Skip to main content

Showing 1–50 of 219 results for author: Ahmed, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16638  [pdf, other

    cs.CV cs.AI

    Feature Fusion for Human Activity Recognition using Parameter-Optimized Multi-Stage Graph Convolutional Network and Transformer Models

    Authors: Mohammad Belal, Taimur Hassan, Abdelfatah Ahmed, Ahmad Aljarah, Nael Alsheikh, Irfan Hussain

    Abstract: Human activity recognition (HAR) is a crucial area of research that involves understanding human movements using computer and machine vision technology. Deep learning has emerged as a powerful tool for this task, with models such as Convolutional Neural Networks (CNNs) and Transformers being employed to capture various aspects of human motion. One of the key contributions of this work is the demon… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: 7 pages, 1 figure, conference

  2. arXiv:2406.01013  [pdf, other

    cs.LG cs.CL

    Scalable Ensembling For Mitigating Reward Overoptimisation

    Authors: Ahmed M. Ahmed, Rafael Rafailov, Stepan Sharkov, Xuechen Li, Sanmi Koyejo

    Abstract: Reinforcement Learning from Human Feedback (RLHF) has enabled significant advancements within language modeling for powerful, instruction-following models. However, the alignment of these models remains a pressing challenge as the policy tends to overfit the learned ``proxy" reward model past an inflection point of utility as measured by a ``gold" reward model that is more performant -- a phenomen… ▽ More

    Submitted 18 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  3. arXiv:2405.13030  [pdf, ps, other

    cs.CL cs.AI

    Crowdsourcing with Enhanced Data Quality Assurance: An Efficient Approach to Mitigate Resource Scarcity Challenges in Training Large Language Models for Healthcare

    Authors: P. Barai, G. Leroy, P. Bisht, J. M. Rothman, S. Lee, J. Andrews, S. A. Rice, A. Ahmed

    Abstract: Large Language Models (LLMs) have demonstrated immense potential in artificial intelligence across various domains, including healthcare. However, their efficacy is hindered by the need for high-quality labeled data, which is often expensive and time-consuming to create, particularly in low-resource domains like healthcare. To address these challenges, we propose a crowdsourcing (CS) framework enr… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: Published in AMIA Summit, Boston, 2024. https://knowledge.amia.org/Info2024/pdf/Info2024a022/Info2024fl021

  4. arXiv:2405.09960  [pdf, other

    eess.SP cs.LG cs.NI

    A Unified Deep Transfer Learning Model for Accurate IoT Localization in Diverse Environments

    Authors: Abdullahi Isa Ahmed, Yaya Etiabi, Ali Waqar Azim, El Mehdi Amhoud

    Abstract: Internet of Things (IoT) is an ever-evolving technological paradigm that is resha** industries and societies globally. Real-time data collection, analysis, and decision-making facilitated by localization solutions form the foundation for location-based services, enabling them to support critical functions within diverse IoT ecosystems. However, most existing works on localization focus on single… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: 6 pages, 8 figures, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2024)

  5. arXiv:2405.06983  [pdf, other

    cs.NI

    ISAC-Assisted Wireless Rechargeable Sensor Networks with Multiple Mobile Charging Vehicles

    Authors: Muhammad Umar Farooq Qaisar, Weijie Yuan, Paolo Bellavista, Guangjie Han, Adeel Ahmed

    Abstract: As IoT-based wireless sensor networks (WSNs) become more prevalent, the issue of energy shortages becomes more pressing. One potential solution is the use of wireless power transfer (WPT) technology, which is the key to building a new shape of wireless rechargeable sensor networks (WRSNs). However, efficient charging and scheduling are critical for WRSNs to function properly. Motivated by the fact… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: Accepted for publication in the Special Issue Q1'2024, "Integrating Sensing and Communication for Ubiquitous Internet of Things," IEEE Internet of Things Magazine

  6. arXiv:2405.06826  [pdf, other

    cs.PL cs.LO

    A Nominal Approach to Probabilistic Separation Logic

    Authors: John M. Li, Jon Aytac, Philip Johnson-Freyd, Amal Ahmed, Steven Holtzen

    Abstract: Currently, there is a gap between the tools used by probability theorists and those used in formal reasoning about probabilistic programs. On the one hand, a probability theorist decomposes probabilistic state along the simple and natural product of probability spaces. On the other hand, recently developed probabilistic separation logics decompose state via relatively unfamiliar measure-theoretic… ▽ More

    Submitted 28 May, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

  7. arXiv:2404.19119  [pdf

    cs.CL

    Effects of Added Emphasis and Pause in Audio Delivery of Health Information

    Authors: Arif Ahmed, Gondy Leroy, Stephen A. Rains, Philip Harber, David Kauchak, Prosanta Barai

