this study, we investigate the dynamics and frame-by-frame phase transition of the first order in black hole thermodynamics. For our analysis, we will utilize the Kramers escape rate. Our focus is on charged anti-de Sitter (AdS) black holes influenced by Kaniadakis and Barrow statistics. The selection of these black holes aims to examine the effects of entropy variation on the dynamics of phase transition and to demonstrate that the Kramers escape rate, as an efficient tool, can effectively represent the dynamic transition from a small to a large black hole within the domain of first-order phase transitions. It is noteworthy that while the transition from small to large black holes should ostensibly dominate the entire process, our results indicate that the escape rate undergoes changes as it passes through the midpoint of the phase transition, leading to a reverse escape phenomenon. The findings suggest that the dynamic phase transition in charged AdS black holes affected by entropy change bears a significant resemblance to the outcomes of models influenced by Bekenstein-Hawking entropy\cite{23}. This similarity in results could serve as an additional motivation to further explore the potential capabilities of Kaniadakis and Barrow statistics in related cosmological fields. These capabilities could enhance our understanding of other cosmological properties, Comment: 20 pages, 9 figures
- Published
- 2024
36. Local Binary Pattern(LBP) Optimization for Feature Extraction
- Author
-
Sedaghatjoo, Zeinab, Hosseinzadeh, Hossein, and Bigham, Bahram Sadeghi
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Mathematics - Numerical Analysis - Abstract
The rapid growth of image data has led to the development of advanced image processing and computer vision techniques, which are crucial in various applications such as image classification, image segmentation, and pattern recognition. Texture is an important feature that has been widely used in many image processing tasks. Therefore, analyzing and understanding texture plays a pivotal role in image analysis and understanding.Local binary pattern (LBP) is a powerful operator that describes the local texture features of images. This paper provides a novel mathematical representation of the LBP by separating the operator into three matrices, two of which are always fixed and do not depend on the input data. These fixed matrices are analyzed in depth, and a new algorithm is proposed to optimize them for improved classification performance. The optimization process is based on the singular value decomposition (SVD) algorithm. As a result, the authors present optimal LBPs that effectively describe the texture of human face images. Several experiment results presented in this paper convincingly verify the efficiency and superiority of the optimized LBPs for face detection and facial expression recognition tasks.
- Published
- 2024
37. Exploring Facial Biomarkers for Depression through Temporal Analysis of Action Units
- Author
-
Parikh, Aditya, Sadeghi, Misha, and Eskofier, Bjorn
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Depression is characterized by persistent sadness and loss of interest, significantly impairing daily functioning and now a widespread mental disorder. Traditional diagnostic methods rely on subjective assessments, necessitating objective approaches for accurate diagnosis. Our study investigates the use of facial action units (AUs) and emotions as biomarkers for depression. We analyzed facial expressions from video data of participants classified with or without depression. Our methodology involved detailed feature extraction, mean intensity comparisons of key AUs, and the application of time series classification models. Furthermore, we employed Principal Component Analysis (PCA) and various clustering algorithms to explore the variability in emotional expression patterns. Results indicate significant differences in the intensities of AUs associated with sadness and happiness between the groups, highlighting the potential of facial analysis in depression assessment.
