-
Integrating Explanations in Learning LTL Specifications from Demonstrations
Authors:
Ashutosh Gupta,
John Komp,
Abhay Singh Rajput,
Krishna Shankaranarayanan,
Ashutosh Trivedi,
Namrita Varshney
Abstract:
This paper investigates whether recent advances in Large Language Models (LLMs) can assist in translating human explanations into a format that can robustly support learning Linear Temporal Logic (LTL) from demonstrations. Both LLMs and optimization-based methods can extract LTL specifications from demonstrations; however, they have distinct limitations. LLMs can quickly generate solutions and inc…
▽ More
This paper investigates whether recent advances in Large Language Models (LLMs) can assist in translating human explanations into a format that can robustly support learning Linear Temporal Logic (LTL) from demonstrations. Both LLMs and optimization-based methods can extract LTL specifications from demonstrations; however, they have distinct limitations. LLMs can quickly generate solutions and incorporate human explanations, but their lack of consistency and reliability hampers their applicability in safety-critical domains. On the other hand, optimization-based methods do provide formal guarantees but cannot process natural language explanations and face scalability challenges. We present a principled approach to combining LLMs and optimization-based methods to faithfully translate human explanations and demonstrations into LTL specifications. We have implemented a tool called Janaka based on our approach. Our experiments demonstrate the effectiveness of combining explanations with demonstrations in learning LTL specifications through several case studies.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Hyper-automation-The next peripheral for automation in IT industries
Authors:
Ayush Singh Rajput,
Richa Gupta
Abstract:
The extension of legacy business process automation beyond the bounds of specific processes is known as hyperautomation. Hyperautomation provides automation for nearly any repetitive action performed by business users by combining AI tools with RPA. It automates complex IT business processes that a company's top brains might not be able to complete. This is an end-to-end automation of a standard b…
▽ More
The extension of legacy business process automation beyond the bounds of specific processes is known as hyperautomation. Hyperautomation provides automation for nearly any repetitive action performed by business users by combining AI tools with RPA. It automates complex IT business processes that a company's top brains might not be able to complete. This is an end-to-end automation of a standard business process deployment. It enables automation to perform task digitalization by combining a brain computer interface (BCI) with AI and RPA automation tools. BCI, in conjunction with automation tools, will advance the detection and generation of automation processes to the next level. It allows enterprises to combine business intelligence systems, address complex requirements, and enhance human expertise and automation experience. Hyperautomation and its importance in today's environment are briefly discussed in this paper. The article then goes on to discuss how BCI and sensors might aid Hyperautomation. The specific sectors of solicitations were examined using a variety of flexible technologies associated to this concept, as well as dedicated workflow techniques, which are also diagrammatically illustrated. Hyperautomation is being utilized to improve the efficiency, accuracy, and human enhancement of automated tasks dramatically. It incorporates a number of automated tools in its discovery, implementation, and automation phases. As a result, it's well-suited to integrating cutting-edge technologies and experimenting with new methods of working. Keywords- Hyperautomation, Brain computer Interface (BCI), Technology, Used case, Sensors, Industries.
△ Less
Submitted 14 May, 2023;
originally announced May 2023.
