Skip to main content

Showing 1–29 of 29 results for author: Ahmad, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15685  [pdf, other

    eess.IV cs.CV

    PathoWAve: A Deep Learning-based Weight Averaging Method for Improving Domain Generalization in Histopathology Images

    Authors: Parastoo Sotoudeh Sharifi, M. Omair Ahmad, M. N. S. Swamy

    Abstract: Recent advancements in deep learning (DL) have significantly advanced medical image analysis. In the field of medical image processing, particularly in histopathology image analysis, the variation in staining protocols and differences in scanners present significant domain shift challenges, undermine the generalization capabilities of models to the data from unseen domains, prompting the need for… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2405.08921  [pdf, other

    cs.LG

    Neural Active Learning Meets the Partial Monitoring Framework

    Authors: Maxime Heuillet, Ola Ahmad, Audrey Durand

    Abstract: We focus on the online-based active learning (OAL) setting where an agent operates over a stream of observations and trades-off between the costly acquisition of information (labelled observations) and the cost of prediction errors. We propose a novel foundation for OAL tasks based on partial monitoring, a theoretical framework specialized in online learning from partially informative actions. We… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  3. arXiv:2405.03706  [pdf, other

    cs.LG

    Improving Graph Machine Learning Performance Through Feature Augmentation Based on Network Control Theory

    Authors: Anwar Said, Obaid Ullah Ahmad, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos

    Abstract: Network control theory (NCT) offers a robust analytical framework for understanding the influence of network topology on dynamic behaviors, enabling researchers to decipher how certain patterns of external control measures can steer system dynamics towards desired states. Distinguished from other structure-function methodologies, NCT's predictive capabilities can be coupled with deploying Graph Ne… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: Conference paper

  4. arXiv:2403.16652  [pdf, other

    cs.RO eess.SY

    Trajectory Planning of Robotic Manipulator in Dynamic Environment Exploiting DRL

    Authors: Osama Ahmad, Zawar Hussain, Hammad Naeem

    Abstract: This study is about the implementation of a reinforcement learning algorithm in the trajectory planning of manipulators. We have a 7-DOF robotic arm to pick and place the randomly placed block at a random target point in an unknown environment. The obstacle is randomly moving which creates a hurdle in picking the object. The objective of the robot is to avoid the obstacle and pick the block with c… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: Accepted in ICIESTR-2024

  5. arXiv:2403.04923  [pdf, other

    cs.LG cs.MA eess.SY

    Control-based Graph Embeddings with Data Augmentation for Contrastive Learning

    Authors: Obaid Ullah Ahmad, Anwar Said, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

    Abstract: In this paper, we study the problem of unsupervised graph representation learning by harnessing the control properties of dynamical networks defined on graphs. Our approach introduces a novel framework for contrastive learning, a widely prevalent technique for unsupervised representation learning. A crucial step in contrastive learning is the creation of 'augmented' graphs from the input graphs. T… ▽ More

    Submitted 17 April, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

    Comments: Accepted in 2024 American Control Conference (ACC), July 8-12, 2024 in Toronto, ON, Canada

  6. arXiv:2402.10388  [pdf

    cs.CY eess.SP

    Improvising Age Verification Technologies in Canada: Technical, Regulatory and Social Dynamics

    Authors: Azfar Adib, Wei-** Zhu, M. Omair Ahmad

    Abstract: Age verification, which is a mandatory legal requirement for delivering certain age-appropriate services or products, has recently been emphasized around the globe to ensure online safety for children. The rapid advancement of artificial intelligence has facilitated the recent development of some cutting-edge age-verification technologies, particularly using biometrics. However, successful deploym… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

    Comments: Presented and accepted for publication in the 2023 IEEE International Humanitarian Technologies Conference (IEEE IHTC 2023), November 1 to 3, 2023, Cartagena, Colombia

  7. arXiv:2402.05002  [pdf, other

    cs.LG

    Randomized Confidence Bounds for Stochastic Partial Monitoring

    Authors: Maxime Heuillet, Ola Ahmad, Audrey Durand

    Abstract: The partial monitoring (PM) framework provides a theoretical formulation of sequential learning problems with incomplete feedback. On each round, a learning agent plays an action while the environment simultaneously chooses an outcome. The agent then observes a feedback signal that is only partially informative about the (unobserved) outcome. The agent leverages the received feedback signals to se… ▽ More

