Skip to main content

Showing 1–15 of 15 results for author: Ghafoor, S

.
  1. arXiv:2310.17032  [pdf, other

    quant-ph cs.LG

    Quantum Long Short-Term Memory (QLSTM) vs Classical LSTM in Time Series Forecasting: A Comparative Study in Solar Power Forecasting

    Authors: Saad Zafar Khan, Nazeefa Muzammil, Salman Ghafoor, Haibat Khan, Syed Mohammad Hasan Zaidi, Abdulah Jeza Aljohani, Imran Aziz

    Abstract: Accurate solar power forecasting is pivotal for the global transition towards sustainable energy systems. This study conducts a meticulous comparison between Quantum Long Short-Term Memory (QLSTM) and classical Long Short-Term Memory (LSTM) models for solar power production forecasting. The primary objective is to evaluate the potential advantages of QLSTMs, leveraging their exponential representa… ▽ More

    Submitted 9 April, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: 33 pages, 9 figures

  2. arXiv:2206.08278  [pdf, other

    cs.NI

    Securing Automotive Architectures with Named Data Networking

    Authors: Zachariah Threet, Christos Papadopoulos, William Lambert, Proyash Podder, Spiros Thanasoulas, Alex Afanasyev, Sheikh Ghafoor, Susmit Shannigrahi

    Abstract: As in-vehicle communication becomes more complex, the automotive community is exploring various architectural options such as centralized and zonal architectures for their numerous benefits. Zonal architecture reduces the wiring cost by physically locating related operations and ECUs near their intended functions and the number of physical ECUs through function consolidation. Centralized architect… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  3. A mathematical modelling portrait of Wnt signalling in early vertebrate embryogenesis

    Authors: Claudiu V. Giuraniuc, Shabana Zain, Shahmama Ghafoor, Stefan Hoppler

    Abstract: There are two phases of Wnt signalling in early vertebrate embryogenesis: very early, maternal Wnt signalling promotes dorsal development, and slightly later, zygotic Wnt signalling promotes ventral and lateral mesoderm induction. However, recent molecular biology analysis has revealed more complexity among the direct Wnt target genes, with at least five classes. Here in order to test the logic an… ▽ More

    Submitted 1 July, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Journal ref: Journal of Theoretical Biology 551-552 (2022) 111239

  4. arXiv:2111.13852  [pdf, other

    eess.SP

    Analogue Radio over Fiber aided Multi-service Communications for High Speed Trains

    Authors: Yichuan Li, Salman Ghafoor, Mohammed El-Hajjar

    Abstract: High speed trains (HST) have gradually become an essential means of transportation, where given our digital world, it is expected that passengers will be connected all the time. More specifically, the on-board passengers require fast mobile connections, which cannot be provided by the currently implemented cellular networks. Hence, in this article, we propose an analogue radio over fiber (A-RoF) a… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

  5. arXiv:2101.09429  [pdf, other

    cs.AI cs.LG

    Explainable Artificial Intelligence Approaches: A Survey

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh Khaled Ghafoor, Mohiuddin Ahmed

    Abstract: The lack of explainability of a decision from an Artificial Intelligence (AI) based "black box" system/model, despite its superiority in many real-world applications, is a key stumbling block for adopting AI in many high stakes applications of different domain or industry. While many popular Explainable Artificial Intelligence (XAI) methods or approaches are available to facilitate a human-friendl… ▽ More

    Submitted 23 January, 2021; originally announced January 2021.

  6. arXiv:1911.10104  [pdf, other

    cs.AI q-fin.RM

    Towards Quantification of Explainability in Explainable Artificial Intelligence Methods

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor

    Abstract: Artificial Intelligence (AI) has become an integral part of domains such as security, finance, healthcare, medicine, and criminal justice. Explaining the decisions of AI systems in human terms is a key challenge--due to the high complexity of the model, as well as the potential implications on human interests, rights, and lives . While Explainable AI is an emerging field of research, there is no c… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: Submitted to FLAIRS-33

  7. arXiv:1911.09858  [pdf, other

    cs.LG q-fin.RM stat.ML

    Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Sid C. Bundy, Douglas A. Talbert, Ambareen Siraj

    Abstract: In the area of credit risk analytics, current Bankruptcy Prediction Models (BPMs) struggle with (a) the availability of comprehensive and real-world data sets and (b) the presence of extreme class imbalance in the data (i.e., very few samples for the minority class) that degrades the performance of the prediction model. Moreover, little research has compared the relative performance of well-known… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: Under review in Expert Systems with Applications

  8. arXiv:1911.09853  [pdf, other

    cs.AI cs.CR

    Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, Mike Rogers

    Abstract: Artificial Intelligence (AI) has become an integral part of modern-day security solutions for its ability to learn very complex functions and handling "Big Data". However, the lack of explainability and interpretability of successful AI models is a key stumbling block when trust in a model's prediction is critical. This leads to human intervention, which in turn results in a delayed response or de… ▽ More

    Submitted 22 February, 2020; v1 submitted 21 November, 2019; originally announced November 2019.