- Published
- 2024
38. CHOSEN: Compilation to Hardware Optimization Stack for Efficient Vision Transformer Inference
- Author
-
Sadeghi, Mohammad Erfan, Fayyazi, Arash, Somashekar, Suhas, and Pedram, Massoud
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Hardware Architecture - Abstract
Vision Transformers (ViTs) represent a groundbreaking shift in machine learning approaches to computer vision. Unlike traditional approaches, ViTs employ the self-attention mechanism, which has been widely used in natural language processing, to analyze image patches. Despite their advantages in modeling visual tasks, deploying ViTs on hardware platforms, notably Field-Programmable Gate Arrays (FPGAs), introduces considerable challenges. These challenges stem primarily from the non-linear calculations and high computational and memory demands of ViTs. This paper introduces CHOSEN, a software-hardware co-design framework to address these challenges and offer an automated framework for ViT deployment on the FPGAs in order to maximize performance. Our framework is built upon three fundamental contributions: multi-kernel design to maximize the bandwidth, mainly targeting benefits of multi DDR memory banks, approximate non-linear functions that exhibit minimal accuracy degradation, and efficient use of available logic blocks on the FPGA, and efficient compiler to maximize the performance and memory-efficiency of the computing kernels by presenting a novel algorithm for design space exploration to find optimal hardware configuration that achieves optimal throughput and latency. Compared to the state-of-the-art ViT accelerators, CHOSEN achieves a 1.5x and 1.42x improvement in the throughput on the DeiT-S and DeiT-B models.
- Published
- 2024
39. Generalization of the Fano and Non-Fano Index Coding Instances
- Author
-
Sharififar, Arman, Sadeghi, Parastoo, and Aboutorab, Neda
- Subjects
Computer Science - Information Theory - Abstract
Matroid theory is fundamentally connected with index coding and network coding problems. In fact, the reliance of linear index coding and network coding rates on the characteristic of a field has been demonstrated by using the two well-known matroid instances, namely the Fano and non-Fano matroids. This established the insufficiency of linear coding, one of the fundamental theorems in both index coding and network coding. While the Fano matroid is linearly representable only over fields with characteristic two, the non-Fano instance is linearly representable only over fields with odd characteristic. For fields with arbitrary characteristic $p$, the Fano and non-Fano matroids were extended to new classes of matroid instances whose linear representations are dependent on fields with characteristic $p$. However, these matroids have not been well appreciated nor cited in the fields of network coding and index coding. In this paper, we first reintroduce these matroids in a more structured way. Then, we provide a completely independent alternative proof with the main advantage of using only matrix manipulation rather than complex concepts in number theory and matroid theory. In this new proof, it is shown that while the class $p$-Fano matroid instances are linearly representable only over fields with characteristic $p$, the class $p$-non-Fano instances are representable over fields with any characteristic other than characteristic $p$. Finally, following the properties of the class $p$-Fano and $p$-non-Fano matroid instances, we characterize two new classes of index coding instances, respectively, referred to as the class $p$-Fano and $p$-non-Fano index coding, each with a size of $p^2 + 4p + 3$., Comment: arXiv admin note: text overlap with arXiv:2201.10057
- Published
- 2024
40. Whitening Not Recommended for Classification Tasks in LLMs
- Author
-
Forooghi, Ali, Sadeghi, Shaghayegh, and Lu, Jianguo
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Sentence embedding is a cornerstone in NLP. Whitening has been claimed to be an effective operation to improve embedding quality obtained from Large Language Models (LLMs). However, we find that the efficacy of whitening is model-dependent and task-dependent. In particular, whitening degenerates embeddings for classification tasks. The conclusion is supported by extensive experiments. We also explored a variety of whitening operations, including PCA, ZCA, PCA-Cor, ZCA-Cor and Cholesky whitenings. A by-product of our research is embedding evaluation platform for LLMs called SentEval+.
