Skip to main content

Showing 1–22 of 22 results for author: Ghani, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.17231  [pdf, other

    cs.RO cs.LG

    Dyna-LfLH: Learning Agile Navigation in Dynamic Environments from Learned Hallucination

    Authors: Saad Abdul Ghani, Zizhao Wang, Peter Stone, Xuesu Xiao

    Abstract: This paper presents a self-supervised learning method to safely learn a motion planner for ground robots to navigate environments with dense and dynamic obstacles. When facing highly-cluttered, fast-moving, hard-to-predict obstacles, classical motion planners may not be able to keep up with limited onboard computation. For learning-based planners, high-quality demonstrations are difficult to acqui… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: Submitted to International Conference on Intelligent Robots and Systems (IROS) 2024

  2. Towards Smart Education through the Internet of Things: A Review

    Authors: Afzal Badshah, Anwar Ghani, Ali Daud, Ateeqa Jalal, Muhammad Bilal, Jon Crowcroft

    Abstract: IoT is a fundamental enabling technology for creating smart spaces, which can assist the effective face-to-face and online education systems. The transition to smart education (integrating IoT and AI into the education system) is appealing, which has a concrete impact on learners' engagement, motivation, attendance, and deep learning. Traditional education faces many challenges, including administ… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 30 pages, 16 tables, 6 figures. This article is accepted for publication in ACM Computing Surveys

    ACM Class: K.3; A.1; J.4

  3. arXiv:2209.09617  [pdf, other

    cs.LG cs.AI math.PR q-bio.PE stat.ML

    Seq2Seq Surrogates of Epidemic Models to Facilitate Bayesian Inference

    Authors: Giovanni Charles, Timothy M. Wolock, Peter Winskill, Azra Ghani, Samir Bhatt, Seth Flaxman

    Abstract: Epidemic models are powerful tools in understanding infectious disease. However, as they increase in size and complexity, they can quickly become computationally intractable. Recent progress in modelling methodology has shown that surrogate models can be used to emulate complex epidemic models with a high-dimensional parameter space. We show that deep sequence-to-sequence (seq2seq) models can serv… ▽ More

    Submitted 10 March, 2023; v1 submitted 20 September, 2022; originally announced September 2022.

  4. Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware

    Authors: Kaleem Nawaz Khan, Najeeb Ullah, Sikandar Ali, Muhammad Salman Khan, Mohammad Nauman, Anwar Ghani

    Abstract: Android is one of the leading operating systems for smart phones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of securing Android platform are somewhat successful. Ho… ▽ More

    Submitted 1 March, 2022; v1 submitted 10 April, 2021; originally announced April 2021.

  5. Depth lower bounds in Stabbing Planes for combinatorial principles

    Authors: Stefan Dantchev, Nicola Galesi, Abdul Ghani, Barnaby Martin

    Abstract: Stabbing Planes (also known as Branch and Cut) is a proof system introduced very recently which, informally speaking, extends the DPLL method by branching on integer linear inequalities instead of single variables. The techniques known so far to prove size and depth lower bounds for Stabbing Planes are generalizations of those used for the Cutting Planes proof system. For size lower bounds these a… ▽ More

    Submitted 10 January, 2024; v1 submitted 15 February, 2021; originally announced February 2021.

    Journal ref: Logical Methods in Computer Science (January 11, 2024) lmcs:10134

  6. arXiv:2008.02138  [pdf, ps, other

    cs.LO cs.CC

    Proof complexity and the binary encoding of combinatorial principles

    Authors: Stefan Dantchev, Nicola Galesi, Abdul Ghani, Barnaby Martin

    Abstract: We consider Proof Complexity in light of the unusual binary encoding of certain combinatorial principles. We contrast this Proof Complexity with the normal unary encoding in several refutation systems, based on Resolution and Integer Linear Programming. Please consult the article for the full abstract.

    Submitted 5 April, 2022; v1 submitted 4 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1809.02843, arXiv:1911.00403

  7. arXiv:2004.14439  [pdf, other

    cs.SI

    EER: Enterprise Expert Ranking using Employee Reputation

    Authors: Saba Mahmood, Anwar Ghani, Ali Daud, Syed Muhammad Saqlain

    Abstract: The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and knowledge of an employee that is not documented or self-disclosed has been addressed in this article. The existing reputation based approaches towards expertise ranking in enterprises uti… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 16 pages, 8 Figures, 6 Tables, 49 References

  8. arXiv:2004.11707  [pdf, other

    cs.DC

    Revenue Maximization Approaches in IaaS Clouds: Research Challenges and Opportunities

    Authors: Afzal Badshah, Anwar Ghani, Ali Daud, Anthony Theodore Chronopoulos, Ateeqa Jalal

    Abstract: Revenue generation is the main concern of any business, particularly in the cloud, where there is no direct interaction between the provider and the consumer. Cloud computing is an emerging core for today's businesses, however, Its complications (e.g, installation, and migration) with traditional markets are the main challenges. It earns more but needs exemplary performance and marketing skills. I… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: 28 Pages, 3 Figures, 5 Tables, 110 References

