Skip to main content

Showing 1–33 of 33 results for author: Khan, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18307  [pdf, ps, other

    cs.IT

    Five-Lee-weight linear codes over $\mathbb{F}_{q}+u\mathbb{F}_{q}$

    Authors: Dr. Pavan Kumar, Dr. Noor Mohammad Khan

    Abstract: In this study, linear codes having their Lee-weight distributions over the semi-local ring $\mathbb{F}_{q}+u\mathbb{F}_{q}$ with $u^{2}=1$ are constructed using the defining set and Gauss sums for an odd prime $q $. Moreover, we derive complete Hamming-weight enumerators for the images of the constructed linear codes under the Gray map. We finally show an application to secret sharing schemes.

    Submitted 26 June, 2024; originally announced June 2024.

    MSC Class: 94B05; 11T71

  2. arXiv:2405.19339  [pdf, other

    cs.GR cs.CG

    MidSurfer: A Parameter-Free Approach for Mid-Surface Extraction from Segmented Volumetric Data

    Authors: Eva Boneš, Dawar Khan, Ciril Bohak, Benjamin A. Barad, Danielle A. Grotjahn, Ivan Viola, Thomas Theußl

    Abstract: In the field of volumetric data processing and analysis, extracting mid-surfaces from thinly bounded compartments is crucial for tasks such as surface area estimation and accurate modeling of biological structures, yet it has lacked a standardized approach. To bridge this gap, we introduce MidSurfer--a novel parameter-free method for extracting mid-surfaces from segmented volumetric data. Our meth… ▽ More

    Submitted 7 April, 2024; originally announced May 2024.

  3. arXiv:2405.13949  [pdf, other

    cs.CV

    PitVQA: Image-grounded Text Embedding LLM for Visual Question Answering in Pituitary Surgery

    Authors: Runlong He, Mengya Xu, Adrito Das, Danyal Z. Khan, Sophia Bano, Hani J. Marcus, Danail Stoyanov, Matthew J. Clarkson, Mobarakol Islam

    Abstract: Visual Question Answering (VQA) within the surgical domain, utilizing Large Language Models (LLMs), offers a distinct opportunity to improve intra-operative decision-making and facilitate intuitive surgeon-AI interaction. However, the development of LLMs for surgical VQA is hindered by the scarcity of diverse and extensive datasets with complex reasoning tasks. Moreover, contextual fusion of the i… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

    Comments: 10 pages, 3 figures

  4. arXiv:2311.09086  [pdf, other

    cs.CL cs.AI cs.SI

    The Uli Dataset: An Exercise in Experience Led Annotation of oGBV

    Authors: Arnav Arora, Maha **adoss, Cheshta Arora, Denny George, Brindaalakshmi, Haseena Dawood Khan, Kirti Rawat, Div, Ritash, Seema Mathur, Shivani Yadav, Shehla Rashid Shora, Rie Raut, Sumit Pawar, Apurva Paithane, Sonia, Vivek, Dharini Priscilla, Khairunnisha, Grace Banu, Ambika Tandon, Rishav Thakker, Rahul Dev Korra, Aatman Vaidya, Tarunima Prabhakar

    Abstract: Online gender based violence has grown concomitantly with adoption of the internet and social media. Its effects are worse in the Global majority where many users use social media in languages other than English. The scale and volume of conversations on the internet has necessitated the need for automated detection of hate speech, and more specifically gendered abuse. There is, however, a lack of… ▽ More

    Submitted 24 June, 2024; v1 submitted 15 November, 2023; originally announced November 2023.

