Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 163 results for author: Hassan, A

Searching in archive cs. Search in all archives.
.
  1. From A-to-Z Review of Clustering Validation Indices

    Authors: Bryar A. Hassan, Noor Bahjat Tayfor, Alla A. Hassan, Aram M. Ahmed, Tarik A. Rashid, Naz N. Abdalla

    Abstract: Data clustering involves identifying latent similarities within a dataset and organizing them into clusters or groups. The outcomes of various clustering algorithms differ as they are susceptible to the intrinsic characteristics of the original dataset, including noise and dimensionality. The effectiveness of such clustering procedures directly impacts the homogeneity of clusters, underscoring the… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2407.18918  [pdf

    cs.HC

    Review on the Role of Virtual Reality in Reducing Mental Health Diseases Specifically Stress, Anxiety, and Depression

    Authors: Sadia Saeed, Khan Bahadar Khan, Muhammad Abul Hassan, Abdul Qayyum, Saba Salahuddin

    Abstract: Objective: Virtual Reality (VR) is a technological interface that allows users to interact with a simulated environment. VR has been used extensively for mental health and clinical research. Mental health disorders are globally burdening health problems in the world. According to the Psychological Interventions Implementation Manual published by WHO on 6th March 2024, around one in eight people in… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

    Comments: 12 pages, 3 figures, 2 tables

    ACM Class: F.2.2; I.2.7

  3. arXiv:2407.17880  [pdf, other

    cs.LG

    DAM: Towards A Foundation Model for Time Series Forecasting

    Authors: Luke Darlow, Qiwen Deng, Ahmed Hassan, Martin Asenov, Rajkarn Singh, Artjom Joosen, Adam Barker, Amos Storkey

    Abstract: It is challenging to scale time series forecasting models such that they forecast accurately for multiple distinct domains and datasets, all with potentially different underlying collection procedures (e.g., sample resolution), patterns (e.g., periodicity), and prediction requirements (e.g., reconstruction vs. forecasting). We call this general task universal forecasting. Existing methods usually… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

  4. Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption

    Authors: Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed. Rashid, Bryar Ahmad Hassan

    Abstract: Nowadays, cybersecurity has grown into a more significant and difficult scientific issue. The recog-nition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guarantees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Encrypt has grown into an an-sw… ▽ More

    Submitted 26 July, 2024; v1 submitted 23 July, 2024; originally announced July 2024.

  5. Modified Bat Algorithm: A Newly Proposed Approach for Solving Complex and Real-World Problems

    Authors: Shahla U. Umar, Tarik A. Rashid, Aram M. Ahmed, Bryar A. Hassan, Mohammed Rashad Baker

    Abstract: Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of bats, which acts as a signal system to estimate the distance and hunt prey. Although the BA has proven effective for various optimization problems, it exhibits limited exploration abi… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  6. Modified-Improved Fitness Dependent Optimizer for Complex and Engineering Problems

    Authors: Hozan K. Hamarashid, Bryar A. Hassan, Tarik A. Rashid

    Abstract: Fitness dependent optimizer (FDO) is considered one of the novel swarm intelligent algorithms. Recently, FDO has been enhanced several times to improve its capability. One of the improvements is called improved FDO (IFDO). However, according to the research findings, the variants of FDO are constrained by two primary limitations that have been identified. Firstly, if the number of agents employed… ▽ More

    Submitted 27 June, 2024; originally announced July 2024.

  7. arXiv:2407.04542  [pdf, other

    cs.NI cs.CV cs.LG eess.IV

    Rethinking Image Compression on the Web with Generative AI

    Authors: Shayan Ali Hassan, Danish Humair, Ihsan Ayyub Qazi, Zafar Ayyub Qazi

    Abstract: The rapid growth of the Internet, driven by social media, web browsing, and video streaming, has made images central to the Web experience, resulting in significant data transfer and increased webpage sizes. Traditional image compression methods, while reducing bandwidth, often degrade image quality. This paper explores a novel approach using generative AI to reconstruct images at the edge or clie… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  8. arXiv:2407.04065  [pdf, other

    cs.SE cs.LG

    On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards

    Authors: Zhimin Zhao, Abdul Ali Bangash, Filipe Roseiro Côgo, Bram Adams, Ahmed E. Hassan

    Abstract: Foundation models (FM), such as large language models (LLMs), which are large-scale machine learning (ML) models, have demonstrated remarkable adaptability in various downstream software engineering (SE) tasks, such as code completion, code understanding, and software development. As a result, FM leaderboards, especially those hosted on cloud platforms, have become essential tools for SE teams to… ▽ More

    Submitted 12 July, 2024; v1 submitted 4 July, 2024; originally announced July 2024.