- Published
- 2024
41. Sharif-MGTD at SemEval-2024 Task 8: A Transformer-Based Approach to Detect Machine Generated Text
- Author
-
Ebrahimi, Seyedeh Fatemeh, Azari, Karim Akhavan, Iravani, Amirmasoud, Qazvini, Arian, Sadeghi, Pouya, Taghavi, Zeinab Sadat, and Sameti, Hossein
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
Detecting Machine-Generated Text (MGT) has emerged as a significant area of study within Natural Language Processing. While language models generate text, they often leave discernible traces, which can be scrutinized using either traditional feature-based methods or more advanced neural language models. In this research, we explore the effectiveness of fine-tuning a RoBERTa-base transformer, a powerful neural architecture, to address MGT detection as a binary classification task. Focusing specifically on Subtask A (Monolingual-English) within the SemEval-2024 competition framework, our proposed system achieves an accuracy of 78.9% on the test dataset, positioning us at 57th among participants. Our study addresses this challenge while considering the limited hardware resources, resulting in a system that excels at identifying human-written texts but encounters challenges in accurately discerning MGTs., Comment: 8 pages, 3 figures, 2 tables. Proceedings of the 18th International Workshop on Semantic Evaluation (SemEval-2024)
- Published
- 2024
42. Approximating particle-based clustering dynamics by stochastic PDEs
- Author
-
Wehlitz, Nathalie, Sadeghi, Mohsen, Montefusco, Alberto, Schütte, Christof, Pavliotis, Grigorios A., and Winkelmann, Stefanie
- Subjects
Quantitative Biology - Quantitative Methods ,Mathematics - Probability ,60H15, 37M05, 37N25, 60J27 - Abstract
This work proposes stochastic partial differential equations (SPDEs) as a practical tool to replicate clustering effects of more detailed particle-based dynamics. Inspired by membrane-mediated receptor dynamics on cell surfaces, we formulate a stochastic particle-based model for diffusion and pairwise interaction of particles, leading to intriguing clustering phenomena. Employing numerical simulation and cluster detection methods, we explore the approximation of the particle-based clustering dynamics through mean-field approaches. We find that SPDEs successfully reproduce spatiotemporal clustering dynamics, not only in the initial cluster formation period, but also on longer time scales where the successive merging of clusters cannot be tracked by deterministic mean-field models. The computational efficiency of the SPDE approach allows us to generate extensive statistical data for parameter estimation in a simpler model that uses a Markov jump process to capture the temporal evolution of the cluster number.
- Published
- 2024
43. Real-time Tracking in a Status Update System with an Imperfect Feedback Channel
- Author
-
Vilni, Saeid Sadeghi, Zakeri, Abolfazl, Moltafet, Mohammad, and Codreanu, Marian
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
We consider a status update system consisting of a finite-state Markov source, an energy-harvesting-enabled transmitter, and a sink. The forward and feedback channels between the transmitter and the sink are error-prone. We study the problem of minimizing the long-term time average of a (generic) distortion function subject to an energy causality constraint. Since the feedback channel is error-prone, the transmitter has only partial knowledge about the transmission results and, consequently, about the estimate of the source state at the sink. Therefore, we model the problem as a partially observable Markov decision process (POMDP), which is then cast as a belief-MDP problem. The infinite belief space makes solving the belief-MDP difficult. Thus, by exploiting a specific property of the belief evolution, we truncate the state space and formulate a finite-state MDP problem, which is then solved using the relative value iteration algorithm (RVIA). Furthermore, we propose a low-complexity transmission policy in which the belief-MDP problem is transformed into a sequence of per-slot optimization problems. Simulation results show the effectiveness of the proposed policies and their superiority compared to a baseline policy. Moreover, we numerically show that the proposed policies have switching-type structures.
- Published
- 2024
44. Exponential Modification of AdS Black Hole and Thermodynamic Behavior
- Author
-
Sadeghi, Mehdi and Rahmani, Faramarz
- Subjects
High Energy Physics - Theory ,General Relativity and Quantum Cosmology - Abstract
In this paper, we present an exponential modification for the action of an AdS black hole in the absence of a matter field. An approximated black hole solution is obtained up to the third order of perturbation coefficient. A thermodynamic investigation in canonical ensemble shows that the behavior of a Van der Waals fluid is not seen in this model. Nevertheless, the study of thermodynamic potentials and other related quantities suggests that the thermodynamic phase transitions of the first and second types can occur in this model. The forms of the phase transitions are more similar to the Hawking-Page phase transitions., Comment: 18 Pages, 9 figures, title changed, ref added
- Published
- 2024
45. Information Density Bounds for Privacy
- Author
-
Saeidian, Sara, Grosse, Leonhard, Sadeghi, Parastoo, Skoglund, Mikael, and Oechtering, Tobias J.
