Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 226 results for author: Rashid, A

.
  1. arXiv:2408.14791  [pdf

    cs.AI cs.RO

    Optimizing Structured Data Processing through Robotic Process Automation

    Authors: Vivek Bhardwaj, Ajit Noonia, Sandeep Chaurasia, Mukesh Kumar, Abdulnaser Rashid, Mohamed Tahar Ben Othman

    Abstract: Robotic Process Automation (RPA) has emerged as a game-changing technology in data extraction, revolutionizing the way organizations process and analyze large volumes of documents such as invoices, purchase orders, and payment advices. This study investigates the use of RPA for structured data extraction and evaluates its advantages over manual processes. By comparing human-performed tasks with th… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

    Comments: This manuscript has been accepted for publication in the journal Revue d'Intelligence Artificielle

  2. arXiv:2408.03887  [pdf

    cs.SD eess.AS

    Central Kurdish Text-to-Speech Synthesis with Novel End-to-End Transformer Training

    Authors: Hawraz A. Ahmad, Tarik A. Rashid

    Abstract: Recent advancements in text-to-speech (TTS) models have aimed to streamline the two-stage process into a single-stage training approach. However, many single-stage models still lag behind in audio quality, particularly when handling Kurdish text and speech. There is a critical need to enhance text-to-speech conversion for the Kurdish language, particularly for the Sorani dialect, which has been re… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: 19 pages

  3. arXiv:2408.00348  [pdf, other

    cs.CR cs.AI eess.IV

    Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks

    Authors: Angona Biswas, MD Abdullah Al Nasim, Kishor Datta Gupta, Roy George, Abdur Rashid

    Abstract: Machine learning (ML) is a rapidly developing area of medicine that uses significant resources to apply computer science and statistics to medical issues. ML's proponents laud its capacity to handle vast, complicated, and erratic medical data. It's common knowledge that attackers might cause misclassification by deliberately creating inputs for machine learning classifiers. Research on adversarial… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

  4. arXiv:2407.21075  [pdf, other

    cs.AI cs.CL cs.LG

    Apple Intelligence Foundation Language Models

    Authors: Tom Gunter, Zirui Wang, Chong Wang, Ruoming Pang, Andy Narayanan, Aonan Zhang, Bowen Zhang, Chen Chen, Chung-Cheng Chiu, David Qiu, Deepak Gopinath, Dian Ang Yap, Dong Yin, Feng Nan, Floris Weers, Guoli Yin, Haoshuo Huang, Jianyu Wang, Jiarui Lu, John Peebles, Ke Ye, Mark Lee, Nan Du, Qibin Chen, Quentin Keunebroek , et al. (130 additional authors not shown)

    Abstract: We present foundation language models developed to power Apple Intelligence features, including a ~3 billion parameter model designed to run efficiently on devices and a large server-based language model designed for Private Cloud Compute. These models are designed to perform a wide range of tasks efficiently, accurately, and responsibly. This report describes the model architecture, the data used… ▽ More

    Submitted 29 July, 2024; originally announced July 2024.

  5. From A-to-Z Review of Clustering Validation Indices

    Authors: Bryar A. Hassan, Noor Bahjat Tayfor, Alla A. Hassan, Aram M. Ahmed, Tarik A. Rashid, Naz N. Abdalla

    Abstract: Data clustering involves identifying latent similarities within a dataset and organizing them into clusters or groups. The outcomes of various clustering algorithms differ as they are susceptible to the intrinsic characteristics of the original dataset, including noise and dimensionality. The effectiveness of such clustering procedures directly impacts the homogeneity of clusters, underscoring the… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  6. Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption

    Authors: Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed. Rashid, Bryar Ahmad Hassan

    Abstract: Nowadays, cybersecurity has grown into a more significant and difficult scientific issue. The recog-nition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guarantees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Encrypt has grown into an an-sw… ▽ More

    Submitted 26 July, 2024; v1 submitted 23 July, 2024; originally announced July 2024.

