Skip to main content

Showing 1–50 of 81 results for author: Hussain, F

.
  1. arXiv:2405.02569  [pdf, other

    cs.LG cs.AI

    Decoupling Exploration and Exploitation for Unsupervised Pre-training with Successor Features

    Authors: JaeYoon Kim, Junyu Xuan, Christy Liang, Farookh Hussain

    Abstract: Unsupervised pre-training has been on the lookout for the virtue of a value function representation referred to as successor features (SFs), which decouples the dynamics of the environment from the rewards. It has a significant impact on the process of task-specific fine-tuning due to the decomposition. However, existing approaches struggle with local optima due to the unified intrinsic reward of… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: IJCNN 2024

  2. arXiv:2401.07194  [pdf, other

    cs.DC

    Resource Allocation of Industry 4.0 Micro-Service Applications across Serverless Fog Federation

    Authors: Razin Farhan Hussain, Mohsen Amini Salehi

    Abstract: The Industry 4.0 revolution has been made possible via AI-based applications (e.g., for automation and maintenance) deployed on the serverless edge (aka fog) computing platforms at the industrial sites -- where the data is generated. Nevertheless, fulfilling the fault-intolerant and real-time constraints of Industry 4.0 applications on resource-limited fog systems in remote industrial sites (e.g.,… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: Accepted in the Future Generation Computer Systems (FGCS) Journal

  3. arXiv:2311.15163  [pdf, other

    cs.CV

    Deep Learning-Based Approaches for Contactless Fingerprints Segmentation and Extraction

    Authors: M. G. Sarwar Murshed, Syed Konain Abbas, Sandip Purnapatra, Daqing Hou, Faraz Hussain

    Abstract: Fingerprints are widely recognized as one of the most unique and reliable characteristics of human identity. Most modern fingerprint authentication systems rely on contact-based fingerprints, which require the use of fingerprint scanners or fingerprint sensors for capturing fingerprints during the authentication process. Various types of fingerprint sensors, such as optical, capacitive, and ultras… ▽ More

    Submitted 25 November, 2023; originally announced November 2023.

  4. arXiv:2308.16122  [pdf, other

    cs.LG

    Spatial Graph Coarsening: Weather and Weekday Prediction with London's Bike-Sharing Service using GNN

    Authors: Yuta Sato, Pak Hei Lam, Shruti Gupta, Fareesah Hussain

    Abstract: This study introduced the use of Graph Neural Network (GNN) for predicting the weather and weekday of a day in London, from the dataset of Santander Cycles bike-sharing system as a graph classification task. The proposed GNN models newly introduced (i) a concatenation operator of graph features with trained node embeddings and (ii) a graph coarsening operator based on geographical contiguity, name… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

  5. arXiv:2308.03767  [pdf, other

    cs.CV cs.AI cs.CL eess.IV

    Enhancing image captioning with depth information using a Transformer-based framework

    Authors: Aya Mahmoud Ahmed, Mohamed Yousef, Khaled F. Hussain, Yousef Bassyouni Mahdy

    Abstract: Captioning images is a challenging scene-understanding task that connects computer vision and natural language processing. While image captioning models have been successful in producing excellent descriptions, the field has primarily focused on generating a single sentence for 2D images. This paper investigates whether integrating depth information with RGB images can enhance the captioning task… ▽ More

    Submitted 24 July, 2023; originally announced August 2023.

    Comments: 19 pages, 5 figures, 13 tables

  6. arXiv:2305.01322  [pdf, other

    cs.AI cs.LG

    An Autonomous Non-monolithic Agent with Multi-mode Exploration based on Options Framework

    Authors: JaeYoon Kim, Junyu Xuan, Christy Liang, Farookh Hussain

    Abstract: Most exploration research on reinforcement learning (RL) has paid attention to `the way of exploration', which is `how to explore'. The other exploration research, `when to explore', has not been the main focus of RL exploration research. The issue of `when' of a monolithic exploration in the usual RL exploration behaviour binds an exploratory action to an exploitational action of an agent. Recent… ▽ More

    Submitted 3 May, 2024; v1 submitted 2 May, 2023; originally announced May 2023.

