Skip to main content

Showing 1–48 of 48 results for author: Javed, A

  1. arXiv:2410.12034  [pdf, other

    cs.LG cs.AI

    A Survey on Deep Tabular Learning

    Authors: Shriyank Somvanshi, Subasish Das, Syed Aaqib Javed, Gian Antariksa, Ahmed Hossain

    Abstract: Tabular data, widely used in industries like healthcare, finance, and transportation, presents unique challenges for deep learning due to its heterogeneous nature and lack of spatial structure. This survey reviews the evolution of deep learning models for tabular data, from early fully connected networks (FCNs) to advanced architectures like TabNet, SAINT, TabTranSELU, and MambaNet. These models i… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

    Comments: 43 pages, 18 figures, 3 tables

  2. arXiv:2409.13000  [pdf

    cs.LG cs.AI stat.AP stat.ML

    Introducing the Large Medical Model: State of the art healthcare cost and risk prediction with transformers trained on patient event sequences

    Authors: Ricky Sahu, Eric Marriott, Ethan Siegel, David Wagner, Flore Uzan, Troy Yang, Asim Javed

    Abstract: With U.S. healthcare spending approaching $5T (NHE Fact Sheet 2024), and 25% of it estimated to be wasteful (Waste in the US the health care system: estimated costs and potential for savings, n.d.), the need to better predict risk and optimal patient care is evermore important. This paper introduces the Large Medical Model (LMM), a generative pre-trained transformer (GPT) designed to guide and pre… ▽ More

    Submitted 19 September, 2024; originally announced September 2024.

    Comments: 10 pages, 10 figures

    ACM Class: I.2.1; K.4.1; K.4.3; J.1; J.3

  3. arXiv:2408.08433  [pdf, other

    cs.CR

    A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network Security using Hierarchical Federated Learning

    Authors: Muzun Althunayyan, Amir Javed, Omer Rana

    Abstract: As connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus has become the predominant communication standard for in-vehicle networks due to its speed and efficiency. However, the CAN bus lacks basic security measures such as authentication and encryption, making it highly vulnerable to cyberattacks. To ensure in-vehicle security, intrusion detection systems (IDSs) must… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

    Comments: 24 pages

  4. arXiv:2407.06436  [pdf

    cs.HC

    Simplifying Integration of Custom Controllers in Exergames

    Authors: Hassan Ali Khan, Muhammad Asbar Javed, Amnah Khan

    Abstract: Despite of the established evidence in favor of exergames for physical rehabilitation their use is limited in Pakistan. In our user study with game developers (N=62), majority (67.7%) of the participants believed that exergames' popularity will increase if cheap alternatives of body tracking devices are available. Perhaps, custom controllers can be used as an affordable alternate input source in e… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

  5. arXiv:2406.06784  [pdf

    physics.bio-ph

    Photosynthetic energy transfer: missing in action (detected spectroscopy)?

    Authors: Ariba Javed, Julian Lüttig, Kateřina Charvátová, Stephanie E. Sanders, Rhiannon Willow, Muyi Zhang, Alastair T. Gardiner, Pavel Malý, Jennifer P. Ogilvie

    Abstract: In recent years, action-detected ultrafast spectroscopies have gained popularity. These approaches offer some advantages over their coherently-detected counterparts, enabling spatially-resolved and operando measurements with high sensitivity. However, there are also fundamental limitations connected to the different process of signal generation in action-detected experiments. Specifically, state m… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  6. arXiv:2406.01261  [pdf, other

    cond-mat.mes-hall

    Utilizing and extending superconducting circuit toolbox to simulate analog quantum gravity

    Authors: M. A. Javed, D. Kruti, A. Kenawy, T. Herrig, C. Koliofoti, O. Kashuba, R. -P. Riwar

    Abstract: There has been considerable effort to simulate quantum gravity features in solid state systems, such as analog black holes or wormholes. However, superconducting circuits have so far received only limited attention in this regard. Moreover, for quantum superpositions of spacetime geometries - a highly contentious notion within the quantum gravity community itself - there currently exist no solid s… ▽ More

    Submitted 17 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: 31 pages, 9 figures