    Submitted 15 May, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

  8. arXiv:2310.05307  [pdf, other

    cs.LG cs.NI

    Successive Data Injection in Conditional Quantum GAN Applied to Time Series Anomaly Detection

    Authors: Benjamin Kalfon, Soumaya Cherkaoui, Jean-Frédéric Laprade, Ola Ahmad, Shengrui Wang

    Abstract: Classical GAN architectures have shown interesting results for solving anomaly detection problems in general and for time series anomalies in particular, such as those arising in communication networks. In recent years, several quantum GAN architectures have been proposed in the literature. When detecting anomalies in time series using QGANs, huge challenges arise due to the limited number of qubi… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  9. arXiv:2310.02606  [pdf, other

    cs.LG eess.IV

    Learning adjacency matrix for dynamic graph neural network

    Authors: Osama Ahmad, Omer Abdul Jalil, Usman Nazir, Murtaza Taj

    Abstract: In recent work, [1] introduced the concept of using a Block Adjacency Matrix (BA) for the representation of spatio-temporal data. While their method successfully concatenated adjacency matrices to encapsulate spatio-temporal relationships in a single graph, it formed a disconnected graph. This limitation hampered the ability of Graph Convolutional Networks (GCNs) to perform message passing across… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: Submitted to ICASSP 2024

  10. arXiv:2309.02649  [pdf, other

    eess.SY cs.MA

    Controllability Backbone in Networks

    Authors: Obaid Ullah Ahmad, Waseem Abbas, Mudassir Shabbir

    Abstract: This paper studies the controllability backbone problem in dynamical networks defined over graphs. The main idea of the controllability backbone is to identify a small subset of edges in a given network such that any subnetwork containing those edges/links has at least the same network controllability as the original network while assuming the same set of input/leader vertices. We consider the str… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

    Comments: Accepted in 62nd IEEE Conference on Decision and Control, Dec. 13-15, 2023, Singapore

  11. arXiv:2307.05707  [pdf, other

    cs.CV cs.LG

    MoP-CLIP: A Mixture of Prompt-Tuned CLIP Models for Domain Incremental Learning

    Authors: Julien Nicolas, Florent Chiaroni, Imtiaz Ziko, Ola Ahmad, Christian Desrosiers, Jose Dolz

    Abstract: Despite the recent progress in incremental learning, addressing catastrophic forgetting under distributional drift is still an open and important problem. Indeed, while state-of-the-art domain incremental learning (DIL) methods perform satisfactorily within known domains, their performance largely degrades in the presence of novel domains. This limitation hampers their generalizability, and restri… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: 13 pages, 5 figures

  12. arXiv:2305.08950  [pdf, other

    cs.LG stat.ME

    Causal Analysis for Robust Interpretability of Neural Networks

    Authors: Ola Ahmad, Nicolas Bereux, Loïc Baret, Vahid Hashemi, Freddy Lecue

    Abstract: Interpreting the inner function of neural networks is crucial for the trustworthy development and deployment of these black-box models. Prior interpretability methods focus on correlation-based measures to attribute model decisions to individual examples. However, these measures are susceptible to noise and spurious correlations encoded in the model during the training phase (e.g., biased inputs,… ▽ More

    Submitted 20 June, 2023; v1 submitted 15 May, 2023; originally announced May 2023.

  13. arXiv:2304.09691  [pdf, other

    cs.CV

    DarSwin: Distortion Aware Radial Swin Transformer

    Authors: Akshaya Athwale, Ichrak Shili, Émile Bergeron, Arman Afrasiyabi, Justin Lagüe, Ola Ahmad, Jean-François Lalonde

    Abstract: Wide-angle lenses are commonly used in perception tasks requiring a large field of view. Unfortunately, these lenses produce significant distortions, making conventional models that ignore the distortion effects unable to adapt to wide-angle images. In this paper, we present a novel transformer-based model that automatically adapts to the distortion produced by wide-angle lenses. Our proposed imag… ▽ More

    Submitted 7 January, 2024; v1 submitted 19 April, 2023; originally announced April 2023.