    Comments: IEEE IJCNN 2023

  7. arXiv:2303.04605  [pdf, other

    cs.CR

    Keystroke Dynamics: Concepts, Techniques, and Applications

    Authors: Rashik Shadman, Ahmed Anu Wahab, Michael Manno, Matthew Lukaszewski, Daqing Hou, Faraz Hussain

    Abstract: Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques such as biometric authentication systems have been devised in recent years. This paper surveys keystroke-based authentication systems and their applications. Keystroke dynamics is a behavioral biometric that is emerging as an important tool for cybersecurity as it promi… ▽ More

    Submitted 23 June, 2024; v1 submitted 8 March, 2023; originally announced March 2023.

  8. arXiv:2303.03341  [pdf, other

    cs.CV cs.AI

    Deep Age-Invariant Fingerprint Segmentation System

    Authors: M. G. Sarwar Murshed, Keivan Bahmani, Stephanie Schuckers, Faraz Hussain

    Abstract: Fingerprint-based identification systems achieve higher accuracy when a slap containing multiple fingerprints of a subject is used instead of a single fingerprint. However, segmenting or auto-localizing all fingerprints in a slap image is a challenging task due to the different orientations of fingerprints, noisy backgrounds, and the smaller size of fingertip components. The presence of slap image… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

    Comments: 20 Pages, 14 figures, Journal

  9. arXiv:2301.12602  [pdf, other

    physics.flu-dyn

    Vorticity dynamics in transcritical liquid jet breakup

    Authors: Jordi Poblador-Ibanez, William Sirignano, Fazle Hussain

    Abstract: Contrary to common assumptions, a transcritical domain exists during the early times of liquid hydrocarbon fuel injection at supercritical pressure. A sharp two-phase interface is sustained before substantial heating of the liquid. Thus, two-phase dynamics has been shown to drive the early three-dimensional deformation and atomisation. A recent study of a transcritical liquid jet shows distinct de… ▽ More

    Submitted 29 January, 2023; originally announced January 2023.

    Comments: 51 pages, 27 figures

  10. arXiv:2301.00484  [pdf, other

    cs.DC eess.SY

    Federated Fog Computing for Remote Industry 4.0 Applications

    Authors: Razin Farhan Hussain, Mohsen Amini Salehi

    Abstract: Industry 4.0 operates based on IoT devices, sensors, and actuators, transforming the use of computing resources and software solutions in diverse sectors. Various Industry 4.0 latency-sensitive applications function based on machine learning to process sensor data for automation and other industrial activities. Sending sensor data to cloud systems is time consuming and detrimental to the latency c… ▽ More

    Submitted 1 January, 2023; originally announced January 2023.

    Comments: PhD Dissertation

  11. arXiv:2207.06289  [pdf, other

    physics.flu-dyn physics.comp-ph

    Direct numerical simulation of turbulent pipe flow up to $Re_τ=5200$

    Authors: Jie Yao, Saleh Rezaeiravesh, Philipp Schlatter, Fazle Hussain

    Abstract: Well-resolved direct numerical simulations (DNSs) have been performed of the flow in a smooth circular pipe of radius $R$ and axial length $10πR$ at friction Reynolds numbers up to $Re_τ=5200$. Various turbulence statistics are documented and compared with other DNS and experimental data in pipes as well as channels.Small but distinct differences between various datasets are identified. The fricti… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

    Comments: 22 pages, 15 figures

  12. arXiv:2112.10430  [pdf, ps, other

    gr-qc

    Study of Generalized Lemaître-Tolman-Bondi Spacetime in Palatini $f(R)$ Gravity

    Authors: M. Z. Bhatti, Z. Yousaf, F. Hussain

    Abstract: This paper aims to analyze the generalization of Lemaître-Tolman-Bondi (LTB) spacetime for dissipative dust under the influence of Palatini $f(R)$ gravity. We explore the modified field equations, kinematical variables, and mass function in this scenario. We construct Bianchi identities using conservation and differential equations for shear, expansion, and curvature scalar in the background of Pa… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: 21 pages

  13. arXiv:2112.08632   

    cs.IR

    CDRec: Cayley-Dickson Recommender

    Authors: Anchen Li, Bo Yang, Huan Huo, Farookh Hussain

    Abstract: In this paper, we propose a recommendation framework named Cayley-Dickson Recommender. We introduce Cayley-Dickson construction which uses a recursive process to define hypercomplex algebras and their mathematical operations. We also design a graph convolution operator to learn representations in the hypercomplex space. To the best of our knowledge, it is the first time that Cayley-Dickson constru… ▽ More

