Skip to main content

Showing 1–22 of 22 results for author: Asim, M

.
  1. arXiv:2402.07770  [pdf, other

    cs.IR cs.CL stat.AP

    Quantitative knowledge retrieval from large language models

    Authors: David Selby, Kai Spriestersbach, Yuichiro Iwashita, Dennis Bappert, Archana Warrier, Sumantrak Mukherjee, Muhammad Nabeel Asim, Koichi Kise, Sebastian Vollmer

    Abstract: Large language models (LLMs) have been extensively studied for their abilities to generate convincing natural language sequences, however their utility for quantitative information retrieval is less well understood. In this paper we explore the feasibility of LLMs as a mechanism for quantitative knowledge retrieval to aid data analysis tasks such as elicitation of prior distributions for Bayesian… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: 13 pages plus supplementary materials

  2. arXiv:2310.19057  [pdf, other

    cs.AI

    A Unique Training Strategy to Enhance Language Models Capabilities for Health Mention Detection from Social Media Content

    Authors: Pervaiz Iqbal Khan, Muhammad Nabeel Asim, Andreas Dengel, Sheraz Ahmed

    Abstract: An ever-increasing amount of social media content requires advanced AI-based computer programs capable of extracting useful information. Specifically, the extraction of health-related content from social media is useful for the development of diverse types of applications including disease spread, mortality rate prediction, and finding the impact of diverse types of drugs on diverse types of disea… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

  3. arXiv:2307.15995  [pdf, other

    eess.SP cs.IT

    Pathloss-based non-Line-of-Sight Identification in an Indoor Environment: An Experimental Study

    Authors: Muhammad Asim, Muhammad Ozair Iqbal, Waqas Aman, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi

    Abstract: This paper reports the findings of an experimental study on the problem of line-of-sight (LOS)/non-line-of-sight (NLOS) classification in an indoor environment. Specifically, we deploy a pair of NI 2901 USRP software-defined radios (SDR) in a large hall. The transmit SDR emits an unmodulated tone of frequency 10 KHz, on a center frequency of 2.4 GHz, using three different signal-to-noise ratios (S… ▽ More

    Submitted 29 July, 2023; originally announced July 2023.

    Comments: 5 pages, 4 figures, submitted to an IEEE conference

  4. arXiv:2306.03971  [pdf

    cs.SE

    A Review Of Progress for Component Based Software Cost Estimation From 1965 to 2023

    Authors: Muhammad Nadeem, Humaira Afzal, Muhammad. Idrees, Sajid Iqbal, M. Rafiq Asim

    Abstract: Component Based Software Engineering (CBSE) is used to develop software from Commercial Off the Shelf Components (COTs) with minimum cost and time. Component Based Software Cost Estimation (CBSCE) is an important pre-development activity for the successful planning and cost estimation of Components-Based Software Development (CBSD) that saves cost and time. Many researchers are putting their effor… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 4. International Antalya Scientific Research and Innovative Studies Congress May 9-10, 2023, Antalya, Türkiye

  5. arXiv:2007.14215  [pdf, other

    cs.DC cs.AI eess.SP

    A Review on Computational Intelligence Techniques in Cloud and Edge Computing

    Authors: Muhammad Asim, Yong Wang, Kezhi Wang, Pei-Qiu Huang

    Abstract: Cloud computing (CC) is a centralized computing paradigm that accumulates resources centrally and provides these resources to users through Internet. Although CC holds a large number of resources, it may not be acceptable by real-time mobile applications, as it is usually far away from users geographically. On the other hand, edge computing (EC), which distributes resources to the network edge, en… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: Accepted by IEEE Transactions on Emerging Topics in Computational Intelligence

  6. arXiv:2005.08447  [pdf, other

    cs.SD eess.AS

    Augmenting Generative Adversarial Networks for Speech Emotion Recognition

    Authors: Siddique Latif, Muhammad Asim, Rajib Rana, Sara Khalifa, Raja Jurdak, Björn W. Schuller

    Abstract: Generative adversarial networks (GANs) have shown potential in learning emotional attributes and generating new data samples. However, their performance is usually hindered by the unavailability of larger speech emotion recognition (SER) data. In this work, we propose a framework that utilises the mixup data augmentation scheme to augment the GAN in feature learning and generation. To show the eff… ▽ More

    Submitted 25 July, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted in INTERSPEECH 2020

  7. arXiv:2003.05443  [pdf

    cs.CL

    A Precisely Xtreme-Multi Channel Hybrid Approach For Roman Urdu Sentiment Analysis

    Authors: Faiza Memood, Muhammad Usman Ghani, Muhammad Ali Ibrahim, Rehab Shehzadi, Muhammad Nabeel Asim

    Abstract: In order to accelerate the performance of various Natural Language Processing tasks for Roman Urdu, this paper for the very first time provides 3 neural word embeddings prepared using most widely used approaches namely Word2vec, FastText, and Glove. The integrity of generated neural word embeddings is evaluated using intrinsic and extrinsic evaluation approaches. Considering the lack of publicly a… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

