Skip to main content

Showing 1–18 of 18 results for author: Mahmood, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.09432  [pdf

    cs.LG cs.NE cs.NI

    An Enhanced Analysis of Traffic Intelligence in Smart Cities Using Sustainable Deep Radial Function

    Authors: Ayad Ghany Ismaeel, S. J. Jereesha Mary, C. Anitha, Jaganathan Logeshwaran, Sarmad Nozad Mahmood, Sameer Alani, Akram H. Shather

    Abstract: Smart cities have revolutionized urban living by incorporating sophisticated technologies to optimize various aspects of urban infrastructure, such as transportation systems. Effective traffic management is a crucial component of smart cities, as it has a direct impact on the quality of life of residents and tourists. Utilizing deep radial basis function (RBF) networks, this paper describes a nove… ▽ More

    Submitted 24 January, 2024; originally announced February 2024.

    Comments: 25 pages, 6 figures, and 3 Tables

    Journal ref: Sustainability 2023, 15, x FOR PEER REVIEW

  2. Traffic Pattern Classification in Smart Cities Using Deep Recurrent Neural Network

    Authors: Ayad Ghany Ismaeel, Krishnadas Janardhanan, Manishankar Sankar, Yuvaraj Natarajan, Sarmad Nozad Mahmood, Sameer Alani, Akram H. Shather

    Abstract: This paper examines the use of deep recurrent neural networks to classify traffic patterns in smart cities. We propose a novel approach to traffic pattern classification based on deep recurrent neural networks, which can effectively capture traffic patterns' dynamic and sequential features. The proposed model combines convolutional and recurrent layers to extract features from traffic pattern data… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: 18 pages, 6 figures, 3 tables

    Journal ref: sustainability 2023, 15, 14522

  3. arXiv:2211.13996  [pdf

    cs.SE cs.IT

    A Vision of DevOps Requirements Change Management Standardization

    Authors: Muhammad Azeem Akbar, Arif Ali Khan, Sajjad Mahmood, Saima Rafi

    Abstract: DevOps (development and operations) aims to shorten the software development process and provide continuous delivery with high software quality. To get the potential gains of DevOps, the software development industry considering global software development (GSD) environment to hire skilled human resources and round-the-clock working hours. However, due to the lack of frequent communication and coo… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

  4. arXiv:2211.13990  [pdf

    cs.SE cs.PL

    Quantum Software Engineering: A New Genre of Computing

    Authors: Muhammad Azeem Akbar, Arif Ali Khan, Sajjad Mahmood, Saima Rafi

    Abstract: Quantum computing (QC) is no longer only a scientific interest but is rapidly becoming an industrially available technology that can potentially tackle the limitations of classical computing. Over the last few years, major technology giants have invested in develo** hardware and programming frameworks to develop quantum-specific applications. QC hardware technologies are gaining momentum, howeve… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

  5. arXiv:2209.09007  [pdf, other

    cs.LG cs.AI cs.NE cs.RO

    Comparative Study of Q-Learning and NeuroEvolution of Augmenting Topologies for Self Driving Agents

    Authors: Arhum Ishtiaq, Maheen Anees, Sara Mahmood, Neha Jafry

    Abstract: Autonomous driving vehicles have been of keen interest ever since automation of various tasks started. Humans are prone to exhaustion and have a slow response time on the road, and on top of that driving is already quite a dangerous task with around 1.35 million road traffic incident deaths each year. It is expected that autonomous driving can reduce the number of driving accidents around the worl… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

  6. arXiv:2106.10714  [pdf, other

    quant-ph cs.LG

    Quantum Machine Learning: Fad or Future?

    Authors: Arhum Ishtiaq, Sara Mahmood

    Abstract: For the last few decades, classical machine learning has allowed us to improve the lives of many through automation, natural language processing, predictive analytics and much more. However, a major concern is the fact that we're fast approach the threshold of the maximum possible computational capacity available to us by the means of classical computing devices including CPUs, GPUs and Applicatio… ▽ More

    Submitted 20 June, 2021; originally announced June 2021.