    Submitted 14 January, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

    Comments: 1. The Preliminary Section is not sufficient. 2. Figure 2 is not clear enough. 3. The Experiment Section are not sufficient

  14. arXiv:2110.04067  [pdf, other

    cs.CV eess.IV

    Deep Slap Fingerprint Segmentation for Juveniles and Adults

    Authors: M. G. Sarwar Murshed, Robert Kline, Keivan Bahmani, Faraz Hussain, Stephanie Schuckers

    Abstract: Many fingerprint recognition systems capture four fingerprints in one image. In such systems, the fingerprint processing pipeline must first segment each four-fingerprint slap into individual fingerprints. Note that most of the current fingerprint segmentation algorithms have been designed and evaluated using only adult fingerprint datasets. In this work, we have developed a human-annotated in-hou… ▽ More

    Submitted 3 May, 2022; v1 submitted 6 October, 2021; originally announced October 2021.

    Journal ref: In 2021 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) (pp. 1-4). IEEE

  15. arXiv:2109.03592  [pdf, ps, other

    cs.DC

    Strong Scaling of OpenACC enabled Nek5000 on several GPU based HPC systems

    Authors: Jonathan Vincent, **g Gong, Martin Karp, Adam Peplinski, Niclas Jansson, Artur Podobas, Andreas Jocksch, Jie Yao, Fazle Hussain, Stefano Markidis, Matts Karlsson, Dirk Pleiter, Erwin Laure, Philipp Schlatter

    Abstract: We present new results on the strong parallel scaling for the OpenACC-accelerated implementation of the high-order spectral element fluid dynamics solver Nek5000. The test case considered consists of a direct numerical simulation of fully-developed turbulent flow in a straight pipe, at two different Reynolds numbers $Re_τ=360$ and $Re_τ=550$, based on friction velocity and pipe radius. The strong… ▽ More

    Submitted 4 November, 2021; v1 submitted 8 September, 2021; originally announced September 2021.

    Comments: 9 pages, 8 figures. Submitted to HPC-Asia 2022 conference, updated to address reviewers comments

    ACM Class: G.4; J.2; C.1

  16. arXiv:2109.00573  [pdf, other

    cs.CV cs.LG

    Pulmonary Disease Classification Using Globally Correlated Maximum Likelihood: an Auxiliary Attention mechanism for Convolutional Neural Networks

    Authors: Edward Verenich, Tobias Martin, Alvaro Velasquez, Nazar Khan, Faraz Hussain

    Abstract: Convolutional neural networks (CNN) are now being widely used for classifying and detecting pulmonary abnormalities in chest radiographs. Two complementary generalization properties of CNNs, translation invariance and equivariance, are particularly useful in detecting manifested abnormalities associated with pulmonary disease, regardless of their spatial locations within the image. However, these… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: 13 pages, 9 figures

  17. arXiv:2108.12286  [pdf

    cs.CY

    Key Lessons Learned from Working During Covid-19 on a Project in the World's Biggest Refugee Camp

    Authors: Faheem Hussain, Suzana Brown

    Abstract: Using a case study structure, this research-in-progress paper elaborates the struggles of working on a humanitarian project during the Covid-19 period. The authors identify six specific challenges and propose innovations to address each of these challenges. The challenges are the following: supply chain, design of solutions, human resource development, connectivity, and user data collection. This… ▽ More

    Submitted 22 August, 2021; originally announced August 2021.

    Comments: In proceedings of the 1st Virtual Conference on Implications of Information and Digital Technologies for Development, 2021

  18. arXiv:2108.09939  [pdf

    cs.CY

    Transcending Old Boundaries: Digital Afterlife in the Age of COVID-19

    Authors: Mashiat Mostafa, Faheem Hussain

    Abstract: The primary objective of our exploratory research is to contribute to the ongoing conversation on Digital Afterlife from the lenses of Global South during the COVID-19 period. Digital Afterlife is fast becoming a challenge for our increasingly connected society. Moreover, the situation got worse with the COVID-19 pandemic. The on-going research is to address the disparity in the Global South, spec… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: In proceedings of the 1st Virtual Conference on Implications of Information and Digital Technologies for Development, 2021