    Comments: 18 pages, 12 figures

    MSC Class: 68T01

  14. An initial Theory to Understand and Manage Requirements Engineering Debt in Practice

    Authors: Julian Frattini, Davide Fucci, Daniel Mendez, Rodrigo Spinola, Vladimir Mandic, Nebojsa Tausan, Muhammad Ovais Ahmad, Javier Gonzalez-Huerta

    Abstract: Context: Advances in technical debt research demonstrate the benefits of applying the financial debt metaphor to support decision-making in software development activities. Although decision-making during requirements engineering has significant consequences, the debt metaphor in requirements engineering is inadequately explored. Objective: We aim to conceptualize how the debt metaphor applies to… ▽ More

    Submitted 8 March, 2023; v1 submitted 11 November, 2022; originally announced November 2022.

    Comments: Revised manuscript based on reviews

  15. arXiv:2209.07878  [pdf

    cs.SE

    Team performance and large scale agile software development

    Authors: Muhammad Ovais Ahmad, Hadi Ghanbari, Tomas Gustavsson

    Abstract: Software development is a team work and largely dependent on open social interaction and continuous learning of individuals. Drawing on well established theoretical concepts proposed by social psychology and organizational science disciplines, we develop a theoretical framework proposing that team climate has a significant influence on team learning and ultimately affects team performance. Our stu… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

    Comments: 6 pages, 1 figure, conference, ESEM, Register Report

  16. arXiv:2203.07255  [pdf, other

    cs.CV

    FisheyeHDK: Hyperbolic Deformable Kernel Learning for Ultra-Wide Field-of-View Image Recognition

    Authors: Ola Ahmad, Freddy Lecue

    Abstract: Conventional convolution neural networks (CNNs) trained on narrow Field-of-View (FoV) images are the state-of-the-art approaches for object recognition tasks. Some methods proposed the adaptation of CNNs to ultra-wide FoV images by learning deformable kernels. However, they are limited by the Euclidean geometry and their accuracy degrades under strong distortions caused by fisheye projections. In… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

    Comments: Accepted at AAAI22

  17. SEMOUR: A Scripted Emotional Speech Repository for Urdu

    Authors: Nimra Zaheer, Obaid Ullah Ahmad, Ammar Ahmed, Muhammad Shehryar Khan, Mudassir Shabbir

    Abstract: Designing reliable Speech Emotion Recognition systems is a complex task that inevitably requires sufficient data for training purposes. Such extensive datasets are currently available in only a few languages, including English, German, and Italian. In this paper, we present SEMOUR, the first scripted database of emotion-tagged speech in the Urdu language, to design an Urdu Speech Recognition Syste… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

    Comments: accepted in CHI 2021

  18. arXiv:2102.10191  [pdf, other

    cs.CV

    Adaptable Deformable Convolutions for Semantic Segmentation of Fisheye Images in Autonomous Driving Systems

    Authors: Clément Playout, Ola Ahmad, Freddy Lecue, Farida Cheriet

    Abstract: Advanced Driver-Assistance Systems rely heavily on perception tasks such as semantic segmentation where images are captured from large field of view (FoV) cameras. State-of-the-art works have made considerable progress toward applying Convolutional Neural Network (CNN) to standard (rectilinear) images. However, the large FoV cameras used in autonomous vehicles produce fisheye images characterized… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

    Comments: 10 pages, 4 figures

  19. arXiv:2007.02096  [pdf

    eess.IV cs.CV cs.LG

    Multi-Site Infant Brain Segmentation Algorithms: The iSeg-2019 Challenge

    Authors: Yue Sun, Kun Gao, Zhengwang Wu, Zhihao Lei, Ying Wei, Jun Ma, ** Yang, Xue Feng, Li Zhao, Trung Le Phan, Jitae Shin, Tao Zhong, Yu Zhang, Lequan Yu, Caizi Li, Ramesh Basnet, M. Omair Ahmad, M. N. S. Swamy, Wenao Ma, Qi Dou, Toan Duc Bui, Camilo Bermudez Noguera, Bennett Landman, Ian H. Gotlib, Kathryn L. Humphreys , et al. (8 additional authors not shown)

    Abstract: To better understand early brain growth patterns in health and disorder, it is critical to accurately segment infant brain magnetic resonance (MR) images into white matter (WM), gray matter (GM), and cerebrospinal fluid (CSF). Deep learning-based methods have achieved state-of-the-art performance; however, one of major limitations is that the learning-based methods may suffer from the multi-site i… ▽ More

    Submitted 11 July, 2020; v1 submitted 4 July, 2020; originally announced July 2020.