    Abstract: Health literacy is crucial to supporting good health and is a major national goal. Audio delivery of information is becoming more popular for informing oneself. In this study, we evaluate the effect of audio enhancements in the form of information emphasis and pauses with health texts of varying difficulty and we measure health information comprehension and retention. We produced audio snippets fr… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

    Comments: This manuscript is accepted to American Medical Informatics Association summit, 2024

  8. arXiv:2404.12241  [pdf, other

    cs.CL cs.AI

    Introducing v0.5 of the AI Safety Benchmark from MLCommons

    Authors: Bertie Vidgen, Adarsh Agrawal, Ahmed M. Ahmed, Victor Akinwande, Namir Al-Nuaimi, Najla Alfaraj, Elie Alhajjar, Lora Aroyo, Trupti Bavalatti, Max Bartolo, Borhane Blili-Hamelin, Kurt Bollacker, Rishi Bomassani, Marisa Ferrara Boston, Siméon Campos, Kal Chakra, Canyu Chen, Cody Coleman, Zacharie Delpierre Coudert, Leon Derczynski, Debojyoti Dutta, Ian Eisenberg, James Ezick, Heather Frase, Brian Fuller , et al. (75 additional authors not shown)

    Abstract: This paper introduces v0.5 of the AI Safety Benchmark, which has been created by the MLCommons AI Safety Working Group. The AI Safety Benchmark has been designed to assess the safety risks of AI systems that use chat-tuned language models. We introduce a principled approach to specifying and constructing the benchmark, which for v0.5 covers only a single use case (an adult chatting to a general-pu… ▽ More

    Submitted 13 May, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

  9. Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US

    Authors: Ejiofor Oluomachi, Akinsola Ahmed, Wahab Ahmed, Edozie Samson

    Abstract: This article assesses the effectiveness of current cybersecurity regulations and policies in the United States amidst the escalating frequency and sophistication of cyber threats. The focus is on the comprehensive framework established by the U.S. government, with a spotlight on the National Institute of Standards and Technology (NIST) Cybersecurity Framework and key regulations such as HIPAA, GLB… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  10. Enhancing Data Privacy In Wireless Sensor Networks: Investigating Techniques And Protocols To Protect Privacy Of Data Transmitted Over Wireless Sensor Networks In Critical Applications Of Healthcare And National Security

    Authors: Akinsola Ahmed, Ejiofor Oluomachi, Akinde Abdullah, Njoku Tochukwu

    Abstract: The article discusses the emergence of Wireless Sensor Networks (WSNs) as a groundbreaking technology in data processing and communication. It outlines how WSNs, composed of dispersed autonomous sensors, are utilized to monitor physical and environmental factors, transmitting data wirelessly for analysis. The article explores various applications of WSNs in healthcare, national security, emergency… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  11. arXiv:2403.15755  [pdf, other

    stat.ME cs.MA cs.SI stat.AP

    Optimized Model Selection for Estimating Treatment Effects from Costly Simulations of the US Opioid Epidemic

    Authors: Abdulrahman A. Ahmed, M. Amin Rahimian, Mark S. Roberts

    Abstract: Agent-based simulation with a synthetic population can help us compare different treatment conditions while kee** everything else constant within the same population (i.e., as digital twins). Such population-scale simulations require large computational power (i.e., CPU resources) to get accurate estimates for treatment effects. We can use meta models of the simulation results to circumvent the… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: To be presented in 2024 Annual Simulation Conference (ANNSIM'24)

  12. arXiv:2403.12044  [pdf, other

    cs.CV cs.LG

    Mobile Application for Oral Disease Detection using Federated Learning

    Authors: Shankara Narayanan V, Sneha Varsha M, Syed Ashfaq Ahmed, Guruprakash J

    Abstract: The mouth, often regarded as a window to the internal state of the body, plays an important role in reflecting one's overall health. Poor oral hygiene has far-reaching consequences, contributing to severe conditions like heart disease, cancer, and diabetes, while inadequate care leads to discomfort, pain, and costly treatments. Federated Learning (FL) for object detection can be utilized for this… ▽ More

    Submitted 27 October, 2023; originally announced March 2024.

