Skip to main content

Showing 1–28 of 28 results for author: Basit, A

.
  1. arXiv:2403.19992  [pdf, other

    cs.AI cs.HC cs.RO

    MindArm: Mechanized Intelligent Non-Invasive Neuro-Driven Prosthetic Arm System

    Authors: Maha Nawaz, Abdul Basit, Muhammad Shafique

    Abstract: Currently, people with disability or difficulty to move their arms (referred to as "patients") have very limited technological solutions to efficiently address their physiological limitations. It is mainly due to two reasons: (1) the non-invasive solutions like mind-controlled prosthetic devices are typically very costly and require expensive maintenance; and (2) other solutions require costly inv… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: 8 pages, 21 figures, paper submitted to IROS 24, authors affiliated to NYUAD

    ACM Class: I.2.9

  2. arXiv:2403.09428  [pdf, other

    cs.LG

    Borrowing Treasures from Neighbors: In-Context Learning for Multimodal Learning with Missing Modalities and Data Scarcity

    Authors: Zhuo Zhi, Ziquan Liu, Moe Elbadawi, Adam Daneshmend, Mine Orlu, Abdul Basit, Andreas Demosthenous, Miguel Rodrigues

    Abstract: Multimodal machine learning with missing modalities is an increasingly relevant challenge arising in various applications such as healthcare. This paper extends the current research into missing modalities to the low-data regime, i.e., a downstream task has both missing modalities and limited sample size issues. This problem setting is particularly challenging and also practical as it is often exp… ▽ More

    Submitted 26 March, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

  3. arXiv:2403.02627  [pdf, other

    cs.CG math.CO

    Eight-Partitioning Points in 3D, and Efficiently Too

    Authors: Boris Aronov, Abdul Basit, Indu Ramesh, Gianluca Tasinato, Uli Wagner

    Abstract: An \emph{eight-partition} of a finite set of points (respectively, of a continuous mass distribution) in $\mathbb{R}^3$ consists of three planes that divide the space into $8$ octants, such that each open octant contains at most $1/8$ of the points (respectively, of the mass). In 1966, Hadwiger showed that any mass distribution in $\mathbb{R}^3$ admits an eight-partition; moreover, one can prescri… ▽ More

    Submitted 16 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: 22 pages, 3 figures, preliminary version to appear in SoCG'24

    MSC Class: 52-08; 52C45; 52C35; 68Q25

  4. arXiv:2403.00830  [pdf, other

    cs.AI cs.CL

    MedAide: Leveraging Large Language Models for On-Premise Medical Assistance on Edge Devices

    Authors: Abdul Basit, Khizar Hussain, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Large language models (LLMs) are revolutionizing various domains with their remarkable natural language processing (NLP) abilities. However, deploying LLMs in resource-constrained edge computing and embedded systems presents significant challenges. Another challenge lies in delivering medical assistance in remote areas with limited healthcare facilities and infrastructure. To address this, we intr… ▽ More

    Submitted 28 February, 2024; originally announced March 2024.

    Comments: 7 pages, 11 figures, ACM conference paper, 33 references

    ACM Class: I.2.7

  5. arXiv:2402.01574  [pdf, other

    eess.SP

    DRL-Based Dynamic Channel Access and SCLAR Maximization for Networks Under Jamming

    Authors: Abdul Basit, Muddasir Rahim, Georges Kaddoum, Tri Nhu Do, Nadir Adam

    Abstract: This paper investigates a deep reinforcement learning (DRL)-based approach for managing channel access in wireless networks. Specifically, we consider a scenario in which an intelligent user device (iUD) shares a time-varying uplink wireless channel with several fixed transmission schedule user devices (fUDs) and an unknown-schedule malicious jammer. The iUD aims to harmoniously coexist with the f… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  6. arXiv:2401.12002  [pdf, other

    cs.LG

    HgbNet: predicting hemoglobin level/anemia degree from EHR data

    Authors: Zhuo Zhi, Moe Elbadawi, Adam Daneshmend, Mine Orlu, Abdul Basit, Andreas Demosthenous, Miguel Rodrigues