-
Latent Sub-structural Resilience Mechanisms in Temporal Human Mobility Networks during Urban Flooding
Authors:
Akhil Anil Rajput,
Ali Mostafavi
Abstract:
In studying resilience in temporal human networks, relying solely on global network measures would be inadequate; latent sub-structural network mechanisms need to be examined to determine the extent of impact and recovery of these networks during perturbations, such as urban flooding. In this study, we utilized high-resolution aggregated location-based disaster related data to construct temporal h…
▽ More
In studying resilience in temporal human networks, relying solely on global network measures would be inadequate; latent sub-structural network mechanisms need to be examined to determine the extent of impact and recovery of these networks during perturbations, such as urban flooding. In this study, we utilized high-resolution aggregated location-based disaster related data to construct temporal human mobility networks. Using the constructed temporal network models, we examined characteristics such as motif distribution, motif persistence and temporal stability, and motif attributes to reveal latent sub-structural mechanisms related to the resilience of human mobility networks during disaster-induced perturbations. The results show that urban flood impacts persists in human mobility networks at the sub-structure level for several weeks. The impact extent and recovery duration is heterogeneous across different network types. Also, perturbation impacts persist at the sub-structure level while global topological network properties might indicate the network has recovered. The findings highlight the importance of examining the microstructures and their dynamic processes and attributes in understanding the resilience of temporal human mobility networks (and other temporal networks), it is essential to examine the microstructures and their perturbation impacts and recovery. The findings can also provide disaster managers, public officials, and transportation planners with insights to better evaluate impacts and to monitor recovery in affected communities based on the patterns of impact and recovery in human mobility networks at both sub-structure and global-network levels.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
Using Deep Learning with Large Aggregated Datasets for COVID-19 Classification from Cough
Authors:
Esin Darici Haritaoglu,
Nicholas Rasmussen,
Daniel C. H. Tan,
Jennifer Ranjani J.,
Jaclyn Xiao,
Gunvant Chaudhari,
Akanksha Rajput,
Praveen Govindan,
Christian Canham,
Wei Chen,
Minami Yamaura,
Laura Gomezjurado,
Aaron Broukhim,
Amil Khanzada,
Mert Pilanci
Abstract:
The Covid-19 pandemic has been one of the most devastating events in recent history, claiming the lives of more than 5 million people worldwide. Even with the worldwide distribution of vaccines, there is an apparent need for affordable, reliable, and accessible screening techniques to serve parts of the World that do not have access to Western medicine. Artificial Intelligence can provide a soluti…
▽ More
The Covid-19 pandemic has been one of the most devastating events in recent history, claiming the lives of more than 5 million people worldwide. Even with the worldwide distribution of vaccines, there is an apparent need for affordable, reliable, and accessible screening techniques to serve parts of the World that do not have access to Western medicine. Artificial Intelligence can provide a solution utilizing cough sounds as a primary screening mode for COVID-19 diagnosis. This paper presents multiple models that have achieved relatively respectable performance on the largest evaluation dataset currently presented in academic literature. Through investigation of a self-supervised learning model (Area under the ROC curve, AUC = 0.807) and a convolutional nerual network (CNN) model (AUC = 0.802), we observe the possibility of model bias with limited datasets. Moreover, we observe that performance increases with training data size, showing the need for the worldwide collection of data to help combat the Covid-19 pandemic with non-traditional means.
△ Less
Submitted 29 March, 2022; v1 submitted 5 January, 2022;
originally announced January 2022.
-
COSPEX: A Program Comprehension Tool for Novice Programmers
Authors:
Ashutosh Rajput,
Nakshatra Gupta,
Sridhar Chimalakonda
Abstract:
Developers often encounter unfamiliar code during software maintenance which consumes a significant amount of time for comprehension, especially for novice programmers. Automated techniques that analyze a source code and present key information to the developers can lead to an effective comprehension of the code. Researchers have come up with automated code summarization techniques that focus on c…
▽ More
Developers often encounter unfamiliar code during software maintenance which consumes a significant amount of time for comprehension, especially for novice programmers. Automated techniques that analyze a source code and present key information to the developers can lead to an effective comprehension of the code. Researchers have come up with automated code summarization techniques that focus on code summarization by generating brief summaries rather than aiding its comprehension. Existing debuggers represent the execution states of the program but they do not show the complete execution at a single point. Studies have revealed that the effort required for program comprehension can be reduced if novice programmers are provided with worked examples. Hence, we propose COSPEX (Comprehension using Summarization via Program Execution) - an Atom plugin that dynamically extracts key information for every line of code executed and presents it to the developers in the form of an interactive example-like dynamic information instance. As a preliminary evaluation, we presented 14 undergraduates having Python programming experience up to 1 year with a code comprehension task in a user survey. We observed that COSPEX helped novice programmers in program comprehension and improved their understanding of the code execution. The source code and tool are available at: https://bit.ly/3utHOBM, and the demo on Youtube is available at: https://bit.ly/2Sp08xQ.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