  7. arXiv:2405.07905  [pdf, other

    eess.IV cs.CV

    PLUTO: Pathology-Universal Transformer

    Authors: Dinkar Juyal, Harshith Padigela, Chintan Shah, Daniel Shenker, Natalia Harguindeguy, Yi Liu, Blake Martin, Yibo Zhang, Michael Nercessian, Miles Markey, Isaac Finberg, Kelsey Luu, Daniel Borders, Syed Ashar Javed, Emma Krause, Raymond Biju, Aashish Sood, Allen Ma, Jackson Nyman, John Shamshoian, Guillaume Chhor, Darpan Sanghavi, Marc Thibault, Limin Yu, Fedaa Najdawi , et al. (8 additional authors not shown)

    Abstract: Pathology is the study of microscopic inspection of tissue, and a pathology diagnosis is often the medical gold standard to diagnose disease. Pathology images provide a unique challenge for computer-vision-based analysis: a single pathology Whole Slide Image (WSI) is gigapixel-sized and often contains hundreds of thousands to millions of objects of interest across multiple resolutions. In this wor… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  8. arXiv:2404.02382  [pdf

    eess.IV

    Imaging transformer for MRI denoising with the SNR unit training: enabling generalization across field-strengths, imaging contrasts, and anatomy

    Authors: Hui Xue, Sarah Hooper, Azaan Rehman, Iain Pierce, Thomas Treibel, Rhodri Davies, W Patricia Bandettini, Rajiv Ramasawmy, Ahsan Javed, Zheren Zhu, Yang Yang, James Moon, Adrienne Campbell, Peter Kellman

    Abstract: The ability to recover MRI signal from noise is key to achieve fast acquisition, accurate quantification, and high image quality. Past work has shown convolutional neural networks can be used with abundant and paired low and high-SNR images for training. However, for applications where high-SNR data is difficult to produce at scale (e.g. with aggressive acceleration, high resolution, or low field… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

  9. Modulational electrostatic wave-wave interactions in plasma fluids modeled by asymmetric coupled nonlinear Schrödinger (CNLS) equations

    Authors: N. Lazarides, Giorgos P. Veldes, Amaria Javed, Ioannis Kourakis

    Abstract: The interaction between two co-propagating electrostatic wavepackets characterized by arbitrary carrier wavenumber is considered. A one-dimensional (1D) non-magnetized plasma model is adopted, consisting of a cold inertial ion fluid evolving against a thermalized (Maxwell-Boltzmann distributed) electron background. A multiple-scale perturbation method is employed to reduce the original model equat… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 21 pages, 6 figures, 46 references

    Journal ref: Chaos, Solitons and Fractals 175 (2023) 113974

  10. arXiv:2309.15653  [pdf, other

    physics.chem-ph

    Direct Sensing of Remote Nuclei: Expanding the Reach of Cross-Effect Dynamic Nuclear Polarization

    Authors: Amaria Javed, Asif Equbal

    Abstract: Dynamic Nuclear Polarization (DNP) has revolutionized the field of solid-state NMR spectroscopy by significantly enhancing the sensitivity of nuclear magnetic resonance experiments. Conventionally, cross effect DNP relies on biradicals to transfer polarization from coupled electron spins to nearby nuclear spins and subsequent relay to target nuclei via spin diffusion mechanism. However, the direct… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  11. arXiv:2308.13589  [pdf

    cs.CR

    Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis

    Authors: Kashif Ishaq, Hafiz Ahsan Javed

    Abstract: The security trade confidentiality, integrity and availability are the main pillar of the information systems as every organization emphasize of the security. From last few decades, digital data is the main asset for every digital or non-digital organization. The proliferation of easily accessible attack software on the internet has lowered the barrier for individuals without hacking skills to eng… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

  12. arXiv:2304.01080  [pdf, other

    cs.SD cs.RO eess.AS

    LIPSFUS: A neuromorphic dataset for audio-visual sensory fusion of lip reading

    Authors: Antonio Rios-Navarro, Enrique Piñero-Fuentes, Salvador Canas-Moreno, Aqib Javed, Jin Harkin, Alejandro Linares-Barranco

    Abstract: This paper presents a sensory fusion neuromorphic dataset collected with precise temporal synchronization using a set of Address-Event-Representation sensors and tools. The target application is the lip reading of several keywords for different machine learning applications, such as digits, robotic commands, and auxiliary rich phonetic short words. The dataset is enlarged with a spiking version of… ▽ More

    Submitted 28 March, 2023; originally announced April 2023.