  7. Modified Bat Algorithm: A Newly Proposed Approach for Solving Complex and Real-World Problems

    Authors: Shahla U. Umar, Tarik A. Rashid, Aram M. Ahmed, Bryar A. Hassan, Mohammed Rashad Baker

    Abstract: Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of bats, which acts as a signal system to estimate the distance and hunt prey. Although the BA has proven effective for various optimization problems, it exhibits limited exploration abi… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  8. Modified-Improved Fitness Dependent Optimizer for Complex and Engineering Problems

    Authors: Hozan K. Hamarashid, Bryar A. Hassan, Tarik A. Rashid

    Abstract: Fitness dependent optimizer (FDO) is considered one of the novel swarm intelligent algorithms. Recently, FDO has been enhanced several times to improve its capability. One of the improvements is called improved FDO (IFDO). However, according to the research findings, the variants of FDO are constrained by two primary limitations that have been identified. Firstly, if the number of agents employed… ▽ More

    Submitted 27 June, 2024; originally announced July 2024.

  9. arXiv:2407.08754  [pdf

    cs.NE

    Unraveling the Versatility and Impact of Multi-Objective Optimization: Algorithms, Applications, and Trends for Solving Complex Real-World Problems

    Authors: Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih

    Abstract: Multi-Objective Optimization (MOO) techniques have become increasingly popular in recent years due to their potential for solving real-world problems in various fields, such as logistics, finance, environmental management, and engineering. These techniques offer comprehensive solutions that traditional single-objective approaches fail to provide. Due to the many innovative algorithms, it has been… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 21 pages

  10. arXiv:2407.06219  [pdf

    cs.NE

    In Search of Excellence: SHOA as a Competitive Shrike Optimization Algorithm for Multimodal Problems

    Authors: Hanan K. AbdulKarim, Tarik A. Rashid

    Abstract: In this paper, a swarm intelligence optimization algorithm is proposed as the Shrike Optimization Algorithm (SHOA). Many creatures living in a group and surviving for the next generation randomly search for food; they follow the best one in the swarm, called swarm intelligence. Swarm-based algorithms are designed to mimic creatures' behaviours, but in multimodal problem competition, they cannot fi… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: 25 pages

  11. arXiv:2407.05710  [pdf, ps, other

    cs.SE

    Saltzer & Schroeder for 2030: Security engineering principles in a world of AI

    Authors: Nikhil Patnaik, Joseph Hallett, Awais Rashid

    Abstract: Writing secure code is challenging and so it is expected that, following the release of code-generative AI tools, such as ChatGPT and GitHub Copilot, developers will use these tools to perform security tasks and use security APIs. However, is the code generated by ChatGPT secure? How would the everyday software or security engineer be able to tell? As we approach the next decade we expect a grea… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

    Journal ref: FSE - 2030 Software Engineering

  12. arXiv:2407.03951  [pdf, other

    cs.LG

    Uncertainty-Guided Optimization on Large Language Model Search Trees

    Authors: Julia Grosse, Ruotian Wu, Ahmad Rashid, Philipp Hennig, Pascal Poupart, Agustinus Kristiadi

    Abstract: Beam search is a standard tree search algorithm when it comes to finding sequences of maximum likelihood, for example, in the decoding processes of large language models. However, it is myopic since it does not take the whole path from the root to a leaf into account. Moreover, it is agnostic to prior knowledge available about the process: For example, it does not consider that the objective being… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: 10 pages

  13. arXiv:2407.03369  [pdf

    cs.NE

    FOXANN: A Method for Boosting Neural Network Performance

    Authors: Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal

    Abstract: Artificial neural networks play a crucial role in machine learning and there is a need to improve their performance. This paper presents FOXANN, a novel classification model that combines the recently developed Fox optimizer with ANN to solve ML problems. Fox optimizer replaces the backpropagation algorithm in ANN; optimizes synaptic weights; and achieves high classification accuracy with a minimu… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 12 pages

  14. arXiv:2407.03324  [pdf

    cs.NE

    CLPB: Chaotic Learner Performance Based Behaviour

    Authors: Dona A. Franci, Tarik A. Rashid

    Abstract: This paper presents an enhanced version of the Learner Performance-based Behavior (LPB), a novel metaheuristic algorithm inspired by the process of accepting high-school students into various departments at the university. The performance of the LPB is not according to the required level. This paper aims to improve the performance of a single objective LPB by embedding ten chaotic maps within LPB… ▽ More

    Submitted 25 April, 2024; originally announced July 2024.

