https://arxiv.org/api/IRIC8OLKh9d49BcPjpJlwca2JX4
2026-03-22T08:52:46Z
2306
0
15
http://arxiv.org/abs/2602.14071v2
Bidirectional Temporal Dynamics Modeling for EEG-based Driving Fatigue Recognition
2026-03-05T05:48:37Z
Driving fatigue is a major contributor to traffic accidents and poses a serious threat to road safety. Electroencephalography (EEG) provides a direct measurement of neural activity, yet EEG-based fatigue recognition is hindered by strong non-stationarity and asymmetric neural dynamics. To address these challenges, we propose DeltaGateNet, a novel framework that explicitly captures Bidirectional temporal dynamics for EEG-based driving fatigue recognition. Our key idea is to introduce a Bidirectional Delta module that decomposes first-order temporal differences into positive and negative components, enabling explicit modeling of asymmetric neural activation and suppression patterns. Furthermore, we design a Gated Temporal Convolution module to capture long-term temporal dependencies for each EEG channel using depthwise temporal convolutions and residual learning, preserving channel-wise specificity while enhancing temporal representation robustness. Extensive experiments conducted under both intra-subject and inter-subject evaluation settings on the public SEED-VIG and SADT driving fatigue datasets demonstrate that DeltaGateNet consistently outperforms existing methods. On SEED-VIG, DeltaGateNet achieves an intra-subject accuracy of 81.89% and an inter-subject accuracy of 55.55%. On the balanced SADT 2022 dataset, it attains intra-subject and inter-subject accuracies of 96.81% and 83.21%, respectively, while on the unbalanced SADT 2952 dataset, it achieves 96.84% intra-subject and 84.49% inter-subject accuracy. These results indicate that explicitly modeling Bidirectional temporal dynamics yields robust and generalizable performance under varying subject and class-distribution conditions.
2026-02-15T09:42:25Z
Yip Tin Po
Jianming Wang
Yutao Miao
Jiayan Zhang
Yunxu Zhao
Xiaomin Ouyang
Zhihong Li
Nevin L. Zhang
http://arxiv.org/abs/2603.02192v1
Personal Health Data Integration and Intelligence through Semantic Web and Blockchain Technologies
2026-03-02T18:53:42Z
Data integration among various stakeholders in the healthcare space remains a challenge, despite the impressive advances in Health AI in the past decade. There is a lot of ``messy'' non-standard but structured data that are continually being collected from personal health devices. While efforts such as the Fast Healthcare Interoperability of Resources (FHIR) are underway in standardizing the data representation formats, there is currently a gap in the standard in addressing the health data ecosystem's decentralized nature. As we see explosive growth in chronic diseases such as diabetes, healthcare providers need Observations of Daily Living (ODL) of their patients to treat them effectively. The best way to obtain ODL is through personal health devices. However, such devices are manufactured by various device makers, and they may not follow standards or integrate with existing Electronic Health Record (EHR) systems. It is also imperative that any data sharing that happens will occur in a secure and trustworthy environment, without being too restrictive, i.e., tied to a particular EHR vendor. This paper presents a scalable solution to bridge this gap using a system that implements semantic web and blockchain technologies. Our solution uses FHIR compliant semantic web based data templates in conjunction with smart contracts on the blockchain to provide healthcare providers with insights on their patients' daily activity that cannot be readily determined solely through patient encounters at the clinic.
2026-03-02T18:53:42Z
Oshani Seneviratne
Manan Shukla
Jianjing Lin
http://arxiv.org/abs/2603.06611v1
A Novel Approach for Testing Water Safety Using Deep Learning Inference of Microscopic Images of Unincubated Water Samples
2026-02-20T01:07:42Z
Fecal-contaminated water causes diseases and even death. Current microbial water safety tests require pathogen incubation, taking 24-72 hours and costing \$20-\$50 per test. This paper presents a solution (DeepScope) exceeding UNICEF's ideal Target Product Profile requirements for presence/absence testing, with an estimated per-test cost of \$0.44. By eliminating the need for pathogen incubation, DeepScope reduces testing time by over 98\%. In DeepScope, a dataset of microscope images of bacteria and water samples was assembled. An innovative augmentation technique, generating up to 21 trillion images from a single microscope image, was developed. Four convolutional neural network models were developed using transfer learning and regularization techniques, then evaluated on a field-test dataset comprising 100,000 microscope images of unseen, real-world water samples collected from fourteen different water sources across Sammamish, WA. Precision-recall analysis showed the DeepScope model achieves 93\% accuracy, with precision of 90\% and recall exceeding 94\%. The DeepScope model was deployed on a web server, and mobile applications for Android and iOS were developed, enabling Internet-based or smartphone-based water safety testing, with results obtained in seconds.
