Skip to main content

Showing 1–36 of 36 results for author: Ullah, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10294  [pdf, other

    cs.CL cs.LG

    RelevAI-Reviewer: A Benchmark on AI Reviewers for Survey Paper Relevance

    Authors: Paulo Henrique Couto, Quang Phuoc Ho, Nageeta Kumari, Benedictus Kent Rachmat, Thanh Gia Hieu Khuong, Ihsan Ullah, Lisheng Sun-Hosoya

    Abstract: Recent advancements in Artificial Intelligence (AI), particularly the widespread adoption of Large Language Models (LLMs), have significantly enhanced text analysis capabilities. This technological evolution offers considerable promise for automating the review of scientific papers, a task traditionally managed through peer review by fellow researchers. Despite its critical role in maintaining res… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Journal ref: Conf{é}rence sur l'Apprentissage Automatique 2024, Jul 2024, Lille, France

  2. Depth Estimation using Weighted-loss and Transfer Learning

    Authors: Muhammad Adeel Hafeez, Michael G. Madden, Ganesh Sistu, Ihsan Ullah

    Abstract: Depth estimation from 2D images is a common computer vision task that has applications in many fields including autonomous vehicles, scene understanding and robotics. The accuracy of a supervised depth estimation method mainly relies on the chosen loss function, the model architecture, quality of data and performance metrics. In this study, we propose a simplified and adaptable approach to improve… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  3. arXiv:2404.04456  [pdf

    cs.CV cs.AI cs.LG

    Beyond the Known: Adversarial Autoencoders in Novelty Detection

    Authors: Muhammad Asad, Ihsan Ullah, Ganesh Sistu, Michael G. Madden

    Abstract: In novelty detection, the goal is to decide if a new data point should be categorized as an inlier or an outlier, given a training dataset that primarily captures the inlier distribution. Recent approaches typically use deep encoder and decoder network frameworks to derive a reconstruction error, and employ this error either to determine a novelty score, or as the basis for a one-class classifier.… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: Accepted at the VISAAP 2024

  4. arXiv:2403.09705  [pdf, other

    cs.CL cs.AI cs.ET

    A Novel Nuanced Conversation Evaluation Framework for Large Language Models in Mental Health

    Authors: Alexander Marrapese, Basem Suleiman, Imdad Ullah, Juno Kim

    Abstract: Understanding the conversation abilities of Large Language Models (LLMs) can help lead to its more cautious and appropriate deployment. This is especially important for safety-critical domains like mental health, where someone's life may depend on the exact wording of a response to an urgent question. In this paper, we propose a novel framework for evaluating the nuanced conversation abilities of… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  5. arXiv:2402.14596  [pdf

    cs.AI

    The Role of LLMs in Sustainable Smart Cities: Applications, Challenges, and Future Directions

    Authors: Amin Ullah, Guilin Qi, Saddam Hussain, Irfan Ullah, Zafar Ali

    Abstract: Smart cities stand as pivotal components in the ongoing pursuit of elevating urban living standards, facilitating the rapid expansion of urban areas while efficiently managing resources through sustainable and scalable innovations. In this regard, as emerging technologies like Artificial Intelligence (AI), the Internet of Things (IoT), big data analytics, and fog and edge computing have become inc… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  6. arXiv:2402.06969  [pdf, other

    cs.CV

    Synthesizing CTA Image Data for Type-B Aortic Dissection using Stable Diffusion Models

    Authors: Ayman Abaid, Muhammad Ali Farooq, Niamh Hynes, Peter Corcoran, Ihsan Ullah

    Abstract: Stable Diffusion (SD) has gained a lot of attention in recent years in the field of Generative AI thus hel** in synthesizing medical imaging data with distinct features. The aim is to contribute to the ongoing effort focused on overcoming the limitations of data scarcity and improving the capabilities of ML algorithms for cardiovascular image processing. Therefore, in this study, the possibility… ▽ More

    Submitted 10 February, 2024; originally announced February 2024.