    Comments: 6 pages

  15. arXiv:2406.16965  [pdf, other

    cs.LG cs.AI cs.CY

    Present and Future of AI in Renewable Energy Domain : A Comprehensive Survey

    Authors: Abdur Rashid, Parag Biswas, Angona Biswas, MD Abdullah Al Nasim, Kishor Datta Gupta, Roy George

    Abstract: Artificial intelligence (AI) has become a crucial instrument for streamlining processes in various industries, including electrical power systems, as a result of recent digitalization. Algorithms for artificial intelligence are data-driven models that are based on statistical learning theory and are used as a tool to take use of the data that the power system and its users generate. Initially, we… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

  16. arXiv:2406.15732  [pdf, other

    cs.AI

    AI-Driven Approaches for Optimizing Power Consumption: A Comprehensive Survey

    Authors: Parag Biswas, Abdur Rashid, Angona Biswas, Md Abdullah Al Nasim, Kishor Datta Gupta, Roy George

    Abstract: Reduced environmental effect, lower operating costs, and a stable and sustainable energy supply for current and future generations are the main reasons why power optimization is important. Power optimization makes ensuring that energy is used more effectively, cutting down on waste and optimizing the utilization of resources.In today's world, power optimization and artificial intelligence (AI) int… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

  17. arXiv:2406.15210  [pdf, other

    cs.CR

    Assessing Effectiveness of Cyber Essentials Technical Controls

    Authors: Priyanka Badva, Partha Das Chowdhury, Kopo M. Ramokapane, Barnaby Craggs, Awais Rashid

    Abstract: Cyber Essentials (CE) comprise a set of controls designed to protect organisations, irrespective of their size, against cyber attacks. The controls are firewalls, secure configuration, user access control, malware protection & security update management. In this work, we explore the extent to which CE remains robust against an ever-evolving threat landscape. To that end, we reconstruct 45 breaches… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: We have submitted this paper in ACM Digital Threats: Research and Practice (DTRAP) Journal. The paper is currently in the review process

  18. arXiv:2406.07780  [pdf, other

    cs.LG cs.CL

    A Critical Look At Tokenwise Reward-Guided Text Generation

    Authors: Ahmad Rashid, Ruotian Wu, Julia Grosse, Agustinus Kristiadi, Pascal Poupart

    Abstract: Large language models (LLMs) can significantly be improved by aligning to human preferences -- the so-called reinforcement learning from human feedback (RLHF). However, the cost of fine-tuning an LLM is prohibitive for many users. Due to their ability to bypass LLM finetuning, tokenwise reward-guided text generation (RGTG) methods have recently been proposed. They use a reward model trained on ful… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  19. arXiv:2406.03322  [pdf, other

    cs.CR

    A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security

    Authors: Lata Nautiyal, Awais Rashid

    Abstract: A cyber security organisation needs to ensure that its workforce possesses the necessary knowledge to fulfil its cyber security business functions. Similarly, where an organisation chooses to delegate their cyber security tasks to a third party provider, they must ensure that the chosen entity possesses robust knowledge capabilities to effectively carry out the assigned tasks. Building a comprehen… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  20. arXiv:2405.18435  [pdf, other

    eess.IV cs.CV

    QUBIQ: Uncertainty Quantification for Biomedical Image Segmentation Challenge

    Authors: Hongwei Bran Li, Fernando Navarro, Ivan Ezhov, Amirhossein Bayat, Dhritiman Das, Florian Kofler, Suprosanna Shit, Diana Waldmannstetter, Johannes C. Paetzold, Xiaobin Hu, Benedikt Wiestler, Lucas Zimmer, Tamaz Amiranashvili, Chinmay Prabhakar, Christoph Berger, Jonas Weidner, Michelle Alonso-Basant, Arif Rashid, Ujjwal Baid, Wesam Adel, Deniz Ali, Bhakti Baheti, Yingbin Bai, Ishaan Bhatt, Sabri Can Cetindag , et al. (55 additional authors not shown)

    Abstract: Uncertainty in medical image segmentation tasks, especially inter-rater variability, arising from differences in interpretations and annotations by various experts, presents a significant challenge in achieving consistent and reliable image segmentation. This variability not only reflects the inherent complexity and subjective nature of medical image interpretation but also directly impacts the de… ▽ More

    Submitted 24 June, 2024; v1 submitted 19 March, 2024; originally announced May 2024.