  19. arXiv:2107.08183  [pdf, other

    cs.LG

    Hierarchical Reinforcement Learning with Optimal Level Synchronization based on a Deep Generative Model

    Authors: JaeYoon Kim, Junyu Xuan, Christy Liang, Farookh Hussain

    Abstract: The high-dimensional or sparse reward task of a reinforcement learning (RL) environment requires a superior potential controller such as hierarchical reinforcement learning (HRL) rather than an atomic RL because it absorbs the complexity of commands to achieve the purpose of the task in its hierarchical structure. One of the HRL issues is how to train each level policy with the optimal data collec… ▽ More

    Submitted 17 July, 2021; originally announced July 2021.

    Comments: "for associated code file, see https://github.com/jangikim2/Hierarchical_Reinforcement_Learning" Submitted to IEEE Transactions on Neural Networks and Learning Systems

  20. arXiv:2105.01252  [pdf, ps, other

    physics.flu-dyn

    Composite active drag control in turbulent channel flows

    Authors: Jie Yao, Xi Chen, Fazle Hussain

    Abstract: A composite drag control (CDC) combining the opposition (OC) and spanwise opposed wall-jet forcing (SOJF) methods is studied in a turbulent channel flow via direct numerical simulation of the incompressible Navier-Stokes equations. A maximum drag reduction of about 33% is obtained for CDC -- much higher than that produced by either individual method (namely, 19% for SOJF and 23% for OC). Due to th… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: To appear in Physical Review Fluids

  21. arXiv:2101.03613  [pdf, other

    cs.LG cs.AI

    Explainable Artificial Intelligence (XAI): An Engineering Perspective

    Authors: F. Hussain, R. Hussain, E. Hossain

    Abstract: The remarkable advancements in Deep Learning (DL) algorithms have fueled enthusiasm for using Artificial Intelligence (AI) technologies in almost every domain; however, the opaqueness of these algorithms put a question mark on their applications in safety-critical systems. In this regard, the `explainability' dimension is not only essential to both explain the inner workings of black-box algorithm… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

  22. A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

    Authors: Syed Ghazanfar Abbas, Shahzaib Zahid, Faisal Hussain, Ghalib A. Shah, Muhammad Husnain

    Abstract: Despite the surging development and utilization of IoT devices, the security of IoT devices is still in infancy. The security pitfalls of IoT devices have made it easy for hackers to take over IoT devices and use them for malicious activities like botnet attacks. With the rampant emergence of IoT devices, botnet attacks are surging. The botnet attacks are not only catastrophic for IoT device users… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

    Comments: Accepted in IEEE TrustCom 2020, 7 Pages, 4 Figures, 3 Tables

  23. arXiv:2012.06054  [pdf, other

    cs.DC cs.LG

    Analyzing the Performance of Smart Industry 4.0 Applications on Cloud Computing Systems

    Authors: Razin Farhan Hussain, Alireza Pakravan, Mohsen Amini Salehi

    Abstract: Cloud-based Deep Neural Network (DNN) applications that make latency-sensitive inference are becoming an indispensable part of Industry 4.0. Due to the multi-tenancy and resource heterogeneity, both inherent to the cloud computing environments, the inference time of DNN-based applications are stochastic. Such stochasticity, if not captured, can potentially lead to low Quality of Service (QoS) or e… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Journal ref: IEEE International Conference on High Performance Computing and Communications (HPCC 2020)

  24. arXiv:2012.01971  [pdf, other

    cs.CR

    IoT DoS and DDoS Attack Detection using ResNet

    Authors: Faisal Hussain, Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah

    Abstract: The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Comments: Accepted in 2020 IEEE 23rd International Multitopic Conference (INMIC), 7 pages, 6 figures, 1 table

  25. arXiv:2012.00463  [pdf, other

    cs.CR cs.AI

    Towards a Universal Features Set for IoT Botnet Attacks Detection

    Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali

    Abstract: The security pitfalls of IoT devices make it easy for the attackers to exploit the IoT devices and make them a part of a botnet. Once hundreds of thousands of IoT devices are compromised and become the part of a botnet, the attackers use this botnet to launch the large and complex distributed denial of service (DDoS) attacks which take down the target websites or services and make them unable to r… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: Accepted in 2020 IEEE 23rd International Multitopic Conference (INMIC), 7 pages, 3 figures, 4 tables