    Comments: Submitted in IEEE EMBC 2024 Conference

  7. arXiv:2310.12523  [pdf, other

    cs.CR

    Privacy Preserving Large Language Models: ChatGPT Case Study Based Vision and Framework

    Authors: Imdad Ullah, Najm Hassan, Sukhpal Singh Gill, Basem Suleiman, Tariq Ahamed Ahanger, Zawar Shah, Junaid Qadir, Salil S. Kanhere

    Abstract: The generative Artificial Intelligence (AI) tools based on Large Language Models (LLMs) use billions of parameters to extensively analyse large datasets and extract critical private information such as, context, specific details, identifying information etc. This have raised serious threats to user privacy and reluctance to use such tools. This article proposes the conceptual model called PrivChat… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  8. arXiv:2307.10192  [pdf

    cs.CR cs.IT

    SSD Forensic: Evidence Generation And Forensic Research On Solid State Drives Using Trim Analysis

    Authors: Hassan Jalil Hadi, Irshad ullah, Sheetal Harris

    Abstract: Traditional hard drives consisting of spinning magnetic media platters are becoming things of the past as with the emergence of the latest digital technologies and electronic equipment, the demand for faster, lighter, and more reliable alternate storage solutions is imperative. To attain these requirements, flash storage technologies like Solid State Drive (SSD) has overtaken traditional hard disk… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  9. arXiv:2303.05465  [pdf, other

    cs.NI eess.SY

    3D UAV Trajectory Design for Fair and Energy-Efficient Communication: A Deep Reinforcement Learning Technique

    Authors: Shahid Rasool, Irfan Ullah, Abid Ali, Ishtiaq Ahmad

    Abstract: In different situations, like disaster communication and network connectivity for rural locations, unmanned aerial vehicles (UAVs) could indeed be utilized as airborne base stations to improve both the functionality and coverage of communication networks. Ground users can employ mobile UAVs to establish communication channels and deliver packages. UAVs, on the other hand, have restricted transmiss… ▽ More

    Submitted 27 January, 2023; originally announced March 2023.

  10. RweetMiner: Automatic identification and categorization of help requests on twitter during disasters

    Authors: Irfan Ullah, Sharifullah Khan, Muhammad Imran, Young-Koo Lee

    Abstract: Catastrophic events create uncertain situations for humanitarian organizations locating and providing aid to affected people. Many people turn to social media during disasters for requesting help and/or providing relief to others. However, the majority of social media posts seeking help could not properly be detected and remained concealed because often they are noisy and ill-formed. Existing syst… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Journal ref: Expert Systems with Applications 176 (2021) 114787

  11. arXiv:2302.08909  [pdf, other

    cs.CV

    Meta-Album: Multi-domain Meta-Dataset for Few-Shot Image Classification

    Authors: Ihsan Ullah, Dustin Carrión-Ojeda, Sergio Escalera, Isabelle Guyon, Mike Huisman, Felix Mohr, Jan N van Rijn, Haozhe Sun, Joaquin Vanschoren, Phan Anh Vu

    Abstract: We introduce Meta-Album, an image classification meta-dataset designed to facilitate few-shot learning, transfer learning, meta-learning, among other tasks. It includes 40 open datasets, each having at least 20 classes with 40 examples per class, with verified licences. They stem from diverse domains, such as ecology (fauna and flora), manufacturing (textures, vehicles), human actions, and optical… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Journal ref: 36th Conference on Neural Information Processing Systems (NeurIPS 2022) Track on Datasets and Benchmarks., NeurIPS, Nov 2022, New Orleans, United States

  12. arXiv:2210.04252  [pdf, other

    cs.CV cs.AI cs.LG

    Precise Single-stage Detector

    Authors: Aisha Chandio, Gong Gui, Teerath Kumar, Irfan Ullah, Ramin Ranjbarzadeh, Arunabha M Roy, Akhtar Hussain, Yao Shen

    Abstract: There are still two problems in SDD causing some inaccurate results: (1) In the process of feature extraction, with the layer-by-layer acquisition of semantic information, local information is gradually lost, resulting into less representative feature maps; (2) During the Non-Maximum Suppression (NMS) algorithm due to inconsistency in classification and regression tasks, the classification confide… ▽ More

    Submitted 9 October, 2022; originally announced October 2022.