    Comments: initial technical report

  21. arXiv:2405.09787  [pdf, other

    eess.IV cs.CV cs.LG

    Analysis of the BraTS 2023 Intracranial Meningioma Segmentation Challenge

    Authors: Dominic LaBella, Ujjwal Baid, Omaditya Khanna, Shan McBurney-Lin, Ryan McLean, Pierre Nedelec, Arif Rashid, Nourel Hoda Tahon, Talissa Altes, Radhika Bhalerao, Yaseen Dhemesh, Devon Godfrey, Fathi Hilal, Scott Floyd, Anastasia Janas, Anahita Fathi Kazerooni, John Kirkpatrick, Collin Kent, Florian Kofler, Kevin Leu, Nazanin Maleki, Bjoern Menze, Maxence Pajot, Zachary J. Reitman, Jeffrey D. Rudie , et al. (96 additional authors not shown)

    Abstract: We describe the design and results from the BraTS 2023 Intracranial Meningioma Segmentation Challenge. The BraTS Meningioma Challenge differed from prior BraTS Glioma challenges in that it focused on meningiomas, which are typically benign extra-axial tumors with diverse radiologic and anatomical presentation and a propensity for multiplicity. Nine participating teams each developed deep-learning… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: 16 pages, 11 tables, 10 figures, MICCAI

  22. arXiv:2405.06371  [pdf, other

    cs.CR cs.SE

    Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

    Authors: Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr, Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl

    Abstract: Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research has demonstrated that AI-generated code can contain security issues, how software professionals balance AI assistant usage and security remains unclear.… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 20 pages, 2 figures, 3 tables

  23. arXiv:2405.02975  [pdf, other

    cond-mat.mes-hall cond-mat.supr-con

    Exploring nonequilibrium Andreev resonances in ultraclean graphene Andreev interferometers

    Authors: Asmaul Smitha Rashid, Le Yi, Takashi Taniguchi, Kenji Watanabe, Nitin Samarth, Régis Mélin, Morteza Kayyalha

    Abstract: We study nonequilibrium Andreev resonances in a voltage-biased graphene three-terminal Josephson junction (JJ). We observe periodic oscillations of resistance with maxima at multiples of the magnetic flux quantum (noninversion regime). As we increase the bias voltage, we further observe a transition point beyond which oscillations exhibit a $π$ phase shift (inversion regime) with maxima of resista… ▽ More

    Submitted 14 May, 2024; v1 submitted 5 May, 2024; originally announced May 2024.

  24. arXiv:2405.01612  [pdf

    cs.SE

    Effective Delegation and Leadership in Software Management

    Authors: Star Dawood Mirkhan, Skala Kamaran Omer, Hussein Mohammed Ali, Mahmood Yashar Hamza, Tarik Ahmed Rashid, Poornima Nedunchezhian

    Abstract: Delegation and leadership are critical components of software management, as they play a crucial role in determining the success of the software development process. This study examined the relationship between delegation and leadership in software management and the impact of these factors on project outcomes. Results showed that effective delegation and transformational leadership styles can imp… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 9 pages

  25. arXiv:2405.01608  [pdf

    cs.SE

    A Comprehensive Study on Automated Testing with the Software Lifecycle

    Authors: Hussein Mohammed Ali, Mahmood Yashar Hamza, Tarik Ahmed Rashid

    Abstract: The software development lifecycle depends heavily on the testing process, which is an essential part of finding issues and reviewing the quality of software. Software testing can be done in two ways: manually and automatically. With an emphasis on its primary function within the software lifecycle, the relevance of testing in general, and the advantages that come with it, this article aims to giv… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 9

  26. arXiv:2405.00006  [pdf

    cs.NE

    Steel Plate Fault Detection using the Fitness Dependent Optimizer and Neural Networks

    Authors: Salar Farahmand-Tabar, Tarik A. Rashid

    Abstract: Detecting faults in steel plates is crucial for ensuring the safety and reliability of the structures and industrial equipment. Early detection of faults can prevent further damage and costly repairs. This chapter aims at diagnosing and predicting the likelihood of steel plates developing faults using experimental text data. Various machine learning methods such as GWO-based and FDO-based MLP and… ▽ More

    Submitted 26 January, 2024; originally announced May 2024.