  5. arXiv:2307.12759  [pdf, other

    cs.CL cs.SD eess.AS

    Code-Switched Urdu ASR for Noisy Telephonic Environment using Data Centric Approach with Hybrid HMM and CNN-TDNN

    Authors: Muhammad Danyal Khan, Raheem Ali, Arshad Aziz

    Abstract: Call Centers have huge amount of audio data which can be used for achieving valuable business insights and transcription of phone calls is manually tedious task. An effective Automated Speech Recognition system can accurately transcribe these calls for easy search through call history for specific context and content allowing automatic call monitoring, improving QoS through keyword search and sent… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: 32 pages, 19 figures, 2 tables, preprint

  6. arXiv:2304.02941  [pdf, other

    cs.GR cs.CV cs.GT

    Dr. KID: Direct Remeshing and K-set Isometric Decomposition for Scalable Physicalization of Organic Shapes

    Authors: Dawar Khan, Ciril Bohak, Ivan Viola

    Abstract: Dr. KID is an algorithm that uses isometric decomposition for the physicalization of potato-shaped organic models in a puzzle fashion. The algorithm begins with creating a simple, regular triangular surface mesh of organic shapes, followed by iterative k-means clustering and remeshing. For clustering, we need similarity between triangles (segments) which is defined as a distance function. The dist… ▽ More

    Submitted 24 July, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  7. arXiv:2303.12210  [pdf, ps, other

    stat.ML cs.LG

    A Random Projection k Nearest Neighbours Ensemble for Classification via Extended Neighbourhood Rule

    Authors: Amjad Ali, Muhammad Hamraz, Dost Muhammad Khan, Wajdan Deebani, Zardad Khan

    Abstract: Ensembles based on k nearest neighbours (kNN) combine a large number of base learners, each constructed on a sample taken from a given training data. Typical kNN based ensembles determine the k closest observations in the training data bounded to a test sample point by a spherical region to predict its class. In this paper, a novel random projection extended neighbourhood rule (RPExNRule) ensemble… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: 23 pages, 8 diagrams, 69 references

    ACM Class: F.2.2

  8. arXiv:2211.11278  [pdf, ps, other

    stat.ML cs.LG

    Optimal Extended Neighbourhood Rule $k$ Nearest Neighbours Ensemble

    Authors: Amjad Ali, Zardad Khan, Dost Muhammad Khan, Saeed Aldahmani

    Abstract: The traditional k nearest neighbor (kNN) approach uses a distance formula within a spherical region to determine the k closest training observations to a test sample point. However, this approach may not work well when test point is located outside this region. Moreover, aggregating many base kNN learners can result in poor ensemble performance due to high classification errors. To address these i… ▽ More

    Submitted 15 February, 2024; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: This manuscript has been submitted for publication in the esteemed journal Pattern Recognition Letters

    MSC Class: 14J60

  9. arXiv:2205.15111  [pdf, ps, other

    cs.LG

    A k nearest neighbours classifiers ensemble based on extended neighbourhood rule and features subsets

    Authors: Amjad Ali, Muhammad Hamraz, Naz Gul, Dost Muhammad Khan, Zardad Khan, Saeed Aldahmani

    Abstract: kNN based ensemble methods minimise the effect of outliers by identifying a set of data points in the given feature space that are nearest to an unseen observation in order to predict its response by using majority voting. The ordinary ensembles based on kNN find out the k nearest observations in a region (bounded by a sphere) based on a predefined value of k. This scenario, however, might not wor… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

    Comments: This paper is submitted to pattern recognotion and has 26 pages, 9 figures and 5 tables

  10. arXiv:2201.05961  [pdf, other

    cs.SI

    Taking sides: Public Opinion over the Israel-Palestine Conflict in 2021

    Authors: Arsal Imtiaz, Danish Khan, Hanjia Lyu, Jiebo Luo

    Abstract: The Israel-Palestine Conflict, one of the most enduring conflicts in history, dates back to the start of 20th century, with the establishment of the British Mandate in Palestine and has deeply rooted complex issues in politics, demography, religion, and other aspects, making it harder to attain resolve. To understand the conflict in 2021, we devise an observational study to aggregate stance held b… ▽ More

    Submitted 23 July, 2022; v1 submitted 15 January, 2022; originally announced January 2022.