  13. arXiv:2403.07483  [pdf, other

    cs.LG cs.AI

    A Deep Learning Approach to Diabetes Diagnosis

    Authors: Zeyu Zhang, Khandaker Asif Ahmed, Md Rakibul Hasan, Tom Gedeon, Md Zakir Hossain

    Abstract: Diabetes, resulting from inadequate insulin production or utilization, causes extensive harm to the body. Existing diagnostic methods are often invasive and come with drawbacks, such as cost constraints. Although there are machine learning models like Classwise k Nearest Neighbor (CkNN) and General Regression Neural Network (GRNN), they struggle with imbalanced data and result in under-performance… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: Accepted to ACIIDS 2024

  14. arXiv:2402.13429  [pdf, ps, other

    cs.DB cs.LG cs.OS

    Everything You Always Wanted to Know About Storage Compressibility of Pre-Trained ML Models but Were Afraid to Ask

    Authors: Zhaoyuan Su, Ammar Ahmed, Zirui Wang, Ali Anwar, Yue Cheng

    Abstract: As the number of pre-trained machine learning (ML) models is growing exponentially, data reduction tools are not catching up. Existing data reduction techniques are not specifically designed for pre-trained model (PTM) dataset files. This is largely due to a lack of understanding of the patterns and characteristics of these datasets, especially those relevant to data reduction and compressibility.… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: This paper presents the first, exhaustive analysis to date of PTM datasets on storage compressibility. Motivated by our findings, we design ELF, a simple yet effective, error-bounded, lossy floating-point compression method

    ACM Class: H.2.7

  15. arXiv:2402.10873  [pdf, ps, other

    cs.NI eess.SP

    Probabilistic On-Demand Charging Scheduling for ISAC-Assisted WRSNs with Multiple Mobile Charging Vehicles

    Authors: Muhammad Umar Farooq Qaisar, Weijie Yuan, Paolo Bellavista, Guangjie Han, Rabiu Sale Zakariyya, Adeel Ahmed

    Abstract: The internet of things (IoT) based wireless sensor networks (WSNs) face an energy shortage challenge that could be overcome by the novel wireless power transfer (WPT) technology. The combination of WSNs and WPT is known as wireless rechargeable sensor networks (WRSNs), with the charging efficiency and charging scheduling being the primary concerns. Therefore, this paper proposes a probabilistic on… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: Accepted for publication at the IEEE Global Communications Conference (GLOBECOM) 2023

  16. Using Ensemble Inference to Improve Recall of Clone Detection

    Authors: Gul Aftab Ahmed, James Vincent Patten, Yuanhua Han, Guoxian Lu, David Gregg, Jim Buckley, Muslim Chochlov

    Abstract: Large-scale source-code clone detection is a challenging task. In our previous work, we proposed an approach (SSCD) that leverages artificial neural networks and approximates nearest neighbour search to effectively and efficiently locate clones in large-scale bodies of code, in a time-efficient manner. However, our literature review suggests that the relative efficacy of differing neural network m… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Journal ref: 2023 IEEE 17th International Workshop on Software Clones (IWSC)

  17. arXiv:2402.03486  [pdf, other

    cs.LG cs.AI cs.IR

    Early prediction of onset of sepsis in Clinical Setting

    Authors: Fahim Mohammad, Lakshmi Arunachalam, Samanway Sadhu, Boudewijn Aasman, Shweta Garg, Adil Ahmed, Silvie Colman, Meena Arunachalam, Sudhir Kulkarni, Parsa Mirhaji

    Abstract: This study proposes the use of Machine Learning models to predict the early onset of sepsis using deidentified clinical data from Montefiore Medical Center in Bronx, NY, USA. A supervised learning approach was adopted, wherein an XGBoost model was trained utilizing 80\% of the train dataset, encompassing 107 features (including the original and derived features). Subsequently, the model was evalua… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 16 pages, 6 figures and 7 tables

  18. arXiv:2401.08287  [pdf, other

    cs.PL

    RichWasm: Bringing Safe, Fine-Grained, Shared-Memory Interoperability Down to WebAssembly

    Authors: Zoe Paraskevopoulou, Michael Fitzgibbons, Michelle Thalakottur, Noble Mushtak, Jose Sulaiman Mazur, Amal Ahmed

    Abstract: Safe, shared-memory interoperability between languages with different type systems and memory-safety guarantees is an intricate problem as crossing language boundaries may result in memory-safety violations. In this paper, we present RichWasm, a novel richly typed intermediate language designed to serve as a compilation target for typed high-level languages with different memory-safety guarantees.… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

  19. arXiv:2401.08047  [pdf, other

    cs.CL cs.LG

    Incremental Extractive Opinion Summarization Using Cover Trees

    Authors: Somnath Basu Roy Chowdhury, Nicholas Monath, Avinava Dubey, Manzil Zaheer, Andrew McCallum, Amr Ahmed, Snigdha Chaturvedi