  7. arXiv:2105.10059  [pdf, other

    cs.LG

    Model Compression

    Authors: Arhum Ishtiaq, Sara Mahmood, Maheen Anees, Neha Mumtaz

    Abstract: With time, machine learning models have increased in their scope, functionality and size. Consequently, the increased functionality and size of such models requires high-end hardware to both train and provide inference after the fact. This paper aims to explore the possibilities within the domain of model compression, discuss the efficiency of combining various levels of pruning and quantization,… ▽ More

    Submitted 4 September, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

  8. arXiv:2011.05805  [pdf

    cs.CY cs.AI cs.LO

    Crime Prediction Using Multiple-ANFIS Architecture and Spatiotemporal Data

    Authors: Mashnoon Islam, Redwanul Karim, Kalyan Roy, Saif Mahmood, Sadat Hossain, M. Rashedur Rahman

    Abstract: Statistical values alone cannot bring the whole scenario of crime occurrences in the city of Dhaka. We need a better way to use these statistical values to predict crime occurrences and make the city a safer place to live. Proper decision-making for the future is key in reducing the rate of criminal offenses in an area or a city. If the law enforcement bodies can allocate their resources efficient… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: Accepted Version, 2018 IEEE International Conference on Intelligent Systems (IS) September 25-27, Funchal - Madeira, Portugal

    MSC Class: 03B52; 68T07 ACM Class: I.2.3; I.2.6

  9. arXiv:2004.14439  [pdf, other

    cs.SI

    EER: Enterprise Expert Ranking using Employee Reputation

    Authors: Saba Mahmood, Anwar Ghani, Ali Daud, Syed Muhammad Saqlain

    Abstract: The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and knowledge of an employee that is not documented or self-disclosed has been addressed in this article. The existing reputation based approaches towards expertise ranking in enterprises uti… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 16 pages, 8 Figures, 6 Tables, 49 References

  10. arXiv:1912.07361  [pdf

    eess.SP cs.CV cs.LG eess.IV

    Classification of Brainwave Signals Based on Hybrid Deep Learning and an Evolutionary Algorithm

    Authors: Zhyar Rzgar K. Rostam, Sozan Abdullah Mahmood

    Abstract: Brainwave signals are read through Electroencephalogram (EEG) devices. These signals are generated from an active brain based on brain activities and thoughts. The classification of brainwave signals is a challenging task due to its non-stationary nature. To address the issue, this paper proposes a Convolutional Neural Network (CNN) model to classify brainwave signals. In order to evaluate the per… ▽ More

    Submitted 8 December, 2019; originally announced December 2019.

    Comments: 10 pages, 6 tables, and 5 figures

    Report number: 4_JZS_Comp_19

    Journal ref: JZS (2019) 21_2 35_44

  11. arXiv:1907.12741  [pdf, other

    cs.CV eess.IV

    Statistical Descriptors-based Automatic Fingerprint Identification: Machine Learning Approaches

    Authors: Hamid Jan, Amjad Ali, Shahid Mahmood, Gautam Srivastava

    Abstract: Identification of a person from fingerprints of good quality has been used by commercial applications and law enforcement agencies for many years, however identification of a person from latent fingerprints is very difficult and challenging. A latent fingerprint is a fingerprint left on a surface by deposits of oils and/or perspiration from the finger. It is not usually visible to the naked eye bu… ▽ More

    Submitted 18 July, 2019; originally announced July 2019.

    Comments: 10 pages, 4 figures

  12. arXiv:1901.01462  [pdf, other

    cs.NE

    Rethinking the Artificial Neural Networks: A Mesh of Subnets with a Central Mechanism for Storing and Predicting the Data

    Authors: Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, Asad Ullah, Uzair Saeed

    Abstract: The Artificial Neural Networks (ANNs) have been originally designed to function like a biological neural network, but does an ANN really work in the same way as a biological neural network? As we know, the human brain holds information in its memory cells, so if the ANNs use the same model as our brains, they should store datasets in a similar manner. The most popular type of ANN architecture is b… ▽ More

    Submitted 5 January, 2019; originally announced January 2019.

