Skip to main content

Showing 1–35 of 35 results for author: Ali, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.18614  [pdf, other

    cs.LG cs.CV cs.NE

    Deep Neural Network Models Trained With A Fixed Random Classifier Transfer Better Across Domains

    Authors: Hafiz Tiomoko Ali, Umberto Michieli, Ji Joong Moon, Daehyun Kim, Mete Ozay

    Abstract: The recently discovered Neural collapse (NC) phenomenon states that the last-layer weights of Deep Neural Networks (DNN), converge to the so-called Equiangular Tight Frame (ETF) simplex, at the terminal phase of their training. This ETF geometry is equivalent to vanishing within-class variability of the last layer activations. Inspired by NC properties, we explore in this paper the transferability… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: ICASSP 2024. Copyright 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other

  2. arXiv:2402.08117  [pdf, other

    cs.LG q-bio.QM

    A Universal Non-Parametric Approach For Improved Molecular Sequence Analysis

    Authors: Sarwan Ali, Tamkanat E Ali, Prakash Chourasia, Murray Patterson

    Abstract: In the field of biological research, it is essential to comprehend the characteristics and functions of molecular sequences. The classification of molecular sequences has seen widespread use of neural network-based techniques. Despite their astounding accuracy, these models often require a substantial number of parameters and more data collection. In this work, we present a novel approach based on… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: Accepted at The Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2024

  3. arXiv:2310.16527  [pdf, other

    cs.CV cs.LG

    Enhancing Document Information Analysis with Multi-Task Pre-training: A Robust Approach for Information Extraction in Visually-Rich Documents

    Authors: Tofik Ali, Partha Pratim Roy

    Abstract: This paper introduces a deep learning model tailored for document information analysis, emphasizing document classification, entity relation extraction, and document visual question answering. The proposed model leverages transformer-based models to encode all the information present in a document image, including textual, visual, and layout information. The model is pre-trained and subsequently f… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  4. arXiv:2309.16021  [pdf, other

    cs.CR

    HuntGPT: Integrating Machine Learning-Based Anomaly Detection and Explainable AI with Large Language Models (LLMs)

    Authors: Tarek Ali, Panos Kostakos

    Abstract: Machine learning (ML) is crucial in network anomaly detection for proactive threat hunting, reducing detection and response times significantly. However, challenges in model training, maintenance, and frequent false positives impact its acceptance and reliability. Explainable AI (XAI) attempts to mitigate these issues, allowing cybersecurity teams to assess AI-generated alerts with confidence, but… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  5. arXiv:2305.07540  [pdf, other

    cs.CV

    Content-based jewellery item retrieval using the local region-based histograms

    Authors: Amin Muhammad Shoib, Summaira Jabeen, Changbo Wang, Tassawar Ali

    Abstract: Jewellery item retrieval is regularly used to find what people want on online marketplaces using a sample query reference image. Considering recent developments, due to the simultaneous nature of various jewelry items, various jewelry goods' occlusion in images or visual streams, as well as shape deformation, content-based jewellery item retrieval (CBJIR) still has limitations whenever it pertains… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

  6. arXiv:2303.10642  [pdf

    q-bio.PE cs.SI

    Reproduction number of SARS-CoV-2 Omicron variants, China, December 2022-January 2023

    Authors: Yuan Bai, Zengyang Shao, Xiao Zhang, Ruohan Chen, Lin Wang, Sheikh Taslim Ali, Tianmu Chen, Eric H. Y. Lau, Dong-Yan **, Zhanwei Du

    Abstract: China adjusted the zero-COVID strategy in late 2022, triggering an unprecedented Omicron wave. We estimated the time-varying reproduction numbers of 32 provincial-level administrative divisions from December 2022 to January 2023. We found that the pooled estimate of initial reproduction numbers is 4.74 (95% CI: 4.41, 5.07).

    Submitted 19 March, 2023; originally announced March 2023.