Comparison of Dynamic and Kinematic Model Driven Extended Kalman Filters (EKF) for the Localization of Autonomous Underwater Vehicles
Authors:
Sharan Balasubramanian,
Ayush Rajput,
Rodra W. Hascaryo,
Chirag Rastogi,
William R. Norris
Abstract:
Autonomous Underwater Vehicles (AUVs) and Remotely Operated Vehicles (ROVs) are used for a wide variety of missions related to exploration and scientific research. Successful navigation by these systems requires a good localization system. Kalman filter based localization techniques have been prevalent since the early 1960s and extensive research has been carried out using them, both in developmen…
▽ More
Autonomous Underwater Vehicles (AUVs) and Remotely Operated Vehicles (ROVs) are used for a wide variety of missions related to exploration and scientific research. Successful navigation by these systems requires a good localization system. Kalman filter based localization techniques have been prevalent since the early 1960s and extensive research has been carried out using them, both in development and in design. It has been found that the use of a dynamic model (instead of a kinematic model) in the Kalman filter can lead to more accurate predictions, as the dynamic model takes the forces acting on the AUV into account. Presented in this paper is a motion-predictive extended Kalman filter (EKF) for AUVs using a simplified dynamic model. The dynamic model is derived first and then it was simplified for a RexROV, a type of submarine vehicle used in simple underwater exploration, inspection of subsea structures, pipelines and shipwrecks. The filter was implemented with a simulated vehicle in an open-source marine vehicle simulator called UUV Simulator and the results were compared with the ground truth. The results show good prediction accuracy for the dynamic filter, though improvements are needed before the EKF can be used on real-time. Some perspective and discussion on practical implementation is presented to show the next steps needed for this concept.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
Revealing Critical Characteristics of Mobility Patterns in New York City during the Onset of COVID-19 Pandemic
Authors:
Akhil Anil Rajput,
Qingchun Li,
Xinyu Gao,
Ali Mostafavi
Abstract:
New York has become one of the worst-affected COVID-19 hotspots and a pandemic epicenter due to the ongoing crisis. This paper identifies the impact of the pandemic and the effectiveness of government policies on human mobility by analyzing multiple datasets available at both macro and micro levels for the New York City. Using data sources related to population density, aggregated population mobil…
▽ More
New York has become one of the worst-affected COVID-19 hotspots and a pandemic epicenter due to the ongoing crisis. This paper identifies the impact of the pandemic and the effectiveness of government policies on human mobility by analyzing multiple datasets available at both macro and micro levels for the New York City. Using data sources related to population density, aggregated population mobility, public rail transit use, vehicle use, hotspot and non-hotspot movement patterns, and human activity agglomeration, we analyzed the inter-borough and intra-borough moment for New York City by aggregating the data at the borough level. We also assessed the internodal population movement amongst hotspot and non-hotspot points of interest for the month of March and April 2020. Results indicate a drop of about 80% in people's mobility in the city, beginning in mid-March. The movement to and from Manhattan showed the most disruption for both public transit and road traffic. The city saw its first case on March 1, 2020, but disruptions in mobility can be seen only after the second week of March when the shelter in place orders was put in effect. Owing to people working from home and adhering to stay-at-home orders, Manhattan saw the largest disruption to both inter- and intra-borough movement. But the risk of spread of infection in Manhattan turned out to be high because of higher hotspot-linked movements. The stay-at-home restrictions also led to an increased population density in Brooklyn and Queens as people were not commuting to Manhattan. Insights obtained from this study would help policymakers better understand human behavior and their response to the news and governmental policies.
△ Less
Submitted 4 February, 2021; v1 submitted 3 February, 2021;
originally announced February 2021.
-
A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks
Authors:
Milad Taleby Ahvanooey,
Qianmu Li,
Mahdi Rabbani,
Ahmed Raza Rajput
Abstract:
Nowadays, the usage of smartphones and their applications have become rapidly increasing popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly increased due to the different forms of apps and connectivity provided by mobile devices such as 3G, 4G, GPRS, and Wi-Fi, etc. In the same trend, the num…
▽ More
Nowadays, the usage of smartphones and their applications have become rapidly increasing popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly increased due to the different forms of apps and connectivity provided by mobile devices such as 3G, 4G, GPRS, and Wi-Fi, etc. In the same trend, the number of vulnerabilities targeting these services and communication networks has raised as well. Therefore, smartphones have become ideal target devices for malicious programmers. With increasing the number of vulnerabilities and attacks, there has been a corresponding ascent of the security countermeasures presented by the researchers. Due to these reasons, security of the payment systems is one of the most important issues in mobile payment systems. In this survey, we aim to provide a comprehensive and structured overview of the research on security solutions for smartphone devices. This survey reviews the state of the art on security solutions, threats, and vulnerabilities during the period of 2011-2017, by focusing on software attacks, such those to smartphone applications. We outline some countermeasures aimed at protecting smartphones against these groups of attacks, based on the detection rules, data collections and operating systems, especially focusing on open source applications. With this categorization, we want to provide an easy understanding for users and researchers to improve their knowledge about the security and privacy of smartphones.
