Skip to main content

Showing 1–30 of 30 results for author: Adnaan, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.14632  [pdf, other

    cs.AR cs.DC

    Workload-Aware Hardware Accelerator Mining for Distributed Deep Learning Training

    Authors: Muhammad Adnan, Amar Phanishayee, Janardhan Kulkarni, Prashant J. Nair, Divya Mahajan

    Abstract: In this paper, we present a novel technique to search for hardware architectures of accelerators optimized for end-to-end training of deep neural networks (DNNs). Our approach addresses both single-device and distributed pipeline and tensor model parallel scenarios, latter being addressed for the first time. The search optimized accelerators for training relevant metrics such as throughput/TDP und… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  2. arXiv:2404.08831  [pdf, other

    eess.IV cs.CV cs.LG

    Structured Model Pruning for Efficient Inference in Computational Pathology

    Authors: Mohammed Adnan, Qinle Ba, Nazim Shaikh, Shivam Kalra, Satarupa Mukherjee, Auranuch Lorsakul

    Abstract: Recent years have seen significant efforts to adopt Artificial Intelligence (AI) in healthcare for various use cases, from computer-aided diagnosis to ICU triage. However, the size of AI models has been rapidly growing due to scaling laws and the success of foundational models, which poses an increasing challenge to leverage advanced models in practical applications. It is thus imperative to devel… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  3. arXiv:2404.04270  [pdf, other

    cs.IR cs.LG

    Accelerating Recommender Model Training by Dynamically Skip** Stale Embeddings

    Authors: Yassaman Ebrahimzadeh Maboud, Muhammad Adnan, Divya Mahajan, Prashant J. Nair

    Abstract: Training recommendation models pose significant challenges regarding resource utilization and performance. Prior research has proposed an approach that categorizes embeddings into popular and non-popular classes to reduce the training time for recommendation models. We observe that, even among the popular embeddings, certain embeddings undergo rapid training and exhibit minimal subsequent variatio… ▽ More

    Submitted 21 March, 2024; originally announced April 2024.

  4. arXiv:2403.15328  [pdf, other

    cs.ET cs.AR

    Cross-layer Modeling and Design of Content Addressable Memories in Advanced Technology Nodes for Similarity Search

    Authors: Siri Narla, Piyush Kumar, Mohammad Adnaan, Azad Naeemi

    Abstract: In this paper we present a comprehensive design and benchmarking study of Content Addressable Memory (CAM) at the 7nm technology node in the context of similarity search applications. We design CAM cells based on SRAM, spin-orbit torque, and ferroelectric field effect transistor devices and from their layouts extract cell parasitics using state of the art EDA tools. These parasitics are used to de… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: 7 pages, 5 figures

  5. arXiv:2403.09054  [pdf, other

    cs.LG cs.AI cs.AR cs.CL

    Keyformer: KV Cache Reduction through Key Tokens Selection for Efficient Generative Inference

    Authors: Muhammad Adnan, Akhil Arunkumar, Gaurav Jain, Prashant J. Nair, Ilya Soloveychik, Purushotham Kamath

    Abstract: Transformers have emerged as the underpinning architecture for Large Language Models (LLMs). In generative language models, the inference process involves two primary phases: prompt processing and token generation. Token generation, which constitutes the majority of the computational workload, primarily entails vector-matrix multiplications and interactions with the Key-Value (KV) Cache. This phas… ▽ More

    Submitted 5 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    MSC Class: 68U35 ACM Class: I.2.7; C.0

    Journal ref: Proceedings of the 7th Annual Conference on Machine Learning and Systems (MLSys), 2024

  6. arXiv:2311.17204  [pdf, other

    cs.LG eess.SP

    Optimal EEG Electrode Set for Emotion Recognition From Brain Signals: An Empirical Quest

    Authors: Rumman Ahmed Prodhan, Sumya Akter, Tanmoy Sarkar Pias, Md. Akhtaruzzaman Adnan