    Comments: awesome foundation model leaderboard list: https://github.com/SAILResearch/awesome-foundation-model-leaderboards

  9. arXiv:2406.09437  [pdf

    cs.CV cs.CY

    Advancing Roadway Sign Detection with YOLO Models and Transfer Learning

    Authors: Selvia Nafaa, Hafsa Essam, Karim Ashour, Doaa Emad, Rana Mohamed, Mohammed Elhenawy, Huthaifa I. Ashqar, Abdallah A. Hassan, Taqwa I. Alhadidi

    Abstract: Roadway signs detection and recognition is an essential element in the Advanced Driving Assistant Systems (ADAS). Several artificial intelligence methods have been used widely among of them YOLOv5 and YOLOv8. In this paper, we used a modified YOLOv5 and YOLOv8 to detect and classify different roadway signs under different illumination conditions. Experimental results indicated that for the YOLOv8… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  10. arXiv:2406.07674  [pdf

    cs.CV cs.CY

    Automated Pavement Cracks Detection and Classification Using Deep Learning

    Authors: Selvia Nafaa, Hafsa Essam, Karim Ashour, Doaa Emad, Rana Mohamed, Mohammed Elhenawy, Huthaifa I. Ashqar, Abdallah A. Hassan, Taqwa I. Alhadidi

    Abstract: Monitoring asset conditions is a crucial factor in building efficient transportation asset management. Because of substantial advances in image processing, traditional manual classification has been largely replaced by semi-automatic/automatic techniques. As a result, automated asset detection and classification techniques are required. This paper proposes a methodology to detect and classify road… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  11. arXiv:2405.13852  [pdf, other

    cs.SE

    Predicting long time contributors with knowledge units of programming languages: an empirical study

    Authors: Md Ahasanuzzaman, Gustavo A. Oliva, Ahmed E. Hassan

    Abstract: Predicting potential long-time contributors (LTCs) early allows project maintainers to effectively allocate resources and mentoring to enhance their development and retention. Mapping programming language expertise to developers and characterizing projects in terms of how they use programming languages can help identify developers who are more likely to become LTCs. However, prior studies on predi… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  12. arXiv:2405.07827  [pdf, other

    cs.MM cs.AI cs.CV

    Automatic Recognition of Food Ingestion Environment from the AIM-2 Wearable Sensor

    Authors: Yuning Huang, Mohamed Abul Hassan, Jiangpeng He, Janine Higgins, Megan McCrory, Heather Eicher-Miller, Graham Thomas, Edward O Sazonov, Fengqing Maggie Zhu

    Abstract: Detecting an ingestion environment is an important aspect of monitoring dietary intake. It provides insightful information for dietary assessment. However, it is a challenging problem where human-based reviewing can be tedious, and algorithm-based review suffers from data imbalance and perceptual aliasing problems. To address these issues, we propose a neural network-based method with a two-stage… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: Accepted at CVPRw 2024

  13. arXiv:2405.00796  [pdf, other

    cs.SE

    Does Using Bazel Help Speed Up Continuous Integration Builds?

