Skip to main content

Showing 1–25 of 25 results for author: Abraham, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.17493  [pdf

    cs.CL

    Predicting postoperative risks using large language models

    Authors: Bing Xue, Charles Alba, Joanna Abraham, Thomas Kannampallil, Chenyang Lu

    Abstract: Predicting postoperative risk can inform effective care management & planning. We explored large language models (LLMs) in predicting postoperative risk through clinical texts using various tuning strategies. Records spanning 84,875 patients from Barnes Jewish Hospital (BJH) between 2018 & 2021, with a mean duration of follow-up based on the length of postoperative ICU stay less than 7 days, were… ▽ More

    Submitted 5 May, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

    Comments: Supplemental file available at: https://sites.wustl.edu/alba/files/2024/04/supplemental_materials-283eb0c14629614c.pdf models publicly available at: https://huggingface.co/cja5553/BJH-perioperative-notes-bioGPT AND https://huggingface.co/cja5553/BJH-perioperative-notes-bioGPT

    ACM Class: J.3; I.2.7

  2. arXiv:2308.03317  [pdf, other

    cs.LG

    HomOpt: A Homotopy-Based Hyperparameter Optimization Method

    Authors: Sophia J. Abraham, Kehelwala D. G. Maduranga, Jeffery Kinnison, Zachariah Carmichael, Jonathan D. Hauenstein, Walter J. Scheirer

    Abstract: Machine learning has achieved remarkable success over the past couple of decades, often attributed to a combination of algorithmic innovations and the availability of high-quality data available at scale. However, a third critical component is the fine-tuning of hyperparameters, which plays a pivotal role in achieving optimal model performance. Despite its significance, hyperparameter optimization… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  3. arXiv:2212.14874  [pdf, other

    cs.LG stat.ML

    Comparative Analysis of Clustering Techniques for Personalized Food Kit Distribution

    Authors: Jude Francis, Rowan K Baby, Jacob Abraham, Ajmal P. S

    Abstract: The Government of Kerala had increased the frequency of supply of free food kits owing to the pandemic, however, these items were static and not indicative of the personal preferences of the consumers. This paper conducts a comparative analysis of various clustering techniques on a scaled-down version of a real-world dataset obtained through a conjoint analysis-based survey. Clustering carried out… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

    Comments: 7 pages,13 figures

  4. arXiv:2210.04417  [pdf, other

    cs.LG

    Self-explaining Hierarchical Model for Intraoperative Time Series

    Authors: Dingwen Li, Bing Xue, Christopher King, Bradley Fritz, Michael Avidan, Joanna Abraham, Chenyang Lu

    Abstract: Major postoperative complications are devastating to surgical patients. Some of these complications are potentially preventable via early predictions based on intraoperative data. However, intraoperative data comprise long and fine-grained multivariate time series, prohibiting the effective learning of accurate models. The large gaps associated with clinical events and protocols are usually ignore… ▽ More

    Submitted 9 October, 2022; originally announced October 2022.

  5. arXiv:2210.02273  [pdf

    q-bio.QM cs.CV q-bio.TO

    Novel Radiomic Measurements of Tumor- Associated Vasculature Morphology on Clinical Imaging as a Biomarker of Treatment Response in Multiple Cancers

    Authors: Nathaniel Braman, Prateek Prasanna, Kaustav Bera, Mehdi Alilou, Mohammadhadi Khorrami, Patrick Leo, Maryam Etesami, Manasa Vulchi, Paulette Turk, Amit Gupta, Prantesh Jain, **fu Fu, Nathan Pennell, Vamsidhar Velcheti, Jame Abraham, Donna Plecha, Anant Madabhushi

    Abstract: Purpose: Tumor-associated vasculature differs from healthy blood vessels by its chaotic architecture and twistedness, which promotes treatment resistance. Measurable differences in these attributes may help stratify patients by likely benefit of systemic therapy (e.g. chemotherapy). In this work, we present a new category of radiomic biomarkers called quantitative tumor-associated vasculature (Qua… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: This manuscript has been accepted for publication in Clinical Cancer Research, which is published by the American Association for Cancer Research

  6. arXiv:2208.09800  [pdf, other

    cs.AR cs.CR

    Zeno: A Scalable Capability-Based Secure Architecture

    Authors: Alan Ehret, Jacob Abraham, Mihailo Isakov, Michel A. Kinsy

    Abstract: Despite the numerous efforts of security researchers, memory vulnerabilities remain a top issue for modern computing systems. Capability-based solutions aim to solve whole classes of memory vulnerabilities at the hardware level by encoding access permissions with each memory reference. While some capability systems have seen commercial adoption, little work has been done to apply a capability mode… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