    Comments: Submitted to ISCAS2023, 4 pages, plus references, github link provided

    MSC Class: 68T40 ACM Class: I.2.10

  13. arXiv:2303.13405  [pdf, other

    cs.CV cs.LG

    SC-MIL: Supervised Contrastive Multiple Instance Learning for Imbalanced Classification in Pathology

    Authors: Dinkar Juyal, Siddhant Shingi, Syed Ashar Javed, Harshith Padigela, Chintan Shah, Anand Sampat, Archit Khosla, John Abel, Amaro Taylor-Weiner

    Abstract: Multiple Instance learning (MIL) models have been extensively used in pathology to predict biomarkers and risk-stratify patients from gigapixel-sized images. Machine learning problems in medical imaging often deal with rare diseases, making it important for these models to work in a label-imbalanced setting. In pathology images, there is another level of imbalance, where given a positively labeled… ▽ More

    Submitted 9 September, 2023; v1 submitted 23 March, 2023; originally announced March 2023.

  14. arXiv:2210.02172  [pdf, other

    eess.SP

    Intelligent and Secure Radio Environments for 6G Vehicular Aided HetNets: Key Opportunities and Challenges

    Authors: Wali Ullah Khan, Muhammad Awais Javed, Sherali Zeadally, Eva Lagunas, Symeon Chatzinotas

    Abstract: Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting elements, it is becoming possible to program and control the wireless environment. Since wireless physical layer technologies can generally adapt to the wireless environment, their combination wit… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: 12,4

  15. arXiv:2207.03295  [pdf, other

    cs.IT eess.SP

    Cooperative Backscatter NOMA with Imperfect SIC: Towards Energy Efficient Sum Rate Maximization in Sustainable 6G Networks

    Authors: Manzoor Ahmed, Zain Ali, Wali Ullah Khan, Omer Waqar, Muhammad Asif, Abd Ullah Khan, Muhammad Awais Javed, Fahd N. Al-Wesabi

    Abstract: The combination of backscatter communication with non-orthogonal multiple access (NOMA) has the potential to support low-powered massive connections in upcoming sixth-generation (6G) wireless networks. More specifically, backscatter communication can harvest and use the existing RF signals in the atmosphere for communication, while NOMA provides communication to multiple wireless devices over the… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Comments: 9, 7

  16. arXiv:2206.01794  [pdf, other

    cs.CV cs.LG

    Additive MIL: Intrinsically Interpretable Multiple Instance Learning for Pathology

    Authors: Syed Ashar Javed, Dinkar Juyal, Harshith Padigela, Amaro Taylor-Weiner, Limin Yu, Aaditya Prakash

    Abstract: Multiple Instance Learning (MIL) has been widely applied in pathology towards solving critical problems such as automating cancer diagnosis and grading, predicting patient prognosis, and therapy response. Deploying these models in a clinical setting requires careful inspection of these black boxes during development and deployment to identify failures and maintain physician trust. In this work, we… ▽ More

    Submitted 16 October, 2022; v1 submitted 3 June, 2022; originally announced June 2022.

  17. arXiv:2204.13623  [pdf, other

    cond-mat.mes-hall cond-mat.supr-con

    Fractional Josephson effect versus fractional charge in superconducting-normal metal hybrid circuits

    Authors: Mohammad Atif Javed, Jakob Schwibbert, Roman-Pascal Riwar

    Abstract: Fractionally charged excitations play a central role in condensed matter physics, and can be probed in different ways. If transport occurs via dissipation-less supercurrents, they manifest as a fractional Josephson effect, whereas in dissipative transport they can be revealed by the transport statistics. However, in a regime where supercurrents and lossy currents coincide, a full understanding of… ▽ More

    Submitted 25 May, 2022; v1 submitted 28 April, 2022; originally announced April 2022.