    Comments: 19 pages

  27. arXiv:2404.08112  [pdf

    cond-mat.mes-hall

    Understanding Disorder in Monolayer Graphene Devices with Gate-Defined Superlattices

    Authors: Vinay Kammarchedu, Derrick Butler, Asmaul Smitha Rashid, Aida Ebrahimi, Morteza Kayyalha

    Abstract: Engineering superlattices (SLs) - which are spatially periodic potential landscapes for electrons - is an emerging approach for the realization of exotic properties, including superconductivity and correlated insulators, in two-dimensional materials. While moiré SL engineering has been a popular approach, nanopatterning is an attractive alternative offering control over the pattern and wavelength… ▽ More

    Submitted 16 August, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

  28. arXiv:2404.02907  [pdf

    cs.NE

    Artificial Cardiac Conduction System: Simulating Heart Function for Advanced Computational Problem Solving

    Authors: Rebaz Mohammed Dler Omer, Nawzad K. Al-Salihi, Tarik A. Rashid, Aso M. Aladdin, Mokhtar Mohammadi, Jafar Majidpour

    Abstract: This work proposes a novel bio-inspired metaheuristic called Artificial Cardiac Conduction System (ACCS) inspired by the human cardiac conduction system. The ACCS algorithm imitates the functional behaviour of the human heart that generates and sends signals to the heart muscle, initiating it to contract. Four nodes in the myocardium layer participate in generating and controlling heart rate, such… ▽ More

    Submitted 18 May, 2024; v1 submitted 12 January, 2024; originally announced April 2024.

    Comments: 28 pages

  29. arXiv:2403.13669  [pdf, other

    cond-mat.mes-hall cond-mat.supr-con

    Ultraclean Andreev interferometers

    Authors: Régis Mélin, Asmaul Smitha Rashid, Morteza Kayyalha

    Abstract: Coupling a two-terminal Josephson junction to the stationary modes of the electromagnetic field produces the so-called Fiske resonances. Here, we propose another mechanism based on the exchange between the static Andreev bound states (ABS) and a nonequilibrium Fermi surface in an ultraclean multiterminal device. As a simple model, we consider an effective $S_a$-$N_{eff}$-$S_b$ double junction conn… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: 20 pages, 6 figures

  30. arXiv:2403.10494  [pdf, other

    cs.RO

    Lifelong LERF: Local 3D Semantic Inventory Monitoring Using FogROS2

    Authors: Adam Rashid, Chung Min Kim, Justin Kerr, Letian Fu, Kush Hari, Ayah Ahmad, Kaiyuan Chen, Huang Huang, Marcus Gualtieri, Michael Wang, Christian Juette, Nan Tian, Liu Ren, Ken Goldberg

    Abstract: Inventory monitoring in homes, factories, and retail stores relies on maintaining data despite objects being swapped, added, removed, or moved. We introduce Lifelong LERF, a method that allows a mobile robot with minimal compute to jointly optimize a dense language and geometric representation of its surroundings. Lifelong LERF maintains this representation over time by detecting semantic changes… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: See project webpage at: https://sites.google.com/berkeley.edu/lifelonglerf/home

  31. arXiv:2403.03828  [pdf

    cs.AI

    From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics

    Authors: Rushit Dave, Marcho Handoko, Ali Rashid, Cole Schoenbauer

    Abstract: In the realm of computer security, the importance of efficient and reliable user authentication methods has become increasingly critical. This paper examines the potential of mouse movement dynamics as a consistent metric for continuous authentication. By analyzing user mouse movement patterns in two contrasting gaming scenarios, "Team Fortress" and Poly Bridge we investigate the distinctive behav… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  32. arXiv:2402.16562  [pdf

    cs.LG cs.AI cs.NE

    Q-FOX Learning: Breaking Tradition in Reinforcement Learning

    Authors: Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid

    Abstract: Reinforcement learning (RL) is a subset of artificial intelligence (AI) where agents learn the best action by interacting with the environment, making it suitable for tasks that do not require labeled data or direct supervision. Hyperparameters (HP) tuning refers to choosing the best parameter that leads to optimal solutions in RL algorithms. Manual or random tuning of the HP may be a crucial proc… ▽ More