    Comments: SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS

  13. arXiv:1702.02537  [pdf

    cs.CV

    Soft Biometrics: Gender Recognition from Unconstrained Face Images using Local Feature Descriptor

    Authors: Olasimbo Ayodeji Arigbabu, Sharifah Mumtazah Syed Ahmad, Wan Azizun Wan Adnan, Salman Yussof, Saif Mahmood

    Abstract: Gender recognition from unconstrained face images is a challenging task due to the high degree of misalignment, pose, expression, and illumination variation. In previous works, the recognition of gender from unconstrained face images is approached by utilizing image alignment, exploiting multiple samples per individual to improve the learning ability of the classifier, or learning gender based on… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Journal ref: Journal of Information and Communication Technology (JICT), 2015

  14. arXiv:1611.06478  [pdf

    cs.CL cs.HC

    Visualizing Linguistic Shift

    Authors: Salman Mahmood, Rami Al-Rfou, Klaus Mueller

    Abstract: Neural network based models are a very powerful tool for creating word embeddings, the objective of these models is to group similar words together. These embeddings have been used as features to improve results in various applications such as document classification, named entity recognition, etc. Neural language models are able to learn word representations which have been used to capture semant… ▽ More

    Submitted 20 November, 2016; originally announced November 2016.

  15. MODLEACH: A Variant of LEACH for WSNs

    Authors: D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A. M. Memon, T. Zaman

    Abstract: Wireless sensor networks are appearing as an emerging need for mankind. Though, Such networks are still in research phase however, they have high potential to be applied in almost every field of life. Lots of research is done and a lot more is awaiting to be standardized. In this work, cluster based routing in wireless sensor networks is studied precisely. Further, we modify one of the most promin… ▽ More

    Submitted 26 July, 2013; originally announced July 2013.

    Comments: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, France

  16. arXiv:1206.2544  [pdf, other

    cs.CY cs.SI

    Education in Conflict Zones: a Web and Mobility Approach

    Authors: Shah Mahmood, Ismatullah Nazar

    Abstract: We propose a new framework for education in conflict zones, considering the explosive growth of social media, web services, and mobile Internet over the past decade. Moreover, we focus on one conflict zone, Afghanistan, as a case study, because of its alarmingly high illiteracy rate, lack of qualified teachers, rough terrain, and relatively high mobile penetration of over 50%. In several of Afghan… ▽ More

    Submitted 12 June, 2012; originally announced June 2012.

  17. arXiv:1203.4043  [pdf, ps, other

    cs.SI cs.CY physics.soc-ph

    Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract)

    Authors: Shah Mahmood, Yvo Desmedt

    Abstract: With over 750 million active users, Facebook is the most famous social networking website. One particular aspect of Facebook widely discussed in the news and heavily researched in academic circles is the privacy of its users. In this paper we introduce a zero day privacy loophole in Facebook. We call this the deactivated friend attack. The concept of the attack is very similar to cloaking in Star… ▽ More

    Submitted 19 March, 2012; originally announced March 2012.

    Comments: Full paper is presented at IEEE International Workshop on Security and Social Networking SESOC 2012, Lugano, Switzerland

  18. arXiv:1111.3530  [pdf, other

    cs.SI cs.CR

    Preliminary Analysis of Google+'s Privacy

    Authors: Shah Mahmood, Yvo Desmedt

    Abstract: In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Goog… ▽ More

    Submitted 15 November, 2011; originally announced November 2011.

    Comments: CCS'11, October 17-21, 2011, Chicago, Illinois, USA

    ACM Class: K.4.1; K.6.5