    Comments: Accepted for publication in Proceedings of the International Workshop on Social Sensing (SocialSens 2022): Special Edition on Belief Dynamics, 2022

  11. arXiv:2201.05399  [pdf, other

    cs.CR cs.SE

    Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android

    Authors: Zubair Khaliq, Dawood Ashraf Khan, Asif Iqbal Baba, Shahbaz Ali, Sheikh Umar Farooq

    Abstract: Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's swee** the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent ou… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  12. arXiv:2201.05371  [pdf, other

    cs.SE cs.AI cs.LG

    Artificial Intelligence in Software Testing : Impact, Problems, Challenges and Prospect

    Authors: Zubair Khaliq, Sheikh Umar Farooq, Dawood Ashraf Khan

    Abstract: Artificial Intelligence (AI) is making a significant impact in multiple areas like medical, military, industrial, domestic, law, arts as AI is capable to perform several roles such as managing smart factories, driving autonomous vehicles, creating accurate weather forecasts, detecting cancer and personal assistants, etc. Software testing is the process of putting the software to test for some abno… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  13. arXiv:2108.12835  [pdf

    cs.NI

    Performance Evaluation of Ad Hoc Multicast Routing Protocols to Facilitate Video Streaming in VANETS

    Authors: Muhammad Danish Khan, Arshad Shaikh

    Abstract: Vehicular Ad Hoc Network (VANET) is a type of mobile ad hoc network (MANET) that facilitates communication among vehicles. VANET provides inter-vehicular communications to serve for the application like road traffic safety and traffic efficiency. Infotainment service has been an anticipating trend in VANETs, and video streaming has a high potential in VANET. Although, this emerging technology is t… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  14. arXiv:2107.08766  [pdf, other

    cs.CV

    VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results

    Authors: Dawei Du, Longyin Wen, Pengfei Zhu, Heng Fan, Qinghua Hu, Haibin Ling, Mubarak Shah, Junwen Pan, Ali Al-Ali, Amr Mohamed, Bakour Imene, Bin Dong, Binyu Zhang, Bouchali Hadia Nesma, Chenfeng Xu, Chenzhen Duan, Ciro Castiello, Corrado Mencar, Dingkang Liang, Florian Krüger, Gennaro Vessio, Giovanna Castellano, Jieru Wang, Junyu Gao, Khalid Abualsaud , et al. (30 additional authors not shown)

    Abstract: Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing on crowd counting on the drone-captured data due to the lack of comprehensive datasets. To this end, we collect a large-scale dataset and organize the Vision Meets Drone Crowd C… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

    Comments: The method description of A7 Mutil-Scale Aware based SFANet (M-SFANet) is updated and missing references are added

    Journal ref: European Conference on Computer Vision. Springer, Cham, 2020: 675-691

  15. arXiv:2012.01494  [pdf

    cs.CV

    Braille to Text Translation for Bengali Language: A Geometric Approach

    Authors: Minhas Kamal, Dr. Amin Ahsan Ali, Dr. Muhammad Asif Hossain Khan, Dr. Mohammad Shoyaib

    Abstract: Braille is the only system to visually impaired people for reading and writing. However, general people cannot read Braille. So, teachers and relatives find it hard to assist them with learning. Almost every major language has software solutions for this translation purpose. However, in Bengali there is an absence of this useful tool. Here, we propose Braille to Text Translator, which takes image… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Journal ref: In Jahangirnagar University Journal of Information Technology (JJIT), pp. 93-111, 2018

  16. arXiv:2010.03951  [pdf, other

    q-bio.QM cs.HC cs.LG

    MolDesigner: Interactive Design of Efficacious Drugs with Deep Learning

    Authors: Kexin Huang, Tianfan Fu, Dawood Khan, Ali Abid, Ali Abdalla, Abubakar Abid, Lucas M. Glass, Marinka Zitnik, Cao Xiao, Jimeng Sun