    Comments: We will submit it soon to the IEEE transaction. Due to characters limitation, we can not upload the full abstract. Please read the pdf file for more detail

  13. arXiv:2210.03234  [pdf, other

    cs.NI eess.SP

    Swarm of UAVs for Network Management in 6G: A Technical Review

    Authors: Muhammad Asghar Khan, Neeraj Kumar, Syed Agha Hassnain Mohsan, Wali Ullah Khan, Moustafa M. Nasralla, Mohammed H. Alsharif, Justyna ywioek, Insaf Ullah

    Abstract: Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in extreme or emergency situations where network densi… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

    Comments: 19, 9

  14. arXiv:2208.14686  [pdf, other

    cs.LG cs.AI cs.CV cs.NE

    NeurIPS'22 Cross-Domain MetaDL competition: Design and baseline results

    Authors: Dustin Carrión-Ojeda, Hong Chen, Adrian El Baz, Sergio Escalera, Chaoyu Guan, Isabelle Guyon, Ihsan Ullah, Xin Wang, Wenwu Zhu

    Abstract: We present the design and baseline results for a new challenge in the ChaLearn meta-learning series, accepted at NeurIPS'22, focusing on "cross-domain" meta-learning. Meta-learning aims to leverage experience gained from previous tasks to solve new tasks efficiently (i.e., with better performance, little training data, and/or modest computational resources). While previous challenges in the series… ▽ More

    Submitted 31 August, 2022; originally announced August 2022.

    Comments: Meta-Knowledge Transfer/Communication in Different Systems, Sep 2022, Grenoble, France

  15. Applying Machine Learning on RSRP-based Features for False Base Station Detection

    Authors: Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah

    Abstract: False base stations -- IMSI catchers, Stingrays -- are devices that impersonate legitimate base stations, as a part of malicious activities like unauthorized surveillance or communication sabotage. Detecting them on the network side using 3GPP standardized measurement reports is a promising technique. While applying predetermined detection rules works well when an attacker operates a false base st… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

    Comments: 9 pages,5 figure, 3 tables, 2 algorithms

  16. arXiv:2206.08138  [pdf, other

    cs.LG cs.AI cs.CV cs.NE

    Lessons learned from the NeurIPS 2021 MetaDL challenge: Backbone fine-tuning without episodic meta-learning dominates for few-shot learning image classification

    Authors: Adrian El Baz, Ihsan Ullah, Edesio Alcobaça, André C. P. L. F. Carvalho, Hong Chen, Fabio Ferreira, Henry Gouk, Chaoyu Guan, Isabelle Guyon, Timothy Hospedales, Shell Hu, Mike Huisman, Frank Hutter, Zhengying Liu, Felix Mohr, Ekrem Öztürk, Jan N. van Rijn, Haozhe Sun, Xin Wang, Wenwu Zhu

    Abstract: Although deep neural networks are capable of achieving performance superior to humans on various tasks, they are notorious for requiring large amounts of data and computing resources, restricting their success to domains where such resources are available. Metalearning methods can address this problem by transferring knowledge from related tasks, thus reducing the amount of data and computing reso… ▽ More

    Submitted 11 July, 2022; v1 submitted 15 June, 2022; originally announced June 2022.

    Comments: version 2 is the correct version, including supplementary material at the end

    Journal ref: NeurIPS 2021 Competition and Demonstration Track, Dec 2021, On-line, United States

  17. arXiv:2107.12592  [pdf, other

    cs.CR stat.ME

    Detection of cybersecurity attacks through analysis of web browsing activities using principal component analysis

    Authors: Insha Ullah, Kerrie Mengersen, Rob J Hyndman, James McGree

    Abstract: Organizations such as government departments and financial institutions provide online service facilities accessible via an increasing number of internet connected devices which make their operational environment vulnerable to cyber attacks. Consequently, there is a need to have mechanisms in place to detect cyber security attacks in a timely manner. A variety of Network Intrusion Detection System… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

  18. Video Big Data Analytics in the Cloud: A Reference Architecture, Survey, Opportunities, and Open Research Issues

    Authors: Aftab Alam, Irfan Ullah, Young-Koo Lee

    Abstract: The proliferation of multimedia devices over the Internet of Things (IoT) generates an unprecedented amount of data. Consequently, the world has stepped into the era of big data. Recently, on the rise of distributed computing technologies, video big data analytics in the cloud has attracted the attention of researchers and practitioners. The current technology and market trends demand an efficient… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Journal ref: A. Alam, I. Ullah and Y. -K. Lee, "Video Big Data Analytics in the Cloud: A Reference Architecture, Survey, Opportunities, and Open Research Issues," in IEEE Access, vol. 8, pp. 152377-152422, 2020

  19. Joint Optimization of Privacy and Cost of in-App Mobile User Profiling and Targeted Ads

    Authors: Imdad Ullah, Adel Binbusayyis

    Abstract: Online mobile advertising ecosystems provide advertising and analytics services that collect, aggregate, process, and trade a rich amount of consumers' personal data and carry out interest-based ad targeting, which raised serious privacy risks and growing trends of users feeling uncomfortable while using the internet services. In this paper, we address users' privacy concerns by develo** an opti… ▽ More

    Submitted 10 May, 2022; v1 submitted 5 November, 2020; originally announced November 2020.