    Comments: 33 pages, 10 figures

  18. arXiv:2204.05205  [pdf, other

    eess.IV cs.CV cs.LG

    Rethinking Machine Learning Model Evaluation in Pathology

    Authors: Syed Ashar Javed, Dinkar Juyal, Zahil Shanis, Shreya Chakraborty, Harsha Pokkalla, Aaditya Prakash

    Abstract: Machine Learning has been applied to pathology images in research and clinical practice with promising outcomes. However, standard ML models often lack the rigorous evaluation required for clinical decisions. Machine learning techniques for natural images are ill-equipped to deal with pathology images that are significantly large and noisy, require expensive labeling, are hard to interpret, and ar… ▽ More

    Submitted 18 April, 2022; v1 submitted 11 April, 2022; originally announced April 2022.

    Comments: ICLR 2022 ML Evaluation Workshop

  19. arXiv:2203.16907  [pdf, other

    eess.SP

    Opportunities for Physical Layer Security in UAV Communication Enhanced with Intelligent Reflective Surfaces

    Authors: Wali Ullah Khan, Eva Lagunas, Zain Ali, Muhammad Awais Javed, Manzoor Ahmed, Symeon Chatzinotas, Björn Ottersten, Petar Popovski

    Abstract: Unmanned Aerial Vehicles (UAVs) are an important component of next-generation wireless networks that can assist in high data rate communications and provide enhanced coverage.Their high mobility and aerial nature offer deployment flexibility and low-cost infrastructure support to existing cellular networks and provide many applications that rely on mobile wireless communications. However, security… ▽ More

    Submitted 20 September, 2022; v1 submitted 31 March, 2022; originally announced March 2022.

  20. arXiv:2203.05152  [pdf, other

    eess.SP

    NOMA-enabled Backscatter Communications for Green Transportation in Automotive-Industry 5.0

    Authors: Wali Ullah Khan, Asim Ihsan, Tu N. Nguyen, Zain Ali, Muhammad Awais Javed

    Abstract: Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, and other Intelligent Transportation System (ITS) entities. Non-Orthogonal Multiple Access (NOMA) and backscatter communications are two key techniques of 6G communications for enhanced spectrum and energy efficiency.… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

    Comments: 12

  21. arXiv:2108.11523  [pdf, other

    cs.LG

    SOMTimeS: Self Organizing Maps for Time Series Clustering and its Application to Serious Illness Conversations

    Authors: Ali Javed, Donna M. Rizzo, Byung Suk Lee, Robert Gramling

    Abstract: There is an increasing demand for scalable algorithms capable of clustering and analyzing large time series datasets. The Kohonen self-organizing map (SOM) is a type of unsupervised artificial neural network for visualizing and clustering complex data, reducing the dimensionality of data, and selecting influential features. Like all clustering methods, the SOM requires a measure of similarity betw… ▽ More

    Submitted 25 August, 2021; originally announced August 2021.

    Comments: 36 pages

  22. Families of Skyrmions in Two-Dimensional Spin-1/2 Systems

    Authors: Amaria Javed, L. Al Sakkaf, U. Al Khawaja

    Abstract: We find Skyrmion-like topological excitations for a two-dimensional spin-1/2 system. Expressing the spinor wavefunction in terms of a rotation operator maps the spin-1/2 system to a Manakov system. We employ both analytical and numerical methods to solve the resulting Manakov system. Using a generalized similarity transformation, we reduce the two-dimensional Manakov system to the integrable one-d… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Comments: 20 pages

    Journal ref: IEEE J. Sel. Top. Quantum Electron (2020)

  23. Adding Binary Numbers with Discrete Solitons in Waveguide Arrays

    Authors: Alaa Shaheen, Amaria Javed, U. Al Khawaja

    Abstract: We present a design and protocol to add binary numbers using discrete solitons in waveguide arrays. We show that the nonlinear interaction between discrete solitons in waveguide arrays can be exploited to design half and full adders. By modulating the separation between waveguides and introducing control solitons, we achieve the performance of an XOR gate. We construct the half and full adders usi… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Journal ref: Phys. Scr., 95, 085107 (2020)

  24. arXiv:2108.01395  [pdf, ps, other

    physics.optics nlin.PS

    Amplifying Optical Signals with Discrete Solitons in Waveguide Arrays

    Authors: Amaria Javed, Alaa Shaheen, U. Al Khawaja

    Abstract: We present a design and protocol to achieve an essential feature of an optical transistor, namely the amplification of input signal with the use of discrete solitons in waveguide arrays. We consider the scattering of a discrete soliton by a reflectionless potential in the presence of a control soliton. We show that at the sharp transition region between full reflectance and full transmittance, the… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Journal ref: Phys. Lett. A, 384, 126654 (2020)