    Abstract: The human brain is a complex organ, still completely undiscovered, that controls almost all the parts of the body. Apart from survival, the human brain stimulates emotions. Recent research indicates that brain signals can be very effective for emotion recognition. However, which parts of the brain exhibit most of the emotions is still under-explored. In this study, we empirically analyze the contr… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

  7. arXiv:2309.01860  [pdf, other

    cs.CV cs.CL cs.LG

    Attention-Driven Multi-Modal Fusion: Enhancing Sign Language Recognition and Translation

    Authors: Zaber Ibn Abdul Hakim, Rasman Mubtasim Swargo, Muhammad Abdullah Adnan

    Abstract: In this paper, we devise a mechanism for the addition of multi-modal information with an existing pipeline for continuous sign language recognition and translation. In our procedure, we have incorporated optical flow information with RGB images to enrich the features with movement-related information. This work studies the feasibility of such modality inclusion using a cross-modal encoder. The plu… ▽ More

    Submitted 6 December, 2023; v1 submitted 4 September, 2023; originally announced September 2023.

  8. arXiv:2308.14902  [pdf, other

    cs.IR cs.LG

    Ad-Rec: Advanced Feature Interactions to Address Covariate-Shifts in Recommendation Networks

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommendation models are vital in delivering personalized user experiences by leveraging the correlation between multiple input features. However, deep learning-based recommendation models often face challenges due to evolving user behaviour and item features, leading to covariate shifts. Effective cross-feature learning is crucial to handle data distribution drift and adapting to changing user b… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  9. arXiv:2308.06268  [pdf

    cs.HC

    Go Together: Bridging the Gap between Learners and Teachers

    Authors: Asim Irfan, Atif Nawaz, Muhammad Turab, Muhmmad Azeem, Mashal Adnan, Ahsan Mehmood, Sarfaraz Ahmed, Adnan Ashraf

    Abstract: After the pandemic, humanity has been facing different types of challenges. Social relationships, societal values, and academic and professional behavior have been hit the most. People are shifting their routines to social media and gadgets, and getting addicted to their isolation. This sudden change in their lives has caused an unusual social breakdown and endangered their mental health. In mid-2… ▽ More

    Submitted 23 July, 2023; originally announced August 2023.

    Journal ref: 7th International Multi-Topic ICT Conference (IMTIC) 2023

  10. arXiv:2305.07414  [pdf

    cs.DC

    Design and Development of a Java Parallel I/O Library

    Authors: Muhammad Sohaib Ayub, Muhammad Adnan, Muhammad Yasir Shafi

    Abstract: Parallel I/O refers to the ability of scientific programs to concurrently read/write from/to a single file from multiple processes executing on distributed memory platforms like compute clusters. In the HPC world, I/O becomes a significant bottleneck for many real-world scientific applications. In the last two decades, there has been significant research in improving the performance of I/O operati… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 10 pages

  11. arXiv:2209.09642  [pdf

    cs.LG cs.CR

    A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique

    Authors: Abdur Rehman, Sagheer Abbas, M. A. Khan, Taher M. Ghazal, Khan Muhammad Adnan, Amir Mosavi

    Abstract: In recent years, the global Internet of Medical Things (IoMT) industry has evolved at a tremendous speed. Security and privacy are key concerns on the IoMT, owing to the huge scale and deployment of IoMT networks. Machine learning (ML) and blockchain (BC) technologies have significantly enhanced the capabilities and facilities of healthcare 5.0, spawning a new area known as "Smart Healthcare." By… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

    Comments: 20 pages, 6 tables, 3 figures

    MSC Class: 68T07

  12. arXiv:2209.07943  [pdf

    cs.CV cs.AI

    Traffic Congestion Prediction using Deep Convolutional Neural Networks: A Color-coding Approach

    Authors: Mirza Fuad Adnan, Nadim Ahmed, Imrez Ishraque, Md. Sifath Al Amin, Md. Sumit Hasan

    Abstract: The traffic video data has become a critical factor in confining the state of traffic congestion due to the recent advancements in computer vision. This work proposes a unique technique for traffic video classification using a color-coding scheme before training the traffic data in a Deep convolutional neural network. At first, the video data is transformed into an imagery data set; then, the vehi… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

  13. Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection

    Authors: Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad A. Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea

    Abstract: Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, ti… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Journal ref: 2021 IEEE International Conference on Big Data (Big Data)

  14. Ransomware Classification and Detection With Machine Learning Algorithms

    Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan

    Abstract: Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause catastrophic damages to computer systems, data centers, web, and mobile applications across various industries and businesses. Traditional anti-ransomware systems struggle to fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional a… ▽ More

    Submitted 2 July, 2022; originally announced July 2022.

