Skip to main content

Showing 1–9 of 9 results for author: Jan, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.06572  [pdf, other

    physics.ins-det cs.LG physics.med-ph

    Deep Learning reconstruction with uncertainty estimation for $γ$ photon interaction in fast scintillator detectors

    Authors: Geoffrey Daniel, Mohamed Bahi Yahiaoui, Claude Comtat, Sebastien Jan, Olga Kochebina, Jean-Marc Martinez, Viktoriya Sergeyeva, Viatcheslav Sharyy, Chi-Hsun Sung, Dominique Yvon

    Abstract: This article presents a physics-informed deep learning method for the quantitative estimation of the spatial coordinates of gamma interactions within a monolithic scintillator, with a focus on Positron Emission Tomography (PET) imaging. A Density Neural Network approach is designed to estimate the 2-dimensional gamma photon interaction coordinates in a fast lead tungstate (PbWO4) monolithic scinti… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: Submitted to Artificial Intelligence

    Journal ref: Engineering Applications of Artificial Intelligence, Volume 131, 2024, 107876

  2. Takagi-Sugeno Fuzzy Modeling and Control for Effective Robotic Manipulator Motion

    Authors: Izzat Aldarraji, Ayad Kakei, Ayad Ghany Ismaeel, Georgios Tsaramirsis, Fazal Qudus Khan, Princy Randhawa, Muath Alrammal, Sadeeq Jan

    Abstract: Robotic manipulators are widely used in applications that require fast and precise motion. Such devices, however, are prompt to nonlinear control issues due to the flexibility in joints and the friction in the motors within the dynamics of their rigid part. To address these issues, the Linear Matrix Inequalities (LMIs) and Parallel Distributed Compensation (PDC) approaches are implemented in the T… ▽ More

    Submitted 19 November, 2021; originally announced December 2021.

    Comments: 3 figures

  3. arXiv:2004.06809  [pdf, other

    cs.NI cs.CR cs.DC

    Issues and challenges in Cloud Storage Architecture: A Survey

    Authors: Anwar Ghani, Afzal Badshah, Saeedullah Jan, Abdulrahman A. Alshdadi, Ali Daud

    Abstract: From home appliances to industrial enterprises, the Information and Communication Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog computing, Internet of Things (IoT), Artificial Intelligence (AI) and Block-chain) which proves the growing use of ICT (e,g. business, education, health, and home appliances), resulti… ▽ More

    Submitted 12 July, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: 12 pages, 5 figures, The article may appear in a future issue of Researchpedia.info Journal of Computing Surveys

    Journal ref: Researchpedia Journal of Computing, Researchpedia.info, 2020, 1(1): 50-64

  4. arXiv:2001.07537  [pdf, other

    cs.AI

    AI Trust in business processes: The need for process-aware explanations

    Authors: Steve T. K. Jan, Vatche Ishakian, Vinod Muthusamy

    Abstract: Business processes underpin a large number of enterprise operations including processing loan applications, managing invoices, and insurance claims. There is a large opportunity for infusing AI to reduce cost or provide better customer experience, and the business process management (BPM) literature is rich in machine learning solutions including unsupervised learning to gain insights on clusters… ▽ More

    Submitted 21 January, 2020; originally announced January 2020.

  5. arXiv:1706.09795  [pdf, ps, other

    stat.ML cs.LG

    Feature uncertainty bounding schemes for large robust nonlinear SVM classifiers

    Authors: Nicolas Couellan, Sophie Jan

    Abstract: We consider the binary classification problem when data are large and subject to unknown but bounded uncertainties. We address the problem by formulating the nonlinear support vector machine training problem with robust optimization. To do so, we analyze and propose two bounding schemes for uncertainties associated to random approximate features in low dimensional spaces. The proposed techniques a… ▽ More

    Submitted 29 June, 2017; originally announced June 2017.

  6. arXiv:1706.01939  [pdf, other

    cs.CR

    Empirical Analysis of Password Reuse and Modification across Online Service

    Authors: Chun Wang, Steve T. K. Jan, Hang Hu, Gang Wang

    Abstract: Leaked passwords from data breaches can pose a serious threat to users if the password is reused elsewhere. With more online services getting breached today, there is still a lack of large-scale quantitative understanding of the risks of password reuse across services. In this paper, we analyze a large collection of 28.8 million users and their 61.5 million passwords across 107 services. We find t… ▽ More

    Submitted 7 June, 2017; v1 submitted 6 June, 2017; originally announced June 2017.

  7. arXiv:1703.01333  [pdf, ps, other

    cs.AI cs.HC

    Towards Monetary Incentives in Social Q&A Services

    Authors: Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang

    Abstract: Community-based question answering (CQA) services are facing key challenges to motivate domain experts to provide timely answers. Recently, CQA services are exploring new incentive models to engage experts and celebrities by allowing them to set a price on their answers. In this paper, we perform a data-driven analysis on two emerging payment-based CQA systems: Fenda (China) and Whale (US). By ana… ▽ More

    Submitted 27 April, 2017; v1 submitted 3 March, 2017; originally announced March 2017.

  8. arXiv:1702.07745  [pdf, other

    cs.CR cs.HC cs.IR cs.SI

    Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

    Authors: Rupinder Paul Khandpur, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan

    Abstract: Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks. Our approach detects a broad range of cyber-attacks (e.g., distributed denial of service (DDOS) attacks, data breaches, and account hijacking) in an unsupervised manner usin… ▽ More

    Submitted 24 February, 2017; originally announced February 2017.

    Comments: 13 single column pages, 5 figures, submitted to KDD 2017

    ACM Class: I.2.7; H.3.3

  9. arXiv:1610.07899  [pdf

    cs.OH

    A Survey: Embedded Systems Supporting By Different Operating Systems

    Authors: Qamar Jabeen, Fazlullah Khan, Muhammad Nouman Hayat, Haroon Khan, Syed Roohullah Jan, Farman Ullah

    Abstract: In these days embedded system have an important role in different Fields and applications like Network embedded system , Real-time embedded systems which supports the mission-critical domains, mostly having the time constraints, Stand-alone systems which includes the network router etc. A great deployment in the processors made for completing the demanding needs of the users. There is also a large… ▽ More

    Submitted 11 May, 2016; originally announced October 2016.

    Comments: 15 pages, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2 Issue 2, pp.664-673, March-April 2016