  25. Unidirectional flow of composite bright-bright solitons through asymmetric double potential barriers and wells

    Authors: Amaria Javed, T. Uthayakumar, M. O. D. Alotaibi, S. M. Al-Marzoug, H. Bahlouli, U. Al Khawaja

    Abstract: We investigate the dynamics of two component bright-bright (BB) solitons through reflectionless double barrier and double well potentials in the framework of a Manakov system governed by the coupled nonlinear Schrödinger equations. The objective is to achieve unidirectional flow and unidirectional segregation/splitting, which may be used in the design of optical data processing devices. We observe… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: 27 pages, 30 figures

    MSC Class: 35Q55; 78A60; 81V80; 35Q60

    Journal ref: Communications in Nonlinear Science and Numerical Simulation, 105968 (2021)

  26. arXiv:2107.03141  [pdf, other

    cs.CL

    Hierarchical Text Classification of Urdu News using Deep Neural Network

    Authors: Taimoor Ahmed Javed, Waseem Shahzad, Umair Arshad

    Abstract: Digital text is increasing day by day on the internet. It is very challenging to classify a large and heterogeneous collection of data, which require improved information processing methods to organize text. To classify large size of corpus, one common approach is to use hierarchical text classification, which aims to classify textual data in a hierarchical structure. Several approaches have been… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

    Comments: 22 pages with 16 figures

  27. arXiv:2106.03307  [pdf, other

    cs.RO eess.SY

    Terrain Adaptive Gait Transitioning for a Quadruped Robot using Model Predictive Control

    Authors: Prathamesh Saraf, Abhishek Sarkar, Arshad Javed

    Abstract: Legged robots can traverse challenging terrain, use perception to plan their safe foothold positions, and navigate the environment. Such unique mobility capabilities make these platforms a perfect candidate for scenarios such as search and rescue, inspection, and exploration tasks. While traversing through such terrains, the robot's instability is a significant concern. Many times the robot needs… ▽ More

    Submitted 6 July, 2021; v1 submitted 6 June, 2021; originally announced June 2021.

    Comments: To be published in the proceedings of the 26th IEEE International Conference on Automation and Computing (ICAC'21)

  28. arXiv:2105.13319  [pdf

    physics.optics cond-mat.other physics.chem-ph

    Phase-Modulated Rapid-Scanning Fluorescence-Detected Two-Dimensional Electronic Spectroscopy

    Authors: Damianos Agathangelou, Ariba Javed, Francesco Sessa, Xavier Solinas, Manuel Joffre, Jennifer P. Ogilvie

    Abstract: We present a rapid-scanning approach to fluorescence-detected two-dimensional electronic spectroscopy that combines acousto-optic phase-modulation with digital lock-in detection. The approach shifts the signal detection window to suppress 1/f laser noise and enables interferometric tracking of the time delays to allow for correction of spectral phase distortions and accurate phasing of the data. T… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  29. arXiv:2103.00484  [pdf

    cs.CR cs.LG cs.SD eess.AS eess.IV

    Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward

    Authors: Momina Masood, Marriam Nawaz, Khalid Mahmood Malik, Ali Javed, Aun Irtaza

    Abstract: Easy access to audio-visual content on social media, combined with the availability of modern tools such as Tensorflow or Keras, open-source trained models, and economical computing infrastructure, and the rapid evolution of deep-learning (DL) methods, especially Generative Adversarial Networks (GAN), have made it possible to generate deepfakes to disseminate disinformation, revenge porn, financia… ▽ More

    Submitted 22 November, 2021; v1 submitted 25 February, 2021; originally announced March 2021.