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security - Abstract
This paper explores the implications of guaranteeing privacy by imposing a lower bound on the information density between the private and the public data. We introduce an operationally meaningful privacy measure called pointwise maximal cost (PMC) and demonstrate that imposing an upper bound on PMC is equivalent to enforcing a lower bound on the information density. PMC quantifies the information leakage about a secret to adversaries who aim to minimize non-negative cost functions after observing the outcome of a privacy mechanism. When restricted to finite alphabets, PMC can equivalently be defined as the information leakage to adversaries aiming to minimize the probability of incorrectly guessing randomized functions of the secret. We study the properties of PMC and apply it to standard privacy mechanisms to demonstrate its practical relevance. Through a detailed examination, we connect PMC with other privacy measures that impose upper or lower bounds on the information density. Our results highlight that lower bounding the information density is a more stringent requirement than upper bounding it. Overall, our work significantly bridges the gaps in understanding the relationships between various privacy frameworks and provides insights for selecting a suitable framework for a given application.
- Published
- 2024
46. A Review of Global Sensitivity Analysis Methods and a comparative case study on Digit Classification
- Author
-
Sadeghi, Zahra and Matwin, Stan
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Global sensitivity analysis (GSA) aims to detect influential input factors that lead a model to arrive at a certain decision and is a significant approach for mitigating the computational burden of processing high dimensional data. In this paper, we provide a comprehensive review and a comparison on global sensitivity analysis methods. Additionally, we propose a methodology for evaluating the efficacy of these methods by conducting a case study on MNIST digit dataset. Our study goes through the underlying mechanism of widely used GSA methods and highlights their efficacy through a comprehensive methodology.
- Published
- 2024
47. PEANO-ViT: Power-Efficient Approximations of Non-Linearities in Vision Transformers
- Author
-
Sadeghi, Mohammad Erfan, Fayyazi, Arash, Azizi, Seyedarmin, and Pedram, Massoud
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
The deployment of Vision Transformers (ViTs) on hardware platforms, specially Field-Programmable Gate Arrays (FPGAs), presents many challenges, which are mainly due to the substantial computational and power requirements of their non-linear functions, notably layer normalization, softmax, and Gaussian Error Linear Unit (GELU). These critical functions pose significant obstacles to efficient hardware implementation due to their complex mathematical operations and the inherent resource count and architectural limitations of FPGAs. PEANO-ViT offers a novel approach to streamlining the implementation of the layer normalization layer by introducing a division-free technique that simultaneously approximates the division and square root function. Additionally, PEANO-ViT provides a multi-scale division strategy to eliminate division operations in the softmax layer, aided by a Pade-based approximation for the exponential function. Finally, PEANO-ViT introduces a piece-wise linear approximation for the GELU function, carefully designed to bypass the computationally intensive operations associated with GELU. In our comprehensive evaluations, PEANO-ViT exhibits minimal accuracy degradation (<= 0.5% for DeiT-B) while significantly enhancing power efficiency, achieving improvements of 1.91x, 1.39x, 8.01x for layer normalization, softmax, and GELU, respectively. This improvement is achieved through substantial reductions in DSP, LUT, and register counts for these non-linear operations. Consequently, PEANO-ViT enables efficient deployment of Vision Transformers on resource- and power-constrained FPGA platforms.
- Published
- 2024
48. The interplay of WGC and WCCC via charged scalar field fluxes in the RPST framework
- Author
-
Alipour, Mohammad Reza, Sadeghi, Jafar, Gashti, Saeed Noori, and Afshar, Mohammad Ali S.