    Report number: R-V1-2022

  7. arXiv:2205.13020  [pdf, other

    cs.LG cs.CV

    People counting system for retail analytics using edge AI

    Authors: Karthik Reddy Kanjula, Vishnu Vardhan Reddy, Jnanesh K P, Jeffy S Abraham, Tanuja K

    Abstract: Developments in IoT applications are playing an important role in our day-to-day life, starting from business predictions to self driving cars. One of the area, most influenced by the field of AI and IoT is retail analytics. In Retail Analytics, Conversion Rates - a metric which is most often used by retail stores to measure how many people have visited the store and how many purchases has happene… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: 5 pages, 3 figures. We proposed a novel framework design (highlighted in abstract) instead of enhancing a DL model or openVINO. To demonstrate the importance of our framework, we have chosen a retail computer vision problem, people counting system and attempted to construct an end-to-end solution with our suggested framework

  8. arXiv:2108.00712  [pdf, ps, other

    eess.SP cs.IT

    Local Diversity and Ultra-Reliable Antenna Arrays

    Authors: Jens Abraham, Torbjörn Ekman

    Abstract: Ultra-reliable low-latency communication enables new use cases for mobile radio networks. The ultra-reliability (UR) regime covers outage probabilities between $10^{-9}$ and $10^{-5}$, obtained under stringent latency requirements. Characterisation of the UR-relevant statistics is difficult due to the rare nature of outage events, but diversity defines the asymptotic behaviour of the small-scale f… ▽ More

    Submitted 2 December, 2021; v1 submitted 2 August, 2021; originally announced August 2021.

    Comments: 7 pages, 5 figures, 2 tables, presented at Asilomar 2021; v1: initial submission, v2: fixed typos, restructured sections, updated notation

  9. arXiv:2105.12633  [pdf, other

    cs.CV

    Edge Detection for Satellite Images without Deep Networks

    Authors: Joshua Abraham, Calden Wloka

    Abstract: Satellite imagery is widely used in many application sectors, including agriculture, navigation, and urban planning. Frequently, satellite imagery involves both large numbers of images as well as high pixel counts, making satellite datasets computationally expensive to analyze. Recent approaches to satellite image analysis have largely emphasized deep learning methods. Though extremely powerful, d… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

  10. arXiv:2104.00210  [pdf, other

    cs.CV

    Training Multi-bit Quantized and Binarized Networks with A Learnable Symmetric Quantizer

    Authors: Phuoc Pham, Jacob Abraham, Jaeyong Chung

    Abstract: Quantizing weights and activations of deep neural networks is essential for deploying them in resource-constrained devices, or cloud platforms for at-scale services. While binarization is a special case of quantization, this extreme case often leads to several training difficulties, and necessitates specialized models and training methods. As a result, recent quantization methods do not provide bi… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

  11. Fading Margins for Large-Scale Antenna Systems

    Authors: Jens Abraham, Torbjörn Ekman

    Abstract: Mobile phone operators have begun the roll-out of 5G networks, deploying massive MIMO base stations. Commercial product ranges start with 16 independent radio chains connected to a large-scale antenna system to exploit both channel hardening and favourable propagation in order to obtain increased spectral efficiency. In this work, the cumulative distribution function describing the gain for large-… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

    Comments: 5 pages, 4 figures, 2 tables, accepted by IEEE ICC 2021

  12. arXiv:2001.08570  [pdf

    q-bio.QM cs.CV cs.LG eess.IV stat.AP stat.ML

    Deep learning-based prediction of response to HER2-targeted neoadjuvant chemotherapy from pre-treatment dynamic breast MRI: A multi-institutional validation study

    Authors: Nathaniel Braman, Mohammed El Adoui, Manasa Vulchi, Paulette Turk, Maryam Etesami, **fu Fu, Kaustav Bera, Stylianos Drisis, Vinay Varadan, Donna Plecha, Mohammed Benjelloun, Jame Abraham, Anant Madabhushi

    Abstract: Predicting response to neoadjuvant therapy is a vexing challenge in breast cancer. In this study, we evaluate the ability of deep learning to predict response to HER2-targeted neo-adjuvant chemotherapy (NAC) from pre-treatment dynamic contrast-enhanced (DCE) MRI acquired prior to treatment. In a retrospective study encompassing DCE-MRI data from a total of 157 HER2+ breast cancer patients from 5 i… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: Braman and El Adoui contributed equally to this work. 33 pages, 3 figures in main text