    Submitted 29 March, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  33. arXiv:2401.17317  [pdf

    q-bio.NC cs.CV cs.SD eess.AS eess.IV

    Detection of Auditory Brainstem Response Peaks Using Image Processing Techniques in Infants with Normal Hearing Sensitivity

    Authors: Amir Majidpour, Samer Kais Jameel, Jafar Majidpour, Houra Bagheri, Tarik A. Rashid, Ahmadreza Nazeri, Mahshid Moheb Aleaba

    Abstract: Introduction: The auditory brainstem response (ABR) is measured to find the brainstem-level peripheral auditory nerve system integrity in children having normal hearing. The Auditory Evoked Potential (AEP) is generated using acoustic stimuli. Interpreting these waves requires competence to avoid misdiagnosing hearing problems. Automating ABR test labeling with computer vision may reduce human erro… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

  34. arXiv:2401.09467  [pdf

    cs.CV cs.AI eess.IV

    Offline Handwriting Signature Verification: A Transfer Learning and Feature Selection Approach

    Authors: Fatih Ozyurt, Jafar Majidpour, Tarik A. Rashid, Canan Koc

    Abstract: Handwritten signature verification poses a formidable challenge in biometrics and document authenticity. The objective is to ascertain the authenticity of a provided handwritten signature, distinguishing between genuine and forged ones. This issue has many applications in sectors such as finance, legal documentation, and security. Currently, the field of computer vision and machine learning has ma… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: 11 pages

  35. arXiv:2311.03683  [pdf, other

    cs.LG

    Preventing Arbitrarily High Confidence on Far-Away Data in Point-Estimated Discriminative Neural Networks

    Authors: Ahmad Rashid, Serena Hacker, Guojun Zhang, Agustinus Kristiadi, Pascal Poupart

    Abstract: Discriminatively trained, deterministic neural networks are the de facto choice for classification problems. However, even though they achieve state-of-the-art results on in-domain test sets, they tend to be overconfident on out-of-distribution (OOD) data. For instance, ReLU networks - a popular class of neural network architectures - have been shown to almost always yield high confidence predicti… ▽ More

    Submitted 27 March, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

    Comments: Accepted at AISTATS 2024

  36. arXiv:2310.12155  [pdf

    cs.NE

    Balancing exploration and exploitation phases in whale optimization algorithm: an insightful and empirical analysis

    Authors: Aram M. Ahmed, Tarik A. Rashid, Bryar A. Hassan, Jaffer Majidpour, Kaniaw A. Noori, Chnoor Maheadeen Rahman, Mohmad Hussein Abdalla, Shko M. Qader, Noor Tayfor, Naufel B Mohammed

    Abstract: Agents of any metaheuristic algorithms are moving in two modes, namely exploration and exploitation. Obtaining robust results in any algorithm is strongly dependent on how to balance between these two modes. Whale optimization algorithm as a robust and well recognized metaheuristic algorithm in the literature, has proposed a novel scheme to achieve this balance. It has also shown superior results… ▽ More

    Submitted 3 September, 2023; originally announced October 2023.

    Comments: 11 pages

  37. arXiv:2310.09730  [pdf, other

    cond-mat.str-el

    Effect of next-nearest neighbor hopping on the single-particle excitations

    Authors: Harun Al Rashid, Dheeraj Kumar Singh

    Abstract: In the half-filled one-orbital Hubbard model on a square lattice, we study the effect of next-nearest neighbor hopping on the single-particle spectral function at finite temperature using an exact-diagonalization + Monte-Carlo based approach to the simulation process. We find that the pseudogap-like dip, existing in the density of states in between the Néel temperature $T_N$ and a relatively highe… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

    Comments: 7 pages, 7 figures

  38. arXiv:2310.07723  [pdf

    cs.NE

    Equitable and Fair Performance Evaluation of Whale Optimization Algorithm

    Authors: Bryar A. Hassan, Tarik A. Rashid, Aram Ahmed, Shko M. Qader, Jaffer Majidpour, Mohmad Hussein Abdalla, Noor Tayfor, Hozan K. Hamarashid, Haval Sidqi, Kaniaw A. Noori

    Abstract: It is essential that all algorithms are exhaustively, somewhat, and intelligently evaluated. Nonetheless, evaluating the effectiveness of optimization algorithms equitably and fairly is not an easy process for various reasons. Choosing and initializing essential parameters, such as the size issues of the search area for each method and the number of iterations required to reduce the issues, might… ▽ More

    Submitted 4 September, 2023; originally announced October 2023.

