Skip to main content

Showing 1–21 of 21 results for author: Malik, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.13836  [pdf, other

    cs.LG math.DS nlin.CD physics.data-an stat.ML

    Tree-based Learning for High-Fidelity Prediction of Chaos

    Authors: Adam Giammarese, Kamal Rana, Erik M. Bollt, Nishant Malik

    Abstract: Model-free forecasting of the temporal evolution of chaotic systems is crucial but challenging. Existing solutions require hyperparameter tuning, significantly hindering their wider adoption. In this work, we introduce a tree-based approach not requiring hyperparameter tuning: TreeDOX. It uses time delay overembedding as explicit short-term memory and Extra-Trees Regressors to perform feature redu… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  2. arXiv:2310.09631  [pdf, other

    cs.LG

    Landslide Topology Uncovers Failure Movements

    Authors: Kamal Rana, Kushanav Bhuyan, Joaquin Vicente Ferrer, Fabrice Cotton, Ugur Ozturk, Filippo Catani, Nishant Malik

    Abstract: The death toll and monetary damages from landslides continue to rise despite advancements in predictive modeling. The predictive capability of these models is limited as landslide databases used in training and assessing the models often have crucial information missing, such as underlying failure types. Here, we present an approach for identifying failure types based on their movements, e.g., sli… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: 23 pages, 11 figures

  3. arXiv:2309.14475  [pdf, other

    econ.GN cs.MM stat.AP

    Designing Effective Music Excerpts

    Authors: Emaad Manzoor, Nikhil Malik

    Abstract: Excerpts are widely used to preview and promote musical works. Effective excerpts induce consumption of the source musical work and thus generate revenue. Yet, what makes an excerpt effective remains unexplored. We leverage a policy change by Apple that generates quasi-exogenous variation in the excerpts of songs in the iTunes Music Store to estimate that having a 60 second longer excerpt increase… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  4. arXiv:2308.08655  [pdf, other

    cs.LG

    Physics Informed Recurrent Neural Networks for Seismic Response Evaluation of Nonlinear Systems

    Authors: Faisal Nissar Malik, James Ricles, Masoud Yari, Malik Arsala Nissar

    Abstract: Dynamic response evaluation in structural engineering is the process of determining the response of a structure, such as member forces, node displacements, etc when subjected to dynamic loads such as earthquakes, wind, or impact. This is an important aspect of structural analysis, as it enables engineers to assess structural performance under extreme loading conditions and make informed decisions… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

  5. arXiv:2305.10869  [pdf, ps, other

    cs.LG cs.CR

    Free Lunch for Privacy Preserving Distributed Graph Learning

    Authors: Nimesh Agrawal, Nikita Malik, Sandeep Kumar

    Abstract: Learning on graphs is becoming prevalent in a wide range of applications including social networks, robotics, communication, medicine, etc. These datasets belonging to entities often contain critical private information. The utilization of data for graph learning applications is hampered by the growing privacy concerns from users on data sharing. Existing privacy-preserving methods pre-process the… ▽ More

    Submitted 19 May, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

  6. arXiv:2302.09438  [pdf, other

    econ.TH cs.CY

    Does Machine Learning Amplify Pricing Errors in the Housing Market? -- The Economics of Machine Learning Feedback Loops

    Authors: Nikhil Malik, Emaad Manzoor

    Abstract: Machine learning algorithms are increasingly employed to price or value homes for sale, properties for rent, rides for hire, and various other goods and services. Machine learning-based prices are typically generated by complex algorithms trained on historical sales data. However, displaying these prices to consumers anchors the realized sales prices, which will in turn become training samples for… ▽ More

    Submitted 18 February, 2023; originally announced February 2023.

  7. arXiv:2209.03499  [pdf

    cs.AI

    Regulating eXplainable Artificial Intelligence (XAI) May Harm Consumers

    Authors: Behnam Mohammadi, Nikhil Malik, Tim Derdenger, Kannan Srinivasan

    Abstract: Recent AI algorithms are black box models whose decisions are difficult to interpret. eXplainable AI (XAI) is a class of methods that seek to address lack of AI interpretability and trust by explaining to customers their AI decisions. The common wisdom is that regulating AI by mandating fully transparent XAI leads to greater social welfare. Our paper challenges this notion through a game theoretic… ▽ More

    Submitted 29 March, 2024; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Corrected the title

  8. arXiv:1707.04933  [pdf, other

    physics.soc-ph cs.SI

    Social Clustering in Epidemic Spread on Coevolving Networks

    Authors: Hsuan-Wei Lee, Nishant Malik, Feng Shi, Peter J. Mucha

    Abstract: Even though transitivity is a central structural feature of social networks, its influence on epidemic spread on coevolving networks has remained relatively unexplored. Here we introduce and study an adaptive SIS epidemic model wherein the infection and network coevolve with non-trivial probability to close triangles during edge rewiring, leading to substantial reinforcement of network transitivit… ▽ More

    Submitted 2 June, 2019; v1 submitted 16 July, 2017; originally announced July 2017.

