Skip to main content

Showing 1–10 of 10 results for author: Omar, H

.
  1. arXiv:2302.10792  [pdf

    q-bio.QM

    A unified approach for morphometrics and functional data analysis with machine learning for craniodental shape quantification in shrew species

    Authors: Aneesha Balachandran Pillay, Dharini Pathmanathan, Sophie Dabo-Niang, Arpah Abu, Hasmahzaiti Omar

    Abstract: This work proposes a functional data analysis approach for morphometrics with applications in classifying three shrew species (S. murinus, C. monticola and C. malayana) based on the images. The discrete landmark data of craniodental views (dorsal, jaw and lateral) are converted into continuous curves where the curves are represented as linear combinations of basis functions. A comparative study ba… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: 24 pages,4 Figures,2 tables,Dharini Pathmanathan (corresponding author)

    ACM Class: I.5.3

  2. arXiv:2107.06147  [pdf, other

    physics.comp-ph hep-ph nucl-th quant-ph

    QTRAJ 1.0: A Lindblad equation solver for heavy-quarkonium dynamics

    Authors: Hisham Ba Omar, Miguel Ángel Escobedo, Ajaharul Islam, Michael Strickland, Sabin Thapa, Peter Vander Griend, Johannes Heinrich Weber

    Abstract: We introduce an open-source package called QTraj that solves the Lindblad equation for heavy-quarkonium dynamics using the quantum trajectories algorithm. The package allows users to simulate the suppression of heavy-quarkonium states using externally-supplied input from 3+1D hydrodynamics simulations. The code uses a split-step pseudo-spectral method for updating the wave-function between jumps,… ▽ More

    Submitted 7 January, 2022; v1 submitted 13 July, 2021; originally announced July 2021.

    Comments: 35 pages, 10 figures; v2 - minor typos fixed; published version

    Report number: TUM-EFT 142/21; HU-EP-21/17-RTG

    Journal ref: Computer Physics Communications 273, 108266 (2022)

  3. arXiv:2103.10460  [pdf

    math.NA

    Structure Calculation and Reconstruction of Discrete State Dynamics from Residual Dipolar Couplings using REDCRAFT

    Authors: Casey A. Cole, Rishi Mukhapadhyay, Hanin Omar, Mirko Hennig, Homayoun Valafar

    Abstract: Residual Dipolar Couplings (RDCs) acquired by Nuclear Magnetic Resonance (NMR) spectroscopy can be an indispensable source of information in investigation of molecular structures and dynamics. Here we present a complete strategy for structure calculation and reconstruction of discrete state dynamics from RDC data. Our method utilizes the previously presented REDCRAFT software package and its dynam… ▽ More

    Submitted 18 March, 2021; originally announced March 2021.

    Journal ref: Was later published in Journal of chemical theory and computation 12 (4), 1408-1422, 2016/4/12

  4. arXiv:2001.03092  [pdf

    q-bio.GN

    De Novo Assembly of Uca minax Transcriptome from Next Generation Sequencing

    Authors: Hanin Omar, Casey A. Cole, Arjang Fahim, Giuliana Gusmaroli, Stephen Borgianini, Homayoun Valafar

    Abstract: High-throughput cDNA sequencing (RNA-seq) is a very powerful technique to quantify gene expression in an unbiased way. The Crustacean family is among the groups of organisms sparsely represented in current genomic databases. Here we present transcriptome data from Uca minax (red-jointed fiddler crab) as an opportunity to extend our knowledge. Next generation sequencing was performed on six tissue… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: 8 pages. BioComp 2015

  5. arXiv:1904.12729  [pdf

    cs.CR cs.AR

    IRONHIDE: A Secure Multicore that Efficiently Mitigates Microarchitecture State Attacks for Interactive Applications

    Authors: Hamza Omar, Omer Khan

    Abstract: Microprocessors enable aggressive hardware virtualization by means of which multiple processes temporally execute on the system. These security-critical and ordinary processes interact with each other to assure application progress. However, temporal sharing of hardware resources exposes the processor to various microarchitecture state attacks. State-of-the-art secure processors, such as MI6 adopt… ▽ More

    Submitted 27 January, 2020; v1 submitted 29 April, 2019; originally announced April 2019.

  6. arXiv:1707.02589  [pdf, other

    cs.DC

    Exploiting the Tradeoff between Program Accuracy and Soft-error Resiliency Overhead for Machine Learning Workloads

    Authors: Qingchuan Shi, Hamza Omar, Omer Khan

    Abstract: To protect multicores from soft-error perturbations, resiliency schemes have been developed with high coverage but high power and performance overheads. Emerging safety-critical machine learning applications are increasingly being deployed on these platforms. Moreover, these systems are exposed to harsh environments, such as unmanned aerial vehicles (UAVs) and self-driving cars. Due to the unique… ▽ More

    Submitted 9 July, 2017; originally announced July 2017.

    Comments: Presented in 2017 IEEE Workshop on Silicon Errors in Logic - System Effects

  7. arXiv:1702.03965  [pdf, other

    cs.CR

    Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory

    Authors: Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk

    Abstract: Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patt… ▽ More

    Submitted 17 June, 2017; v1 submitted 13 February, 2017; originally announced February 2017.

    Comments: A 250 word preliminary abstract of this work has been accepted for publication and a poster presentation at Hardware Oriented Security and Trust (HOST) 2017. Added Section 5: Leakage under Caching Effects

  8. A Novel (k,n) Secret Sharing Scheme from Quadratic Residues for Grayscale Images

    Authors: El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar, Afra Hashim

    Abstract: A new grayscale image encryption algorithm based on $(k,n)$ threshold secret sharing is proposed. The scheme allows a secret image to be transformed into $n$ shares, where any $k \le n$ shares can be used to reconstruct the secret image, while the knowledge of $k-1$ or fewer shares leaves no sufficient information about the secret image and it becomes hard to decrypt the transmitted image. In the… ▽ More

    Submitted 22 August, 2014; v1 submitted 14 August, 2014; originally announced August 2014.

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014

  9. A Rewriting View of Simple Ty**

    Authors: Aaron Stump, Garrin Kimmell, Hans Zantema, Ruba El Haj Omar

    Abstract: This paper shows how a recently developed view of ty** as small-step abstract reduction, due to Kuan, MacQueen, and Findler, can be used to recast the development of simple type theory from a rewriting perspective. We show how standard meta-theoretic results can be proved in a completely new way, using the rewriting view of simple ty**. These meta-theoretic results include standard type prese… ▽ More

    Submitted 26 February, 2013; v1 submitted 5 November, 2012; originally announced November 2012.

    ACM Class: D.3.1

    Journal ref: Logical Methods in Computer Science, Volume 9, Issue 1 (February 27, 2013) lmcs:936

  10. arXiv:cs/0604014  [pdf

    cs.CC

    Towards Analog Reverse Time Computation

    Authors: O. Habibi, U. R. Patihnedj, M. O. Dhar

    Abstract: We report the consequences of a destabilization process on a simulated General Purpose Analog Computer. This new technology overcomes problems linked with serial ambiguity, and provides an analog bias to encode algorithms whose complexity is over polynomial. We also implicitly demonstrate how countermesures of the Stochastic Aperture Degeneracy could efficiently reach higher computational classe… ▽ More

    Submitted 7 April, 2006; v1 submitted 5 April, 2006; originally announced April 2006.