    Authors: Shenyu Zheng, Bram Adams, Ahmed E. Hassan

    Abstract: A long continuous integration (CI) build forces developers to wait for CI feedback before starting subsequent development activities, leading to time wasted. In addition to a variety of build scheduling and test selection heuristics studied in the past, new artifact-based build technologies like Bazel have built-in support for advanced performance optimizations such as parallel build and increment… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  14. arXiv:2404.19048  [pdf, other

    cs.CL cs.AI

    A Framework for Real-time Safeguarding the Text Generation of Large Language Model

    Authors: Ximing Dong, Dayi Lin, Shaowei Wang, Ahmed E. Hassan

    Abstract: Large Language Models (LLMs) have significantly advanced natural language processing (NLP) tasks but also pose ethical and societal risks due to their propensity to generate harmful content. To address this, various approaches have been developed to safeguard LLMs from producing unsafe content. However, existing methods have limitations, including the need for training specific control models and… ▽ More

    Submitted 1 May, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

  15. arXiv:2404.10225  [pdf

    cs.SE cs.AI

    Rethinking Software Engineering in the Foundation Model Era: From Task-Driven AI Copilots to Goal-Driven AI Pair Programmers

    Authors: Ahmed E. Hassan, Gustavo A. Oliva, Dayi Lin, Boyuan Chen, Zhen Ming, Jiang

    Abstract: The advent of Foundation Models (FMs) and AI-powered copilots has transformed the landscape of software development, offering unprecedented code completion capabilities and enhancing developer productivity. However, the current task-driven nature of these copilots falls short in addressing the broader goals and complexities inherent in software engineering (SE). In this paper, we propose a paradig… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  16. arXiv:2403.18958  [pdf, other

    cs.SE cs.AI

    A State-of-the-practice Release-readiness Checklist for Generative AI-based Software Products

    Authors: Harsh Patel, Dominique Boucher, Emad Fallahzadeh, Ahmed E. Hassan, Bram Adams

    Abstract: This paper investigates the complexities of integrating Large Language Models (LLMs) into software products, with a focus on the challenges encountered for determining their readiness for release. Our systematic review of grey literature identifies common challenges in deploying LLMs, ranging from pre-training and fine-tuning to user experience considerations. The study introduces a comprehensive… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  17. arXiv:2403.17154  [pdf, other

    cs.SE

    On the Impact of Black-box Deployment Strategies for Edge AI on Latency and Model Performance

    Authors: Jaskirat Singh, Bram Adams, Ahmed E. Hassan

    Abstract: Deciding what combination of operators to use across the Edge AI tiers to achieve specific latency and model performance requirements is an open question for MLOps engineers. This study aims to empirically assess the accuracy vs inference time trade-off of different black-box Edge AI deployment strategies, i.e., combinations of deployment operators and deployment tiers. In this paper, we conduct i… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  18. arXiv:2403.14120  [pdf, other

    cs.LG cs.AI eess.SP

    Advancing IIoT with Over-the-Air Federated Learning: The Role of Iterative Magnitude Pruning

    Authors: Fazal Muhammad Ali Khan, Hatem Abou-Zeid, Aryan Kaushik, Syed Ali Hassan

    Abstract: The industrial Internet of Things (IIoT) under Industry 4.0 heralds an era of interconnected smart devices where data-driven insights and machine learning (ML) fuse to revolutionize manufacturing. A noteworthy development in IIoT is the integration of federated learning (FL), which addresses data privacy and security among devices. FL enables edge sensors, also known as peripheral intelligence uni… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: 6 pages, 6 figures

  19. arXiv:2403.10468  [pdf, other

    cs.SE

    An Empirical Study on Developers Shared Conversations with ChatGPT in GitHub Pull Requests and Issues

    Authors: Huizi Hao, Kazi Amit Hasan, Hong Qin, Marcos Macedo, Yuan Tian, Steven H. H. Ding, Ahmed E. Hassan

    Abstract: ChatGPT has significantly impacted software development practices, providing substantial assistance to developers in a variety of tasks, including coding, testing, and debugging. Despite its widespread adoption, the impact of ChatGPT as an assistant in collaborative coding remains largely unexplored. In this paper, we analyze a dataset of 210 and 370 developers shared conversations with ChatGPT in… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  20. arXiv:2403.09012  [pdf, other

    cs.SE

    Leveraging the Crowd for Dependency Management: An Empirical Study on the Dependabot Compatibility Score

    Authors: Benjamin Rombaut, Filipe R. Cogo, Ahmed E. Hassan

    Abstract: Dependabot, a popular dependency management tool, includes a compatibility score feature that helps client packages assess the risk of accepting a dependency update by leveraging knowledge from "the crowd". For each dependency update, Dependabot calculates this compatibility score as the proportion of successful updates performed by other client packages that use the same provider package as a dep… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  21. An Empirical Study of Challenges in Machine Learning Asset Management