    Abstract: Anemia is a prevalent medical condition that typically requires invasive blood tests for diagnosis and monitoring. Electronic health records (EHRs) have emerged as valuable data sources for numerous medical studies. EHR-based hemoglobin level/anemia degree prediction is non-invasive and rapid but still faces some challenges due to the fact that EHR data is typically an irregular multivariate time… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

  7. arXiv:2401.11670  [pdf, other

    quant-ph

    Effects of reservoir squeezing on the amplification of quantum correlation

    Authors: Zhaorui Peng, Lucas C. Céleri, Abdul Basit, Gao Xianlong

    Abstract: The dynamics of quantum discord is studied in a system of two identical noninteracting qubits coupled to a common squeezed vacuum bath through non-demolition interactions. We concern on how reservoir squeezing influences the dynamical behaviors of quantum discord when both qubits are initially prepared in $X$-type states. We find that the critical time exhibits the sudden change of quantum discord… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

    Comments: 12 pages, 8 figures

  8. arXiv:2309.15391  [pdf, other

    stat.ME

    A Risk-Ratio-Based Marginal Sensitivity Model for Causal Effects in Observational Studies

    Authors: Md Abdul Basit, Mahbub A. H. M. Latif, Abdus S Wahed

    Abstract: In observational studies, the identification of causal estimands depends on the no unmeasured confounding (NUC) assumption. As this assumption is not testable from observed data, sensitivity analysis plays an important role in observational studies to investigate the impact of unmeasured confounding on the causal conclusions. In this paper, we proposed a risk-ratio-based sensitivity analysis frame… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  9. arXiv:2309.09236  [pdf, other

    cs.CV cs.AI cs.CY cs.LG

    Detection and Localization of Firearm Carriers in Complex Scenes for Improved Safety Measures

    Authors: Arif Mahmood, Abdul Basit, M. Akhtar Munir, Mohsen Ali

    Abstract: Detecting firearms and accurately localizing individuals carrying them in images or videos is of paramount importance in security, surveillance, and content customization. However, this task presents significant challenges in complex environments due to clutter and the diverse shapes of firearms. To address this problem, we propose a novel approach that leverages human-firearm interaction informat… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

    Comments: This paper is accepted in IEEE Transactions on Computational Social Systems

  10. arXiv:2308.15986  [pdf, ps, other

    stat.ME

    Sensitivity Analysis of Inverse Probability Weighting Estimators of Causal Effects in Observational Studies with Multivalued Treatments

    Authors: Md Abdul Basit, Mahbub A. H. M. Latif, Abdus S Wahed

    Abstract: One of the fundamental challenges in drawing causal inferences from observational studies is that the assumption of no unmeasured confounding is not testable from observed data. Therefore, assessing sensitivity to this assumption's violation is important to obtain valid causal conclusions in observational studies. Although several sensitivity analysis frameworks are available in the casual inferen… ▽ More

    Submitted 23 June, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

  11. arXiv:2307.13257  [pdf, ps, other

    math.CO

    Covering triangular grids with multiplicity

    Authors: Abdul Basit, Alexander Clifton, Paul Horn

    Abstract: Motivated by classical work of Alon and Füredi, we introduce and address the following problem: determine the minimum number of affine hyperplanes in $\mathbb{R}^d$ needed to cover every point of the triangular grid $T_d(n) := \{(x_1,\dots,x_d)\in\mathbb{Z}_{\ge 0}^d\mid x_1+\dots+x_d\le n-1\}$ at least $k$ times. For $d = 2$, we solve the problem exactly for $k \leq 4$, and obtain a partial solut… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: 23 pages, 3 figures

    MSC Class: 05D99

  12. arXiv:2204.04568  [pdf, ps, other

    math.CO

    Generalized Tuza's conjecture for random hypergraphs

    Authors: Abdul Basit, David Galvin

    Abstract: A celebrated conjecture of Tuza states that in any finite graph the minimum size of a cover of triangles by edges is at most twice the maximum size of a set of edge-disjoint triangles. For an $r$-uniform hypergraph ($r$-graph) $G$, let $τ(G)$ be the minimum size of a cover of edges by $(r-1)$-sets of vertices, and let $ν(G)$ be the maximum size of a set of edges pairwise intersecting in fewer than… ▽ More

    Submitted 14 May, 2024; v1 submitted 9 April, 2022; originally announced April 2022.

