Skip to main content

Showing 1–11 of 11 results for author: Ahmed, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00030  [pdf

    cs.CY cs.AI

    Artificial Intelligence in Sustainable Vertical Farming

    Authors: Hribhu Chowdhury, Debo Brata Paul Argha, Md Ashik Ahmed

    Abstract: As global challenges of population growth, climate change, and resource scarcity intensify, the agricultural landscape is at a critical juncture. Sustainable vertical farming emerges as a transformative solution to address these challenges by maximizing crop yields in controlled environments. This paradigm shift necessitates the integration of cutting-edge technologies, with Artificial Intelligenc… ▽ More

    Submitted 17 November, 2023; originally announced December 2023.

  2. arXiv:2307.16262  [pdf, other

    eess.IV cs.CV

    Validating polyp and instrument segmentation methods in colonoscopy through Medico 2020 and MedAI 2021 Challenges

    Authors: Debesh Jha, Vanshali Sharma, Debapriya Banik, Debayan Bhattacharya, Kaushiki Roy, Steven A. Hicks, Nikhil Kumar Tomar, Vajira Thambawita, Adrian Krenzer, Ge-Peng Ji, Sahadev Poudel, George Batchkala, Saruar Alam, Awadelrahman M. A. Ahmed, Quoc-Huy Trinh, Zeshan Khan, Tien-Phat Nguyen, Shruti Shrestha, Sabari Nathan, Jeonghwan Gwak, Ritika K. Jha, Zheyuan Zhang, Alexander Schlaefer, Debotosh Bhattacharjee, M. K. Bhuyan , et al. (8 additional authors not shown)

    Abstract: Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has… ▽ More

    Submitted 6 May, 2024; v1 submitted 30 July, 2023; originally announced July 2023.

  3. arXiv:2307.13473  [pdf, other

    cs.SE cs.LG

    Exploring MLOps Dynamics: An Experimental Analysis in a Real-World Machine Learning Project

    Authors: Awadelrahman M. A. Ahmed

    Abstract: This article presents an experiment focused on optimizing the MLOps (Machine Learning Operations) process, a crucial aspect of efficiently implementing machine learning projects. The objective is to identify patterns and insights to enhance the MLOps workflow, considering its iterative and interdependent nature in real-world model development scenarios. The experiment involves a comprehensive ML… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 9 figures

  4. arXiv:2307.13470  [pdf, other

    cs.LG cs.GT

    Combinatorial Auctions and Graph Neural Networks for Local Energy Flexibility Markets

    Authors: Awadelrahman M. A. Ahmed, Frank Eliassen, Yan Zhang

    Abstract: This paper proposes a new combinatorial auction framework for local energy flexibility markets, which addresses the issue of prosumers' inability to bundle multiple flexibility time intervals. To solve the underlying NP-complete winner determination problems, we present a simple yet powerful heterogeneous tri-partite graph representation and design graph neural network-based models. Our models ach… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Accepted in The IEEE PES ISGT Europe 2023 (ISGT Europe 2023), Grenoble, France, on October, 2023

  5. arXiv:2111.01665  [pdf, other

    eess.IV cs.CV cs.LG

    Explainable Medical Image Segmentation via Generative Adversarial Networks and Layer-wise Relevance Propagation

    Authors: Awadelrahman M. A. Ahmed, Leen A. M. Ali

    Abstract: This paper contributes to automating medical image segmentation by proposing generative adversarial network-based models to segment both polyps and instruments in endoscopy images. A major contribution of this work is to provide explanations for the predictions using a layer-wise relevance propagation approach designating which input image pixels are relevant to the predictions and to what extent.… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: Nordic Machine Intelligence

  6. arXiv:2109.12952  [pdf, other

    cs.NI cs.PF

    A Tutorial on Trace-based Simulations of Mobile Ad-hoc Networks on the Example of Aeronautical Communications

    Authors: Musab Ahmed Eltayeb Ahmed, Konrad Fuger, Sebastian Lindner, Fatema Khan, Andreas Timm-Giel

    Abstract: The OMNeT++ simulator is well-suited for the simulation of randomized user behavior in communication networks. However, there are scenarios, where such a random model is unsuited to evaluate a communication system, and this paper attempts to highlight such a case. Using this example of ad-hoc communication between aircraft mid-flight, a tutorial-style description is attempted that shall show how t… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: Published in: M. Marek, G. Nardini, V. Vesely (Eds.), Proceedings of the 8th OMNeT++ Community Summit, Virtual Summit, September 8-10, 2021

    Report number: OMNET/2021/04

  7. arXiv:2012.06771  [pdf, other

    eess.IV cs.CV cs.LG

    Generative Adversarial Networks for Automatic Polyp Segmentation

    Authors: Awadelrahman M. A. Ali Ahmed

    Abstract: This paper aims to contribute in bench-marking the automatic polyp segmentation problem using generative adversarial networks framework. Perceiving the problem as an image-to-image translation task, conditional generative adversarial networks are utilized to generate masks conditioned by the images as inputs. Both generator and discriminator are convolution neural networks based. The model achieve… ▽ More

    Submitted 12 December, 2020; originally announced December 2020.

    Comments: MediaEval20, Multimedia Evaluation Workshop, December 14-15 2020, Online

  8. arXiv:2008.03866  [pdf

    cs.SI physics.soc-ph

    Data-driven Inferences of Agency-level Risk and Response Communication on COVID-19 through Social Media based Interactions

    Authors: Md Ashraf Ahmed, Arif Mohaimin Sadri, M. Hadi Amini

    Abstract: Risk and response communication of public agencies through social media played a significant role in the emergence and spread of novel Coronavirus (COVID-19) and such interactions were echoed in other information outlets. This study collected time-sensitive online social media data and analyzed such communication patterns from public health (WHO, CDC), emergency (FEMA), and transportation (FDOT) a… ▽ More

    Submitted 9 August, 2020; originally announced August 2020.

  9. UML Artifacts Reuse: State of the Art

    Authors: Hamza Onoruoiza Salami, Moataz A. Ahmed

    Abstract: The benefits that can be derived from reusing software include accelerated development, reduced cost, reduced risk and effective use of specialists. Reuse of software artifacts during the initial stages of software development increases reuse benefits, because it allows subsequent reuse of later stage artifacts derived from earlier artifacts. UML is the de facto modeling language used by software… ▽ More

    Submitted 2 February, 2014; originally announced February 2014.

    Comments: Conference Proceedings

    Journal ref: International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, pp. 115-122, 2013

  10. arXiv:1311.6001  [pdf, other

    cs.CR

    Comparison analysis in Multicast Authentication based on Batch Signature (MABS) in Network Security

    Authors: Srikanth Bethu, K Kanthi Kumar, MD Asrar Ahmed, S. Soujanya

    Abstract: Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet… ▽ More

    Submitted 23 November, 2013; originally announced November 2013.

    Comments: 6 pages, 11 figures. IJIP 2013

    Journal ref: IJIP VOLUME 8 ISSUE 1 2014

  11. arXiv:1004.0767  [pdf

    cs.CR

    Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme

    Authors: Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdul Sattar

    Abstract: In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al's scheme has been proposed but e… ▽ More

    Submitted 5 April, 2010; originally announced April 2010.

    Comments: 6Pages

    Journal ref: International Journal of Network Security & Its Applications 1.3 (2009) 32-37