    Authors: Zhimin Zhao, Yihao Chen, Abdul Ali Bangash, Bram Adams, Ahmed E. Hassan

    Abstract: In machine learning (ML), efficient asset management, including ML models, datasets, algorithms, and tools, is vital for resource optimization, consistent performance, and a streamlined development lifecycle. This enables quicker iterations, adaptability, reduced development-to-deployment time, and reliable outputs. Despite existing research, a significant knowledge gap remains in operational chal… ▽ More

    Submitted 28 February, 2024; v1 submitted 25 February, 2024; originally announced February 2024.

    Journal ref: Empirical Software Engineering 2024

  22. arXiv:2402.15943  [pdf

    cs.SE cs.AI

    Rethinking Software Engineering in the Foundation Model Era: A Curated Catalogue of Challenges in the Development of Trustworthy FMware

    Authors: Ahmed E. Hassan, Dayi Lin, Gopi Krishnan Rajbahadur, Keheliya Gallaba, Filipe R. Cogo, Boyuan Chen, Haoxiang Zhang, Kishanthan Thangarajah, Gustavo Ansaldi Oliva, Jiahuei Lin, Wali Mohammad Abdullah, Zhen Ming Jiang

    Abstract: Foundation models (FMs), such as Large Language Models (LLMs), have revolutionized software development by enabling new use cases and business models. We refer to software built using FMs as FMware. The unique properties of FMware (e.g., prompts, agents, and the need for orchestration), coupled with the intrinsic limitations of FMs (e.g., hallucination) lead to a completely new set of software eng… ▽ More

    Submitted 3 March, 2024; v1 submitted 24 February, 2024; originally announced February 2024.

  23. arXiv:2401.14420  [pdf, other

    cs.CR

    A Novel Blockchain Based Information Management Framework for Web 3.0

    Authors: Md Arif Hassan, Cong T. Nguyen, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz

    Abstract: Web 3.0 is the third generation of the World Wide Web (WWW), concentrating on the critical concepts of decentralization, availability, and increasing client usability. Although Web 3.0 is undoubtedly an essential component of the future Internet, it currently faces critical challenges, including decentralized data collection and management. To overcome these challenges, blockchain has emerged as o… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  24. arXiv:2401.10901  [pdf, other

    cs.CY

    Enabling Technologies for Web 3.0: A Comprehensive Survey

    Authors: Md Arif Hassan, Mohammad Behdad Jamshidi, Bui Duc Manh, Nam H. Chu, Chi-Hieu Nguyen, Nguyen Quang Hieu, Cong T. Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Nguyen Van Huynh, Mohammad Abu Alsheikh, Eryk Dutkiewicz

    Abstract: Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web… ▽ More

    Submitted 29 December, 2023; originally announced January 2024.

  25. arXiv:2312.15350  [pdf, other

    cs.CR cs.SE

    Why Not Mitigate Vulnerabilities in Helm Charts?

    Authors: Yihao Chen, Jiahuei Lin, Bram Adams, Ahmed E. Hassan

    Abstract: [Context]: Containerization ensures the resilience of distributed applications by Kubernetes. Helm is a package manager for Kubernetes applications. A Helm package, namely "Chart'', is a set of pre-configured resources that one could quickly deploy a complex application. However, Helm broadens the attack surface of the distributed applications. [Objective]: This study aims to investigate the pre… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

  26. arXiv:2312.12604  [pdf

    cs.SE cs.LG

    An empirical study of testing machine learning in the wild

    Authors: Moses Openja, Foutse Khomh, Armstrong Foundjem, Zhen Ming, Jiang, Mouna Abidi, Ahmed E. Hassan

    Abstract: Recently, machine and deep learning (ML/DL) algorithms have been increasingly adopted in many software systems. Due to their inductive nature, ensuring the quality of these systems remains a significant challenge for the research community. Unlike traditional software built deductively by writing explicit rules, ML/DL systems infer rules from training data. Recent research in ML/DL quality assuran… ▽ More

    Submitted 13 July, 2024; v1 submitted 19 December, 2023; originally announced December 2023.