    Abstract: The efficacy of a drug depends on its binding affinity to the therapeutic target and pharmacokinetics. Deep learning (DL) has demonstrated remarkable progress in predicting drug efficacy. We develop MolDesigner, a human-in-the-loop web user-interface (UI), to assist drug developers leverage DL predictions to design more effective drugs. A developer can draw a drug molecule in the interface. In the… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

    Comments: NeurIPS 2020 Demonstration Track

  17. arXiv:2008.08697  [pdf, other

    cs.NI

    Toward an Abstract Model of Programmable Data Plane Devices

    Authors: Debobroto Das Robin, Dr. Javed I. Khan

    Abstract: SDN divides the networking landscape into 2 parts: control and data plane. SDN expanded it's foot mark starting with OpenFlow based highly flexible control plane and rigid data plane. Innovation and improvement in hardware design and development is bringing various new architectures for data plane. Data plane is becoming more programmable then ever before. A common abstract model of data plane is… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: 17 pages , 12 figures

  18. arXiv:1906.02569  [pdf, other

    cs.LG cs.HC stat.ML

    Gradio: Hassle-Free Sharing and Testing of ML Models in the Wild

    Authors: Abubakar Abid, Ali Abdalla, Ali Abid, Dawood Khan, Abdulrahman Alfozan, James Zou

    Abstract: Accessibility is a major challenge of machine learning (ML). Typical ML models are built by specialists and require specialized hardware/software as well as ML experience to validate. This makes it challenging for non-technical collaborators and endpoint users (e.g. physicians) to easily provide feedback on model development and to gain trust in ML. The accessibility challenge also makes collabora… ▽ More

    Submitted 6 June, 2019; originally announced June 2019.

    Comments: Presented at 2019 ICML Workshop on Human in the Loop Learning (HILL 2019), Long Beach, USA

  19. A survey of advances in vision-based vehicle re-identification

    Authors: Sultan Daud Khan, Habib Ullah

    Abstract: Vehicle re-identification (V-reID) has become significantly popular in the community due to its applications and research significance. In particular, the V-reID is an important problem that still faces numerous open challenges. This paper reviews different V-reID methods including sensor based methods, hybrid methods, and vision based methods which are further categorized into hand-crafted featur… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

    Comments: 17 pages; 21 figures; journal paper

    Journal ref: Computer Vision and Image Understanding 2019

  20. arXiv:1905.10906  [pdf, other

    cs.LG cs.CR stat.ML

    Non-Determinism in Neural Networks for Adversarial Robustness

    Authors: Daanish Ali Khan, Linhong Li, Ninghao Sha, Zhuoran Liu, Abelino Jimenez, Bhiksha Raj, Rita Singh

    Abstract: Recent breakthroughs in the field of deep learning have led to advancements in a broad spectrum of tasks in computer vision, audio processing, natural language processing and other areas. In most instances where these tasks are deployed in real-world scenarios, the models used in them have been shown to be susceptible to adversarial attacks, making it imperative for us to address the challenge of… ▽ More

    Submitted 26 May, 2019; originally announced May 2019.

  21. arXiv:1709.05952  [pdf, other

    cs.CV

    Towards a Crowd Analytic Framework For Crowd Management in Majid-al-Haram

    Authors: Sultan Daud Khan, Muhammad Tayyab, Muhammad Khurram Amin, Akram Nour, Anas Basalamah, Saleh Basalamah, Sohaib Ahmad Khan

    Abstract: The scared cities of Makkah Al Mukarramah and Madina Al Munawarah host millions of pilgrims every year. During Hajj, the movement of large number of people has a unique spatial and temporal constraints, which makes Hajj one of toughest challenges for crowd management. In this paper, we propose a computer vision based framework that automatically analyses video sequence and computes important measu… ▽ More

    Submitted 14 September, 2017; originally announced September 2017.