    Journal ref: IEEE Transactions on Medical Imaging, 40(5), 1363-1376, 2021

  20. Design and Hardware Implementation of a Separable Image Steganographic Scheme Using Public-key Cryptosystem

    Authors: Salah Harb, M. Omair Ahmad, M. N. S Swamy

    Abstract: In this paper, a novel and efficient hardware implementation of steganographic cryptosystem based on a public-key cryptography is proposed. Digital images are utilized as carriers of secret data between sender and receiver parties in the communication channel. The proposed public-key cryptosystem offers a separable framework that allows to embed or extract secret data and encrypt or decrypt the ca… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    Comments: 14 pages, 5 figures, conference

  21. arXiv:2003.08021  [pdf

    cs.CV

    Applying r-spatiogram in object tracking for occlusion handling

    Authors: Niloufar Salehi Dastjerdi, M. Omair Ahmad

    Abstract: Object tracking is one of the most important problems in computer vision. The aim of video tracking is to extract the trajectories of a target or object of interest, i.e. accurately locate a moving target in a video sequence and discriminate target from non-targets in the feature space of the sequence. So, feature descriptors can have significant effects on such discrimination. In this paper, we u… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

  22. arXiv:1805.00632  [pdf, other

    cs.CV

    Interpretable Fully Convolutional Classification of Intrapapillary Capillary Loops for Real-Time Detection of Early Squamous Neoplasia

    Authors: Luis C. Garcia-Peraza-Herrera, Martin Everson, Wenqi Li, Inmanol Luengo, Lorenz Berger, Omer Ahmad, Laurence Lovat, Hsiu-Po Wang, Wen-Lun Wang, Rehan Haidry, Danail Stoyanov, Tom Vercauteren, Sebastien Ourselin

    Abstract: In this work, we have concentrated our efforts on the interpretability of classification results coming from a fully convolutional neural network. Motivated by the classification of oesophageal tissue for real-time detection of early squamous neoplasia, the most frequent kind of oesophageal cancer in Asia, we present a new dataset and a novel deep learning method that by means of deep supervision… ▽ More

    Submitted 2 May, 2018; originally announced May 2018.

  23. arXiv:1803.00396  [pdf

    eess.AS cs.SD

    Speech Enhancement in Adverse Environments Based on Non-stationary Noise-driven Spectral Subtraction and SNR-dependent Phase Compensation

    Authors: Md Tauhidul Islam, Asaduzzaman, Celia Shahnaz, Wei-** Zhu, M. Omair Ahmad

    Abstract: A two-step enhancement method based on spectral subtraction and phase spectrum compensation is presented in this paper for noisy speeches in adverse environments involving non-stationary noise and medium to low levels of SNR. The magnitude of the noisy speech spectrum is modified in the first step of the proposed method by a spectral subtraction approach, where a new noise estimation method based… ▽ More

    Submitted 18 February, 2018; originally announced March 2018.

    Comments: 15 pages, 10 figures, 8 tables. arXiv admin note: substantial text overlap with arXiv:1802.02665; text overlap with arXiv:1802.05125

  24. arXiv:1802.05125  [pdf

    eess.AS cs.SD

    Enhancement of Noisy Speech with Low Speech Distortion Based on Probabilistic Geometric Spectral Subtraction

    Authors: Md Tauhidul Islam, Celia Shahnaz, Wei-** Zhu, M. Omair Ahmad

    Abstract: A speech enhancement method based on probabilistic geometric approach to spectral subtraction (PGA) performed on short time magnitude spectrum is presented in this paper. A confidence parameter of noise estimation is introduced in the gain function of the proposed method to prevent subtraction of the overestimated and underestimated noise, which not only removes the noise efficiently but also prev… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