  9. arXiv:2004.08948  [pdf, other

    cs.DC

    SOS: Socially Omitting Selfishness in IoT for Smart and Connected Communities

    Authors: Ghani ur Rehman, Anwar Ghani, Muhammad Zubair, Muhammad Imran Saeed, Dhananjay Singh

    Abstract: Smart and Connected Communities (SCC) is an emerging field of Internet of Things (IoT), and it is having potential applications to improve human life. The improvement may be in terms of preservation, revitalization, livability, and sustainability of a community. The resources of the nodes and devices in the SCC have certain constraints that may not allow the devices and nodes to cooperate to save… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

    Comments: 25 Pages, 7 Figures, 7 Tables, 55 References

  10. arXiv:2004.08698  [pdf, other

    cs.DC cs.NI

    Honesty Based Democratic Scheme to Improve Community Cooperation for IoT Based Vehicular Delay Tolerant Networks

    Authors: Ghani ur Rehman, Anwar Ghani, Muhammad Zubair, Shahbaz Ahmad Khan Ghayyure, Shad Muhammad

    Abstract: Many Internet of things (IoT) applications have been developed and implemented on unreliable wireless networks like the Delay tolerant network (DTN), however, efficient data transfer in DTN is still an important issue for the IoT applications. One of the application areas of DTN is Vehicular Delay Tolerant Network (VDTN) where the network faces communication disruption due to lack of end-to-end re… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Comments: 19 Pages, 5 Figures, 6 Tables, 55 References

  11. arXiv:2004.08441  [pdf, other

    cs.SI cs.DC

    Structuring Communities for Sharing Human Digital Memories in a Social P2P Network

    Authors: Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani

    Abstract: A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities are common in online social networks than traditional file-sharing P2P networks because many people capture huge amounts of data through their lives. This increases the number of hosts bearing… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: 13 Pages, 14 Figures, 39 References

  12. arXiv:2004.07618  [pdf, other

    cs.CR

    A Secure and Improved Multi Server Authentication Protocol Using Fuzzy Commitment

    Authors: Hafeez Ur Rehman, Anwar Ghani, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif, Narjes Nabipour

    Abstract: Very recently, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides anonymity while resisting all known attacks. In this paper, we analyze that Barman et al.'s protocol is still vulnerable to anonymity violation attack and impersonation based on the stolen smart attack; moreover, it has scalability issues. We then pr… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: 19 Pages, 9 Figures, 3 Tables, 45 References

  13. arXiv:2004.06809  [pdf, other

    cs.NI cs.CR cs.DC

    Issues and challenges in Cloud Storage Architecture: A Survey

    Authors: Anwar Ghani, Afzal Badshah, Saeedullah Jan, Abdulrahman A. Alshdadi, Ali Daud

    Abstract: From home appliances to industrial enterprises, the Information and Communication Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog computing, Internet of Things (IoT), Artificial Intelligence (AI) and Block-chain) which proves the growing use of ICT (e,g. business, education, health, and home appliances), resulti… ▽ More

    Submitted 12 July, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: 12 pages, 5 figures, The article may appear in a future issue of Researchpedia.info Journal of Computing Surveys

    Journal ref: Researchpedia Journal of Computing, Researchpedia.info, 2020, 1(1): 50-64

  14. arXiv:2004.04860  [pdf, other

    cs.HC

    Brain Interface Based Wheel Chair Control System for Handicap -- An advance and viable approach

    Authors: Mohtashim Baqar, Azfar Ghani, Azeem Aftab, Shahzad Karim Khawar

    Abstract: This paper presents advancement towards making an efficient and viable wheel chair control system based on brain computer interface via electro-oculogram (EOG) signals. The system utilizes the movement of eye as the element of purpose for controlling the movement of the wheel chair. Skin-surface electrodes are placed over skin for the purpose of acquiring the electro-oculogram signal and with the… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: Journal Article

    Journal ref: Asian Journal of Engineering, Sciences & Technology . Mar2016, Vol. 6 Issue 1, p14-16. 3p

  15. arXiv:1911.00403  [pdf, other

    cs.LO cs.CC

    Sherali-Adams and the binary encoding of combinatorial principles

    Authors: Stefan Dantchev, Abdul Ghani, Barnaby Martin

    Abstract: We consider the Sherali-Adams (SA) refutation system together with the unusual binary encoding of certain combinatorial principles. For the unary encoding of the Pigeonhole Principle and the Least Number Principle, it is known that linear rank is required for refutations in SA, although both admit refutations of polynomial size. We prove that the binary encoding of the Pigeonhole Principle require… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  16. Handling state space explosion in verification of component-based systems: A review

    Authors: Faranak Nejati, Abdul Azim Abd. Ghani, Ng Keng Yap, Azmi Jaafar

    Abstract: Component-based software development (CBSD) is an alternative approach to constructing software systems that offers numerous benefits, particularly in decreasing the complexity of system design. However, deploying components into a system is a challenging and error-prone task. Model-checking is one of the reliable methods to systematically analyze the correctness of a system. It is a bruce-force c… ▽ More

    Submitted 26 May, 2021; v1 submitted 28 July, 2017; originally announced September 2017.

