Skip to main content

Showing 1–7 of 7 results for author: Sultan, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.04938  [pdf

    eess.SP cs.CE cs.LG

    Advancing ECG Diagnosis Using Reinforcement Learning on Global Waveform Variations Related to P Wave and PR Interval

    Authors: Rumsha Fatima, Shahzad Younis, Faraz Shaikh, Hamna Imran, Haseeb Sultan, Shahzad Rasool, Mehak Rafiq

    Abstract: The reliable diagnosis of cardiac conditions through electrocardiogram (ECG) analysis critically depends on accurately detecting P waves and measuring the PR interval. However, achieving consistent and generalizable diagnoses across diverse populations presents challenges due to the inherent global variations observed in ECG signals. This paper is focused on applying the Q learning reinforcement a… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  2. Clinical Decision Support System for Unani Medicine Practitioners

    Authors: Haider Sultan, Hafiza Farwa Mahmood, Noor Fatima, Marriyam Nadeem, Talha Waheed

    Abstract: Like other fields of Traditional Medicines, Unani Medicines have been found as an effective medical practice for ages. It is still widely used in the subcontinent, particularly in Pakistan and India. However, Unani Medicines Practitioners are lacking modern IT applications in their everyday clinical practices. An Online Clinical Decision Support System may address this challenge to assist apprenti… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 59 pages, 11 figures, Computer Science Bachelor's Thesis on use of Artificial Intelligence in Clinical Decision Support System for Unani Medicines

  3. arXiv:2307.12119  [pdf, other

    cs.AR

    VarSim: A Fast Process Variation-aware Thermal Modeling Methodology Using Green's Functions

    Authors: Hameedah Sultan, Smruti R. Sarangi

    Abstract: Despite temperature rise being a first-order design constraint, traditional thermal estimation techniques have severe limitations in modeling critical aspects affecting the temperature in modern-day chips. Existing thermal modeling techniques often ignore the effects of parameter variation, which can lead to significant errors. Such methods also ignore the dependence of conductivity on temperature… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 15 pages

  4. arXiv:2305.09221  [pdf, other

    cs.CR

    A Multi-Client Searchable Encryption Scheme for IoT Environment

    Authors: Nazatul H. Sultan, Shabnam Kasra-Kermanshahi, Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi

    Abstract: The proliferation of connected devices through Internet connectivity presents both opportunities for smart applications and risks to security and privacy. It is vital to proactively address these concerns to fully leverage the potential of the Internet of Things. IoT services where one data owner serves multiple clients, like smart city transportation, smart building management and healthcare can… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: 22 pages, 5 figures, this version was submitted to ESORICS 2023

  5. arXiv:2004.10952  [pdf, other

    cs.CR

    Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption

    Authors: Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan

    Abstract: For better data availability and accessibility while ensuring data secrecy, organizations often tend to outsource their encrypted data to the cloud storage servers, thus bringing the challenge of keyword search over encrypted data. In this paper, we propose a novel authorized keyword search scheme using Role-Based Encryption (RBE) technique in a cloud environment. The contributions of this paper a… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

  6. arXiv:2004.05419  [pdf, other

    cs.CR

    A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context

    Authors: Nazatul Haque Sultan, Vijay Varadharajan, Lan Zhou, Ferdous Ahmed Barbhuiya

    Abstract: Role-Based Access Control (RBAC) is a popular model which maps roles to access permissions for resources and then roles to the users to provide access control. Role-Based Encryption (RBE) is a cryptographic form of RBAC model that integrates traditional RBAC with the cryptographic encryption method, where RBAC access policies are embedded in encrypted data itself so that any user holding a qualifi… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

    Comments: 16 pages, 5 figures

  7. arXiv:1809.03147  [pdf, other

    cs.AR

    Is Leakage Power a Linear Function of Temperature?

    Authors: Hameedah Sultan, Shashank Varshney, Smruti R Sarangi

    Abstract: In this work, we present a study of the leakage power modeling techniques commonly used in the architecture community. We further provide an analysis of the error in leakage power estimation using the various modeling techniques. We strongly believe that this study will help researchers determine an appropriate leakage model to use in their work, based on the desired modeling accuracy and speed.

    Submitted 10 September, 2018; originally announced September 2018.