    Abstract: Extractive opinion summarization involves automatically producing a summary of text about an entity (e.g., a product's reviews) by extracting representative sentences that capture prevalent opinions in the review set. Typically, in online marketplaces user reviews accumulate over time, and opinion summaries need to be updated periodically to provide customers with up-to-date information. In this w… ▽ More

    Submitted 12 April, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: Accepted at TMLR

  20. arXiv:2401.01394  [pdf

    cs.CR

    Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience

    Authors: Sagar Dasgupta, Abdullah Ahmed, Mizanur Rahman, Thejesh N. Bandi

    Abstract: Autonomous vehicles (AVs) rely on the Global Positioning System (GPS) or Global Navigation Satellite Systems (GNSS) for precise (Positioning, Navigation, and Timing) PNT solutions. However, the vulnerability of GPS signals to intentional and unintended threats due to their lack of encryption and weak signal strength poses serious risks, thereby reducing the reliability of AVs. GPS spoofing is a co… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  21. arXiv:2312.14358  [pdf

    cs.RO cs.HC

    A utility belt for an agricultural robot: reflection-in-action for applied design research

    Authors: Natalie Friedman, Asmita Mehta, Kari Love, Alexandra Bremers, Awsaf Ahmed, Wendy Ju

    Abstract: Clothing for robots can help expand a robot's functionality and also clarify the robot's purpose to bystanders. In studying how to design clothing for robots, we can shed light on the functional role of aesthetics in interactive system design. We present a case study of designing a utility belt for an agricultural robot. We use reflection-in-action to consider the ways that observation, in situ ma… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  22. arXiv:2312.00194  [pdf

    cs.LG cs.CL

    Robust Concept Erasure via Kernelized Rate-Distortion Maximization

    Authors: Somnath Basu Roy Chowdhury, Nicholas Monath, Avinava Dubey, Amr Ahmed, Snigdha Chaturvedi

    Abstract: Distributed representations provide a vector space that captures meaningful relationships between data instances. The distributed nature of these representations, however, entangles together multiple attributes or concepts of data instances (e.g., the topic or sentiment of a text, characteristics of the author (age, gender, etc), etc). Recent work has proposed the task of concept erasure, in which… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

    Comments: NeurIPS 2023

  23. arXiv:2312.00030  [pdf

    cs.CY cs.AI

    Artificial Intelligence in Sustainable Vertical Farming

    Authors: Hribhu Chowdhury, Debo Brata Paul Argha, Md Ashik Ahmed

    Abstract: As global challenges of population growth, climate change, and resource scarcity intensify, the agricultural landscape is at a critical juncture. Sustainable vertical farming emerges as a transformative solution to address these challenges by maximizing crop yields in controlled environments. This paradigm shift necessitates the integration of cutting-edge technologies, with Artificial Intelligenc… ▽ More

    Submitted 17 November, 2023; originally announced December 2023.

  24. arXiv:2311.13494  [pdf

    cs.IR cs.HC

    A Comparative Analysis of Supportive Navigation on Movie Recommenders

    Authors: Mohammad Sualeh Ali, Muhammed Maaz Tariq, Alina Ahmed, Abdul Razaque Soomro, Danysh Syed

    Abstract: This literature review covers the research and thought process that went into making a solution for the infinite scrolling problem faced in streaming services such as Netflix. Using the data collected, we have come to the conclusion that an alternate layout can somewhat alleviate the problems it takes in navigating a list of movies. We also found out by a comparative analysis that some layouts, th… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

    Comments: This was an extensive survey and prototy** we did to purpose and alternative user interface for movie recommender systems like Netflix

  25. arXiv:2311.12882  [pdf

    cs.CL

    LLMs-Healthcare : Current Applications and Challenges of Large Language Models in various Medical Specialties

    Authors: Ummara Mumtaz, Awais Ahmed, Summaya Mumtaz

    Abstract: We aim to present a comprehensive overview of the latest advancements in utilizing Large Language Models (LLMs) within the healthcare sector, emphasizing their transformative impact across various medical domains. LLMs have become pivotal in supporting healthcare, including physicians, healthcare providers, and patients. Our review provides insight into the applications of Large Language Models (L… ▽ More

    Submitted 25 February, 2024; v1 submitted 27 October, 2023; originally announced November 2023.