    Comments: Accepted to be published in the Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice (AAAI-MAKE 2020). Stanford University, Palo Alto, California, USA, March 23-25, 2020

  9. arXiv:1909.11762  [pdf, other

    cs.DC

    Extending the Message Passing Interface (MPI) with User-Level Schedules

    Authors: Derek Schafer, Sheikh Ghafoor, Daniel Holmes, Martin Ruefenacht, Anthony Skjellum

    Abstract: Composability is one of seven reasons for the long-standing and continuing success of MPI. Extending MPI by composing its operations with user-level operations provides useful integration with the progress engine and completion notification methods of MPI. However, the existing extensibility mechanism in MPI (generalized requests) is not widely utilized and has significant drawbacks. MPI can be… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  10. arXiv:1905.11474  [pdf, other

    cs.AI cs.LG

    Infusing domain knowledge in AI-based "black box" models for better explainability with application in bankruptcy prediction

    Authors: Sheikh Rabiul Islam, William Eberle, Sid Bundy, Sheikh Khaled Ghafoor

    Abstract: Although "black box" models such as Artificial Neural Networks, Support Vector Machines, and Ensemble Approaches continue to show superior performance in many disciplines, their adoption in the sensitive disciplines (e.g., finance, healthcare) is questionable due to the lack of interpretability and explainability of the model. In fact, future adoption of "black box" models is difficult because of… ▽ More

    Submitted 30 May, 2019; v1 submitted 27 May, 2019; originally announced May 2019.

    Comments: Under review in KDD, 2019 : 2nd KDD Workshop on Anomaly Detection in Finance

  11. arXiv:1904.11441  [pdf, other

    cs.NI

    MAC Protocols for Terahertz Communication: A Comprehensive Survey

    Authors: Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy

    Abstract: Terahertz communication is emerging as a future technology to support Terabits per second link with highlighting features as high throughput and negligible latency. However, the unique features of the Terahertz band such as high path loss, scattering and reflection pose new challenges and results in short communication distance. The antenna directionality, in turn, is required to enhance the commu… ▽ More

    Submitted 16 July, 2020; v1 submitted 25 April, 2019; originally announced April 2019.

    Comments: Submitted to IEEE Communication Surveys and Tutorials Journal

  12. arXiv:1811.07767  [pdf, other

    cs.CV

    Injecting and removing malignant features in mammography with CycleGAN: Investigation of an automated adversarial attack using neural networks

    Authors: Anton S. Becker, Lukas Jendele, Ondrej Skopek, Nicole Berger, Soleen Ghafoor, Magda Marcon, Ender Konukoglu

    Abstract: $\textbf{Purpose}$ To train a cycle-consistent generative adversarial network (CycleGAN) on mammographic data to inject or remove features of malignancy, and to determine whether these AI-mediated attacks can be detected by radiologists. $\textbf{Material and Methods}… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: To be presented at RSNA 2018

    MSC Class: 68T45

  13. arXiv:1807.01176  [pdf

    cs.LG stat.ML

    Credit Default Mining Using Combined Machine Learning and Heuristic Approach

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh Khaled Ghafoor

    Abstract: Predicting potential credit default accounts in advance is challenging. Traditional statistical techniques typically cannot handle large amounts of data and the dynamic nature of fraud and humans. To tackle this problem, recent research has focused on artificial and computational intelligence based approaches. In this work, we present and validate a heuristic approach to mine potential default acc… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Comments: Accepted for ICDATA, 2018

  14. arXiv:1807.00939  [pdf, other

    q-fin.ST cs.LG stat.ML

    Mining Illegal Insider Trading of Stocks: A Proactive Approach

    Authors: Sheikh Rabiul Islam, Sheikh Khaled Ghafoor, William Eberle

    Abstract: Illegal insider trading of stocks is based on releasing non-public information (e.g., new product launch, quarterly financial report, acquisition or merger plan) before the information is made public. Detecting illegal insider trading is difficult due to the complex, nonlinear, and non-stationary nature of the stock market. In this work, we present an approach that detects and predicts illegal ins… ▽ More

    Submitted 7 November, 2018; v1 submitted 2 July, 2018; originally announced July 2018.

    Comments: Accepted in IEEE BigData 2018

    Journal ref: 2018 IEEE International Conference on Big Data (Big Data)

  15. Mining Bad Credit Card Accounts from OLAP and OLTP

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh Khaled Ghafoor

    Abstract: Credit card companies classify accounts as a good or bad based on historical data where a bad account may default on payments in the near future. If an account is classified as a bad account, then further action can be taken to investigate the actual nature of the account and take preventive actions. In addition, marking an account as "good" when it is actually bad, could lead to loss of revenue -… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Comments: Conference proceedings of ICCDA, 2017

    Journal ref: Islam, S. R., Eberle, W., & Ghafoor, S. K. (2017, May). Mining Bad Credit Card Accounts from OLAP and OLTP. In Proceedings of the International Conference on Compute and Data Analysis (pp. 129-137). ACM