    Comments: 16 pages, 21 figures

    Journal ref: Phys. Rev. E 99, 062301 (2019)

  9. Evolutionary prisoner's dilemma games coevolving on adaptive networks

    Authors: Hsuan-Wei Lee, Nishant Malik, Peter J. Mucha

    Abstract: We study a model for switching strategies in the Prisoner's Dilemma game on adaptive networks of player pairings that coevolve as players attempt to maximize their return. We use a node-based strategy model wherein each player follows one strategy at a time (cooperate or defect) across all of its neighbors, changing that strategy and possibly changing partners in response to local changes in the n… ▽ More

    Submitted 23 July, 2017; v1 submitted 16 February, 2017; originally announced February 2017.

    Comments: 23 pages, 12 figures

    MSC Class: 91

  10. A Hybrid Approach for Secured Optimal Power Flow and Voltage Stability with TCSC Placement

    Authors: Sheila Mahapatra, Nitin Malik

    Abstract: This paper proposes a hybrid technique for secured optimal power flow coupled with enhancing voltage stability with FACTS device installation. The hybrid approach of Improved Gravitational Search algorithm (IGSA) and Firefly algorithm (FA) performance is analyzed by optimally placing TCSC controller. The algorithm is implemented in MATLAB working platform and the power flow security and voltage st… ▽ More

    Submitted 31 January, 2017; originally announced January 2017.

    Comments: Google Scholar Indexed Australian journal, ISSN: 2005-4238, 8 pages, 2 figures, 1 table

    Journal ref: International Journal of Advanced Science and Technology, vol.89, pp.1-8, April 2016

  11. Detection, Segmentation and Recognition of Face and its Features Using Neural Network

    Authors: Smriti Tikoo, Nitin Malik

    Abstract: Face detection and recognition has been prevalent with research scholars and diverse approaches have been incorporated till date to serve purpose. The rampant advent of biometric analysis systems, which may be full body scanners, or iris detection and recognition systems and the finger print recognition systems, and surveillance systems deployed for safety and security purposes have contributed to… ▽ More

    Submitted 28 January, 2017; originally announced January 2017.

    Comments: Google Scholar Indexed Journal, 5 pages, 10 figures, Journal of Biosensors and Bioelectronics, vol. 7, no. 2, June-Sept 2016

  12. arXiv:1701.08257  [pdf

    cs.CV

    Detection of Face using Viola Jones and Recognition using Back Propagation Neural Network

    Authors: Smriti Tikoo, Nitin Malik

    Abstract: Detection and recognition of the facial images of people is an intricate problem which has garnered much attention during recent years due to its ever increasing applications in numerous fields. It continues to pose a challenge in finding a robust solution to it. Its scope extends to catering the security, commercial and law enforcement applications. Research for moreover a decade on this subject… ▽ More

    Submitted 28 January, 2017; originally announced January 2017.

    Comments: ISSN 2320-088X, 8 pages, 5 figures, 1 table

    Journal ref: Int J. Computer Science and Mobile Computing, vol. 5, issue 5, pp. 288-295 (May 2016)

  13. Design of PI Controller for Automatic Generation Control of Multi Area Interconnected Power System using Bacterial Foraging Optimization

    Authors: Naresh Kumari, Nitin Malik, A. N. Jha, Gaddam Mallesham

    Abstract: The system comprises of three interconnected power system networks based on thermal, wind and hydro power generation. The load variation in any one of the network results in frequency deviation in all the connected systems.The PI controllers have been connected separately with each system for the frequency control and the gains (Kp and Ki) of all the controllers have been optimized along with freq… ▽ More

    Submitted 26 January, 2017; originally announced January 2017.

    Comments: SCOPUS indexed Singapore journal, ISSN (Print): 2319-8613, ISSN (Online): 0975-4024, 8 pages, 11 Figures, 5 tables

    Journal ref: Int. J. Engineering & Tech.,8(6),2779-2786,2016

  14. arXiv:1610.05868  [pdf, other

    cs.SI physics.soc-ph stat.ME

    Feature-Based Classification of Networks

    Authors: Ian Barnett, Nishant Malik, Marieke L. Kuijjer, Peter J. Mucha, Jukka-Pekka Onnela

    Abstract: Network representations of systems from various scientific and societal domains are neither completely random nor fully regular, but instead appear to contain recurring structural building blocks. These features tend to be shared by networks belonging to the same broad class, such as the class of social networks or the class of biological networks. At a finer scale of classification within each su… ▽ More

    Submitted 19 October, 2016; originally announced October 2016.