  30. arXiv:2101.06502  [pdf, ps, other

    cs.IT

    Stable Matching for Selection of Intelligent Reflecting Surfaces in Multiuser MISO Systems

    Authors: Jawad Mirza, Bakhtiar Ali, Muhammad Awais Javed

    Abstract: In this letter, we present an intelligent reflecting surface (IRS) selection strategy for multiple IRSs aided multiuser multiple-input single-output (MISO) systems. In particular, we pose the IRS selection problem as a stable matching problem. A two stage user-IRS assignment algorithm is proposed, where the main objective is to carry out a stable user-IRS matching, such that the sum rate of the sy… ▽ More

    Submitted 16 January, 2021; originally announced January 2021.

    Comments: 5 pages and 4 figures, submitted for publication

  31. arXiv:2007.01052  [pdf, ps, other

    eess.SP cs.IT

    Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications

    Authors: Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jantti

    Abstract: Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years. With the integration of blockchain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicles at any time. Specifically, the blockchain technology is expected to improve the security, immutability… ▽ More

    Submitted 29 June, 2020; originally announced July 2020.

    Comments: Blockchain, Cellular V2X Communications, Latency, Mining, Vehicular Networks

  32. A Benchmark Study on Time Series Clustering

    Authors: Ali Javed, Byung Suk Lee, Dona M. Rizzo

    Abstract: This paper presents the first time series clustering benchmark utilizing all time series datasets currently available in the University of California Riverside (UCR) archive -- the state of the art repository of time series data. Specifically, the benchmark examines eight popular clustering methods representing three categories of clustering algorithms (partitional, hierarchical and density-based)… ▽ More

    Submitted 26 April, 2020; v1 submitted 20 April, 2020; originally announced April 2020.

    Comments: Typos corrected, figures resolution changed

    Journal ref: Machine Learning with Applications, 1:100001, 2020

  33. CEFIoT: A Fault-Tolerant IoT Architecture for Edge and Cloud

    Authors: Asad Javed, Keijo Heljanko, Andrea Buda, Kary Främling

    Abstract: Internet of Things (IoT), the emerging computing infrastructure that refers to the networked interconnection of physical objects, incorporates a plethora of digital systems that are being developed by means of a large number of applications. Many of these applications administer data collection on the edge and offer data storage and analytics capabilities in the cloud. This raises the following pr… ▽ More

    Submitted 23 January, 2020; originally announced January 2020.

    Comments: 6 pages, 6 figures

    Journal ref: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5-8 February, 2018

  34. arXiv:1912.10274  [pdf, other

    cs.RO

    Shared Autonomy in Web-based Human Robot Interaction

    Authors: Yug Ajmera, Arshad Javed

    Abstract: In this paper, we aim to achieve a human-robot work balance by implementing shared autonomy through a web interface. Shared autonomy integrates user input with the autonomous capabilities of the robot and therefore increases the overall performance of the robot. Presenting only the relevant information to the user on the web page lowers the cognitive load of the operator. Through our web interface… ▽ More

    Submitted 19 February, 2020; v1 submitted 21 December, 2019; originally announced December 2019.

    Comments: Accepted at Intelligent Systems Conference (IntelliSys) 2020

  35. arXiv:1912.05636  [pdf, ps, other

    cs.CV cs.LG cs.MM

    CineFilter: Unsupervised Filtering for Real Time Autonomous Camera Systems

    Authors: Sudheer Achary, K L Bhanu Moorthy, Syed Ashar Javed, Nikita Shravan, Vineet Gandhi, Anoop Namboodiri

    Abstract: Autonomous camera systems are often subjected to an optimization/filtering operation to smoothen and stabilize the rough trajectory estimates. Most common filtering techniques do reduce the irregularities in data; however, they fail to mimic the behavior of a human cameraman. Global filtering methods modeling human camera operators have been successful; however, they are limited to offline setting… ▽ More

    Submitted 27 May, 2020; v1 submitted 11 December, 2019; originally announced December 2019.

  36. Analysis of Hydrological and Suspended Sediment Events from Mad River Watershed using Multivariate Time Series Clustering

    Authors: Ali Javed, Scott D. Hamshaw, Donna M. Rizzo, Byung Suk Lee

    Abstract: Hydrological storm events are a primary driver for transporting water quality constituents such as turbidity, suspended sediments and nutrients. Analyzing the concentration (C) of these water quality constituents in response to increased streamflow discharge (Q), particularly when monitored at high temporal resolution during a hydrological event, helps to characterize the dynamics and flux of such… ▽ More

    Submitted 20 March, 2020; v1 submitted 27 November, 2019; originally announced November 2019.