    Comments: To appear in Computer Speech and Language, 16 pages, 13 figures, 8 tables. arXiv admin note: text overlap with arXiv:1802.02665

  25. arXiv:1802.03472  [pdf

    eess.AS cs.SD

    Modeling of Teager Energy Operated Perceptual Wavelet Packet Coefficients with an Erlang-2 PDF for Real Time Enhancement of Noisy Speech

    Authors: Md Tauhidul Islam, Celia Shahnaz, Wei-** Zhu, M. Omair Ahmad

    Abstract: In this paper, for real time enhancement of noisy speech, a method of threshold determination based on modeling of Teager energy (TE) operated perceptual wavelet packet (PWP) coefficients of the noisy speech and noise by an Erlang-2 PDF is presented. The proposed method is computationally much faster than the existing wavelet packet based thresholding methods. A custom thresholding function based… ▽ More

    Submitted 9 February, 2018; originally announced February 2018.

    Comments: To appear in Digital Signal Processing, 27 pages, 19 figures, 10 tables

  26. arXiv:1802.02665  [pdf

    eess.AS cs.SD

    A Divide and Conquer Strategy for Musical Noise-free Speech Enhancement in Adverse Environments

    Authors: Md Tauhidul Islam, Celia Shahnaz, Wei-** Zhu, M. Omair Ahmad

    Abstract: A divide and conquer strategy for enhancement of noisy speeches in adverse environments involving lower levels of SNR is presented in this paper, where the total system of speech enhancement is divided into two separate steps. The first step is based on noise compensation on short time magnitude and the second step is based on phase compensation. The magnitude spectrum is compensated based on a mo… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: 11 pages, 8 tables, 12 figures

  27. arXiv:1109.3767  [pdf

    cs.CV

    Generalised Object Detection and Semantic Analysis: Casino Example using Matlab

    Authors: Othman Ahmad

    Abstract: Matlab version 7.1 had been used to detect playing cards on a Casino table and the suits and ranks of these cards had been identified. The process gives an example of an application of computer vision to a problem where rectangular objects are to be detected and the information content of the objects are extracted out. In the case of playing cards, it is the suit and rank of each card. The image p… ▽ More

    Submitted 17 September, 2011; originally announced September 2011.

  28. arXiv:1005.0783  [pdf, other

    cs.SE

    Software Requirements Specification of the IUfA's UUIS -- a Team 2 COMP5541-W10 Project Approach

    Authors: Omer Shahid Ahmad, Faisal Alrashdi, Jason, Chen, Najah Ilham, Jianhai Lu, Yiwei Sun, Tong Wang, Yongxin Zhu

    Abstract: In the 52-page document, we describe our approach to the Software Requirements Specification of the IUfA's UUIS prototype. This includes the overall system description, functional requirements, non-functional requirements, use cases, the corresponding data dictionary for all entities involved, mock user interface (UI) design, and the overall projected cost estimate. The design specification of UUI… ▽ More

    Submitted 7 May, 2010; v1 submitted 5 May, 2010; originally announced May 2010.

    Comments: 52 pages. 51 tables, 4 figures

    ACM Class: D.2; K.6; H.5.2

  29. arXiv:1005.0665  [pdf, other

    cs.SE

    Software Design Document, Testing, Deployment and Configuration Management of the UUIS--a Team 2 COMP5541-W10 Project Approach

    Authors: Omer Shahid Ahmad, Faisal Alrashdi, Jason, Chen, Najah Ilham, Jianhai Lu, Yiwei Sun, Tong Wang, Yongxin Zhu

    Abstract: The Software Design Document of UUIS describes the prototype design details of the system architecture, database layer, deployment and configuration details as well as test cases produced while working the design and implementation of the prototype. The requirements specification of UUIS are detailed in arXiv:1005.0783.

    Submitted 7 May, 2010; v1 submitted 5 May, 2010; originally announced May 2010.

    Comments: 161 pages, 46 figures

    ACM Class: D.2; K.6; H.5.2