- Subjects
High Energy Physics - Theory ,General Relativity and Quantum Cosmology - Abstract
In this paper, we investigate the weak cosmic censorship conjecture (WCCC) for the Reissner-Nordstrom (R-N) AdS black hole in a restricted phase space thermodynamics (RPST). Also here, we consider energy flux and equivalence mass-energy principle and examine the weak gravity conjecture (WGC) and the weak cosmic censorship conjecture. The incoming and outgoing energy flux leads to changes in the black hole. In that case, by applying the first law, we examined whether the second law of thermodynamics is valid. And also one can say that, in the case where absorption and superradiance are in the saturated to an equilibrium. Also, by using the thermodynamics of black holes in the restricted phase space, we show that if the black hole is in an extreme or close to an extreme state with radiation and particle absorption, the weak cosmic censorship conjecture is established. In addition, with the help of equivalence mass and energy principle and second-order approximation, in the near extremity, we find that when the black hole radiates and its central charge is greater than the scaled electric charge, the superradiance particles obey the weak gravity conjecture, and this causes the black hole to move further away from its extreme state. But when the particles that obey the weak gravity conjecture are attracted to the black hole when the black hole is very small. Then, in this case, we note that the black hole becomes closer to its extreme state., Comment: 15 pages, 1 table
- Published
- 2024
49. Bayes' capacity as a measure for reconstruction attacks in federated learning
- Author
-
Biswas, Sayan, Dras, Mark, Faustini, Pedro, Fernandes, Natasha, McIver, Annabelle, Palamidessi, Catuscia, and Sadeghi, Parastoo
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
Within the machine learning community, reconstruction attacks are a principal attack of concern and have been identified even in federated learning, which was designed with privacy preservation in mind. In federated learning, it has been shown that an adversary with knowledge of the machine learning architecture is able to infer the exact value of a training element given an observation of the weight updates performed during stochastic gradient descent. In response to these threats, the privacy community recommends the use of differential privacy in the stochastic gradient descent algorithm, termed DP-SGD. However, DP has not yet been formally established as an effective countermeasure against reconstruction attacks. In this paper, we formalise the reconstruction threat model using the information-theoretic framework of quantitative information flow. We show that the Bayes' capacity, related to the Sibson mutual information of order infinity, represents a tight upper bound on the leakage of the DP-SGD algorithm to an adversary interested in performing a reconstruction attack. We provide empirical results demonstrating the effectiveness of this measure for comparing mechanisms against reconstruction threats.
- Published
- 2024
50. Dampening Long-Period Doppler Shift Oscillations using Deep Machine Learning Techniques in the Solar Network and Internetwork
- Author
-
Sadeghi, Rayhaneh and Tavabi, Ehsan
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Astrophysics - High Energy Astrophysical Phenomena - Abstract
This study explores the Doppler shift at different wavelengths in the Interface Region Imaging Spectrograph (IRIS) solar spectrum and implements a comprehensive consideration of Doppler velocity oscillations in the IRIS channels. This comprehensive consideration reveals a propagating periodic perturbation in a large number of chromosphere and transition region (TR) bright points (BPs). To our knowledge, this is the first investigation of the longitudinal oscillations with damping in BPs using comprehensive consideration of the Doppler velocity at various wavelengths. The phenomena of attenuation in the red and blue Doppler shifts of the solar wavelength range were seen several times during the experiments. We utilized deep learning techniques to examine the statistical properties of damping in network and internetwork BPs, as well as active, quiet areas, and coronal hole areas. Our results revealed varying damping rates across different regions, with 80 percent of network BPs exhibiting damping in quiet areas and 72 in coronal hole areas. In active areas, the figure approached 33. For internetwork BPs, the values were 65, 54, and 63 percent for quiet areas, coronal hole areas, and active regions, respectively. The damping rate in active regions is twice as high at Internetwork's BPs. The damping components in this study were computed, and the findings show that the damping at all points is underdamped. The observed damping process suggests the propagation and leaking of energetic waves out of TR bright points, potentially contributing to the energy transport from the bright magnetic footpoints to the upper chromosphere, transition region, and corona., Comment: 25 pages, 7 figs. accepted in Advances in Space Research
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.