    Comments: Corrected typo in title

    Journal ref: Journal of Hydrology, 593:125802, 2021

  37. arXiv:1910.01210  [pdf, other

    cs.CV cs.LG cs.RO

    Embodied Language Grounding with 3D Visual Feature Representations

    Authors: Mihir Prabhudesai, Hsiao-Yu Fish Tung, Syed Ashar Javed, Maximilian Sieb, Adam W. Harley, Katerina Fragkiadaki

    Abstract: We propose associating language utterances to 3D visual abstractions of the scene they describe. The 3D visual abstractions are encoded as 3-dimensional visual feature maps. We infer these 3D visual scene feature maps from RGB images of the scene via view prediction: when the generated 3D scene feature map is neurally projected from a camera viewpoint, it should match the corresponding RGB image.… ▽ More

    Submitted 17 June, 2021; v1 submitted 2 October, 2019; originally announced October 2019.

    Journal ref: Conference on Computer Vision and Pattern Recognition. 2020, pp. 2220-2229

  38. arXiv:1909.01600  [pdf

    cs.NI

    Interference mitigation techniques for a dense heterogeneous area network in machine-to-machine communications

    Authors: Dong Chen, Jamil Khan, Muhammad Awais Javed, Jason Brown

    Abstract: With the advent of Machine-to-Machine (M2M) communications, various networking consumer industrial and autonomous systems exchange messages in the real world in order to achieve their objectives. Parts of these systems are comprised of short-range wireless networks in the form of clusters that collectively cover a large geographical area. In these clusters, the nodes that represent the cluster hea… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

  39. arXiv:1909.00935  [pdf, other

    cs.SD eess.AS

    Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays

    Authors: Roland Baumann, Khalid Mahmood Malik, Ali Javed, Andersen Ball, Brandon Kujawa, Hafiz Malik

    Abstract: The evolution of modern voice controlled devices (VCDs) in recent years has revolutionized the Internet of Things, and resulted in increased realization of smart homes, personalization and home automation through voice commands. The introduction of VCDs in IoT is expected to give emergence of new subfield of IoT, called Multimedia of Thing (MoT). These VCDs can be exploited in IoT driven environme… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.

  40. arXiv:1908.06842  [pdf, other

    eess.SP cs.IT cs.NI

    Performance Analysis of Cooperative V2V and V2I Communications under Correlated Fading

    Authors: Furqan Jameel, Muhammad Awais Javed, Duy T. Ngo

    Abstract: Cooperative vehicular networks will play a vital role in the coming years to implement various intelligent transportation-related applications. Both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications will be needed to reliably disseminate information in a vehicular network. In this regard, a roadside unit (RSU) equipped with multiple antennas can improve the network capaci… ▽ More

    Submitted 11 August, 2019; originally announced August 2019.

    Comments: Internet of Vehicles (IoV), Vehicular communication, Antenna correlation, Stackelberg game, Vehicle-to-infrastructure (V2I), Vehicle-to-vehicle (V2V), Game theory, Cooperative vehicular networks

    Journal ref: IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019

  41. arXiv:1907.13261  [pdf, other

    eess.IV cs.CV

    Robust Autocalibrated Structured Low-Rank EPI Ghost Correction

    Authors: Rodrigo A. Lobos, W. Scott Hoge, Ahsan Javed, Congyu Liao, Kawin Setsompop, Krishna S. Nayak, Justin P. Haldar

    Abstract: Purpose: We propose and evaluate a new structured low-rank method for EPI ghost correction called Robust Autocalibrated LORAKS (RAC-LORAKS). The method can be used to suppress EPI ghosts arising from the differences between different readout gradient polarities and/or the differences between different shots. It does not require conventional EPI navigator signals, and is robust to imperfect autocal… ▽ More

    Submitted 1 October, 2020; v1 submitted 30 July, 2019; originally announced July 2019.

