Skip to main content

Showing 1–20 of 20 results for author: Fahad, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.01568  [pdf

    cs.DB

    An Ontology-based Collaborative Business Intelligence Framework

    Authors: Muhammad Fahad, Jérôme Darmont

    Abstract: Business Intelligence constitutes a set of methodologies and tools aiming at querying, reporting, on-line analytic processing (OLAP), generating alerts, performing business analytics, etc. When in need to perform these tasks collectively by different collaborators, we need a Collaborative Business Intelligence (CBI) platform. CBI plays a significant role in targeting a common goal among various co… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Journal ref: 12th International Conference on Data Science, Technology and Applications (DATA 2023), INSTICC, Jul 2023, Rome, Italy

  2. arXiv:2307.00830  [pdf

    cs.DB

    Ontology-based Mediation with Quality Criteria

    Authors: Muhammad Fahad

    Abstract: This paper presents a semantic system named OntMed for an ontology-based data integration of heterogeneous data sources to achieve interoperability between heterogeneous data sources. Our system is based on the quality criteria (consistency, completeness and conciseness) for building the reliable analysis contexts to provide an accurate unified view of data to the end user. The generation of an er… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Journal ref: 8th International Conference on Business Intelligence (CBI 2023), Jul 2023, Istanbul, Turkey

  3. arXiv:2211.00995  [pdf, other

    cs.DB

    The Collaborative Business Intelligence Ontology (CBIOnt)

    Authors: Muhammad Fahad, Jérôme Darmont, Cécile Favre

    Abstract: In the current era, many disciplines are seen devoted towards ontology development for their domains with the intention of creating, disseminating and managing resource descriptions of their domain knowledge into machine understandable and processable manner. Ontology construction is a difficult group activity that involves many people with the different expertise. Generally, domain experts are no… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Journal ref: 18e journ{é}es Business Intelligence et Big Data (EDA 2022), Oct 2022, Clermont-Ferrand, France

  4. arXiv:2202.10563  [pdf, other

    cs.IT eess.SP stat.CO

    Heuristic Sensing Schemes for Four-Target Detection in Time-Constrained Vector Poisson and Gaussian Channels

    Authors: Muhammad Fahad, Daniel R. Fuhrmann

    Abstract: In this work, we investigate the different sensing schemes for the detection of four targets as observed through a vector Poisson and Gaussian channels when the sensing time resource is limited and the source signals can be observed through a variety of sum combinations during that fixed time. For this purpose, we can maximize the mutual information or the detection probability with respect to the… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: 18 pages, 26 figures

    Journal ref: Signal & Image Processing: An International Journal (SIPIJ) 2022

  5. Sensing Method for Two-Target Detection in Time-Constrained Vector Gaussian Channel

    Authors: Muhammad Fahad, Daniel R. Fuhrmann

    Abstract: This paper considers a vector Gaussian channel of fixed identity covariance matrix and binary input signalling as the mean of it. A linear transformation is performed on the vector input signal. The objective is to find the optimal scaling matrix, under the total time constraint, that would: i) maximize the mutual information between the input and output random vectors, ii) maximize the MAP detect… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

    Comments: 14 pages, 28 figures, journal article. arXiv admin note: text overlap with arXiv:2201.07915

    Journal ref: International Journal on Information Theory (IJIT) Vol.11, No.1, January 2022

  6. arXiv:2201.07915  [pdf, other

    cs.IT eess.SP stat.CO

    Sensing Method for Two-Target Detection in Time-Constrained Vector Poisson Channel

    Authors: Muhammad Fahad, Daniel R. Fuhrmann

    Abstract: It is an experimental design problem in which there are two Poisson sources with two possible and known rates, and one counter. Through a switch, the counter can observe the sources individually or the counts can be combined so that the counter observes the sum of the two. The sensor scheduling problem is to determine an optimal proportion of the available time to be allocated toward individual an… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    Comments: 24 pages, 37 figures, journal article

    Journal ref: Signal & Image Processing: An International Journal (SIPIJ) Vol. 12, No. 6, December 2021

  7. λ-Scaled-Attention: A Novel Fast Attention Mechanism for Efficient Modeling of Protein Sequences

    Authors: Ashish Ranjan, Md Shah Fahad, Akshay Deepak

    Abstract: Attention-based deep networks have been successfully applied on textual data in the field of NLP. However, their application on protein sequences poses additional challenges due to the weak semantics of the protein words, unlike the plain text words. These unexplored challenges faced by the standard attention technique include (i) vanishing attention score problem and (ii) high variations in the a… ▽ More

    Submitted 8 January, 2022; originally announced January 2022.