    Journal ref: IEEEAccess, 2021

  17. arXiv:1402.6764  [pdf

    cs.SE cs.CL

    A method to identify potential ambiguous Malay words through Ambiguity Attributes map**: An exploratory Study

    Authors: Hazlina Haron, Abdul Azim Abd. Ghani

    Abstract: We describe here a methodology to identify a list of ambiguous Malay words that are commonly being used in Malay documentations such as Requirement Specification. We compiled several relevant and appropriate requirement quality attributes and sentence rules from previous literatures and adopt it to come out with a set of ambiguity attributes that most suit Malay words. The extracted Malay ambiguou… ▽ More

    Submitted 26 February, 2014; originally announced February 2014.

    Comments: Paper was presented at The Fourth International Conference of Computer Science and Information Technology (CCSIT2014)in Sydney, Australia on Feb 22, 2014

  18. arXiv:1302.2748  [pdf

    cs.SE

    A Systematic Literature Review on relationship between agile methods and Open Source Software Development methodology

    Authors: Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan

    Abstract: Agile software development methods (ASD) and open source software development methods (OSSD) are two different approaches which were introduced in last decade and both of them have their fanatical advocators. Yet, it seems that relation and interface between ASD and OSSD is a fertile area and few rigorous studies have been done in this matter. Major goal of this study was assessment of the relatio… ▽ More

    Submitted 12 February, 2013; originally announced February 2013.

    Comments: 6 pages, 5 tables

    Journal ref: Taghi Javdani Gandomani, at al., A systematic literature review on relationship between agile SD and open source SD, International review on computers and software (IRECOS), 2012, Vol. 7, Issue 4, pp. 1602-1607

  19. arXiv:1302.2747  [pdf

    cs.SE

    Effective factors in agile transformation process from change management perspective

    Authors: Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md. Sultan

    Abstract: After introducing agile approach in 2001, several agile methods were founded over the last decade. Agile values such as customer collaboration, embracing changes, iteration and frequent delivery, continuous integration, etc. motivate all software stakeholders to use these methods in their projects. The main issue is that for using these methods instead of traditional methods in software developmen… ▽ More

    Submitted 12 February, 2013; originally announced February 2013.

    Journal ref: Taghi Javdani Gandomani, et al., Effective factors in agile transformation process from change management perspective, 2nd Int. Conf. on Advance Information System, E-Education & Development (CAISED 2013), Jan. 2013, Kuala Lumpur, Malaysia

  20. arXiv:1301.5964  [pdf

    cs.SE

    On the Current Measurement Practices in Agile Software Development

    Authors: Taghi Javdani, Hazura Zulzalil, Abdul Azim Abd Ghani, Abu Bakar Md Sultan, Reza Meimandi Parizi

    Abstract: Agile software development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus ASD methods require different measurement practices comparing to traditional methods. Agile teams often… ▽ More

    Submitted 24 January, 2013; originally announced January 2013.

    Comments: 7 pages

    Journal ref: Taghi Javdani , Hazura Zulzalil, Abd. Azim Abd. Ghani, Abubakar Md. Sultan, On the current measurement practices in agile software development, International Journal of Computer Science Issues, 2012, Vol. 9, Issue 4, No. 3, pp. 127-133

  21. arXiv:1012.5579   

    cs.CR

    The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem

    Authors: Muhammad Rezal Kamel Ariffin, Arif Mandangan, Aniza Abdul Ghani, Kamel Ariffin Mohd Atan, Nor Azman Abu

    Abstract: The El-Gamal AA_β Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_β-function. The AA_β-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It w… ▽ More

    Submitted 14 February, 2011; v1 submitted 27 December, 2010; originally announced December 2010.

    Comments: There is a major flaw within the arguments such that the results are compromised

    MSC Class: 94A60; 68P25; 11D45

  22. arXiv:0807.2282  [pdf

    cs.NE cs.AI cs.CE

    Hardware/Software Co-Design for Spike Based Recognition

    Authors: Arfan Ghani, Martin McGinnity, Liam Maguire, Jim Harkin

    Abstract: The practical applications based on recurrent spiking neurons are limited due to their non-trivial learning algorithms. The temporal nature of spiking neurons is more favorable for hardware implementation where signals can be represented in binary form and communication can be done through the use of spikes. This work investigates the potential of recurrent spiking neurons implementations on rec… ▽ More

    Submitted 14 July, 2008; originally announced July 2008.

    Comments: 6 pages

    ACM Class: C.1.3