△ Less
Submitted 26 January, 2020;
originally announced January 2020.
-
Clickbait in Education Positive or Negative? Machine Learning Answers
Authors:
Adil Rajput
Abstract:
The topic of clickbait has garnered lot of attention since the advent of social media. Meriam-Webster defines Clickbait as something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest. Clickbait is used synonymously with terms with negative connotations such as yellow journalism, tabloid news etc. Majority of the work in thi…
▽ More
The topic of clickbait has garnered lot of attention since the advent of social media. Meriam-Webster defines Clickbait as something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest. Clickbait is used synonymously with terms with negative connotations such as yellow journalism, tabloid news etc. Majority of the work in this area has focused on detecting clickbait to stop being presented to the reader. In this work, we look at clickbait in the field of education with emphasis on educational videos that are authored by individual authors without any institutional backing. Such videos can become quite popular with different audiences and are not verified by any expert. We present findings that despite the negative connotation associated with clickbait, audiences value content regardless of the clickbait techniques and have an overall favorable impression. We also establish initial metrics that can be used to gauge the likeness factor for such educational videos/MOOCs.
△ Less
Submitted 9 April, 2019;
originally announced April 2019.
-
Using Crowdsourcing to Identify a Proxy of Socio-Economic status
Authors:
Adil E. Rajput,
Akila Sarirete,
Tamer F. Desouky
Abstract:
Social Media provides researchers with an unprecedented opportunity to gain insight into various facets of human life. Health practitioners put a great emphasis on pinpointing socioeconomic status (SES) of individuals as they can use to it to predict certain diseases. Crowdsourcing is a term coined that entails gathering intelligence from a user community online. In order to group the users online…
▽ More
Social Media provides researchers with an unprecedented opportunity to gain insight into various facets of human life. Health practitioners put a great emphasis on pinpointing socioeconomic status (SES) of individuals as they can use to it to predict certain diseases. Crowdsourcing is a term coined that entails gathering intelligence from a user community online. In order to group the users online into communities, researchers have made use of hashtags that will cull the interest of a community of users. In this paper, we propose a mechanism to group a certain group of users based on their geographic background and build a corpus for such users. Specifically, we have looked at discussion forums for some vehi-cles where the site has established communities for different areas to air their grievances or sing the praises of the vehicle. From such a discussion, it was pos-sible to glean the vocabulary that these group of users adheres to. We compared the corpus of different communities and noted the difference in the choice of language. This provided us with the groundwork for predicting the socio-eco-nomic status of such communities that can be particularly helpful to health prac-titioners and in turn used in smart cities to provide better services to the commu-nity members. More work is underway to take words and emojis out of vo-cablary(OOV) and assessing the average score as special cases.
△ Less
Submitted 19 February, 2019;
originally announced February 2019.
-
Big Data and Social/Medical Sciences: State of the Art and Future Trends
Authors:
Adil E. Rajput,
Samara M. Ahmed
Abstract:
The explosion of data on the internet is a direct corollary of the social media platform. With petabytes of data being generated by end users, the researchers have access to unprecedented amount of data (Big Data). Such data provides an insight into user mental state and hence can be utilized to produce clinical evidence. This lofty goal requires a thorough understanding of not only the mental hea…
▽ More
The explosion of data on the internet is a direct corollary of the social media platform. With petabytes of data being generated by end users, the researchers have access to unprecedented amount of data (Big Data). Such data provides an insight into user mental state and hence can be utilized to produce clinical evidence. This lofty goal requires a thorough understanding of not only the mental health issues but also the technology trends underlying the Big Data and how they can be leveraged effectively. The paper looks at various such concepts, provides an overview and enumerates the work that has been done in this realm. Furthermore, we provide guidelines for future work that will help in streamlining the Big Data use in social/medical sciences.