2026-02-20T01:07:42Z
Sanjay Srinivasan
http://arxiv.org/abs/2507.14908v2
Partial Symmetry Enforced Attention Decomposition (PSEAD): A Group-Theoretic Framework for Equivariant Transformers in Biological Systems
2026-02-18T10:03:55Z
This research introduces the Theory of Partial Symmetry Enforced Attention Decomposition (PSEAD), a new and rigorous group-theoretic framework designed to seamlessly integrate local symmetry awareness into the core architecture of self-attention mechanisms within Transformer models. We formalize the concept of local permutation subgroup actions on windows of biological data, proving that under such actions, the attention mechanism naturally decomposes into a direct sum of orthogonal irreducible components. Critically, these components are intrinsically aligned with the irreducible representations of the acting permutation subgroup, thereby providing a powerful mathematical basis for disentangling symmetric and asymmetric features. We show that PSEAD offers substantial advantages. These include enhanced generalization capabilities to novel biological motifs exhibiting similar partial symmetries, unprecedented interpretability by allowing direct visualization and analysis of attention contributions from different symmetry channels, and significant computational efficiency gains by focusing representational capacity on relevant symmetric subspaces. Beyond static data analysis, we extend PSEAD's applicability to dynamic biological processes within reinforcement learning paradigms, showcasing its potential to accelerate the discovery and optimization of biologically meaningful policies in complex environments like protein folding and drug discovery. This work lays the groundwork for a new generation of biologically informed, symmetry-aware artificial intelligence models.
2025-07-20T10:44:31Z
Daniel Ayomide Olanrewaju
http://arxiv.org/abs/2602.13926v1
EVECTOR: An orchestrator for analysing attacks in electric vehicles charging system
2026-02-14T23:49:15Z
Electric Vehicle (EV) charging infrastructure is critical for the widespread adoption of EVs, ensuring efficient and secure charging processes. Evaluating the security and performance of EV charging systems in real-world infrastructure poses significant challenges due to the diversity of information exchange between vehicles and charging stations/Electric Vehicle Supply Equipment (EVSE), including complex network protocols, scale of deployment and a variety of potential threats. Existing simulation frameworks are unable to handle complex security scenarios across these differing data exchange protocols. In this paper, we propose a novel EV orchestration framework: EVECTOR, which addresses the limitations of existing simulation systems by enabling both quantitative and qualitative analyses of EV charging scenarios. EVECTOR also provides a flexible attack orchestrator to simulate realistic attack behaviours on EV charging infrastructure. We validate the EVECTOR framework through two case studies: (a) cyber-physical attacks such as broken wire; and (b) cyber-specific attacks such as frame fuzzification. The case studies highlight the effectiveness of EVECTOR in providing deeper insights into the security and performance of EV charging systems.
2026-02-14T23:49:15Z
Devki Nandan Jha
Tomasz Szydlo
Nima Valizadeh
Ringo Sham
Aleksandra Edwards
Amrit Kumar
Amanjot Kaur
Bo Wei
Vijay Kumar
Kai Li Lim
Rajiv Ranjan
Omer Rana
http://arxiv.org/abs/2602.16922v1
A Conceptual Hybrid Framework for Post-Quantum Security: Integrating BB84 QKD, AES, and Bio-inspired Mechanisms
2026-01-31T19:40:01Z
Quantum computing is a significant risk to classical cryptographic, especially RSA, which depends on the difficulty of factoring large numbers. Classical factorization methods, such as Trial Division and Pollard's Rho, are inefficient for large keys, while Shor's quantum algorithm can break RSA efficiently in polynomial time. This research studies RSA's vulnerabilities under both classical and quantum attacks and designs a hybrid security framework to ensure data protection in the post-quantum era. The conceptual framework combines AES encryption for classical security, BB84 Quantum Key Distribution (QKD) for secure key exchange with eavesdropping detection, quantum state comparison for lightweight authentication, and a bio-inspired immune system for adaptive threat detection. RSA is vulnerable to Shor's algorithm, BB84 achieves full key agreement in ideal conditions, and it detects eavesdropping with high accuracy. The conceptual model includes both classical and quantum security methods, providing a scalable and adaptive solution for Post-Quantum encryption data protection. This work primarily proposes a conceptual framework. Detailed implementation, security proofs, and extensive experimental validation are considered future work.