  8. arXiv:2003.01345  [pdf

    cs.CL cs.LG

    Benchmark Performance of Machine And Deep Learning Based Methodologies for Urdu Text Document Classification

    Authors: Muhammad Nabeel Asim, Muhammad Usman Ghani, Muhammad Ali Ibrahim, Sheraz Ahmad, Waqar Mahmood, Andreas Dengel

    Abstract: In order to provide benchmark performance for Urdu text document classification, the contribution of this paper is manifold. First, it pro-vides a publicly available benchmark dataset manually tagged against 6 classes. Second, it investigates the performance impact of traditional machine learning based Urdu text document classification methodologies by embedding 10 filter-based feature selection a… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

  9. arXiv:2003.00415  [pdf, other

    cs.LG stat.ML

    Advanced kNN: A Mature Machine Learning Series

    Authors: Muhammad Asim, Muaaz Zakria

    Abstract: k-nearest neighbour (kNN) is one of the most prominent, simple and basic algorithm used in machine learning and data mining. However, kNN has limited prediction ability, i.e., kNN cannot predict any instance correctly if it does not belong to any of the predefined classes in the training data set. The purpose of this paper is to suggest an Advanced kNN (A-kNN) algorithm that will be able to classi… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

    Comments: 2 figures

  10. arXiv:1909.12167  [pdf, other

    cs.CR cs.NI

    Adversarial Machine Learning Attack on Modulation Classification

    Authors: Muhammad Usama, Muhammad Asim, Junaid Qadir, Ala Al-Fuqaha, Muhammad Ali Imran

    Abstract: Modulation classification is an important component of cognitive self-driving networks. Recently many ML-based modulation classification methods have been proposed. We have evaluated the robustness of 9 ML-based modulation classifiers against the powerful Carlini \& Wagner (C-W) attack and showed that the current ML-based modulation classifiers do not provide any deterrence against adversarial ML… ▽ More

    Submitted 26 September, 2019; originally announced September 2019.

  11. arXiv:1909.05478  [pdf, other

    cs.CL cs.IR cs.LG

    A Robust Hybrid Approach for Textual Document Classification

    Authors: Muhammad Nabeel Asim, Muhammad Usman Ghani Khan, Muhammad Imran Malik, Andreas Dengel, Sheraz Ahmed

    Abstract: Text document classification is an important task for diverse natural language processing based applications. Traditional machine learning approaches mainly focused on reducing dimensionality of textual data to perform classification. This although improved the overall classification accuracy, the classifiers still faced sparsity problem due to lack of better data representation techniques. Deep l… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: ICDAR Conference

  12. arXiv:1908.07404  [pdf, other

    cs.CV

    Blind Image Deconvolution using Pretrained Generative Priors

    Authors: Muhammad Asim, Fahad Shamshad, Ali Ahmed

    Abstract: This paper proposes a novel approach to regularize the ill-posed blind image deconvolution (blind image deblurring) problem using deep generative networks. We employ two separate deep generative models - one trained to produce sharp images while the other trained to generate blur kernels from lower dimensional parameters. To deblur, we propose an alternating gradient descent scheme operating in th… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

    Comments: Accepted in BMVC 2019. Extended version of this paper can be found at arXiv:1802.04073

  13. arXiv:1905.11672  [pdf, other

    cs.CV

    Invertible generative models for inverse problems: mitigating representation error and dataset bias

    Authors: Muhammad Asim, Max Daniels, Oscar Leong, Ali Ahmed, Paul Hand

    Abstract: Trained generative models have shown remarkable performance as priors for inverse problems in imaging -- for example, Generative Adversarial Network priors permit recovery of test images from 5-10x fewer measurements than sparsity priors. Unfortunately, these models may be unable to represent any particular image because of architectural choices, mode collapse, and bias in the training dataset. In… ▽ More

    Submitted 12 July, 2020; v1 submitted 28 May, 2019; originally announced May 2019.

    Comments: Camera ready version for ICML 2020, paper 2655

  14. Motion Corrected Multishot MRI Reconstruction Using Generative Networks with Sensitivity Encoding

    Authors: Muhammad Usman, Muhammad Umar Farooq, Siddique Latif, Muhammad Asim, Junaid Qadir

    Abstract: Multishot Magnetic Resonance Imaging (MRI) is a promising imaging modality that can produce a high-resolution image with relatively less data acquisition time. The downside of multishot MRI is that it is very sensitive to subject motion and even small amounts of motion during the scan can produce artifacts in the final MR image that may cause misdiagnosis. Numerous efforts have been made to addres… ▽ More

    Submitted 11 March, 2020; v1 submitted 20 February, 2019; originally announced February 2019.