  26. arXiv:2011.05368  [pdf, other

    q-bio.PE physics.soc-ph

    Measuring the Change in European and US COVID-19 Death Rates

    Authors: Zeina S. Khan, Frank Van Bussel, Fazle Hussain

    Abstract: By fitting a compartment ODE model for Covid-19 propagation to cumulative case and death data for US states and European countries, we find that the case mortality rate seems to have decreased by at least 80% in most of the US and at least 90% in most of Europe. These are much larger and faster changes than reported in empirical studies, such as the 18% decrease in mortality found for the New York… ▽ More

    Submitted 6 January, 2021; v1 submitted 10 November, 2020; originally announced November 2020.

    MSC Class: 92-10 ACM Class: J.3

  27. arXiv:2008.02911  [pdf, other

    physics.flu-dyn

    Objective quantification of Particle Pair Diffusion in Homogeneous Isotropic Turbulence

    Authors: Nadeem A. Malik, Fazle Hussain

    Abstract: Turbulence consists of interacting flow structures covering a wide range of length and time scales. A long-standing question looms over pair diffusion of particles in close proximity i.e. particle pair diffusion at small separations: what range of turbulence length scales governs pair diffusion? Here, we attempt to answer this question by addressing pair diffusion by both fine scales and larger sc… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: 32 pages, 18 figures (including some with multiple plots), submitted to the Journal of Fluid Mechanics

  28. arXiv:2008.02866  [pdf, other

    cs.CV cs.LG eess.IV

    Improving Explainability of Image Classification in Scenarios with Class Overlap: Application to COVID-19 and Pneumonia

    Authors: Edward Verenich, Alvaro Velasquez, Nazar Khan, Faraz Hussain

    Abstract: Trust in predictions made by machine learning models is increased if the model generalizes well on previously unseen samples and when inference is accompanied by cogent explanations of the reasoning behind predictions. In the image classification domain, generalization can be assessed through accuracy, sensitivity, and specificity. Explainability can be assessed by how well the model localizes the… ▽ More

    Submitted 15 August, 2020; v1 submitted 6 August, 2020; originally announced August 2020.

    Comments: 7 pages, 6 figures

  29. arXiv:2007.07789  [pdf, other

    q-bio.PE physics.soc-ph

    US faces endemic Covid-19 infections and deaths; ways to stop the pandemic

    Authors: Fazle Hussain, Zeina S. Khan, Frank Van Bussel

    Abstract: A new epidemic model for Covid-19 has been constructed and simulated for eight US states. The coefficients for this model, based on seven coupled differential equations, are carefully evaluated against recorded data on cases and deaths. These projections reveal that Covid-19 will become endemic, spreading for more than two years. If stay-at-home orders are relaxed, most states may experience a sec… ▽ More

    Submitted 21 July, 2020; v1 submitted 15 July, 2020; originally announced July 2020.

    Comments: 8 pages, 3 figures

  30. arXiv:2007.04456  [pdf

    eess.SP cs.AI cs.CY cs.LG

    An Efficient Data Imputation Technique for Human Activity Recognition

    Authors: Ivan Miguel Pires, Faisal Hussain, Nuno M. Garcia, Eftim Zdravevski

    Abstract: The tremendous applications of human activity recognition are surging its span from health monitoring systems to virtual reality applications. Thus, the automatic recognition of daily life activities has become significant for numerous applications. In recent years, many datasets have been proposed to train the machine learning models for efficient monitoring and recognition of human daily living… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

    Comments: 8 Pages, 8 Figures, 1 Table. Accepted in 14th Multi Conference on Computer Science and Information Systems 2020 (MCCSIS 2020)

  31. arXiv:2006.05955  [pdf, other

    q-bio.PE physics.soc-ph

    A predictive model for Covid-19 spread applied to eight US states

    Authors: Zeina S. Khan, Frank Van Bussel, Fazle Hussain

    Abstract: A compartmental epidemic model is proposed to predict the Covid-19 virus spread. It considers: both detected and undetected infected populations, medical quarantine and social sequestration, release from sequestration, plus possible reinfection. The coefficients in the model are evaluated by fitting to empirical data for eight US states: Arizona, California, Florida, Illinois, Louisiana, New Jerse… ▽ More