2026-01-31T19:40:01Z
Md. Ismiel Hossen Abir
http://arxiv.org/abs/2602.00418v1
Commodity RF Sensing of Belowground Tuber Growth
2026-01-31T00:17:42Z
Belowground yield-forming organs of root and tuber crops are difficult to measure during growth, and management therefore relies on aboveground proxies and destructive sampling. Aboveground wireless links could provide a low-cost, non-invasive alternative, but strong attenuation and soil-dependent variability make repeatable subsurface sensing challenging. In a controlled greenhouse pot study of sweet potato, we deploy aboveground antennas in a line-of-sight-suppressed geometry and collect daily swept-frequency channel spectra together with standardized cellular link indicators, revealing consistent frequency-dependent attenuation and rippling as tubers develop. Here, we show that swept-frequency measurements in the 2.0-3.5 gigahertz band yield four interpretable spectral features that classify day-indexed growth stages with up to 87.5% accuracy across two soil recipes and two moisture regimes, and that fusing cellular link-quality indicators enables 5-centimeter-grid tuber localization with up to 95.0% accuracy, providing a proof-of-concept for subsurface crop monitoring without buried sensors, and motivating validation across cultivars and larger soil volumes.
2026-01-31T00:17:42Z
Mengning Li
Teng Fei
Wenye Wang
http://arxiv.org/abs/2602.06999v1
A Multiscale Workflow for Thermal Analysis of 3DI Chip Stacks
2026-01-28T15:43:59Z
Thermally aware design of 2.5D and 3D advanced packaging systems will require fast, accurate, and powerful thermal analysis of chiplets, stacks, and packages. These systems contain multiple materials with non-linear heat transfer properties and geometric feature sizes that span many orders of magnitude. The smallest heterostructures in the front and back ends of the line present significant thermal modeling and analysis challenges in isolation. Replicated millions or billions of times in a chiplet stack, these structures present a near insurmountable hurdle to meeting the speed and accuracy needed of analysis in the design process. Additionally, establishing precise parameter values for the materials in these systems, when size and temperature dependencies create significant deviations from bulk properties, further complicates the problem.
To address these issues, we have developed a multiscale methodology that advances the current state of the field by enabling die-scale simulations that capture phenomena arising from the structural details of the BEOL metallization stack. Taking advantage of the large length-scale separation between the BEOL features and the die-level structures, we employ a hierarchical, multiscale, finite-element approach. This hierarchical method uses a standard finite element method (FEM) formulation on a die or package scale, using computational homogenization to obtain effective thermal conductivities in the BEOL. Referring to industry-standard layout and design files, we construct and solve a locally appropriate subscale FEM problem in a representative volume element (RVE) at every quadrature point in the macroscale FEM problem. To accomplish this, RVE models are automatically constructed, meshed, and used to compute homogenized, anisotropic, thermal conductivities from the relevant GDSII or OASIS.
2026-01-28T15:43:59Z
2025 24th IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems (ITherm)
Max Bloomfield
Amogh Wasti
Zongmin Yang
Matthew Galarza
Theodorian Borca-Tasciuc
Jacob Merson
Timothy Chainer
Prabudhya Roy Chowdhury
Aakrati Jain
10.1109/ITherm55376.2025.11235683
http://arxiv.org/abs/2601.06327v2
From Lagging to Leading: Validating Hard Braking Events as High-Density Indicators of Segment Crash Risk
2026-01-16T23:45:40Z
Identifying high crash risk road segments and accurately predicting crash incidence is fundamental to implementing effective safety countermeasures. While collision data inherently reflects risk, the infrequency and inconsistent reporting of crashes present a major challenge to robust risk prediction models. The proliferation of connected vehicle technology offers a promising avenue to leverage high-density safety metrics for enhanced crash forecasting. A Hard-Braking Event (HBE), interpreted as an evasive maneuver, functions as a potent proxy for elevated driving risk due to its demonstrable correlation with underlying crash causal factors. Crucially, HBE data is significantly more readily available across the entire road network than conventional collision records. This study systematically evaluated the correlation at individual road segment level between police-reported collisions and aggregated and anonymized HBEs identified via the Google Android Auto platform, utilizing datasets from California and Virginia. Empirical evidence revealed that HBEs occur at a rate magnitudes higher than traffic crashes. Employing the state-of-the-practice Negative-Binomial regression models, the analysis established a statistically significant positive correlation between the HBE rate and the crash rate: road segments exhibiting a higher frequency of HBEs were consistently associated with a greater incidence of crashes. This sophisticated model incorporated and controlled for various confounding factors, including road type, speed profile, proximity to ramps, and road segment slope. The HBEs derived from connected vehicle technology thus provide a scalable, high-density safety surrogate metric for network-wide traffic safety assessment, with the potential to optimize safer routing recommendations and inform the strategic deployment of active safety countermeasures.