  7. arXiv:2210.04764  [pdf, ps, other

    cs.CY

    End-to-end verifiable voting for develo** countries -- what's hard in Lausanne is harder still in Lahore

    Authors: Hina Binte Haq, Syed Taha Ali, Ronan McDermott

    Abstract: In recent years end-to-end verifiable voting (E2EVV) has emerged as a promising new paradigm to conduct evidence-based elections. However, E2EVV systems thus far have primarily been designed for the developed world and the fundamental assumptions underlying the design of these systems do not readily translate to the develo** world, and may even act as potential barriers to adoption of these syst… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

  8. arXiv:2207.10169  [pdf

    eess.IV cs.CV cs.LG

    Pediatric Bone Age Assessment using Deep Learning Models

    Authors: Aravinda Raman, Sameena Pathan, Tanweer Ali

    Abstract: Bone age assessment (BAA) is a standard method for determining the age difference between skeletal and chronological age. Manual processes are complicated and necessitate the expertise of experts. This is where deep learning comes into play. In this study, pre-trained models like VGG-16, InceptionV3, XceptionNet, and MobileNet are used to assess the bone age of the input data, and their mean avera… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

    Comments: 18 pages, 28 figures, 1 table

  9. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  10. arXiv:2205.00581  [pdf

    cs.CV cs.LG eess.IV

    Using a novel fractional-order gradient method for CNN back-propagation

    Authors: Mundher Mohammed Taresh, Ningbo Zhu, Talal Ahmed Ali Ali, Mohammed Alghaili, Weihua Guo

    Abstract: Computer-aided diagnosis tools have experienced rapid growth and development in recent years. Among all, deep learning is the most sophisticated and popular tool. In this paper, researchers propose a novel deep learning model and apply it to COVID-19 diagnosis. Our model uses the tool of fractional calculus, which has the potential to improve the performance of gradient methods. To this end, the r… ▽ More

    Submitted 1 May, 2022; originally announced May 2022.

    Comments: 9 pages, 6 figuers

    MSC Class: D.1.2; F.3.1; F.4.1 ACM Class: F.2.2, I.2.7 K.5

  11. arXiv:2110.01899  [pdf, ps, other

    stat.ML cs.LG

    Random matrices in service of ML footprint: ternary random features with no performance loss

    Authors: Hafiz Tiomoko Ali, Zhenyu Liao, Romain Couillet

    Abstract: In this article, we investigate the spectral behavior of random features kernel matrices of the type ${\bf K} = \mathbb{E}_{\bf w} \left[σ\left({\bf w}^{\sf T}{\bf x}_i\right)σ\left({\bf w}^{\sf T}{\bf x}_j\right)\right]_{i,j=1}^n$, with nonlinear function $σ(\cdot)$, data ${\bf x}_1, \ldots, {\bf x}_n \in \mathbb{R}^p$, and random projection vector ${\bf w} \in \mathbb{R}^p$ having i.i.d. entries… ▽ More

    Submitted 17 May, 2022; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: Published as a conference at ICLR2022

  12. arXiv:2104.02516  [pdf, other

    cs.CL

    AI4D -- African Language Program

    Authors: Kathleen Siminyu, Godson Kalipe, Davor Orlic, Jade Abbott, Vukosi Marivate, Sackey Freshia, Prateek Sibal, Bhanu Neupane, David I. Adelani, Amelia Taylor, Jamiil Toure ALI, Kevin Degila, Momboladji Balogoun, Thierno Ibrahima DIOP, Davis David, Chayma Fourati, Hatem Haddad, Malek Naski

    Abstract: Advances in speech and language technologies enable tools such as voice-search, text-to-speech, speech recognition and machine translation. These are however only available for high resource languages like English, French or Chinese. Without foundational digital resources for African languages, which are considered low-resource in the digital context, these advanced tools remain out of reach. This… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  13. arXiv:2104.01255  [pdf

    cs.CR

    A Systematic Literature Review on Phishing and Anti-Phishing Techniques

    Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem

    Abstract: Phishing is the number one threat in the world of internet. Phishing attacks are from decades and with each passing year it is becoming a major problem for internet users as attackers are coming with unique and creative ideas to breach the security. In this paper, different types of phishing and anti-phishing techniques are presented. For this purpose, the Systematic Literature Review(SLR) approac… ▽ More

    Submitted 2 April, 2021; originally announced April 2021.