    Submitted 9 July, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

    Comments: 21 pages and 6 figures

  32. arXiv:2006.05796  [pdf, ps, other

    physics.flu-dyn

    Separation scaling for viscous vortex reconnection

    Authors: Jie Yao, Fazle Hussain

    Abstract: Reconnection plays a significant role in the dynamics of plasmas, polymers and macromolecules, as well as in numerous laminar and turbulent flow phenomena in both classical and quantum fluids. Extensive studies in quantum vortex reconnection show that the minimum separation distance δ between interacting vortices follows a 1/2 scaling. Due to the complex nature of the dynamics (e.g., the formation… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

    Comments: 11 pages, 6 figures

    Journal ref: J. Fluid Mech. 900 (2020) R4

  33. arXiv:2004.00844  [pdf

    cs.NI cs.CY

    IoT-Flock: An Open-source Framework for IoT Traffic Generation

    Authors: Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah

    Abstract: Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be u… ▽ More

    Submitted 2 April, 2020; originally announced April 2020.

    Comments: 6 Pages, 2 Figures, 4 Tables. Accepted in IEEE International Conference on Emerging Trends in Smart Technologies(ICETST) 2020

  34. arXiv:2003.04117  [pdf, other

    cs.CV cs.LG stat.ML

    The Utility of Feature Reuse: Transfer Learning in Data-Starved Regimes

    Authors: Rashik Shadman, M. G. Sarwar Murshed, Edward Verenich, Alvaro Velasquez, Faraz Hussain

    Abstract: The use of transfer learning with deep neural networks has increasingly become widespread for deploying well-tested computer vision systems to newer domains, especially those with limited datasets. We describe a transfer learning use case for a domain with a data-starved regime, having fewer than 100 labeled target samples. We evaluate the effectiveness of convolutional feature extraction and fine… ▽ More

    Submitted 28 December, 2023; v1 submitted 29 February, 2020; originally announced March 2020.

    Comments: 5 pages, 3 figure, conference

  35. arXiv:2003.04116  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    Hazard Detection in Supermarkets using Deep Learning on the Edge

    Authors: M. G. Sarwar Murshed, Edward Verenich, James J. Carroll, Nazar Khan, Faraz Hussain

    Abstract: Supermarkets need to ensure clean and safe environments for both shoppers and employees. Slips, trips, and falls can result in injuries that have a physical as well as financial cost. Timely detection of hazardous conditions such as spilled liquids or fallen items on supermarket floors can reduce the chances of serious injuries. This paper presents EdgeLite, a novel, lightweight deep learning mode… ▽ More

    Submitted 29 February, 2020; originally announced March 2020.

    Comments: 6 pages, conference

  36. arXiv:2003.01538  [pdf, other

    cs.DC cs.LG stat.ML

    FlexServe: Deployment of PyTorch Models as Flexible REST Endpoints

    Authors: Edward Verenich, Alvaro Velasquez, M. G. Sarwar Murshed, Faraz Hussain

    Abstract: The integration of artificial intelligence capabilities into modern software systems is increasingly being simplified through the use of cloud-based machine learning services and representational state transfer architecture design. However, insufficient information regarding underlying model provenance and the lack of control over model evolution serve as an impediment to the more widespread adopt… ▽ More

    Submitted 29 February, 2020; originally announced March 2020.

    Comments: 3 pages, 1 figure, conference

  37. arXiv:1911.11976  [pdf

    cs.LG cs.CY eess.SP stat.ML

    An Efficient Machine Learning-based Elderly Fall Detection Algorithm

    Authors: Faisal Hussain, Muhammad Basit Umair, Muhammad Ehatisham-ul-Haq, Ivan Miguel Pires, Tânia Valente, Nuno M. Garcia, Nuno Pombo

    Abstract: Falling is a commonly occurring mishap with elderly people, which may cause serious injuries. Thus, rapid fall detection is very important in order to mitigate the severe effects of fall among the elderly people. Many fall monitoring systems based on the accelerometer have been proposed for the fall detection. However, many of them mistakenly identify the daily life activities as fall or fall as d… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

    Comments: 6 pages, SENSORDEVICES 2018, the Ninth International Conference on Sensor Device Technologies and Applications, Venice, Italy, 16-20 September 2018