    Comments: 17th Scientific Meeting on Hajj & Umrah Research, 2017

  22. arXiv:1709.02243  [pdf, other

    cs.CV

    Towards a Dedicated Computer Vision Tool set for Crowd Simulation Models

    Authors: Sultan Daud Khan, Muhammad Saqib, Michael Blumenstein

    Abstract: As the population of world is increasing, and even more concentrated in urban areas, ensuring public safety is becoming a taunting job for security personnel and crowd managers. Mass events like sports, festivals, concerts, political gatherings attract thousand of people in a constraint environment,therefore adequate safety measures should be adopted. Despite safety measures, crowd disasters still… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

  23. arXiv:1604.03821  [pdf

    cs.DC

    The Effect of Multi-core Communication Architecture on System Performance

    Authors: Bilal Habib, Ahmed Anber, Sultan Daud Khan

    Abstract: MPSoCs are gaining popularity because of its potential to solve computationally expensive applications. A multi-core processor combines two or more independent cores (normally a CPU) into a single package composed of a single integrated circuit (Chip). However, as the number of components on a single chip and their performance continue to increase, a shift from computation-based to communication-b… ▽ More

    Submitted 13 April, 2016; originally announced April 2016.

    Comments: 5 pages

  24. arXiv:1306.1148  [pdf

    cs.NI

    Comparative Analysis of Routing Protocols for Under Water Wireless Sensor Networks

    Authors: S. Ahmed, I. U. Khan, M. B. Rasheed, M. Ilahi, R. D. Khan, S. H. Bouk, N. Javaid

    Abstract: Underwater Wireless Sensor Networks are significantly different from terrestrial sensor networks due to peculiar characteristics of low bandwidth, high latency, limited energy, node float mobility and high error probability. These features bring many challenges to the network protocol design of UWSNs. Several routing protocols have been developed in recent years for these networks. One of the majo… ▽ More

    Submitted 5 June, 2013; originally announced June 2013.

    Journal ref: J. Basic. Appl. Sci. Res., 3(6)130-147, 2013

  25. arXiv:1306.1146  [pdf

    cs.NI

    Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs

    Authors: A. Iqbal, M. Akbar, N. Javaid, S. H. Bouk, M. Ilahi, R. D. Khan

    Abstract: Wireless Sensors Networks (WSNs) have a big application in heterogeneous networks. In this paper, we propose and evaluate Advanced Low-Energy Adaptive Clustering Hierarchy (Ad-LEACH) which is static clustering based heterogeneous routing protocol. The complete network field is first divided into static clusters and then in each cluster separate Ad-LEACH protocol is applied. Our proposed protocol i… ▽ More

    Submitted 5 June, 2013; originally announced June 2013.

    Journal ref: J. Basic. Appl. Sci. Res., 3(5)864-872, 2013

  26. arXiv:1306.1144  [pdf

    cs.RO

    Control Strategies for Mobile Robot With Obstacle Avoidance

    Authors: M. Zohaib, M. Pasha, R. A. Riaz, N. Javaid, M. Ilahi, R. D. Khan

    Abstract: Obstacle avoidance is an important task in the field of robotics, since the goal of autonomous robot is to reach the destination without collision. Several algorithms have been proposed for obstacle avoidance, having drawbacks and benefits. In this survey paper, we mainly discussed different algorithms for robot navigation with obstacle avoidance. We also compared all provided algorithms and menti… ▽ More

    Submitted 5 June, 2013; originally announced June 2013.

    Journal ref: J. Basic. Appl. Sci. Res., 3(4)1027-1036, 2013

  27. arXiv:1306.1137  [pdf

    cs.NI

    Home Energy Management Systems in Future Smart Grids

    Authors: I. Khan, A. Mahmood, N. Javaid, S. Razzaq, R. D. Khan, M. Ilahi

    Abstract: We present a detailed review of various Home Energy Management Schemes (HEM,s). HEM,s will increase savings, reduce peak demand and Pto Average Ratio (PAR). Among various applications of smart grid technologies, home energy management is probably the most important one to be addressed. Various steps have been taken by utilities for efficient energy consumption.New pricing schemes like Time of Use… ▽ More

    Submitted 5 June, 2013; originally announced June 2013.