    Journal ref: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)

  15. arXiv:2206.13034  [pdf, other

    cs.LG cs.AI

    Monitoring Shortcut Learning using Mutual Information

    Authors: Mohammed Adnan, Yani Ioannou, Chuan-Yung Tsai, Angus Galloway, H. R. Tizhoosh, Graham W. Taylor

    Abstract: The failure of deep neural networks to generalize to out-of-distribution data is a well-known problem and raises concerns about the deployment of trained networks in safety-critical domains such as healthcare, finance and autonomous vehicles. We study a particular kind of distribution shift $\unicode{x2013}$ shortcuts or spurious correlations in the training data. Shortcut learning is often only e… ▽ More

    Submitted 26 June, 2022; originally announced June 2022.

    Comments: Accepted at ICML 2022 Workshop on Spurious Correlations, Invariance, and Stability

  16. arXiv:2204.05436  [pdf, other

    cs.AR cs.AI cs.LG

    Heterogeneous Acceleration Pipeline for Recommendation System Training

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommendation models rely on deep learning networks and large embedding tables, resulting in computationally and memory-intensive processes. These models are typically trained using hybrid CPU-GPU or GPU-only configurations. The hybrid mode combines the GPU's neural network acceleration with the CPUs' memory storage and supply for embedding tables but may incur significant CPU-to-GPU transfer tim… ▽ More

    Submitted 28 April, 2024; v1 submitted 11 April, 2022; originally announced April 2022.

    Comments: Accepted at The International Symposium on Computer Architecture (ISCA), 2024

  17. arXiv:2203.06607  [pdf

    cs.CL cs.AI

    A Systematic Study and Analysis of Bengali Folklore with Natural Language Processing Systems

    Authors: Mustain Billah, Md. Mynoddin, Mostafijur Rahman Akhond, Md. Nasim Adnan, Syed Md. Galib, Rizwanur Rahad, M Nurujjaman Khan

    Abstract: Folklore, a solid branch of folk literature, is the hallmark of any nation or any society. Such as oral tradition; as proverbs or jokes, it also includes material culture as well as traditional folk beliefs, and various customs. Bengali folklore is as rich in-depth as it is amazing. Nevertheless, in the womb of time, it is determined to sustain its existence. Therefore, our aim in this study is to… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  18. arXiv:2111.12170  [pdf, other

    cs.LG cs.AI cs.CV

    Domain-Agnostic Clustering with Self-Distillation

    Authors: Mohammed Adnan, Yani A. Ioannou, Chuan-Yung Tsai, Graham W. Taylor

    Abstract: Recent advancements in self-supervised learning have reduced the gap between supervised and unsupervised representation learning. However, most self-supervised and deep clustering techniques rely heavily on data augmentation, rendering them ineffective for many learning tasks where insufficient domain knowledge exists for performing augmentation. We propose a new self-distillation based algorithm… ▽ More

    Submitted 20 December, 2021; v1 submitted 23 November, 2021; originally announced November 2021.

    Comments: NeurIPS 2021 Workshop: Self-Supervised Learning - Theory and Practice

  19. arXiv:2106.06623  [pdf, other

    eess.IV cs.CV

    Pay Attention with Focus: A Novel Learning Scheme for Classification of Whole Slide Images

    Authors: Shivam Kalra, Mohammed Adnan, Sobhan Hemati, Taher Dehkharghanian, Shahryar Rahnamayan, Hamid Tizhoosh

    Abstract: Deep learning methods such as convolutional neural networks (CNNs) are difficult to directly utilize to analyze whole slide images (WSIs) due to the large image dimensions. We overcome this limitation by proposing a novel two-stage approach. First, we extract a set of representative patches (called mosaic) from a WSI. Each patch of a mosaic is encoded to a feature vector using a deep network. The… ▽ More

    Submitted 11 June, 2021; originally announced June 2021.