    Journal ref: Pakistan J Engg & Tech 2021, 4, 163-168

  14. A Practical Approach towards Causality Mining in Clinical Text using Active Transfer Learning

    Authors: Musarrat Hussain, Fahad Ahmed Satti, Jamil Hussain, Taqdir Ali, Syed Imran Ali, Hafiz Syed Muhammad Bilal, Gwang Hoon Park, Sungyoung Lee

    Abstract: Objective: Causality mining is an active research area, which requires the application of state-of-the-art natural language processing techniques. In the healthcare domain, medical experts create clinical text to overcome the limitation of well-defined and schema driven information systems. The objective of this research work is to create a framework, which can convert clinical text into causal kn… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Journal ref: Journal of Biomedical Informatics 123 (2021) 103932

  15. arXiv:2012.05489  [pdf, ps, other

    cs.AI cs.CL

    AI Driven Knowledge Extraction from Clinical Practice Guidelines: Turning Research into Practice

    Authors: Musarrat Hussain, Jamil Hussain, Taqdir Ali, Fahad Ahmed Satti, Sungyoung Lee

    Abstract: Background and Objectives: Clinical Practice Guidelines (CPGs) represent the foremost methodology for sharing state-of-the-art research findings in the healthcare domain with medical practitioners to limit practice variations, reduce clinical cost, improve the quality of care, and provide evidence based treatment. However, extracting relevant knowledge from the plethora of CPGs is not feasible for… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

  16. arXiv:2010.02353  [pdf, other

    cs.CL cs.AI cs.LG

    Participatory Research for Low-resourced Machine Translation: A Case Study in African Languages

    Authors: Wilhelmina Nekoto, Vukosi Marivate, Tshinondiwa Matsila, Timi Fasubaa, Tajudeen Kolawole, Taiwo Fagbohungbe, Solomon Oluwole Akinola, Shamsuddeen Hassan Muhammad, Salomon Kabongo, Salomey Osei, Sackey Freshia, Rubungo Andre Niyongabo, Ricky Macharm, Perez Ogayo, Orevaoghene Ahia, Musie Meressa, Mofe Adeyemi, Masabata Mokgesi-Selinga, Lawrence Okegbemi, Laura Jane Martinus, Kolawole Tajudeen, Kevin Degila, Kelechi Ogueji, Kathleen Siminyu, Julia Kreutzer , et al. (23 additional authors not shown)

    Abstract: Research in NLP lacks geographic diversity, and the question of how NLP can be scaled to low-resourced languages has not yet been adequately solved. "Low-resourced"-ness is a complex problem going beyond data availability and reflects systemic problems in society. In this paper, we focus on the task of Machine Translation (MT), that plays a crucial role for information accessibility and communicat… ▽ More

    Submitted 6 November, 2020; v1 submitted 5 October, 2020; originally announced October 2020.