    Comments: Received March 8, 2022, accepted April 4, 2022, date of publication April 11, 2022, date of current version April 15, 2022

    Journal ref: IEEE Access April 15, 2022

  20. arXiv:2011.02694  [pdf, ps, other

    cs.DC

    Video Big Data Analytics in the Cloud: Research Issues and Challenges

    Authors: Aftab Alam, Shah Khalid, Muhammad Numan Khan, Tariq Habib Afridi, Irfan Ullah, Young-Koo Lee

    Abstract: On the rise of distributed computing technologies, video big data analytics in the cloud have attracted researchers and practitioners' attention. The current technology and market trends demand an efficient framework for video big data analytics. However, the current work is too limited to provide an architecture on video big data analytics in the cloud, including managing and analyzing video big… ▽ More

    Submitted 5 November, 2020; originally announced November 2020.

    Comments: 15 pages, 3 Figures, Conference

  21. arXiv:2009.06861  [pdf, other

    cs.CR

    Privacy in Targeted Advertising: A Survey

    Authors: Imdad Ullah, Roksana Boreli, Salil S. Kanhere

    Abstract: Targeted advertising has transformed the marketing landscape for a wide variety of businesses, by creating new opportunities for advertisers to reach prospective customers by delivering personalised ads, using an infrastructure of a number of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process and trade a vast amount of user's personal data,… ▽ More

    Submitted 20 June, 2021; v1 submitted 15 September, 2020; originally announced September 2020.

  22. arXiv:2008.10479  [pdf, other

    cs.CR

    Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads

    Authors: Imdad Ullah, Salil S. Kanhere, Roksana Boreli

    Abstract: The targeted advertising is based on preference profiles inferred via relationships among individuals, their monitored responses to previous advertising and temporal activity over the Internet, which has raised critical privacy concerns. In this paper, we present a novel proposal for a Blockchain-based advertising platform that provides: a system for privacy preserving user profiling, privately re… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.

  23. arXiv:2005.00355  [pdf, other

    cs.CV

    Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?

    Authors: Bahram Lavi, Ihsan Ullah, Mehdi Fatan, Anderson Rocha

    Abstract: Intelligent video-surveillance (IVS) is currently an active research field in computer vision and machine learning and provides useful tools for surveillance operators and forensic video investigators. Person re-identification (PReID) is one of the most critical problems in IVS, and it consists of recognizing whether or not an individual has already been observed over a camera in a network. Soluti… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

    Comments: 24 pages, 6 figures, and 2 tables, considered over than 100 papers. arXiv admin note: substantial text overlap with arXiv:1807.05284

  24. arXiv:2003.03394  [pdf, other

    cs.CR math.AG physics.ao-ph

    Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads

    Authors: Ikram Ullah, Umar Hayat, Miguel D. Bustamante

    Abstract: We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs). By defining a total order on quasi-resonant triads, at a first stage we construct quasi-resonant triads using auxiliary parameters of elliptic surfaces in order to generate pseudo-random numbers. At a second stage, we employ an MEC to construct a… ▽ More

    Submitted 10 May, 2020; v1 submitted 6 March, 2020; originally announced March 2020.

    Comments: Accepted and published version (Entropy 2020, 22, 454)

    MSC Class: 14H52; 76B15; 11T71; 14G50

    Journal ref: Entropy 2020, 22, 454

  25. arXiv:2001.11190  [pdf, other

    cs.CV cs.RO

    2018 Robotic Scene Segmentation Challenge

    Authors: Max Allan, Satoshi Kondo, Sebastian Bodenstedt, Stefan Leger, Rahim Kadkhodamohammadi, Imanol Luengo, Felix Fuentes, Evangello Flouty, Ahmed Mohammed, Marius Pedersen, Avinash Kori, Varghese Alex, Ganapathy Krishnamurthi, David Rauber, Robert Mendel, Christoph Palm, Sophia Bano, Guinther Saibro, Chi-Sheng Shih, Hsun-An Chiang, Juntang Zhuang, Junlin Yang, Vladimir Iglovikov, Anton Dobrenkii, Madhu Reddiboina , et al. (16 additional authors not shown)