△ Less
Submitted 2 February, 2019;
originally announced February 2019.
-
Making a Case for Social Media Corpus for Detecting Depression
Authors:
Adil Rajput,
Samara Ahmed
Abstract:
The social media platform provides an opportunity to gain valuable insights into user behaviour. Users mimic their internal feelings and emotions in a disinhibited fashion using natural language. Techniques in Natural Language Processing have helped researchers decipher standard documents and cull together inferences from massive amount of data. A representative corpus is a prerequisite for NLP an…
▽ More
The social media platform provides an opportunity to gain valuable insights into user behaviour. Users mimic their internal feelings and emotions in a disinhibited fashion using natural language. Techniques in Natural Language Processing have helped researchers decipher standard documents and cull together inferences from massive amount of data. A representative corpus is a prerequisite for NLP and one of the challenges we face today is the non-standard and noisy language that exists on the internet. Our work focuses on building a corpus from social media that is focused on detecting mental illness. We use depression as a case study and demonstrate the effectiveness of using such a corpus for helping practitioners detect such cases. Our results show a high correlation between our Social Media Corpus and the standard corpus for depression.
△ Less
Submitted 2 February, 2019;
originally announced February 2019.
-
Natural Language Processing, Sentiment Analysis and Clinical Analytics
Authors:
Adil Rajput
Abstract:
Recent advances in Big Data has prompted health care practitioners to utilize the data available on social media to discern sentiment and emotions expression. Health Informatics and Clinical Analytics depend heavily on information gathered from diverse sources. Traditionally, a healthcare practitioner will ask a patient to fill out a questionnaire that will form the basis of diagnosing the medical…
▽ More
Recent advances in Big Data has prompted health care practitioners to utilize the data available on social media to discern sentiment and emotions expression. Health Informatics and Clinical Analytics depend heavily on information gathered from diverse sources. Traditionally, a healthcare practitioner will ask a patient to fill out a questionnaire that will form the basis of diagnosing the medical condition. However, medical practitioners have access to many sources of data including the patients writings on various media. Natural Language Processing (NLP) allows researchers to gather such data and analyze it to glean the underlying meaning of such writings. The field of sentiment analysis (applied to many other domains) depend heavily on techniques utilized by NLP. This work will look into various prevalent theories underlying the NLP field and how they can be leveraged to gather users sentiments on social media. Such sentiments can be culled over a period of time thus minimizing the errors introduced by data input and other stressors. Furthermore, we look at some applications of sentiment analysis and application of NLP to mental health. The reader will also learn about the NLTK toolkit that implements various NLP theories and how they can make the data scavenging process a lot easier.
△ Less
Submitted 2 February, 2019;
originally announced February 2019.
-
Characterizing IOMT/Personal Area Networks Landscape
Authors:
Adil Rajput,
Tayeb Brahimi
Abstract:
The attention garnered by the Internet of Things (IoT) term has taken the world by a storm. IOT concepts have been applied to various domains revolutionizing the way business processes are conducted. Health Informatics is a nascent multidisciplinary field that aims at applying information engineering concepts to healthcare. The information traditionally came from a variety of sources such as healt…
▽ More
The attention garnered by the Internet of Things (IoT) term has taken the world by a storm. IOT concepts have been applied to various domains revolutionizing the way business processes are conducted. Health Informatics is a nascent multidisciplinary field that aims at applying information engineering concepts to healthcare. The information traditionally came from a variety of sources such as healthcare IT systems but recently is being stored in variety of IOT devices. Application of IOT concepts is becoming the norm giving rise to the Internet of Medical Things (IOMT). However, IOMT introduces many challenges such as the real-time nature, security, and privacy of data along with others. Thus, understanding the underlying structure of IOMT is of paramount importance. Given the importance of the underlying networks, we explore various solutions currently employed in developing the Personal Area Networks (PANs) that are the underlying cornerstone of IOMT). PANs allow the sensors to measure the change in various stimuli and transmit the information via LANs and WANs to various stakeholders. This chapter will look at three standards that are currently used by both academia and industry along with Body Area Networks (BANs). The chapter also provides a survey of prevalent IOMT applications along with various vendors that provide such services.
△ Less
Submitted 2 February, 2019;
originally announced February 2019.