    Comments: 32 pages including references and appendix; minor corrections throughout the article; accepted to SIAM J. Discrete Math

    MSC Class: 05D15; 05D40

  13. Partitioning axis-parallel lines in 3D

    Authors: Boris Aronov, Abdul Basit, Mark de Berg, Joachim Gudmundsson

    Abstract: Let $L$ be a set of $n$ axis-parallel lines in $\mathbb{R}^3$. We are are interested in partitions of $\mathbb{R}^3$ by a set $H$ of three planes such that each open cell in the arrangement $\mathcal{A}(H)$ is intersected by as few lines from $L$ as possible. We study such partitions in three settings, depending on the type of splitting planes that we allow. We obtain the following results.… ▽ More

    Submitted 21 December, 2023; v1 submitted 4 April, 2022; originally announced April 2022.

    Comments: 21 pages, minor changes, accepted to Computing in Geometry and Topology

    MSC Class: 52-08; 52C45; 52C35; 68Q25;

    Journal ref: Computing in Geometry and Topology, 2.1(2023), 9:1-9:20

  14. Improved bounds on a generalization of Tuza's conjecture

    Authors: Abdul Basit, Daniel McGinnis, Henry Simmons, Matt Sinnwell, Shira Zerbib

    Abstract: For an $r$-uniform hypergraph $H$, let $ν^{(m)}(H)$ denote the maximum size of a set~$M$ of edges in $H$ such that every two edges in $M$ intersect in less than $m$ vertices, and let $τ^{(m)}(H)$ denote the minimum size of a collection $C$ of $m$-sets of vertices such that every edge in $H$ contains an element of $C$. The fractional analogues of these parameters are denoted by $ν^{*(m)}(H)$ and… ▽ More

    Submitted 10 October, 2022; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: 23 pages; minor corrections throughout the article, updated references; accepted to the Electron. J. Combin

    MSC Class: 05C65; 05D15

    Journal ref: Electronic Journal of Combinatorics, 29 (2022), article P4.14

  15. arXiv:2106.03042  [pdf

    cs.SE cs.IR

    Clone-Seeker: Effective Code Clone Search Using Annotations

    Authors: Muhammad Hammad, Önder Babur, Hamid Abdul Basit, Mark van den Brand

    Abstract: Source code search plays an important role in software development, e.g. for exploratory development or opportunistic reuse of existing code from a code base. Often, exploration of different implementations with the same functionality is needed for tasks like automated software transplantation, software diversification, and software repair. Code clones, which are syntactically or semantically simi… ▽ More

    Submitted 6 June, 2021; originally announced June 2021.

  16. arXiv:2010.00964  [pdf, other

    cs.SE

    Augmenting Machine Learning with Information Retrieval to Recommend Real Cloned Code Methods for Code Completion

    Authors: Muhammad Hammad, Önder Babur, Hamid Abdul Basit

    Abstract: Software developers frequently reuse source code from repositories as it saves development time and effort. Code clones accumulated in these repositories hence represent often repeated functionalities and are candidates for reuse in an exploratory or rapid development. In previous work, we introduced DeepClone, a deep neural network model trained by fine tuning GPT-2 model over the BigCloneBench d… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

  17. arXiv:2009.02922  [pdf, ps, other

    math.CO math.LO

    Zarankiewicz's problem for semilinear hypergraphs

    Authors: Abdul Basit, Artem Chernikov, Sergei Starchenko, Terence Tao, Chieu-Minh Tran

    Abstract: A bipartite graph $H = \left(V_1, V_2; E \right)$ with $|V_1| + |V_2| = n$ is semilinear if $V_i \subseteq \mathbb{R}^{d_i}$ for some $d_i$ and the edge relation $E$ consists of the pairs of points $(x_1, x_2) \in V_1 \times V_2$ satisfying a fixed Boolean combination of $s$ linear equalities and inequalities in $d_1 + d_2$ variables for some $s$. We show that for a fixed $k$, the number of edges… ▽ More

    Submitted 23 July, 2021; v1 submitted 7 September, 2020; originally announced September 2020.