    Journal ref: Information Sciences, 2022

  8. User Behavior Assessment Towards Biometric Facial Recognition System: A SEM-Neural Network Approach

    Authors: Sheikh Muhamad Hizam, Waqas Ahmed, Muhammad Fahad, Habiba Akter, Ilham Sentosa, Jawad Ali

    Abstract: A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behavior modeling. However, there is the paucity of empiric… ▽ More

    Submitted 7 June, 2021; originally announced June 2021.

    Comments: 15 Pages, 04 Figures, 05 Tables, FICC-2021 Conference 29-30 April 2021, Vancouver, Canada

    Journal ref: 2021 - Advances in Intelligent Systems and Computing book series (AISC, volume 1364)

  9. Clustering based Privacy Preserving of Big Data using Fuzzification and Anonymization Operation

    Authors: Saira Khan, Khalid Iqbal, Safi Faizullah, Muhammad Fahad, Jawad Ali, Waqas Ahmed

    Abstract: Big Data is used by data miner for analysis purpose which may contain sensitive information. During the procedures it raises certain privacy challenges for researchers. The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. This paper presents a clustering based privacy preservation probabilistic model… ▽ More

    Submitted 6 January, 2020; originally announced January 2020.

    Comments: 08 Page, 07 figures

    Journal ref: International Journal of Advanced Computer Science and Applications, Volume 10 Issue 12, 2019

  10. arXiv:1910.00334  [pdf

    cs.AI cs.CL cs.LO

    Towards French Smart Building Code: Compliance Checking Based on Semantic Rules

    Authors: Nicolas Bus, Ana Roxin, Guillaume Picinbono, Muhammad Fahad

    Abstract: Manually checking models for compliance against building regulation is a time-consuming task for architects and construction engineers. There is thus a need for algorithms that process information from construction projects and report non-compliant elements. Still automated code-compliance checking raises several obstacles. Building regulations are usually published as human readable texts and the… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: Linked Data for Architecture and Construction (LDAC'2018), Jun 2018, Londres, United Kingdom

  11. arXiv:1908.03054  [pdf, other

    eess.AS cs.LG cs.SD stat.ML

    Pitch-Synchronous Single Frequency Filtering Spectrogram for Speech Emotion Recognition

    Authors: Shruti Gupta, Md. Shah Fahad, Akshay Deepak

    Abstract: Convolutional neural networks (CNN) are widely used for speech emotion recognition (SER). In such cases, the short time fourier transform (STFT) spectrogram is the most popular choice for representing speech, which is fed as input to the CNN. However, the uncertainty principles of the short-time Fourier transform prevent it from capturing time and frequency resolutions simultaneously. On the other… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

    Comments: 11 pages and less than 20 figures

  12. arXiv:1907.04080  [pdf, other

    cs.DC cs.PF eess.SY

    Bi-objective Optimisation of Data-parallel Applications on Heterogeneous Platforms for Performance and Energy via Workload Distribution

    Authors: Hamidreza Khaleghzadeh, Muhammad Fahad, Arsalan Shahid, Ravi Reddy Manumachu, Alexey Lastovetsky

    Abstract: Performance and energy are the two most important objectives for optimisation on modern parallel platforms. Latest research demonstrated the importance of workload distribution as a decision variable in the bi-objective optimisation for performance and energy on homogeneous multicore clusters. We show in this work that bi-objective optimisation for performance and energy on heterogeneous processor… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

  13. arXiv:1907.02805  [pdf, other

    cs.DC cs.PF eess.SY

    Energy of Computing on Multicore CPUs: Predictive Models and Energy Conservation Law

    Authors: Arsalan Shahid, Muhammad Fahad, Ravi Reddy Manumachu, Alexey Lastovetsky

    Abstract: Energy is now a first-class design constraint along with performance in all computing settings. Energy predictive modelling based on performance monitoring counts (PMCs) is the leading method used for prediction of energy consumption during an application execution. We use a model-theoretic approach to formulate the assumed properties of existing models in a mathematical form. We extend the formal… ▽ More

    Submitted 27 September, 2021; v1 submitted 5 July, 2019; originally announced July 2019.