2026-01-09T21:58:50Z
Yechen Li
Shantanu Shahane
Shoshana Vasserman
Carolina Osorio
Yi-fan Chen
Ivan Kuznetsov
Kristin White
Justyna Swiatkowska
Neha Arora
Feng Guo
http://arxiv.org/abs/2601.08863v1
WheatAI v1.0: An AI-Powered High Throughput Wheat Phenotyping Platform
2026-01-10T04:58:18Z
High-throughput, low-cost phenotyping remains a critical bottleneck in wheat breeding, genetics, and crop management. This is particularly evident in the measurement of complex yield components (i.e., spike and spikelet counts), disease and grain-quality traits related to Fusarium Head Blight (FHB) and Fusarium-Damaged Kernels (FDK), and microscale physiological traits such as density and size of stomata and aperture. We introduce WheatAI (wheatai.net), an AI-powered web application designed to bridge the gap between advanced computer vision, AI and deep learning models, and high-throughput phenotyping (HTP) and practical agricultural applications. WheatAI v1.0 provides an accessible, browser-based interface that supports multiscale data ingestion from smartphones, Unmanned Aerial Vehicles (UAVs), and portable microscopes. The core functionalities of the platform include plot- and field-scale assessment via UAV- and smartphone-based wheat spike detection and counting, as well as smartphone-based spikelet counting. Additionally, it offers grain quality assessment through FDK ratio estimation and kernel morphometric measurements, such as length, width, and area, derived from smartphone images of kernel samples. For leaf-level analysis, WheatAI provides microscale phenotyping through automated stomatal counting, size, and aperture measurement from digital microscopy images. The system supports both single-image and bulk processing via a guided upload-and-run workflow. This platform is designed to reduce labor costs and rater subjectivity while accelerating field-to-lab decision cycles. By providing standardized, image-based outputs, WheatAI enables breeders, agronomists, and producers to implement high-throughput selection and precision scouting at scale.
2026-01-10T04:58:18Z
Maitiniyazi Maimaitijiang
Hillson Ghimire
Subash Thapa
Mohammad Maruf Billah
Shaurya Sehgal
Mandeep Singh
Swas Kaushal
Kushal Poudel
Santosh Subedi
Ubaid Ur Rehman Janjua
Lise-Olga Makonga
Jyotirmoy Halder
Harsimardeep S. Gill
Mazhar Sher
Jagdeep Singh Sidhu
Sunish K. Sehgal
http://arxiv.org/abs/2601.06349v1
Fixing ill-formed UTF-16 strings with SIMD instructions
2026-01-09T23:09:42Z
UTF-16 is a widely used Unicode encoding representing characters with one or two 16-bit code units. The format relies on surrogate pairs to encode characters beyond the Basic Multilingual Plane, requiring a high surrogate followed by a low surrogate. Ill-formed UTF-16 strings -- where surrogates are mismatched -- can arise from data corruption or improper encoding, posing security and reliability risks. Consequently, programming languages such as JavaScript include functions to fix ill-formed UTF-16 strings by replacing mismatched surrogates with the Unicode replacement character (U+FFFD). We propose using Single Instruction, Multiple Data (SIMD) instructions to handle multiple code units in parallel, enabling faster and more efficient execution. Our software is part of the Google JavaScript engine (V8) and thus part of several major Web browsers.
2026-01-09T23:09:42Z
Robert Clausecker
Daniel Lemire
http://arxiv.org/abs/2511.17527v2
Bunny Hops and Blockchain Stops: Cross-Chain MEV Detection With N-Hops
2026-01-07T14:10:36Z
This student paper introduces a novel methodology for the detection and analysis of multihop cross-chain arbitrage opportunities, wherein multihop denotes arbitrage sequences involving more than two transactional steps across distinct blockchain networks, executed using sequence-dependent strategies. Utilizing a comprehensive dataset comprising over 2.4 billion transactions recorded between September 2023 and August 2024 (encompassing 12 blockchain platforms and 45 cross-chain bridges) we design and implement an algorithm capable of identifying, sequence-dependent arbitrage paths spanning multiple ecosystems. Our empirical analysis demonstrates that such arbitrage opportunities are exceedingly infrequent, underscoring the inherent challenges associated with multihop execution in cross-chain environments.