    Comments: v.2: 32 pages; minor corrections throughout the article, updated references; accepted to the Forum of Mathematics, Sigma

    MSC Class: 05D10; 52C10; 52C45; 03C45; 03C64

  18. arXiv:2007.11671  [pdf, other

    cs.SE

    DeepClone: Modeling Clones to Generate Code Predictions

    Authors: Muhammad Hammad, Önder Babur, Hamid Abdul Basit, Mark van den Brand

    Abstract: Programmers often reuse code from source code repositories to reduce the development effort. Code clones are candidates for reuse in exploratory or rapid development, as they represent often repeated functionality in software systems. To facilitate code clone reuse, we propose DeepClone, a novel approach utilizing a deep learning algorithm for modeling code clones to predict the next set of tokens… ▽ More

    Submitted 5 December, 2020; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: 16 pages

  19. arXiv:2006.12562  [pdf, ps, other

    math.CO

    On the independent set sequence of a tree

    Authors: Abdul Basit, David Galvin

    Abstract: Alavi, Malde, Schwenk and Erdős asked whether the independent set sequence of every tree is unimodal. Here we make some observations about this question. We show that for the uniformly random (labelled) tree, asymptotically almost surely (a.a.s.) the initial approximately 49.5\% of the sequence is increasing while the terminal approximately 38.8\% is decreasing. Our approach uses the Matrix Tree T… ▽ More

    Submitted 3 July, 2021; v1 submitted 22 June, 2020; originally announced June 2020.

    Comments: To appear in Electron. J. Combin.. This version corrects some errors from the previous version, and clarifies the analysis

    MSC Class: 05C05; 05C30; 05C69

  20. arXiv:2005.09329  [pdf, other

    cs.CV

    Localizing Firearm Carriers by Identifying Human-Object Pairs

    Authors: Abdul Basit, Muhammad Akhtar Munir, Mohsen Ali, Arif Mahmood

    Abstract: Visual identification of gunmen in a crowd is a challenging problem, that requires resolving the association of a person with an object (firearm). We present a novel approach to address this problem, by defining human-object interaction (and non-interaction) bounding boxes. In a given image, human and firearms are separately detected. Each detected human is paired with each detected firearm, allow… ▽ More

    Submitted 20 May, 2020; v1 submitted 19 May, 2020; originally announced May 2020.

    Comments: 5 pages, accepted in IEEE ICIP 2020

  21. arXiv:1902.07438  [pdf

    cs.CV

    Dynamic Matrix Decomposition for Action Recognition

    Authors: Abdul Basit

    Abstract: Designing a technique for the automatic analysis of different actions in videos in order to detect the presence of interested activities is of high significance nowadays. In this paper, we explore a robust and dynamic appearance technique for the purpose of identifying different action activities. We also exploit a low-rank and structured sparse matrix decomposition (LSMD) method to better model t… ▽ More

    Submitted 20 February, 2019; originally announced February 2019.

  22. arXiv:1901.06091  [pdf

    cs.LG stat.ML

    Transfer Learning and Meta Classification Based Deep Churn Prediction System for Telecom Industry

    Authors: Uzair Ahmed, Asifullah Khan, Saddam Hussain Khan, Abdul Basit, Irfan Ul Haq, Yeon Soo Lee

    Abstract: A churn prediction system guides telecom service providers to reduce revenue loss. However, the development of a churn prediction system for a telecom industry is a challenging task, mainly due to the large size of the data, high dimensional features, and imbalanced distribution of the data. In this paper, we present a solution to the inherent problems of churn prediction, using the concept of Tra… ▽ More

    Submitted 5 March, 2019; v1 submitted 18 January, 2019; originally announced January 2019.