    Comments: 26 pages and one figure

  26. arXiv:2311.12589   

    cs.CV cs.AI cs.LG

    Improving Source-Free Target Adaptation with Vision Transformers Leveraging Domain Representation Images

    Authors: Gauransh Sawhney, Daksh Dave, Adeel Ahmed, Jiechao Gao, Khalid Saleem

    Abstract: Unsupervised Domain Adaptation (UDA) methods facilitate knowledge transfer from a labeled source domain to an unlabeled target domain, navigating the obstacle of domain shift. While Convolutional Neural Networks (CNNs) are a staple in UDA, the rise of Vision Transformers (ViTs) provides new avenues for domain generalization. This paper presents an innovative method to bolster ViT performance in so… ▽ More

    Submitted 2 December, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: Requesting withdrawal due to significant overlap with prior research that wasn't appropriately acknowledged in our manuscript. The decision is made to uphold academic integrity

  27. ART-Owen Scrambling

    Authors: Abdalla G. M. Ahmed, Matt Pharr, Peter Wonka

    Abstract: We present a novel algorithm for implementing Owen-scrambling, combining the generation and distribution of the scrambling bits in a single self-contained compact process. We employ a context-free grammar to build a binary tree of symbols, and equip each symbol with a scrambling code that affects all descendant nodes. We nominate the grammar of adaptive regular tiles (ART) derived from the repetit… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: To appear at SIGGRAPH Asia 2023

  28. arXiv:2311.06278  [pdf

    q-fin.ST cs.AI cs.LG

    Boosting Stock Price Prediction with Anticipated Macro Policy Changes

    Authors: Md Sabbirul Haque, Md Shahedul Amin, Jonayet Miah, Duc Minh Cao, Ashiqul Haque Ahmed

    Abstract: Prediction of stock prices plays a significant role in aiding the decision-making of investors. Considering its importance, a growing literature has emerged trying to forecast stock prices with improved accuracy. In this study, we introduce an innovative approach for forecasting stock prices with greater accuracy. We incorporate external economic environment-related information along with stock pr… ▽ More

    Submitted 27 October, 2023; originally announced November 2023.

    Journal ref: Journal of Mathematics and Statistics Studies, 4(3), 29-34 (2023)

  29. arXiv:2310.12155  [pdf

    cs.NE

    Balancing exploration and exploitation phases in whale optimization algorithm: an insightful and empirical analysis

    Authors: Aram M. Ahmed, Tarik A. Rashid, Bryar A. Hassan, Jaffer Majidpour, Kaniaw A. Noori, Chnoor Maheadeen Rahman, Mohmad Hussein Abdalla, Shko M. Qader, Noor Tayfor, Naufel B Mohammed

    Abstract: Agents of any metaheuristic algorithms are moving in two modes, namely exploration and exploitation. Obtaining robust results in any algorithm is strongly dependent on how to balance between these two modes. Whale optimization algorithm as a robust and well recognized metaheuristic algorithm in the literature, has proposed a novel scheme to achieve this balance. It has also shown superior results… ▽ More

    Submitted 3 September, 2023; originally announced October 2023.

    Comments: 11 pages

  30. arXiv:2310.11401  [pdf, other

    cs.LG

    Enhancing Group Fairness in Online Settings Using Oblique Decision Forests

    Authors: Somnath Basu Roy Chowdhury, Nicholas Monath, Ahmad Beirami, Rahul Kidambi, Avinava Dubey, Amr Ahmed, Snigdha Chaturvedi

    Abstract: Fairness, especially group fairness, is an important consideration in the context of machine learning systems. The most commonly adopted group fairness-enhancing techniques are in-processing methods that rely on a mixture of a fairness objective (e.g., demographic parity) and a task-specific objective (e.g., cross-entropy) during the training process. However, when data arrives in an online fashio… ▽ More

    Submitted 27 April, 2024; v1 submitted 17 October, 2023; originally announced October 2023.

    Comments: ICLR 2024 (Spotlight)

  31. arXiv:2310.07723  [pdf

    cs.NE

    Equitable and Fair Performance Evaluation of Whale Optimization Algorithm

    Authors: Bryar A. Hassan, Tarik A. Rashid, Aram Ahmed, Shko M. Qader, Jaffer Majidpour, Mohmad Hussein Abdalla, Noor Tayfor, Hozan K. Hamarashid, Haval Sidqi, Kaniaw A. Noori

    Abstract: It is essential that all algorithms are exhaustively, somewhat, and intelligently evaluated. Nonetheless, evaluating the effectiveness of optimization algorithms equitably and fairly is not an easy process for various reasons. Choosing and initializing essential parameters, such as the size issues of the search area for each method and the number of iterations required to reduce the issues, might… ▽ More

    Submitted 4 September, 2023; originally announced October 2023.