    Report number: ISBN: 978-1-61208-660-6

  38. arXiv:1909.08048  [pdf, other

    cs.CR cs.NI

    Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

    Authors: Fatima Hussain, Rasheed Hussain, Brett Noye, Salah Sharieh

    Abstract: With the advancements in the enterprise-level business development, the demand for new applications and services is overwhelming. For the development and delivery of such applications and services, enterprise businesses rely on Application Programming Interfaces (APIs). In essence, API is a double-edged sword. On one hand, API provides ease of expanding the business through sharing value and utili… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: 7 pages

  39. arXiv:1908.00080  [pdf, other

    cs.LG cs.CV cs.NI stat.ML

    Machine Learning at the Network Edge: A Survey

    Authors: M. G. Sarwar Murshed, Christopher Murphy, Daqing Hou, Nazar Khan, Ganesh Ananthanarayanan, Faraz Hussain

    Abstract: Resource-constrained IoT devices, such as sensors and actuators, have become ubiquitous in recent years. This has led to the generation of large quantities of data in real-time, which is an appealing target for AI systems. However, deploying machine learning models on such end-devices is nearly impossible. A typical solution involves offloading data to external computing systems (such as cloud ser… ▽ More

    Submitted 23 May, 2021; v1 submitted 31 July, 2019; originally announced August 2019.

    Comments: 35 pages, 4 figures; restructured text to combine ML/DL into a single section; updated tables/figures; added a new table summarizing major ML edge applications, fixed typos

    Journal ref: ACM Comput. Surv. 54, 8, Article 170 (November 2022)

  40. arXiv:1907.08965  [pdf, other

    cs.NI eess.SP

    Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges

    Authors: Fatima Hussain, Syed Ali Hassan, Rasheed Hussain, Ekram Hossain

    Abstract: Internet-of-Things (IoT) refers to a massively heterogeneous network formed through smart devices connected to the Internet. In the wake of disruptive IoT with a huge amount and variety of data, Machine Learning (ML) and Deep Learning (DL) mechanisms will play a pivotal role to bring intelligence to the IoT networks. Among other aspects, ML and DL can play an essential role in addressing the chall… ▽ More

    Submitted 21 July, 2019; originally announced July 2019.

    Comments: 21 pages, 3 figures

  41. arXiv:1906.08864  [pdf, other

    cs.NE cs.LG stat.ML

    Accurate and Energy-Efficient Classification with Spiking Random Neural Network: Corrected and Expanded Version

    Authors: Khaled F. Hussain, Mohamed Yousef Bassyouni, Erol Gelenbe

    Abstract: Artificial Neural Network (ANN) based techniques have dominated state-of-the-art results in most problems related to computer vision, audio recognition, and natural language processing in the past few years, resulting in strong industrial adoption from all leading technology companies worldwide. One of the major obstacles that have historically delayed large scale adoption of ANNs is the huge comp… ▽ More

    Submitted 1 June, 2019; originally announced June 2019.

    ACM Class: I.2; G.3

  42. arXiv:1905.04460  [pdf, other

    cs.DC

    Serverless Edge Computing for Green Oil and Gas Industry

    Authors: Razin Farhan Hussain, Mohsen Amini Salehi, Omid Semiari

    Abstract: Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Netwo… ▽ More

    Submitted 11 May, 2019; originally announced May 2019.

  43. arXiv:1905.04458  [pdf, other

    cs.DC

    Robust Resource Allocation Using Edge Computing for Vehicle to Infrastructure (V2I) Networks

    Authors: Anna Kovalenko, Razin Farhan Hussain, Omid Semiari, Mohsen Amini Salehi

    Abstract: Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Netwo… ▽ More

    Submitted 11 May, 2019; originally announced May 2019.

    Journal ref: 3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019)

  44. arXiv:1904.05735  [pdf, other

    cs.CR cs.LG stat.ML

    Machine Learning in IoT Security: Current Solutions and Future Challenges

    Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain

    Abstract: The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives. The participating nodes in IoT networks are usually resource-constrained, which makes them luring targets for cyber attacks. In this regard, extensive efforts have been made to address the security and privacy issues in IoT networks primarily through traditional cryptographic approaches. How… ▽ More

    Submitted 13 March, 2019; originally announced April 2019.