    Comments: This paper has been published in Scientific Reports Journal

  15. arXiv:1811.12488  [pdf, other

    cs.CV cs.LG stat.ML

    Leveraging Deep Stein's Unbiased Risk Estimator for Unsupervised X-ray Denoising

    Authors: Fahad Shamshad, Muhammad Awais, Muhammad Asim, Zain ul Aabidin Lodhi, Muhammad Umair, Ali Ahmed

    Abstract: Among the plethora of techniques devised to curb the prevalence of noise in medical images, deep learning based approaches have shown the most promise. However, one critical limitation of these deep learning based denoisers is the requirement of high-quality noiseless ground truth images that are difficult to obtain in many medical imaging applications such as X-rays. To circumvent this issue, we… ▽ More

    Submitted 29 November, 2018; originally announced November 2018.

    Comments: Machine Learning for Health (ML4H) Workshop at NeurIPS 2018 arXiv:1811.07216

    Report number: ML4H/2018/223

  16. arXiv:1811.09750  [pdf, other

    cs.CV

    Automating Motion Correction in Multishot MRI Using Generative Adversarial Networks

    Authors: Siddique Latif, Muhammad Asim, Muhammad Usman, Junaid Qadir, Rajib Rana

    Abstract: Multishot Magnetic Resonance Imaging (MRI) has recently gained popularity as it accelerates the MRI data acquisition process without compromising the quality of final MR image. However, it suffers from motion artifacts caused by patient movements which may lead to misdiagnosis. Modern state-of-the-art motion correction techniques are able to counter small degree motion, however, their adoption is… ▽ More

    Submitted 23 November, 2018; originally announced November 2018.

    Journal ref: MED-NIPS 2018

  17. arXiv:1802.04073  [pdf, other

    cs.CV

    Blind Image Deconvolution using Deep Generative Priors

    Authors: Muhammad Asim, Fahad Shamshad, Ali Ahmed

    Abstract: This paper proposes a novel approach to regularize the \textit{ill-posed} and \textit{non-linear} blind image deconvolution (blind deblurring) using deep generative networks as priors. We employ two separate generative models --- one trained to produce sharp images while the other trained to generate blur kernels from lower-dimensional parameters. To deblur, we propose an alternating gradient desc… ▽ More

    Submitted 26 February, 2019; v1 submitted 12 February, 2018; originally announced February 2018.

  18. On the security defects of an image encryption scheme

    Authors: Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen

    Abstract: This paper studies the security of a recently-proposed chaos-based image encryption scheme, and points out the following problems: 1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; 2) given one chosen plain-image, a subkey $K_{10}$ can be guessed with a smaller computational complexity than that of the simple brute-force attack… ▽ More

    Submitted 8 October, 2016; originally announced October 2016.

    Comments: 14 pages; 8 figures; 5 tables

    MSC Class: 94A60

    Journal ref: Image and Vision Computing, 27(9): 1371-1381, 2009

  19. arXiv:1205.5757  [pdf, other

    cs.CR

    Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption

    Authors: Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone

    Abstract: Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed system, but none of them addresses the dynamicity characterizing virtual organizations. In this paper w… ▽ More

    Submitted 25 May, 2012; originally announced May 2012.

  20. arXiv:1202.2511  [pdf

    cs.SE

    A Step Forward To Component-based Software Cost Estimation in Object-oriented Environment

    Authors: Nadeem Ahmed, M. Rafiq Asim, M. Rizwan Jameel Qureshi

    Abstract: Software cost estimation (SCE) of a project is pivotal to the acceptance or rejection of the development of software project. Various SCE techniques have been in practice with their own strengths and limitations. The latest of these is object-oriented one. Currently object-oriented approach for SCE is based on Line of Code (LOC), function points, functions and classes etc. Relatively less attentio… ▽ More

    Submitted 12 February, 2012; originally announced February 2012.

    Comments: ISSN: 0030-9877

    Journal ref: Pakistan Journal of Science, Vol. 62/4, December 2010, pp. 250-257

  21. arXiv:1202.2510  [pdf

    cs.SE

    A New Teaching Model For The Subject Of Software Project Management

    Authors: M. Rizwan Jameel Qureshi, Muhammad Rafiq Asim, Muhammad Nadeem, Asif Mehmood

    Abstract: Software (SW) development is a very tough task which requires a skilled project leader for its success. If the project leader is not skilled enough then project may fail. In the real world of SW engineering 65% of the SW projects fail to meet their objectives as in [1]. The main reason is lack of training of the project mangers. This extreme ratio of failure can be reduced by teaching SW project m… ▽ More

    Submitted 12 February, 2012; originally announced February 2012.

    Comments: 9 Pages; ISSN: 1013-5316, CODEN: SINTE 8

    Journal ref: Science International-Lahore, Vol. 22/1, March 2010, pp. 295-303

  22. arXiv:1011.5072  [pdf

    cs.NI

    A self-managing fault management mechanism for wireless sensor networks

    Authors: Muhammad Asim, Hala Mokhtar, Madjid Merabti

    Abstract: A sensor network can be described as a collection of sensor nodes which co-ordinate with each other to perform some specific function. These sensor nodes are mainly in large numbers and are densely deployed either inside the phenomenon or very close to it. They can be used for various application areas (e.g. health, military, home). Failures are inevitable in wireless sensor networks due to inhosp… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 14 pages, 5 figures, Journal

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010