    Comments: 21 pages

    Journal ref: 2023

  32. arXiv:2310.05878  [pdf

    cs.LG

    A Machine Learning Approach to Predicting Single Event Upsets

    Authors: Archit Gupta, Chong Yock Eng, Deon Lim Meng Wee, Rashna Analia Ahmed, See Min Sim

    Abstract: A single event upset (SEU) is a critical soft error that occurs in semiconductor devices on exposure to ionising particles from space environments. SEUs cause bit flips in the memory component of semiconductors. This creates a multitude of safety hazards as stored information becomes less reliable. Currently, SEUs are only detected several hours after their occurrence. CREMER, the model presented… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  33. SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework

    Authors: Daksh Dave, Aditya Sharma, Shafii Muhammad Abdulhamid, Adeel Ahmed, Adnan Akhunzada, Rashid Amin

    Abstract: Due to the rapid development of technology and the widespread usage of smartphones, the number of mobile applications is exponentially growing. Finding a suitable collection of apps that aligns with users needs and preferences can be challenging. However, mobile app recommender systems have emerged as a helpful tool in simplifying this process. But there is a drawback to employing app recommender… ▽ More

    Submitted 29 September, 2023; originally announced September 2023.

    Journal ref: IEEE Access, vol. 11, pp. 76751-76767, 2023

  34. arXiv:2309.06565  [pdf, other

    cs.AR cs.PF

    METICULOUS: An FPGA-based Main Memory Emulator for System Software Studies

    Authors: Takahiro Hirofuchi, Takaaki Fukai, Akram Ben Ahmed, Ryousei Takano, Kento Sato

    Abstract: Due to the scaling problem of the DRAM technology, non-volatile memory devices, which are based on different principle of operation than DRAM, are now being intensively developed to expand the main memory of computers. Disaggregated memory is also drawing attention as an emerging technology to scale up the main memory. Although system software studies need to discuss management mechanisms for the… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

  35. Using a Nearest-Neighbour, BERT-Based Approach for Scalable Clone Detection

    Authors: Muslim Chochlov, Gul Aftab Ahmed, James Vincent Patten, Guoxian Lu, Wei Hou, David Gregg, Jim Buckley

    Abstract: Code clones can detrimentally impact software maintenance and manually detecting them in very large codebases is impractical. Additionally, automated approaches find detection of Type 3 and Type 4 (inexact) clones very challenging. While the most recent artificial deep neural networks (for example BERT-based artificial neural networks) seem to be highly effective in detecting such clones, their pa… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

    Comments: 10 pages, 2 figures, 38th IEEE International Conference on Software Maintenance and Evolution

  36. arXiv:2308.13040  [pdf, other

    cs.MA cs.SI stat.AP

    Estimating Treatment Effects Using Costly Simulation Samples from a Population-Scale Model of Opioid Use Disorder

    Authors: Abdulrahman A. Ahmed, M. Amin Rahimian, Mark S. Roberts

    Abstract: Large-scale models require substantial computational resources for analysis and studying treatment conditions. Specifically, estimating treatment effects using simulations may require a lot of infeasible resources to allocate at every treatment condition. Therefore, it is essential to develop efficient methods to allocate computational resources for estimating treatment effects. Agent-based simula… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

    Comments: To be presented in IEEE International Conference on Biomedical and Health Informatics 2023, repository link: https://github.com/abdulrahmanfci/intervention-estimation

  37. arXiv:2308.03767  [pdf, other

    cs.CV cs.AI cs.CL eess.IV

    Enhancing image captioning with depth information using a Transformer-based framework

    Authors: Aya Mahmoud Ahmed, Mohamed Yousef, Khaled F. Hussain, Yousef Bassyouni Mahdy

    Abstract: Captioning images is a challenging scene-understanding task that connects computer vision and natural language processing. While image captioning models have been successful in producing excellent descriptions, the field has primarily focused on generating a single sentence for 2D images. This paper investigates whether integrating depth information with RGB images can enhance the captioning task… ▽ More

    Submitted 24 July, 2023; originally announced August 2023.

    Comments: 19 pages, 5 figures, 13 tables

  38. arXiv:2308.02029  [pdf

    cs.LG

    Deep Maxout Network-based Feature Fusion and Political Tangent Search Optimizer enabled Transfer Learning for Thalassemia Detection

    Authors: Hemn Barzan Abdalla, Awder Ahmed, Guoquan Li, Nasser Mustafa, Abdur Rashid Sangi

    Abstract: Thalassemia is a heritable blood disorder which is the outcome of a genetic defect causing lack of production of hemoglobin polypeptide chains. However, there is less understanding of the precise frequency as well as sharing in these areas. Knowing about the frequency of thalassemia occurrence and dependable mutations is thus a significant step in preventing, controlling, and treatment planning. H… ▽ More

    Submitted 28 June, 2024; v1 submitted 3 August, 2023; originally announced August 2023.