    Comments: 21 pages

    Journal ref: 2023

  39. arXiv:2310.02945  [pdf, other

    eess.SY

    Proximal Policy Optimization-Based Reinforcement Learning Approach for DC-DC Boost Converter Control: A Comparative Evaluation Against Traditional Control Techniques

    Authors: Utsab Saha, Shakib Shahria, A. B. M Harun-Ur Rashid

    Abstract: This article presents a proximal policy optimization (PPO) based reinforcement learning (RL) approach for DC-DC boost converter control, which is compared to traditional control methods. The performance of the PPO algorithm is evaluated using MATLAB Simulink co-simulation, and the results demonstrate that the most efficient approach for achieving short settling time and stability is to combine the… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  40. arXiv:2309.12663  [pdf, other

    hep-th math-ph quant-ph

    Quantization of Length in Spaces with Position-Dependent Noncommutativity

    Authors: Jishnu Aryampilly, Muthukumar Balasundaram, Aamir Rashid

    Abstract: We present a novel approach to quantizing the length in noncommutative spaces with positional-dependent noncommutativity. The method involves constructing ladder operators that change the length not only along a plane but also along the third direction due to a noncommutative parameter that is a combination of canonical/Weyl-Moyal type and Lie algebraic type. The primary quantization of length in… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

    Comments: 14 pages, 1 figure

  41. arXiv:2309.07970  [pdf, other

    cs.RO cs.CV

    Language Embedded Radiance Fields for Zero-Shot Task-Oriented Grasping

    Authors: Adam Rashid, Satvik Sharma, Chung Min Kim, Justin Kerr, Lawrence Chen, Angjoo Kanazawa, Ken Goldberg

    Abstract: Grasping objects by a specific part is often crucial for safety and for executing downstream tasks. Yet, learning-based grasp planners lack this behavior unless they are trained on specific object part data, making it a significant challenge to scale object diversity. Instead, we propose LERF-TOGO, Language Embedded Radiance Fields for Task-Oriented Grasping of Objects, which uses vision-language… ▽ More

    Submitted 18 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: See the project website at: lerftogo.github.io

  42. arXiv:2309.03444  [pdf

    cond-mat.mes-hall cond-mat.str-el

    Quantized Hall conductance in graphene by nonperturbative magnetic-field-containing relativistic tight-binding approximation method

    Authors: Md. Abdur Rashid, Masahiko Higuchi, Katsuhiko Higuch

    Abstract: In this study, we conducted a numerical investigation on the Hall conductance ($σ_{Hall}$) of graphene based on the magnetic energy band structure calculated using a nonperturbative magnetic-field-containing relativistic tight-binding approximation (MFRTB) method. The nonperturbative MFRTB can revisit two types of plateaus for the dependence of $σ_{Hall}$ on Fermi energy. One set is characterized… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Journal ref: Physical Review B 108, 125132 2023

  43. Multi-Transfer Learning Techniques for Detecting Auditory Brainstem Response

    Authors: Fatih Ozyurt, Jafar Majidpour, Tarik A. Rashid, Amir Majidpour, Canan Koc

    Abstract: The assessment of the well-being of the peripheral auditory nerve system in individuals experiencing hearing impairment is conducted through auditory brainstem response (ABR) testing. Audiologists assess and document the results of the ABR test. They interpret the findings and assign labels to them using reference-based markers like peak latency, waveform morphology, amplitude, and other relevant… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    Comments: 19

    Journal ref: Applied Acoustics, 2023

  44. Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy

    Authors: Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid

    Abstract: Smartphone manufacturer provided default features (e.g., default location services, iCloud, Google Assistant, ad tracking) enhance the usability and extend the functionality of these devices. Prior studies have highlighted smartphone vulnerabilities and how users' data can be harvested without their knowledge. However, little is known about manufacturer provided default features in this regard --… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 19 pages, 3 figures, Proceedings on Privacy Enhancing Technologies (PoPETS)