    Comments: 14 pages including 4 figures and a table. Methods and supplementary material included to the end

  15. arXiv:1308.2015  [pdf, ps, other

    physics.soc-ph cs.SI

    Role of social environment and social clustering in spread of opinions in co-evolving networks

    Authors: Nishant Malik, Peter J. Mucha

    Abstract: Taking a pragmatic approach to the processes involved in the phenomena of collective opinion formation, we investigate two specific modifications to the co-evolving network voter model of opinion formation, studied by Holme and Newman [1]. First, we replace the rewiring probability parameter by a distribution of probability of accepting or rejecting opinions between individuals, accounting for the… ▽ More

    Submitted 12 August, 2013; v1 submitted 8 August, 2013; originally announced August 2013.

  16. DSTN (Distributed Sleep Transistor Network) for Low Power Programmable Logic array Design

    Authors: Pradeep Singla, Kamya Dhingra, Naveen Kr. Malik

    Abstract: With the high demand of the portable electronic products, Low- power design of VLSI circuits & Power dissipation has been recognized as a challenging technology in the recent years. PLA (Programming logic array) is one of the important off shelf part in the industrial application. This paper describes the new design of PLA using power gating structure sleep transistor at circuit level implementati… ▽ More

    Submitted 1 June, 2012; originally announced June 2012.

    Comments: 6 pages, 7 Figures

    Journal ref: IJCA 45(17):31-36, May 2012. Published by Foundation of Computer Science, New York, USA

  17. A Cost- Effective Design of Reversible Programmable Logic Array

    Authors: Pradeep Singla, Naveen Kr. Malik

    Abstract: In the recent era, Reversible computing is a growing field having applications in nanotechnology, optical information processing, quantum networks etc. In this paper, the authors show the design of a cost effective reversible programmable logic array using VHDL. It is simulated on xilinx ISE 8.2i and results are shown. The proposed reversible Programming logic array called RPLA is designed by MUX… ▽ More

    Submitted 24 April, 2012; originally announced April 2012.

    Comments: 6 Pages, 9 Figures

    Journal ref: Pradeep Singla and Naveen Kr. Malik. Article: A Cost- Effective Design of Reversible Programmable Logic Array. IJCA 41(15):41-46, March 2012. Published by Foundation of Computer Science, New York, USA

  18. arXiv:1204.5407  [pdf

    cs.AR

    Reversible Programmable Logic Array (RPLA) using Feynman & MUX Gates for Low Power Industrial Applications

    Authors: Pradeep Singla, Naveen Kr. Malik

    Abstract: This paper present the research work directed towards the design of reversible programmable logic array using very high speed integrated circuit hardware description language (VHDL). Reversible logic circuits have significant importance in bioinformatics, optical information processing, CMOS design etc. In this paper the authors propose the design of new RPLA using Feynman & MUX gate.VHDL based co… ▽ More

    Submitted 24 April, 2012; originally announced April 2012.

    Comments: 9 Pages, 9 Figures

    Journal ref: Pradeep Singla and Naveen Kr. Malik. Article: Reversible Programmable Logic Array (RPLA) using Feynman & MUX Gates for Low Power Industrial Applications. Proceedinggs of ICIAICT-2012,pp 411-419, March 2012

  19. arXiv:0912.2306  [pdf

    cs.CR

    PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries

    Authors: Nasir Mahmood Malik, Tehmina Khalil, Samina Khalid, Faisal Munir Malik

    Abstract: The paper includes Public Key Infrastructure (PKI), its need and requirements and introduction of some renowned PKI products. However, the major thrust of this work is that how PKI can enhance security of various systems. The paper is intended to serve as a guide on how to adequately prepare for some of the challenges that may be encountered especially in develo** countries like Pakistan. The… ▽ More

    Submitted 11 December, 2009; originally announced December 2009.

    Journal ref: IJCSE Volume 1 Issue 2 2009 105-110

  20. arXiv:0906.5393  [pdf

    cs.SE

    Measurable & Scalable NFRs using Fuzzy Logic and Likert Scale

    Authors: Nasir Mahmood Malik, Arif Mushtaq, Samina Khalid, Tehmina Khalil, Faisal Munir Malik

    Abstract: Most of the research related to Non Functional Requirements (NFRs) have presented NFRs frameworks by integrating non functional requirements with functional requirements while we proposed that measurement of NFRs is possible e.g. cost and performance and NFR like usability can be scaled. Our novel hybrid approach integrates three things rather than two i.e. Functional Requirements (FRs), Measura… ▽ More

    Submitted 29 June, 2009; originally announced June 2009.

    Comments: 5 Pages, International Journal of Computer Science and Information Security (IJCSIS)

    Journal ref: IJCSIS June 2009 Issue, Vol. 2, No. 1

  21. arXiv:cs/0505019  [pdf

    cs.NE

    Artificial Neural Networks and their Applications

    Authors: Nitin Malik

    Abstract: The Artificial Neural network is a functional imitation of simplified model of the biological neurons and their goal is to construct useful computers for real world problems. The ANN applications have increased dramatically in the last few years fired by both theoretical and practical applications in a wide variety of applications. A brief theory of ANN is presented and potential areas are ident… ▽ More

    Submitted 10 May, 2005; originally announced May 2005.

    Comments: 6 pages, 2 figures, 1 table