    Comments: Findings of EMNLP 2020; updated benchmarks

  17. arXiv:2003.11529  [pdf, other

    cs.CL

    Masakhane -- Machine Translation For Africa

    Authors: Iroro Orife, Julia Kreutzer, Blessing Sibanda, Daniel Whitenack, Kathleen Siminyu, Laura Martinus, Jamiil Toure Ali, Jade Abbott, Vukosi Marivate, Salomon Kabongo, Musie Meressa, Espoir Murhabazi, Orevaoghene Ahia, Elan van Biljon, Arshath Ramkilowan, Adewale Akinfaderin, Alp Öktem, Wole Akin, Ghollah Kioko, Kevin Degila, Herman Kamper, Bonaventure Dossou, Chris Emezue, Kelechi Ogueji, Abdallah Bashir

    Abstract: Africa has over 2000 languages. Despite this, African languages account for a small portion of available resources and publications in Natural Language Processing (NLP). This is due to multiple factors, including: a lack of focus from government and funding, discoverability, a lack of community, sheer language complexity, difficulty in reproducing papers and no benchmarks to compare techniques. To… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: Accepted for the AfricaNLP Workshop, ICLR 2020

  18. Blockchain-based Smart-IoT Trust Zone Measurement Architecture

    Authors: Jawad Ali, Toqeer Ali, Yazed Alsaawy, Ahmad Shahrafidz Khalid, Shahrulniza Musa

    Abstract: With a rapid growth in the IT industry, Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment. In IoT the things (devices) communicate and exchange the data without the act of human intervention. Such autonomy and proliferation of IoT ecosystem make the devices more vulnerable to attacks. In this paper, we propose a behavior monitor in IoT-Blockc… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: 6 pages, 5 Figures, International Conference on Omni-Layer Intelligent Systems, COINS May 2019. arXiv admin note: substantial text overlap with arXiv:2001.01841

    Journal ref: International Conference on Omni-Layer Intelligent Systems, COINS May 2019, Pages 152-157

  19. Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure

    Authors: Jawad Ali, Toqeer Ali, Shahrulniza Musa, Ali Zahrani

    Abstract: The Internet of Things (IoT) is undergoing rapid growth in the IT industry, but, it continues to be associated with several security and privacy concerns as a result of its massive scale, decentralised topology, and resource-constrained devices. Blockchain (BC), a distributed ledger technology used in cryptocurrency has attracted significant attention in the realm of IoT security and privacy. Howe… ▽ More

    Submitted 6 January, 2020; originally announced January 2020.

    Comments: 9 pages, 4 Figures, 2 tables

    Journal ref: International Journal of Advanced Computer Sciences and Applications, Volume 9, Issue 10, 2018

  20. arXiv:1912.06812  [pdf, other

    cs.CR

    Cerberus: A Blockchain-Based Accreditation and Degree Verification System

    Authors: Aamna Tariq, Hina Binte Haq, Syed Taha Ali

    Abstract: Credential fraud is a widespread practice that undermines investment and confidence in higher education systems and bears significant economic and social costs. Legacy credential verification systems are typically time-consuming, costly, and bureaucratic, and struggle against certain classes of credential fraud. In this paper, we propose a comprehensive blockchain-based credential verification sol… ▽ More

    Submitted 14 December, 2019; originally announced December 2019.

  21. arXiv:1910.03923  [pdf, ps, other

    cs.CV

    Multiple Kernel Fisher Discriminant Metric Learning for Person Re-identification

    Authors: T M Feroz Ali, Kalpesh K Patel, Rajbabu Velmurugan, Subhasis Chaudhuri

    Abstract: Person re-identification addresses the problem of matching pedestrian images across disjoint camera views. Design of feature descriptor and distance metric learning are the two fundamental tasks in person re-identification. In this paper, we propose a metric learning framework for person re-identification, where the discriminative metric space is learned using Kernel Fisher Discriminant Analysis (… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

  22. arXiv:1910.03905  [pdf, other

    cs.CV

    A Semi-Supervised Maximum Margin Metric Learning Approach for Small Scale Person Re-identification

    Authors: T M Feroz Ali, Subhasis Chaudhuri

    Abstract: In video surveillance, person re-identification is the task of searching person images in non-overlap** cameras. Though supervised methods for person re-identification have attained impressive performance, obtaining large scale cross-view labeled training data is very expensive. However, unlabelled data is available in abundance. In this paper, we propose a semi-supervised metric learning approa… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