    Comments: Accepted in MICCAI, 2021

  20. arXiv:2106.05840  [pdf

    cs.LG math.ST stat.AP stat.CO stat.ME

    A Bagging and Boosting Based Convexly Combined Optimum Mixture Probabilistic Model

    Authors: Mian Arif Shams Adnan, H. M. Miraz Mahmud

    Abstract: Unlike previous studies on mixture distributions, a bagging and boosting based convexly combined mixture probabilistic model has been suggested. This model is a result of iteratively searching for obtaining the optimum probabilistic model that provides the maximum p value.

    Submitted 8 June, 2021; originally announced June 2021.

  21. arXiv:2103.00686  [pdf, other

    cs.IR cs.AI cs.AR cs.LG

    Accelerating Recommendation System Training by Leveraging Popular Choices

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommender models are commonly used to suggest relevant items to a user for e-commerce and online advertisement-based applications. These models use massive embedding tables to store numerical representation of items' and users' categorical variables (memory intensive) and employ neural networks (compute intensive) to generate final recommendations. Training these large-scale recommendation model… ▽ More

    Submitted 28 September, 2021; v1 submitted 28 February, 2021; originally announced March 2021.

    ACM Class: I.2.6; C.5.0

    Journal ref: Proceedings of the VLDB Endowment, 2022

  22. arXiv:2004.07399  [pdf, other

    eess.IV cs.CV cs.LG

    Representation Learning of Histopathology Images using Graph Neural Networks

    Authors: Mohammed Adnan, Shivam Kalra, Hamid R. Tizhoosh

    Abstract: Representation learning for Whole Slide Images (WSIs) is pivotal in develo** image-based systems to achieve higher precision in diagnostic pathology. We propose a two-stage framework for WSI representation learning. We sample relevant patches using a color-based method and use graph neural networks to learn relations among sampled patches to aggregate the image information into a single vector r… ▽ More

    Submitted 17 April, 2020; v1 submitted 15 April, 2020; originally announced April 2020.

    Comments: Published in CVMI at CVPR Workshops, 2020

  23. arXiv:1911.07984  [pdf, other

    cs.LG cs.CV stat.ML

    Learning Permutation Invariant Representations using Memory Networks

    Authors: Shivam Kalra, Mohammed Adnan, Graham Taylor, Hamid Tizhoosh

    Abstract: Many real-world tasks such as classification of digital histopathology images and 3D object detection involve learning from a set of instances. In these cases, only a group of instances or a set, collectively, contains meaningful information and therefore only the sets have labels, and not individual data instances. In this work, we present a permutation invariant neural network called Memory-base… ▽ More

    Submitted 3 July, 2020; v1 submitted 18 November, 2019; originally announced November 2019.

    Comments: Accepted at ECCV 2020

  24. arXiv:1711.10643  [pdf

    cs.IT

    A Review on Cooperative Diversity Techniques Bypassing Channel Estimation

    Authors: Sylvia Ong Ai Ling, Hushairi Zen, Al-Khalid B Hj Othman, Mahmood Adnan, Olalekan Bello

    Abstract: Wireless communication technology has seen a remarkably fast evolution due to its capability to provide a quality, reliable and high-speed data transmission amongst the users. However, transmission of information in wireless channels is primarily impaired by deleterious multipath fading, which affects the quality and reliability of the system. In order to overcome the detrimental effects of fading… ▽ More

    Submitted 28 November, 2017; originally announced November 2017.