    Comments: Number of Pages: 10 Number of Figures:4 Number of Tables: 4

  23. An improved sum-product bound for quaternions

    Authors: Abdul Basit, Ben Lund

    Abstract: We show that there exists an absolute constant $c > 0$, such that, for any finite set $A$ of quaternions, \[ \max\{|A+A, |AA| \} \gtrsim |A|^{4/3 + c}. \] This generalizes a sum-product bound for real numbers proved by Konyagin and Shkredov.

    Submitted 10 November, 2021; v1 submitted 6 September, 2018; originally announced September 2018.

    Comments: Appeared in SIAM J. Discrete Math. This version corrects some errors from the previous version, and clarifies the analysis

    Journal ref: SIAM J. Discrete Math., 33(2), 1044-1060, 2019

  24. Lightweight Cryptography for Distributed PKI Based MANETS

    Authors: N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah

    Abstract: Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any fixed infrastructure and centralized authority. In this pa… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.2, March 2018

  25. arXiv:1803.09405  [pdf

    cs.CL

    Automatic Identification of Closely-related Indian Languages: Resources and Experiments

    Authors: Ritesh Kumar, Bornini Lahiri, Deepak Alok, Atul Kr. Ojha, Mayank Jain, Abdul Basit, Yogesh Dawer

    Abstract: In this paper, we discuss an attempt to develop an automatic language identification system for 5 closely-related Indo-Aryan languages of India, Awadhi, Bhojpuri, Braj, Hindi and Magahi. We have compiled a comparable corpora of varying length for these languages from various resources. We discuss the method of creation of these corpora in detail. Using these corpora, a language identification syst… ▽ More

    Submitted 26 March, 2018; originally announced March 2018.

    Comments: Paper accepted at the 4th Workshop in Indian Languages Data and Resources (WILDRE - 4), 11th edition of the Language Resources and Evaluation Conference (LREC - 2018), 7-12 May 2018, Miyazaki (Japan)

  26. arXiv:1711.07886  [pdf

    cs.LG q-bio.QM stat.ML

    Training large margin host-pathogen protein-protein interaction predictors

    Authors: Abdul Hannan Basit, Wajid Arshad Abbasi, Amina Asif, Fayyaz Ul Amir Afsar Minhas

    Abstract: Detection of protein-protein interactions (PPIs) plays a vital role in molecular biology. Particularly, infections are caused by the interactions of host and pathogen proteins. It is important to identify host-pathogen interactions (HPIs) to discover new drugs to counter infectious diseases. Conventional wet lab PPI prediction techniques have limitations in terms of large scale application and bud… ▽ More

    Submitted 21 November, 2017; originally announced November 2017.

    Comments: 12 pages

    Report number: Vol. 16, No. 04 1850014

    Journal ref: Journal of Bioinformatics and Computational Biology 2018

  27. Node Authentication Using BLS Signature in Distributed PKI Based MANETS

    Authors: N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, Y. V. Subba Rao

    Abstract: Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity-based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adapt it to MANET, the job of the CA must be di… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Journal ref: International Journal of Network Security & Its Applications (IJNSA) Vol.9, No.4, July 2017

  28. On the number of ordinary lines determined by sets in complex space

    Authors: Abdul Basit, Zeev Dvir, Shubhangi Saraf, Charles Wolf

    Abstract: Kelly's theorem states that a set of $n$ points affinely spanning $\mathbb{C}^3$ must determine at least one ordinary complex line (a line passing through exactly two of the points). Our main theorem shows that such sets determine at least $3n/2$ ordinary lines, unless the configuration has $n-1$ points in a plane and one point outside the plane (in which case there are at least $n-1$ ordinary lin… ▽ More

    Submitted 10 November, 2021; v1 submitted 26 November, 2016; originally announced November 2016.

    Comments: Appeared in Discrete Comput. Geom. This version corrects some errors from the previous version, and clarifies the analysis

    Journal ref: Discrete Comput Geom 61, 778-808 (2019)