  42. arXiv:1903.02657  [pdf, other

    eess.SP cs.IT physics.optics

    Scattering Mechanisms and Modeling for Terahertz Wireless Communications

    Authors: Shihao Ju, Syed Hashim Ali Shah, Muhammad Affan Javed, Jun Li, Girish Palteru, Jyotish Robin, Yunchou Xing, Ojas Kanhere, Theodore S. Rappaport

    Abstract: This paper provides an analysis of radio wave scattering for frequencies ranging from the microwave to the Terahertz band (e.g., 1 GHz - 1 THz), by studying the scattering power reradiated from various types of materials with different surface roughnesses. First, fundamentals of scattering and reflection are developed and explained for use in wireless mobile radio, and the effect of scattering on… ▽ More

    Submitted 8 March, 2019; v1 submitted 6 March, 2019; originally announced March 2019.

    Comments: 7 pages, 7 figures, ICC

  43. arXiv:1803.06508  [pdf, other

    cs.CV cs.RO

    MergeNet: A Deep Net Architecture for Small Obstacle Discovery

    Authors: Krishnam Gupta, Syed Ashar Javed, Vineet Gandhi, K. Madhava Krishna

    Abstract: We present here, a novel network architecture called MergeNet for discovering small obstacles for on-road scenes in the context of autonomous driving. The basis of the architecture rests on the central consideration of training with less amount of data since the physical setup and the annotation process for small obstacles is hard to scale. For making effective use of the limited data, we propose… ▽ More

    Submitted 17 March, 2018; originally announced March 2018.

  44. arXiv:1803.06506  [pdf, other

    cs.CV

    Learning Unsupervised Visual Grounding Through Semantic Self-Supervision

    Authors: Syed Ashar Javed, Shreyas Saxena, Vineet Gandhi

    Abstract: Localizing natural language phrases in images is a challenging problem that requires joint understanding of both the textual and visual modalities. In the unsupervised setting, lack of supervisory signals exacerbate this difficulty. In this paper, we propose a novel framework for unsupervised visual grounding which uses concept learning as a proxy task to obtain self-supervision. The simple intuit… ▽ More

    Submitted 16 November, 2018; v1 submitted 17 March, 2018; originally announced March 2018.

    Comments: NIPS Workshop 2018

  45. arXiv:1708.05831  [pdf, other

    cs.SI

    Real Time Prediction of Drive by Download Attacks on Twitter

    Authors: Amir Javed, Pete Burnap, Omer Rana

    Abstract: The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a… ▽ More

    Submitted 19 August, 2017; originally announced August 2017.

    Comments: 17 pages

  46. arXiv:1705.04358  [pdf, other

    cs.CV

    Object-Level Context Modeling For Scene Classification with Context-CNN

    Authors: Syed Ashar Javed, Anil Kumar Nelakanti

    Abstract: Convolutional Neural Networks (CNNs) have been used extensively for computer vision tasks and produce rich feature representation for objects or parts of an image. But reasoning about scenes requires integration between the low-level feature representations and the high-level semantic information. We propose a deep network architecture which models the semantic context of scenes by capturing objec… ▽ More

    Submitted 2 June, 2017; v1 submitted 11 May, 2017; originally announced May 2017.

    Comments: Scene Understanding workshop (SUNw), CVPR 2017

  47. Phen-Gen: combining phenotype and genotype to analyze rare disorders

    Authors: Asif Javed, Saloni Agrawal, Pauline C. Ng

    Abstract: We introduce Phen-Gen, a method which combines patient disease symptoms and sequencing data with prior domain knowledge to identify the causative gene(s) for rare disorders.

    Submitted 27 February, 2015; originally announced February 2015.

    Journal ref: Nat Methods. 2014 Sep;11(9):935-7

  48. arXiv:1410.0373  [pdf, other

    cs.CY cs.DC

    Teaching Parallel Programming Using Java

    Authors: Aamir Shafi, Aleem Akhtar, Ansar Javed, Bryan Carpenter

    Abstract: This paper presents an overview of the "Applied Parallel Computing" course taught to final year Software Engineering undergraduate students in Spring 2014 at NUST, Pakistan. The main objective of the course was to introduce practical parallel programming tools and techniques for shared and distributed memory concurrent systems. A unique aspect of the course was that Java was used as the principle… ▽ More

    Submitted 27 August, 2014; originally announced October 2014.

    Comments: 8 Pages, 6 figures, MPJ Express, MPI Java, Teaching Parallel Programming

    ACM Class: K.3.2