  23. arXiv:1909.11316  [pdf, ps, other

    cs.CV

    Cross-View Kernel Similarity Metric Learning Using Pairwise Constraints for Person Re-identification

    Authors: T M Feroz Ali, Subhasis Chaudhuri

    Abstract: Person re-identification is the task of matching pedestrian images across non-overlap** cameras. In this paper, we propose a non-linear cross-view similarity metric learning for handling small size training data in practical re-ID systems. The method employs non-linear map**s combined with cross-view discriminative subspace learning and cross-view distance metric learning based on pairwise sim… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  24. arXiv:1907.07765  [pdf, other

    cs.CY cs.CR

    Pakistan's Internet Voting Experiment

    Authors: Hina Binte Haq, Ronan McDermott, Syed Taha Ali

    Abstract: Pakistan recently conducted small-scale trials of a remote Internet voting system for overseas citizens. In this contribution, we report on the experience: we document the unique combination of sociopolitical, legal, and institutional factors motivating this exercise. We describe the system and it's reported vulnerabilities, and we also highlight new issues pertaining to materiality. If this syste… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

    Comments: 16 pages

  25. arXiv:1905.10357  [pdf

    cs.CV

    Deep Trajectory for Recognition of Human Behaviours

    Authors: Tauseef Ali, Eissa Jaber Alreshidi

    Abstract: Identifying human actions in complex scenes is widely considered as a challenging research problem due to the unpredictable behaviors and variation of appearances and postures. For extracting variations in motion and postures, trajectories provide meaningful way. However, simple trajectories are normally represented by vector of spatial coordinates. In order to identify human actions, we must expl… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

  26. Indoor Localization for IoT Using Adaptive Feature Selection: A Cascaded Machine Learning Approach

    Authors: Mohamed I. AlHajri, Nazar T. Ali, Raed M. Shubair

    Abstract: Evolving Internet-of-Things (IoT) applications often require the use of sensor-based indoor tracking and positioning, for which the performance is significantly improved by identifying the type of the surrounding indoor environment. This identification is of high importance since it leads to higher localization accuracy. This paper presents a novel method based on a cascaded two-stage machine lear… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

    Comments: 13 pages

  27. arXiv:1904.12625  [pdf

    cs.CV

    Crowd Management in Open Spaces

    Authors: Tauseef Ali, Ahmed B. Altamimi

    Abstract: Crowd analysis and management is a challenging problem to ensure public safety and security. For this purpose, many techniques have been proposed to cope with various problems. However, the generalization capabilities of these techniques is limited due to ignoring the fact that the density of crowd changes from low to extreme high depending on the scene under observation. We propose robust feature… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

  28. arXiv:1807.10908  [pdf, ps, other

    cs.CV

    Maximum Margin Metric Learning Over Discriminative Nullspace for Person Re-identification

    Authors: T M Feroz Ali, Subhasis Chaudhuri

    Abstract: In this paper we propose a novel metric learning framework called Nullspace Kernel Maximum Margin Metric Learning (NK3ML) which efficiently addresses the small sample size (SSS) problem inherent in person re-identification and offers a significant performance gain over existing state-of-the-art methods. Taking advantage of the very high dimensionality of the feature space, the metric is learned us… ▽ More

    Submitted 28 July, 2018; originally announced July 2018.

    Comments: Accepted for ECCV 2018

  29. arXiv:1806.07963  [pdf, other

    cs.SI cs.LG stat.ML

    Latent heterogeneous multilayer community detection

    Authors: Hafiz Tiomoko Ali, Sijia Liu, Yasin Yilmaz, Romain Couillet, Indika Rajapakse, Alfred Hero

    Abstract: We propose a method for simultaneously detecting shared and unshared communities in heterogeneous multilayer weighted and undirected networks. The multilayer network is assumed to follow a generative probabilistic model that takes into account the similarities and dissimilarities between the communities. We make use of a variational Bayes approach for jointly inferring the shared and unshared hidd… ▽ More

    Submitted 24 June, 2019; v1 submitted 16 June, 2018; originally announced June 2018.