  14. XDoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features

    Authors: AKM Bahalul Haque, Rabeya Sultana, Mohammad Sajid Fahad, MD Nasif Latif, Md. Amdadul Bari

    Abstract: Technology has developed so fast that we feel both safe as well as unsafe in both ways. Systems used today are always prone to attack by malicious users. In most cases, services are hindered because these systems cannot handle the amount of over loads the attacker provides. So, proper service load measurement is necessary. The tool that is being described in this paper for developments is based on… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

    Comments: 12 pages, 11 Figures, 4 tables

    Journal ref: International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.3

  15. arXiv:1811.01338  [pdf, other

    cs.LG q-bio.BM stat.ML

    Deep Robust Framework for Protein Function Prediction using Variable-Length Protein Sequences

    Authors: Ashish Ranjan, Md Shah Fahad, David Fernandez-Baca, Akshay Deepak, Sudhakar Tripathi

    Abstract: Amino acid sequence portrays most intrinsic form of a protein and expresses primary structure of protein. The order of amino acids in a sequence enables a protein to acquire a particular stable conformation that is responsible for the functions of the protein. This relationship between a sequence and its function motivates the need to analyse the sequences for predicting protein functions. Early g… ▽ More

    Submitted 19 June, 2019; v1 submitted 4 November, 2018; originally announced November 2018.

    Journal ref: IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2019

  16. arXiv:1806.00984  [pdf, other

    cs.SD cs.AI cs.LG eess.AS

    DNN-HMM based Speaker Adaptive Emotion Recognition using Proposed Epoch and MFCC Features

    Authors: Md. Shah Fahad, Jainath Yadav, Gyadhar Pradhan, Akshay Deepak

    Abstract: Speech is produced when time varying vocal tract system is excited with time varying excitation source. Therefore, the information present in a speech such as message, emotion, language, speaker is due to the combined effect of both excitation source and vocal tract system. However, there is very less utilization of excitation source features to recognize emotion. In our earlier work, we have prop… ▽ More

    Submitted 4 June, 2018; originally announced June 2018.

    Journal ref: Circuits, Systems, and Signal Processing 2020

  17. arXiv:1804.08669  [pdf, other

    eess.SP cs.RO

    Ocean Plume Tracking with Unmanned Surface Vessels: Algorithms and Experiments

    Authors: Muhammad Fahad, Yi Guo, Brian Bingham, Kristopher Krasnosky, Laura Fitzpatrick, Fernando A. Sanabria

    Abstract: Pollution plume monitoring using autonomous vehicles is important due to the adverse effect of pollution plumes on the environment and associated monetary losses. Using the advection-diffusion plume dispersion model, we present a control law design to track dynamic concentration level curves. We also present a gradient and divergence estimation method to enable this control law from concentration… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

    Comments: This paper has been accepted at WCICA 2018 and will appear in the proceedings of that conference

  18. arXiv:1801.04482  [pdf

    cs.SE

    Semantic integration of UML class diagram with semantic validation on segments of map**s

    Authors: Hicham Elasri, Elmustapha Elabbassi, Sekkaki Abderrahim, Muhammad Fahad

    Abstract: Recently, attention has focused on the software development, specially by differ-ent teams that are geographically distant to support collaborative work. Manage-ment, description and modeling in such collaborative approach are through sever-al tools and techniques based on UML models. It is now supported by a large number of tools. Most of these systems have the ability to compare different UML mo… ▽ More

    Submitted 13 January, 2018; originally announced January 2018.

  19. arXiv:1602.04376  [pdf

    cs.AI

    BPCMont: Business Process Change Management Ontology

    Authors: Muhammad Fahad

    Abstract: Change management for evolving collaborative business process development is crucial when the business logic, transections and workflow change due to changes in business strategies or organizational and technical environment. During the change implementation, business processes are analyzed and improved ensuring that they capture the proposed change and they do not contain any undesired functional… ▽ More

    Submitted 13 February, 2016; originally announced February 2016.

    Comments: 5 pages, 7 Figures

  20. arXiv:1510.01659  [pdf

    cs.AI

    DKP-AOM: results for OAEI 2015

    Authors: Muhammad Fahad

    Abstract: In this paper, we present the results obtained by our DKP-AOM system within the OAEI 2015 campaign. DKP-AOM is an ontology merging tool designed to merge heterogeneous ontologies. In OAEI, we have participated with its ontology map** component which serves as a basic module capable of matching large scale ontologies before their merging. This is our first successful participation in the Conferen… ▽ More

    Submitted 6 October, 2015; originally announced October 2015.

    Comments: 8 pages, 3 figures, 3 tables, initial results of OM workshop, Ontology Matching Workshop 2015