    Journal ref: Canadian Journal of Pure and Applied Sciences, Vol. 10, No. 1, February 2016, pp.3777-3783

  25. arXiv:1509.04394  [pdf

    cs.DC

    Efficient Kernel Fusion Techniques for Massive Video Data Analysis on GPGPUs

    Authors: Asif M Adnan, Sridhar Radhakrishnan, Suleyman Karabuk

    Abstract: Kernels are executable code segments and kernel fusion is a technique for combing the segments in a coherent manner to improve execution time. For the first time, we have developed a technique to fuse image processing kernels to be executed on GPGPUs for improving execution time and total throughput (amount of data processed in unit time). We have applied our techniques for feature tracking on vid… ▽ More

    Submitted 15 September, 2015; originally announced September 2015.

  26. arXiv:1210.1300  [pdf

    cs.SI cs.DM

    Properties of Stochastic Kronecker Graph

    Authors: Ahmed Mehedi Nizam, Md. Nasim Adnan, Md. Rashedul Islam, Mohammad Akbar Kabir

    Abstract: The stochastic Kronecker Graph model can generate large random graph that closely resembles many real world networks. For example, the output graph has a heavy-tailed degree distribution, has a (low) diameter that effectively remains constant over time and obeys the so-called densification power law [1]. Aside from this list of very important graph properties, one may ask for some additional infor… ▽ More

    Submitted 4 October, 2012; originally announced October 2012.

    Comments: 5 pages

    MSC Class: 68 ACM Class: G.2.2

    Journal ref: IJCSI Volume 9, Issue 4, July 2012

  27. arXiv:1208.0995  [pdf, other

    cs.AR

    Design and implementation of a digital clock showing digits in Bangla font using microcontroller AT89C4051

    Authors: Nasif Muslim, Md. Tanvir Adnan, Mohammad Zahidul Kabir, Md. Humayun Kabir, Sheikh Mominul Islam

    Abstract: In this paper, a digital clock is designed where the microcontroller is used for timing controller and the font of the Bangla digits are designed, and programmed within the microcontroller. The design is cost effective, simple and easy for maintenance.

    Submitted 5 August, 2012; originally announced August 2012.

  28. arXiv:1204.2320  [pdf, other

    cs.NI cs.DC

    Energy Efficient Geographical Load Balancing via Dynamic Deferral of Workload

    Authors: Muhammad Abdullah Adnan, Ryo Sugihara, Rajesh Gupta

    Abstract: With the increasing popularity of Cloud computing and Mobile computing, individuals, enterprises and research centers have started outsourcing their IT and computational needs to on-demand cloud services. Recently geographical load balancing techniques have been suggested for data centers hosting cloud computation in order to reduce energy cost by exploiting the electricity price differences acros… ▽ More

    Submitted 10 April, 2012; originally announced April 2012.

    Comments: 10 pages, 6 figures

  29. arXiv:1109.3839  [pdf, other

    cs.NI

    Dynamic Deferral of Workload for Capacity Provisioning in Data Centers

    Authors: Muhammad Abdullah Adnan, Ryo Sugihara, Yan Ma, Rajesh Gupta

    Abstract: Recent increase in energy prices has led researchers to find better ways for capacity provisioning in data centers to reduce energy wastage due to the variation in workload. This paper explores the opportunity for cost saving utilizing the flexibility from the Service Level Agreements (SLAs) and proposes a novel approach for capacity provisioning under bounded latency requirements of the workload.… ▽ More

    Submitted 13 November, 2012; v1 submitted 17 September, 2011; originally announced September 2011.

    Comments: 12 pages, 13 figures, 4 tables

  30. arXiv:0811.0254  [pdf, ps, other

    cs.CG cs.DM cs.DS

    Characterizing Graphs of Zonohedra

    Authors: Muhammad Abdullah Adnan, Masud Hasan

    Abstract: A classic theorem by Steinitz states that a graph G is realizable by a convex polyhedron if and only if G is 3-connected planar. Zonohedra are an important subclass of convex polyhedra having the property that the faces of a zonohedron are parallelograms and are in parallel pairs. In this paper we give characterization of graphs of zonohedra. We also give a linear time algorithm to recognize suc… ▽ More

    Submitted 3 November, 2008; originally announced November 2008.

    Comments: 13 pages, 5 figures