  13. arXiv:1909.13101  [pdf

    eess.IV cs.CV

    Plasmodium Detection Using Simple CNN and Clustered GLCM Features

    Authors: Julisa Bana Abraham

    Abstract: Malaria is a serious disease caused by the Plasmodium parasite that transmitted through the bite of a female Anopheles mosquito and invades human erythrocytes. Malaria must be recognized precisely in order to treat the patient in time and to prevent further spread of infection. The standard diagnostic technique using microscopic examination is inefficient, the quality of the diagnosis depends on t… ▽ More

    Submitted 28 September, 2019; originally announced September 2019.

    Comments: 5 Pages, 11 figures

  14. arXiv:1906.08717  [pdf, ps, other

    cs.CL

    A New Statistical Approach for Comparing Algorithms for Lexicon Based Sentiment Analysis

    Authors: Mateus Machado, Evandro Ruiz, Kuruvilla Joseph Abraham

    Abstract: Lexicon based sentiment analysis usually relies on the identification of various words to which a numerical value corresponding to sentiment can be assigned. In principle, classifiers can be obtained from these algorithms by comparison with human annotation, which is considered the gold standard. In practise this is difficult in languages such as Portuguese where there is a paucity of human annota… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    ACM Class: I.2.7

  15. arXiv:1905.07555  [pdf, ps, other

    cs.IT eess.SP

    Power Inversion of the Massive MIMO Channel

    Authors: Jens Abraham, Torbjörn Ekman

    Abstract: Channel hardening characterises the diminishing influence of small scale fading on large scale antenna systems. The effective massive MIMO time domain channel is introduced and applied to a maximum diversity channel with rectangular power delay profile. This model bounds channel hardening and allows a proper interpretation from a radio design perspective. The reduced variability of the effective c… ▽ More

    Submitted 18 May, 2019; originally announced May 2019.

    Comments: 5 pages, 2 figures, 40th WIC / IEEE SP Symposium on Information Theory in the Benelux (SITB 2019)

  16. Measured Channel Hardening in an Indoor Multiband Scenario

    Authors: Golsa Ghiaasi, Jens Abraham, Egil Eide, Torbjörn Ekman

    Abstract: A study of channel hardening in a large-scale antenna system has been carried out by means of indoor channel measurements over four frequency bands, namely 1.472 GHz, 2.6 GHz, 3.82 GHz and 4.16 GHz. NTNU's Reconfigurable Radio Network Platform has been used to record the channel estimates for 40 single user non-line of sight radio links to a 64 element wide-band antenna array. By examining the rms… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

    Comments: 6 pages, 7 figures, presented at IEEE PIMRC 2018

  17. Tolerating Soft Errors in Processor Cores Using CLEAR (Cross-Layer Exploration for Architecting Resilience)

    Authors: Eric Cheng, Shahrzad Mirkhani, Lukasz G. Szafaryn, Chen-Yong Cher, Hyungmin Cho, Kevin Skadron, Mircea R. Stan, Klas Lilja, Jacob A. Abraham, Pradip Bose, Subhasish Mitra

    Abstract: We present CLEAR (Cross-Layer Exploration for Architecting Resilience), a first of its kind framework which overcomes a major challenge in the design of digital systems that are resilient to reliability failures: achieve desired resilience targets at minimal costs (energy, power, execution time, area) by combining resilience techniques across various layers of the system stack (circuit, logic, arc… ▽ More

    Submitted 28 September, 2017; originally announced September 2017.

    Comments: Unedited version of paper published in Transactions on Computer-Aided Design of Integrated Circuits and Systems

  18. arXiv:1708.07973  [pdf, ps, other

    cs.DS cs.CY

    A Model for Donation Verification

    Authors: Bin Fu, Fengjuan Zhu, John Abraham

    Abstract: In this paper, we introduce a model for donation verification. A randomized algorithm is developed to check if the money claimed being received by the collector is $(1-ε)$-approximation to the total amount money contributed by the donors. We also derive some negative results that show it is impossible to verify the donations under some circumstances.

    Submitted 26 August, 2017; originally announced August 2017.