2025-10-24T13:20:12Z
Accepted manuscript. Published in Proceedings of the 2025 7th Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS), 2025, pp. 1-4. DOI: 10.1109/BRAINS67003.2025.11302948
Proceedings of the 2025 7th Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS), 2025, pp. 1-4
Davide Mancino
Hasret Ozan Sevim
Oriol Saguillo Gonzalez
10.1109/BRAINS67003.2025.11302948
http://arxiv.org/abs/2512.22422v1
S-BLE: A Participatory BLE Sensory Data Set Recorded from Real-World Bus Travel Events
2025-12-27T01:10:08Z
This contribution describes S-BLE, a data set created for supporting the design of robust and reliable Be-In-Be-Out systems in public transit. S-BLE was recorded by the smartphones of 28 participants during their daily transit routines in a university campus setting. 20 shuttle bus vehicles in the campus fleet were equipped with two Bluetooth low energy (BLE) beacons each. RSSI data from these beacons was recorded during regular rides, along with odometry information (from GPS) and data from the smartphone's inertial sensors. The article describes the system used for data collection and presents some statistics of interest for the recorded data.
2025-12-27T01:10:08Z
Jonathan Lam
Roberto Manduchi
http://arxiv.org/abs/2601.00809v1
A Modular Reference Architecture for MCP-Servers Enabling Agentic BIM Interaction
2025-12-21T23:12:26Z
Agentic workflows driven by large language models (LLMs) are increasingly applied to Building Information Modelling (BIM), enabling natural-language retrieval, modification and generation of IFC models. Recent work has begun adopting the emerging Model Context Protocol (MCP) as a uniform tool-calling interface for LLMs, simplifying the agent side of BIM interaction. While MCP standardises how LLMs invoke tools, current BIM-side implementations are still authoring tool-specific and ad hoc, limiting reuse, evaluation, and workflow portability across environments. This paper addresses this gap by introducing a modular reference architecture for MCP servers that enables API-agnostic, isolated and reproducible agentic BIM interactions. From a systematic analysis of recurring capabilities in recent literature, we derive a core set of requirements. These inform a microservice architecture centred on an explicit adapter contract that decouples the MCP interface from specific BIM-APIs. A prototype implementation using IfcOpenShell demonstrates feasibility across common modification and generation tasks. Evaluation across representative scenarios shows that the architecture enables reliable workflows, reduces coupling, and provides a reusable foundation for systematic research.
2025-12-21T23:12:26Z
Submitted to the GNI Symposium on Artificial Intelligence for the Built World (Technical University of Munich, May 18--20, 2026)
Tobias Heimig-Elschner
Changyu Du
Anna Scheuvens
André Borrmann
Jakob Beetz
http://arxiv.org/abs/2601.00808v1
Implementation of the Spherical Trigonometry Algorithm in a Qibla Direction Application
2025-12-20T07:10:53Z
This research explores the implementation of a spherical trigonometry algorithm in the development of QiblatKita, a mobile-based Qibla direction application designed to address the need for accurate and accessible prayer direction tools for Muslims, especially in the context of global mobility and diverse geographical settings. Built using the Flutter framework to ensure cross-platform compatibility and near-native performance, the application integrates critical device sensors, including GPS, magnetometer, and accelerometer, to collect real-time positional and orientation data. The Agile Software Development Lifecycle (SDLC) was adopted to facilitate iterative refinement and responsiveness to user feedback. By applying the Haversine formula and Spherical Law of Cosines, the system calculates the azimuth angle between the user's location and the Kaaba with high precision, achieving an angular deviation of less than one degree in testing. The results confirm that QiblatKita offers a stable, user-friendly, and scientifically grounded solution, effectively merging spherical trigonometry with modern mobile technology to support religious practice in the digital era.
2025-12-20T07:10:53Z
Wisnu Uriawan
Informatics Department, UIN Sunan Gunung Djati Bandung, Jawa Barat, Indonesia
Andika Nuralamsyah
Informatics Department, UIN Sunan Gunung Djati Bandung, Jawa Barat, Indonesia
Abidzar Giffari
Informatics Department, UIN Sunan Gunung Djati Bandung, Jawa Barat, Indonesia
Arief Rahman Mubarok
Informatics Department, UIN Sunan Gunung Djati Bandung, Jawa Barat, Indonesia
Aisyah Muthmainnah
Informatics Department, UIN Sunan Gunung Djati Bandung, Jawa Barat, Indonesia
Najwa Naura Salsabilla Herdiyana
Informatics Department, UIN Sunan Gunung Djati Bandung, Jawa Barat, Indonesia