    Journal ref: J. Basic. Appl. Sci. Res., 3(3)1224-1231, 2013

  28. arXiv:1306.1134  [pdf

    cs.NI

    A Survey of Different Residential Energy Consumption Controlling Techniques for Autonomous DSM in Future Smart Grid Communications

    Authors: M. N. Ullah, A. Mahmood, S. Razzaq, M. Ilahi, R. D. Khan, N. Javaid

    Abstract: In this work, we present a survey of residential load controlling techniques to implement demand side management in future smart grid. Power generation sector facing important challenges both in quality and quantity to meet the increasing requirements of consumers. Energy efficiency, reliability, economics and integration of new energy resources are important issues to enhance the stability of pow… ▽ More

    Submitted 5 June, 2013; originally announced June 2013.

    Journal ref: J. Basic. Appl. Sci. Res., 3(3)1207-1214, 2013

  29. arXiv:1306.0761  [pdf

    cs.NI

    Evaluating and Comparing Probability of Path Loss in DSDV, OLSR and DYMO at 802.11 and 802.11p

    Authors: S. Wasiq, N. Javaid, M. Ilahi, R. D. Khan, U. Qasim, Z. A. Khan

    Abstract: In this paper, we present path loss model for VANETs and simulate three routing protocols; Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Dynamic MANET On-demand (DYMO) to evaluate and compare their performance using NS-2. The main contribution of this work is enhancement of existing techniques to achieve high efficiency of the underlying networks. After exte… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Journal ref: J. Basic. Appl. Sci. Res., 3(2)1327-1334, 2013

  30. arXiv:1306.0757  [pdf

    cs.NI

    Modeling and Simulating Network Connectivity in Routing Protocols for MANETs and VANETs

    Authors: W. Arshad, N. Javaid, R. D. Khan, M. Ilahi, U. Qasim, Z. A. Khan

    Abstract: This paper presents a framework for node distribution with respect to density, network connectivity and communication time. Using NS2, we evaluate and compare performance of three routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) both in MANETs (IEEE 802.11) and VANETs (IEEE 802.11p). We further enhanced these protocols by chan… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Journal ref: J. Basic. Appl. Sci. Res., 3(2)1312-1318, 2013

  31. arXiv:1306.0755  [pdf

    cs.NI

    Evaluating Wireless Reactive Routing Protocols with Linear Programming Model for Wireless Ad-hoc Networks

    Authors: N. Javaid, M. Ilahi, R. D. Khan, L. Ali, U. Qasim, Z. A. Khan

    Abstract: In Wireless Ad-hoc Networks, nodes are free to move randomly and organize themselves arbitrarily, thus topology may change quickly and capriciously. In Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users with facility of quick communication. In Wireless Multi-hop Networks, routing protocols with energy efficient and delay reduction techniques are needed to fulfill users dem… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1304.0153

    Journal ref: J. Basic. Appl. Sci. Res., 3(1)1170-1181, 2013

  32. arXiv:1306.0750  [pdf

    cs.NI

    Evaluating Wireless Proactive Routing Protocols under Mobility and Scalability Constraints

    Authors: N. Javaid, R. D. Khan, M. Ilahi, L. Ali, Z. A. Khan, U. Qasim

    Abstract: Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1304.0154

    Journal ref: J. Basic. Appl. Sci. Res., 3(1)1187-12001, 2013

  33. An Adaptive Design Methodology for Reduction of Product Development Risk

    Authors: Hara Gopal Mani Pakala, Dr. Plh Varaprasad, Dr. Raju Kvsvn, Dr. Ibrahim Khan

    Abstract: Embedded systems interaction with environment inherently complicates understanding of requirements and their correct implementation. However, product uncertainty is highest during early stages of development. Design verification is an essential step in the development of any system, especially for Embedded System. This paper introduces a novel adaptive design methodology, which incorporates step-w… ▽ More

    Submitted 17 December, 2011; originally announced December 2011.

    Comments: 21 pages, 9 figures

    Journal ref: International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.3, September 2011, p35-55