    Abstract: In 2015 we began a sub-challenge at the EndoVis workshop at MICCAI in Munich using endoscope images of ex-vivo tissue with automatically generated annotations from robot forward kinematics and instrument CAD models. However, the limited background variation and simple motion rendered the dataset uninformative in learning about which techniques would be suitable for segmentation in real surgery. In… ▽ More

    Submitted 2 August, 2020; v1 submitted 30 January, 2020; originally announced January 2020.

  26. arXiv:1912.09592  [pdf, ps, other

    cs.LG stat.ML

    Graph Convolutional Networks: analysis, improvements and results

    Authors: Ihsan Ullah, Mario Manzo, Mitul Shah, Michael Madden

    Abstract: In the current era of neural networks and big data, higher dimensional data is processed for automation of different application areas. Graphs represent a complex data organization in which dependencies between more than one object or activity occur. Due to the high dimensionality, this data creates challenges for machine learning algorithms. Graph convolutional networks were introduced to utilize… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

    Comments: 10 pages

  27. arXiv:1910.05576  [pdf, other

    cs.CR math.AG

    Efficient and Secure Substitution Box and Random Number Generators Over Mordell Elliptic Curves

    Authors: Ikram Ullah, Naveed Ahmed Azam, Umar Hayat

    Abstract: Elliptic curve cryptography has received great attention in recent years due to its high resistance against modern cryptanalysis. The aim of this article is to present efficient generators to generate substitution boxes (S-boxes) and pseudo random numbers which are essential for many well-known cryptosystems. These generators are based on a special class of ordered Mordell elliptic curves. Rigorou… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

  28. arXiv:1904.13234  [pdf

    cs.LG eess.SP stat.ML

    Automatic Emotion Recognition (AER) System based on Two-Level Ensemble of Lightweight Deep CNN Models

    Authors: Emad-ul-Haq Qazi, Muhammad Hussain, Hatim AboAlsamh, Ihsan Ullah

    Abstract: Emotions play a crucial role in human interaction, health care and security investigations and monitoring. Automatic emotion recognition (AER) using electroencephalogram (EEG) signals is an effective method for decoding the real emotions, which are independent of body gestures, but it is a challenging problem. Several automatic emotion recognition systems have been proposed, which are based on tra… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

  29. The Design and Deployment of an End-to-end IoT Infrastructure for the Natural Environment

    Authors: Vatsala Nundloll, Barry Porter, Gordon Blair, Jack Cosby, Bridget Emmett, Ben Winterbourn, Graham Dean, Philip Beattie, Rory Shaw, Davey Jones, Dave Chadwick, Mike Brown, Wayne Shelley, Izhar Ullah

    Abstract: Internet of Things (IoT) systems have seen recent growth in popularity for city and home environments. We report on the design, deployment and use of IoT infrastructure for environmental monitoring and management. Working closely with hydrologists, soil scientists and animal behaviour scientists, we successfully deployed and utilised a system to deliver integrated information across these two fiel… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

  30. arXiv:1809.11057  [pdf, ps, other

    cs.CR

    Efficient Construction of a Substitution Box Based on a Mordell Elliptic Curve Over a Finite Field

    Authors: Naveed Ahmed Azam, Umar Hayat, Ikram Ullah

    Abstract: Elliptic curve cryptography (ECC) is used in many security systems due to its small key size and high security as compared to the other cryptosystems. In many well-known security systems substitution box (S-box) is the only non-linear component. Recently, it is shown that the security of a cryptosystem can be improved by using dynamic S-boxes instead of a static S-box. This fact necessitates the c… ▽ More

    Submitted 15 January, 2019; v1 submitted 28 September, 2018; originally announced September 2018.