  19. CLEAR: Cross-Layer Exploration for Architecting Resilience - Combining Hardware and Software Techniques to Tolerate Soft Errors in Processor Cores

    Authors: Eric Cheng, Shahrzad Mirkhani, Lukasz G. Szafaryn, Chen-Yong Cher, Hyungmin Cho, Kevin Skadron, Mircea R. Stan, Klas Lilja, Jacob A. Abraham, Pradip Bose, Subhasish Mitra

    Abstract: We present a first of its kind framework which overcomes a major challenge in the design of digital systems that are resilient to reliability failures: achieve desired resilience targets at minimal costs (energy, power, execution time, area) by combining resilience techniques across various layers of the system stack (circuit, logic, architecture, software, algorithm). This is also referred to as… ▽ More

    Submitted 23 June, 2016; v1 submitted 11 April, 2016; originally announced April 2016.

    Comments: Extended version of paper published in Proceedings of the 53rd Annual Design Automation Conference

    ACM Class: B.8.1

  20. arXiv:1506.05012  [pdf

    cs.CL cs.AI cs.SD

    Emotion Analysis of Songs Based on Lyrical and Audio Features

    Authors: Adit Jamdar, Jessica Abraham, Karishma Khanna, Rahul Dubey

    Abstract: In this paper, a method is proposed to detect the emotion of a song based on its lyrical and audio features. Lyrical features are generated by segmentation of lyrics during the process of data extraction. ANEW and WordNet knowledge is then incorporated to compute Valence and Arousal values. In addition to this, linguistic association rules are applied to ensure that the issue of ambiguity is prope… ▽ More

    Submitted 16 June, 2015; originally announced June 2015.

    Comments: 16 pages, 2 figures, 6 tables, 5 equations in International journal of Artificial Intelligence & Applications (IJAIA)

  21. arXiv:1506.04931  [pdf

    cs.CR

    Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication

    Authors: Anjan K, Srinath N K, Jibi Abraham

    Abstract: Covert channels is a vital setup in the analysing the strength of security in a network.Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation.The trapdoor set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall.This is due to the intricate covert scheme that enables to build robust cov… ▽ More

    Submitted 16 June, 2015; originally announced June 2015.

    Comments: 15 pages, 11 figures

  22. Tackling Exascale Software Challenges in Molecular Dynamics Simulations with GROMACS

    Authors: Páll Szilárd, Mark James Abraham, Carsten Kutzner, Berk Hess, Erik Lindahl

    Abstract: GROMACS is a widely used package for biomolecular simulation, and over the last two decades it has evolved from small-scale efficiency to advanced heterogeneous acceleration and multi-level parallelism targeting some of the largest supercomputers in the world. Here, we describe some of the ways we have been able to realize this through the use of parallelization on all levels, combined with a cons… ▽ More

    Submitted 1 June, 2015; originally announced June 2015.

    Comments: EASC 2014 conference proceeding

    ACM Class: J.2; I.6.8

    Journal ref: Proc. EASC 2014, 8759 pp. 3-27, Springer LNCS

  23. Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters

    Authors: Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, Pradeep Sinha, Gaur Sunder, Prashant Bendale, Sayali Pophalkar

    Abstract: Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic algorithms are usually used to address these security concerns. However, along with security there are other factors that need to be considered for practical imp… ▽ More

    Submitted 24 June, 2014; originally announced June 2014.

    Comments: 8 pages, 4 figures, Fifth International Conference on Communications Security & Information Assurance (CSIA 2014) May 24~25, 2014, Delhi, India

  24. Distributed Semantic Web Data Management in HBase and MySQL Cluster

    Authors: Craig Franke, Samuel Morin, Artem Chebotko, John Abraham, Pearl Brazier

    Abstract: Various computing and data resources on the Web are being enhanced with machine-interpretable semantic descriptions to facilitate better search, discovery and integration. This interconnected metadata constitutes the Semantic Web, whose volume can potentially grow the scale of the Web. Efficient management of Semantic Web data, expressed using the W3C's Resource Description Framework (RDF), is cru… ▽ More

    Submitted 11 May, 2011; originally announced May 2011.

    Comments: In Proc. of the 4th IEEE International Conference on Cloud Computing (CLOUD'11)

  25. Design of Transport Layer Based Hybrid Covert Channel Detection Engine

    Authors: Anjan K, Jibi Abraham, Mamatha Jadhav V

    Abstract: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called "Covert Channel". The word "Covert" stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitimate net… ▽ More

    Submitted 30 December, 2010; originally announced January 2011.

    Comments: 8 pages, 4 figures, Journal