  39. arXiv:2308.00137  [pdf

    cs.MM cs.NE

    An Efficient Recommendation System in E-commerce using Passer learning optimization based on Bi-LSTM

    Authors: Hemn Barzan Abdalla, Awder Ahmed, Bahtiyar Mehmed, Mehdi Gheisari, Maryam Cheraghy

    Abstract: Recommendation system services have become crucial for users to access personalized goods or services as the global e-commerce market expands. They can increase business sales growth and lower the cost of user information exploration. Recent years have seen a signifi-cant increase in researchers actively using user reviews to solve standard recommender system research issues. Reviews may, however,… ▽ More

    Submitted 2 August, 2023; v1 submitted 31 July, 2023; originally announced August 2023.

  40. arXiv:2307.16262  [pdf, other

    eess.IV cs.CV

    Validating polyp and instrument segmentation methods in colonoscopy through Medico 2020 and MedAI 2021 Challenges

    Authors: Debesh Jha, Vanshali Sharma, Debapriya Banik, Debayan Bhattacharya, Kaushiki Roy, Steven A. Hicks, Nikhil Kumar Tomar, Vajira Thambawita, Adrian Krenzer, Ge-Peng Ji, Sahadev Poudel, George Batchkala, Saruar Alam, Awadelrahman M. A. Ahmed, Quoc-Huy Trinh, Zeshan Khan, Tien-Phat Nguyen, Shruti Shrestha, Sabari Nathan, Jeonghwan Gwak, Ritika K. Jha, Zheyuan Zhang, Alexander Schlaefer, Debotosh Bhattacharjee, M. K. Bhuyan , et al. (8 additional authors not shown)

    Abstract: Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has… ▽ More

    Submitted 6 May, 2024; v1 submitted 30 July, 2023; originally announced July 2023.

  41. arXiv:2307.13473  [pdf, other

    cs.SE cs.LG

    Exploring MLOps Dynamics: An Experimental Analysis in a Real-World Machine Learning Project

    Authors: Awadelrahman M. A. Ahmed

    Abstract: This article presents an experiment focused on optimizing the MLOps (Machine Learning Operations) process, a crucial aspect of efficiently implementing machine learning projects. The objective is to identify patterns and insights to enhance the MLOps workflow, considering its iterative and interdependent nature in real-world model development scenarios. The experiment involves a comprehensive ML… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 9 figures

  42. arXiv:2307.13470  [pdf, other

    cs.LG cs.GT

    Combinatorial Auctions and Graph Neural Networks for Local Energy Flexibility Markets

    Authors: Awadelrahman M. A. Ahmed, Frank Eliassen, Yan Zhang

    Abstract: This paper proposes a new combinatorial auction framework for local energy flexibility markets, which addresses the issue of prosumers' inability to bundle multiple flexibility time intervals. To solve the underlying NP-complete winner determination problems, we present a simple yet powerful heterogeneous tri-partite graph representation and design graph neural network-based models. Our models ach… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Accepted in The IEEE PES ISGT Europe 2023 (ISGT Europe 2023), Grenoble, France, on October, 2023

  43. arXiv:2307.12186  [pdf, other

    cs.MA cs.SI stat.AP

    Inferring epidemic dynamics using Gaussian process emulation of agent-based simulations

    Authors: Abdulrahman A. Ahmed, M. Amin Rahimian, Mark S. Roberts

    Abstract: Computational models help decision makers understand epidemic dynamics to optimize public health interventions. Agent-based simulation of disease spread in synthetic populations allows us to compare and contrast different effects across identical populations or to investigate the effect of interventions kee** every other factor constant between ``digital twins''. FRED (A Framework for Reconstruc… ▽ More

    Submitted 11 September, 2023; v1 submitted 22 July, 2023; originally announced July 2023.