    ACM Class: J.4

  45. arXiv:2308.13326  [pdf, other

    cs.HC

    ExD: Explainable Deletion

    Authors: Kopo M. Ramokapane, Awais Rashid

    Abstract: This paper focuses on a critical yet often overlooked aspect of data in digital systems and services-deletion. Through a review of existing literature we highlight the challenges that user face when attempting to delete data from systems and services, the lack of transparency in how such requests are handled or processed and the lack of clear assurance that the data has been deleted. We highlight… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 16 pages, 3 figures, New Security Paradigms Workshop

    ACM Class: H.1.2; H.5

  46. arXiv:2308.01270  [pdf

    cs.NE

    BCDDO: Binary Child Drawing Development Optimization

    Authors: Abubakr S. Issa, Yossra H. Ali, Tarik A. Rashid

    Abstract: A lately created metaheuristic algorithm called Child Drawing Development Optimization (CDDO) has proven to be effective in a number of benchmark tests. A Binary Child Drawing Development Optimization (BCDDO) is suggested for choosing the wrapper features in this study. To achieve the best classification accuracy, a subset of crucial features is selected using the suggested BCDDO. The proposed fea… ▽ More

    Submitted 11 April, 2024; v1 submitted 19 July, 2023; originally announced August 2023.

    Comments: 13 pages

  47. arXiv:2308.01269  [pdf

    cs.NE

    VAPI: Vectorization of Algorithm for Performance Improvement

    Authors: Mahmood Yashar, Tarik A. Rashid

    Abstract: This study presents the vectorization of metaheuristic algorithms as the first stage of vectorized optimization implementation. Vectorization is a technique for converting an algorithm, which operates on a single value at a time to one that operates on a collection of values at a time to execute rapidly. The vectorization technique also operates by replacing multiple iterations into a single opera… ▽ More

    Submitted 21 August, 2023; v1 submitted 19 July, 2023; originally announced August 2023.

    Comments: 18 pages

  48. arXiv:2308.01268  [pdf

    cs.NE

    Current Studies and Applications of Krill Herd and Gravitational Search Algorithms in Healthcare

    Authors: Rebwar Khalid Hamad, Tarik A. Rashid

    Abstract: Nature-Inspired Computing or NIC for short is a relatively young field that tries to discover fresh methods of computing by researching how natural phenomena function to find solutions to complicated issues in many contexts. As a consequence of this, ground-breaking research has been conducted in a variety of domains, including synthetic immune functions, neural networks, the intelligence of swarm… ▽ More

    Submitted 17 July, 2023; originally announced August 2023.

    Comments: 35 pages

  49. arXiv:2308.00004  [pdf, other

    cs.CR

    Towards Equitable Privacy

    Authors: Kopo M. Ramokapane, Lizzie Coles-Kemp, Nikhil Patnaik, Rui Huan, Nirav Ajmeri, Genevieve Liveley, Awais Rashid

    Abstract: Ensuring equitable privacy experiences remains a challenge, especially for marginalised and vulnerable populations (MVPs) who often hesitate to participate or use digital services due to concerns about the privacy of their sensitive information. In response, security research has emphasised the importance of inclusive security and privacy practices to facilitate meaningful engagement of MVPs onlin… ▽ More

    Submitted 28 July, 2023; originally announced August 2023.

    Comments: 4 Pages, SOUPS Workshop on Inclusive Privacy and Security (WIPS)

    ACM Class: K.4; H.4

  50. arXiv:2307.10420  [pdf

    cs.AI

    GOOSE Algorithm: A Powerful Optimization Tool for Real-World Engineering Challenges and Beyond

    Authors: Rebwar Khalid Hamad, Tarik A. Rashid

    Abstract: This study proposes the GOOSE algorithm as a novel metaheuristic algorithm based on the goose's behavior during rest and foraging. The goose stands on one leg and keeps his balance to guard and protect other individuals in the flock. The GOOSE algorithm is benchmarked on 19 well-known benchmark test functions, and the results are verified by a comparative study with genetic algorithm (GA), particl… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.