    Comments: We have updated Lemma 4. Two new sections (5.1 and 5.2) are added. Results related to time complexity are corrected

  31. arXiv:1809.06244  [pdf, other

    cs.AI cs.RO

    A Virtual Testbed for Critical Incident Investigation with Autonomous Remote Aerial Vehicle Surveying, Artificial Intelligence, and Decision Support

    Authors: David L. Smyth, Sai Abinesh, Nazli B. Karimi, Brett Drury, Ihsan Ullah, Frank G. Glavin, Michael G. Madden

    Abstract: Autonomous robotics and artificial intelligence techniques can be used to support human personnel in the event of critical incidents. These incidents can pose great danger to human life. Some examples of such assistance include: multi-robot surveying of the scene; collection of sensor data and scene imagery, real-time risk assessment and analysis; object identification and anomaly detection; and r… ▽ More

    Submitted 25 January, 2019; v1 submitted 14 September, 2018; originally announced September 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1806.04497

    Journal ref: IWAISe, 2nd International Workshop on A.I. in Security, European Conference on Machine Learning 2018

  32. arXiv:1807.05284  [pdf, other

    cs.CV

    Survey on Deep Learning Techniques for Person Re-Identification Task

    Authors: Bahram Lavi, Mehdi Fatan Serj, Ihsan Ullah

    Abstract: Intelligent video-surveillance is currently an active research field in computer vision and machine learning techniques. It provides useful tools for surveillance operators and forensic video investigators. Person re-identification (PReID) is one among these tools. It consists of recognizing whether an individual has already been observed over a camera in a network or not. This tool can also be em… ▽ More

    Submitted 19 July, 2018; v1 submitted 13 July, 2018; originally announced July 2018.

  33. arXiv:1806.04497  [pdf, other

    cs.CY cs.AI

    A Virtual Environment with Multi-Robot Navigation, Analytics, and Decision Support for Critical Incident Investigation

    Authors: David L. Smyth, James Fennell, Sai Abinesh, Nazli B. Karimi, Frank G. Glavin, Ihsan Ullah, Brett Drury, Michael G. Madden

    Abstract: Accidents and attacks that involve chemical, biological, radiological/nuclear or explosive (CBRNE) substances are rare, but can be of high consequence. Since the investigation of such events is not anybody's routine work, a range of AI techniques can reduce investigators' cognitive load and support decision-making, including: planning the assessment of the scene; ongoing evaluation and updating of… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: 27th International Joint Conference on Artificial Intelligence (IJCAI), Stockholm, Sweden

  34. arXiv:1801.05412  [pdf

    cs.CV

    An Automated System for Epilepsy Detection using EEG Brain Signals based on Deep Learning Approach

    Authors: Ihsan Ullah, Muhammad Hussain, Emad-ul-Haq Qazi, Hatim Aboalsamh

    Abstract: Epilepsy is a neurological disorder and for its detection, encephalography (EEG) is a commonly used clinical approach. Manual inspection of EEG brain signals is a time-consuming and laborious process, which puts heavy burden on neurologists and affects their performance. Several automatic techniques have been proposed using traditional approaches to assist neurologists in detecting binary epilepsy… ▽ More

    Submitted 16 January, 2018; originally announced January 2018.

    Comments: 18 pages

  35. arXiv:1608.04064  [pdf, other

    cs.CV

    About Pyramid Structure in Convolutional Neural Networks

    Authors: Ihsan Ullah, Alfredo Petrosino

    Abstract: Deep convolutional neural networks (CNN) brought revolution without any doubt to various challenging tasks, mainly in computer vision. However, their model designing still requires attention to reduce number of learnable parameters, with no meaningful reduction in performance. In this paper we investigate to what extend CNN may take advantage of pyramid structure typical of biological neurons. A g… ▽ More

    Submitted 14 August, 2016; originally announced August 2016.

    Comments: Published in 2016 International Joint Conference on Neural Networks (IJCNN)

  36. arXiv:1208.5195  [pdf

    cs.SE

    Decreasing defect rate of test cases by designing and analysis for recursive modules of a program structure: Improvement in test cases

    Authors: Muhammad Javed, Bashir Ahmad, Zaffar Abbas, Allah Nawaz, Muhammad Ali Abid, Ihsan Ullah

    Abstract: Designing and analysis of test cases is a challenging tasks for tester roles especially those who are related to test the structure of program. Recently, Programmers are showing valuable trend towards the implementation of recursive modules in a program structure. In testing phase of software development life cycle, test cases help the tester to test the structure and flow of program. The implemen… ▽ More

    Submitted 26 August, 2012; originally announced August 2012.

    Comments: 4 pages

    Journal ref: IJCSIS August 2012, Vol. 10 No. 8