    Comments: To be presented in Winter Simulation Conference 2023, repository link: https://github.com/abdulrahmanfci/gpr-abm

  44. arXiv:2307.05581  [pdf, other

    q-fin.GN cs.CE cs.MA

    Exploring the Dynamics of the Specialty Insurance Market Using a Novel Discrete Event Simulation Framework: a Lloyd's of London Case Study

    Authors: Sedar Olmez, Akhil Ahmed, Keith Kam, Zhe Feng, Alan Tua

    Abstract: This research presents a novel Discrete Event Simulation (DES) of the Lloyd's of London specialty insurance market, exploring complex market dynamics that have not been previously studied quantitatively. The proof-of-concept model allows for the simulation of various scenarios that capture important market phenomena such as the underwriting cycle, the impact of risk syndication, and the importance… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: 27 Pages, 12 Images and 14 Tables

  45. arXiv:2306.12285  [pdf, ps, other

    cs.LG eess.SP

    Resilient Sparse Array Radar with the Aid of Deep Learning

    Authors: Aya Mostafa Ahmed, Udaya S. K. P. Miriya Thanthrige, Aydin Sezgin, Fulvio Gini

    Abstract: In this paper, we address the problem of direction of arrival (DOA) estimation for multiple targets in the presence of sensor failures in a sparse array. Generally, sparse arrays are known with very high-resolution capabilities, where N physical sensors can resolve up to $\mathcal{O}(N^2)$ uncorrelated sources. However, among the many configurations introduced in the literature, the arrays that pr… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

    Comments: Accepted to be published in 2023 IEEE 97th Vehicular Technology Conference: VTC2023-Spring, 2023

    Journal ref: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)

  46. arXiv:2306.06925  [pdf, other

    cs.GR math.CO

    Analysis and Synthesis of Digital Dyadic Sequences

    Authors: Abdalla G. M. Ahmed, Mikhail Skopenkov, Markus Hadwiger, Peter Wonka

    Abstract: We explore the space of matrix-generated (0, m, 2)-nets and (0, 2)-sequences in base 2, also known as digital dyadic nets and sequences. In computer graphics, they are arguably leading the competition for use in rendering. We provide a complete characterization of the design space and count the possible number of constructions with and without considering possible reorderings of the point set. Bas… ▽ More

    Submitted 23 September, 2023; v1 submitted 12 June, 2023; originally announced June 2023.

    Comments: 17 pages, 11 figures. Minor improvement of exposition; references to earlier proofs of Theorems 3.1 and 3.3 added

  47. arXiv:2306.05375  [pdf, other

    cs.CR cs.LG

    Sequential Graph Neural Networks for Source Code Vulnerability Identification

    Authors: Ammar Ahmed, Anwar Said, Mudassir Shabbir, Xenofon Koutsoukos

    Abstract: Vulnerability identification constitutes a task of high importance for cyber security. It is quite helpful for locating and fixing vulnerable functions in large applications. However, this task is rather challenging owing to the absence of reliable and adequately managed datasets and learning models. Existing solutions typically rely on human expertise to annotate datasets or specify features, whi… ▽ More

    Submitted 23 May, 2023; originally announced June 2023.

    Comments: 7 pages paper presented at HotSoS2023 conference

  48. arXiv:2305.02061  [pdf, other

    cs.MA cs.AI

    Attention Based Feature Fusion For Multi-Agent Collaborative Perception

    Authors: Ahmed N. Ahmed, Siegfried Mercelis, Ali Anwar

    Abstract: In the domain of intelligent transportation systems (ITS), collaborative perception has emerged as a promising approach to overcome the limitations of individual perception by enabling multiple agents to exchange information, thus enhancing their situational awareness. Collaborative perception overcomes the limitations of individual sensors, allowing connected agents to perceive environments beyon… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

  49. arXiv:2304.09233  [pdf

    cs.LG cs.CY

    Machine Learning Applications in Studying Mental Health Among Immigrants and Racial and Ethnic Minorities: A Systematic Review

    Authors: Khushbu Khatri Park, Abdulaziz Ahmed, Mohammed Ali Al-Garadi

    Abstract: Background: The use of machine learning (ML) in mental health (MH) research is increasing, especially as new, more complex data types become available to analyze. By systematically examining the published literature, this review aims to uncover potential gaps in the current use of ML to study MH in vulnerable populations of immigrants, refugees, migrants, and racial and ethnic minorities. Method… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

  50. arXiv:2304.04628  [pdf

    eess.SY cs.DB cs.IR

    Implementation of a Sustainable Security Architecture using Radio Frequency Identification (RFID) Technology for Access Control

    Authors: Shakiru Olajide Kassim, Aisha Samaila Idriss, Abdullahi Isa Ahmed

    Abstract: Implementation of a sustainable security architecture has been quite a challenging task with several technology deployed to achieve the feat. Automatic IDentification (Auto-ID) procedures exist to provide information about people, animals, goods and products in transit and found several applications in purchasing and distribution logistics, industries, manufacturing companies and material flow sys… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: Presented at the 19th Annual National Conference of the School of Business Studies, Federal Polytechnic, Ede, 11 pages, 10 figures