  45. A note on some perfect fluid Kantowski-Sachs and Bianchi type III space-times and their conformal vector fields in f(R) theory of gravity

    Authors: Ghulam Shabbir, Fiaz Hussain, A. H. Kara, Muhammad Ramzan

    Abstract: The purpose of this paper is to find conformal vector fields of some perfect fluid Kantowski-Sachs and Bianchi type III space-times in the f(R) theory of gravity using direct integration technique. In this study there exists only eight cases. Studying each case in detail, we found that in two cases proper conformal vector fields exist while in the rest of six cases conformal vector fields become K… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

    Comments: 12 pages

    Journal ref: Modern Physics Letters A in 2019

  46. Dynamics of fracturing saturated porous media and self-organization of rupture

    Authors: C. Peruzzo, D. T. Cao, E. Milanese, P. Favia, F. Pesavento, F. Hussain, B. A. Schrefler

    Abstract: Analytical solutions and a vast majority of numerical ones for fracture propagation in saturated porous media yield smooth behavior while experiments, field observations and a few numerical solutions reveal stepwise crack advancement and pressure oscillations. To explain this fact, we invoke self-organization of rupture observed in fracturing solids, both dry and fully saturated, when two requirem… ▽ More

    Submitted 26 February, 2019; originally announced February 2019.

    Comments: 25 pages, 20 figures. The paper was presented as a general lecture at the EUROMECH Solid Mechanics Conference in Bologna

    Journal ref: European Journal of Mechanics - A/Solids Volume 74, March - April 2019, Pages 471-484

  47. arXiv:1812.11894  [pdf, other

    cs.CV

    Accurate, Data-Efficient, Unconstrained Text Recognition with Convolutional Neural Networks

    Authors: Mohamed Yousef, Khaled F. Hussain, Usama S. Mohammed

    Abstract: Unconstrained text recognition is an important computer vision task, featuring a wide variety of different sub-tasks, each with its own set of challenges. One of the biggest promises of deep neural networks has been the convergence and automation of feature extractors from input raw signals, allowing for the highest possible performance with minimum required domain knowledge. To this end, we propo… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

    Comments: Submitted for publication

  48. arXiv:1812.10485  [pdf

    cs.DC cs.CY

    Toward a self-learned Smart Contracts

    Authors: Ahmed S. Almasoud, Maged M. Eljazzar, Farookh Hussain

    Abstract: In recent years, Blockchain technology has been highly valued and disruptive. Several researches have presented a merge between blockchain and current application i.e. medical, supply chain, and e-commerce. Although Blockchain architecture does not have a standard yet, IBM, MS, AWS offer BaaS (Blockchain as a Service). In addition to the current public chains i.e. Ethereum, NEO, and Cardeno; there… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

    Comments: 5

    Journal ref: 2018 IEEE 15th International Conference on e-Business Engineering (ICEBE)

  49. arXiv:1812.04813  [pdf, other

    cond-mat.mtrl-sci

    First-principles prediction of half-Heusler half-metals above room temperature

    Authors: Muhammad Atif Sattar, S. Aftab Ahmad, Fayyaz Hussain, Claudio Cazorla

    Abstract: Half-metallicity (HM) offers great potential for engineering spintronic applications, yet only few magnetic materials present metallicity in just one spin channel. In addition, most HM systems become magnetically disordered at temperatures well below ambient conditions, which further hinders the development of spin-based electronic devices. Here, we use first-principles methods based on density fu… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

  50. Effects of Repetitive SSVEPs on EEG Complexity using Multiscale Inherent Fuzzy Entropy

    Authors: Zehong Cao, Wei** Ding, Yu-Kai Wang, Farookh Khadeer Hussain, Adel Al-Jumaily, Chin-Teng Lin

    Abstract: Multiscale inherent fuzzy entropy is an objective measurement of electroencephalography (EEG) complexity, reflecting the habituation of brain systems. Entropy dynamics are generally believed to reflect the ability of the brain to adapt to a visual stimulus environment. In this study, we explored repetitive steady-state visual evoked potential (SSVEP)-based EEG complexity by assessing multiscale in… ▽ More

    Submitted 29 September, 2018; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: The manuscript is pending publication in Neurocomputing

    Journal ref: Neurocomputing (Available online 8 May 2019)