  30. arXiv:1802.03505  [pdf, other

    cs.LG cs.CV cs.NE

    Coulomb Autoencoders

    Authors: Emanuele Sansone, Hafiz Tiomoko Ali, Sun Jiacheng

    Abstract: Learning the true density in high-dimensional feature spaces is a well-known problem in machine learning. In this work, we consider generative autoencoders based on maximum-mean discrepancy (MMD) and provide theoretical insights. In particular, (i) we prove that MMD coupled with Coulomb kernels has optimal convergence properties, which are similar to convex functionals, thus improving the training… ▽ More

    Submitted 26 November, 2019; v1 submitted 9 February, 2018; originally announced February 2018.

  31. arXiv:1710.02964  [pdf, ps, other

    cs.CR

    The Nuts and Bolts of Micropayments: A Survey

    Authors: Syed Taha Ali, Dylan Clarke, Patrick McCorry

    Abstract: In this paper, we undertake a comprehensive survey of key trends and innovations in the development of research-based and commercial micropayment systems. Based on our study, we argue that past solutions have largely failed because research has focused heavily on cryptographic and engineering innovation, whereas fundamental issues pertaining to usability, psychology, and economics have been neglec… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: preprint

  32. arXiv:1605.08554  [pdf, other

    cs.CR

    An Overview of End-to-End Verifiable Voting Systems

    Authors: Syed Taha Ali, Judy Murray

    Abstract: Advances in E2E verifiable voting have the potential to fundamentally restore trust in elections and democratic processes in society. In this chapter, we provide a comprehensive introduction to the field. We trace the evolution of privacy and verifiability properties in the research literature and describe the operations of current state-of-the-art E2E voting systems. We also discuss outstanding c… ▽ More

    Submitted 27 May, 2016; originally announced May 2016.

    Comments: This is a self-archived version of a chapter due to appear in the book "Real-World Electronic Voting: Design, Analysis and Deployment", edited by Feng Hao and Peter Y. A. Ryan, part of the Series in Security, Privacy and Trust published by CRC Press, 2016

  33. arXiv:1603.07866  [pdf, other

    cs.LG cs.NE math.PR

    The Asymptotic Performance of Linear Echo State Neural Networks

    Authors: Romain Couillet, Gilles Wainrib, Harry Sevi, Hafiz Tiomoko Ali

    Abstract: In this article, a study of the mean-square error (MSE) performance of linear echo-state neural networks is performed, both for training and testing tasks. Considering the realistic setting of noise present at the network nodes, we derive deterministic equivalents for the aforementioned MSE in the limit where the number of input data $T$ and network size $n$ both grow large. Specializing then the… ▽ More

    Submitted 25 March, 2016; originally announced March 2016.

  34. arXiv:1402.0429  [pdf, other

    physics.geo-ph cs.CE physics.comp-ph

    Defmod - Parallel multiphysics finite element code for modeling crustal deformation during the earthquake/rifting cycle

    Authors: S. Tabrez Ali

    Abstract: In this article, we present Defmod, an open source, fully unstructured, two or three dimensional, parallel finite element code for modeling crustal deformation over time scales ranging from milliseconds to thousands of years. Unlike existing public domain numerical codes, Defmod can simulate deformation due to all major processes that make up the earthquake/rifting cycle, in non-homogeneous media.… ▽ More

    Submitted 30 December, 2015; v1 submitted 3 February, 2014; originally announced February 2014.

  35. arXiv:1304.7124  [pdf

    cs.CY

    Security threats in Prepaid Mobile

    Authors: Arshiya Begum, Mohammed Tanveer Ali

    Abstract: Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing . Prepaid services are driving mobile communication i… ▽ More

    Submitted 26 April, 2013; originally announced April 2013.