    Comments: Accepted paper at TOSEM journal

  27. arXiv:2312.10127  [pdf, other

    cs.PF cs.DC cs.LG

    How Does It Function? Characterizing Long-term Trends in Production Serverless Workloads

    Authors: Artjom Joosen, Ahmed Hassan, Martin Asenov, Rajkarn Singh, Luke Darlow, Jianfeng Wang, Adam Barker

    Abstract: This paper releases and analyzes two new Huawei cloud serverless traces. The traces span a period of over 7 months with over 1.4 trillion function invocations combined. The first trace is derived from Huawei's internal workloads and contains detailed per-second statistics for 200 functions running across multiple Huawei cloud data centers. The second trace is a representative workload from Huawei'… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    ACM Class: D.4.7; I.5.1; C.4

    Journal ref: SoCC '23: Proceedings of the 2023 ACM Symposium on Cloud Computing, October 2023, Pages 443-458

  28. Scheduling and Communication Schemes for Decentralized Federated Learning

    Authors: Bahaa-Eldin Ali Abdelghany, Ana Fernández-Vilas, Manuel Fernández-Veiga, Nashwa El-Bendary, Ammar M. Hassan, Walid M. Abdelmoez

    Abstract: Federated learning (FL) is a distributed machine learning paradigm in which a large number of clients coordinate with a central server to learn a model without sharing their own training data. One central server is not enough, due to problems of connectivity with clients. In this paper, a decentralized federated learning (DFL) model with the stochastic gradient descent (SGD) algorithm has been int… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

    Comments: 32nd International Conference on Computer Theory and Applications (ICCTA), Alexandria, Egypt, 2022

  29. arXiv:2311.14699  [pdf

    cs.CL cs.AI

    Ontology Learning Using Formal Concept Analysis and WordNet

    Authors: Bryar A. Hassan

    Abstract: Manual ontology construction takes time, resources, and domain specialists. Supporting a component of this process for automation or semi-automation would be good. This project and dissertation provide a Formal Concept Analysis and WordNet framework for learning concept hierarchies from free texts. The process has steps. First, the document is Part-Of-Speech labeled, then parsed to produce sentenc… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

  30. arXiv:2311.12179  [pdf, other

    cs.CL

    Leveraging Closed-Access Multilingual Embedding for Automatic Sentence Alignment in Low Resource Languages

    Authors: Idris Abdulmumin, Auwal Abubakar Khalid, Shamsuddeen Hassan Muhammad, Ibrahim Said Ahmad, Lukman Jibril Aliyu, Babangida Sani, Bala Mairiga Abduljalil, Sani Ahmad Hassan

    Abstract: The importance of qualitative parallel data in machine translation has long been determined but it has always been very difficult to obtain such in sufficient quantity for the majority of world languages, mainly because of the associated cost and also the lack of accessibility to these languages. Despite the potential for obtaining parallel datasets from online articles using automatic approaches,… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: To appear in the proceedings of ICCAIT 2023. 6 pages, 2 figures

  31. arXiv:2311.12019  [pdf, other

    cs.SE

    An Empirical Study of Self-Admitted Technical Debt in Machine Learning Software

    Authors: Aaditya Bhatia, Foutse Khomh, Bram Adams, Ahmed E Hassan

    Abstract: The emergence of open-source ML libraries such as TensorFlow and Google Auto ML has enabled developers to harness state-of-the-art ML algorithms with minimal overhead. However, during this accelerated ML development process, said developers may often make sub-optimal design and implementation decisions, leading to the introduction of technical debt that, if not addressed promptly, can have a signi… ▽ More

    Submitted 9 June, 2024; v1 submitted 20 November, 2023; originally announced November 2023.

  32. arXiv:2311.09828  [pdf, other

    cs.CL

    AfriMTE and AfriCOMET: Enhancing COMET to Embrace Under-resourced African Languages

    Authors: Jiayi Wang, David Ifeoluwa Adelani, Sweta Agrawal, Marek Masiak, Ricardo Rei, Eleftheria Briakou, Marine Carpuat, Xuanli He, Sofia Bourhim, Andiswa Bukula, Muhidin Mohamed, Temitayo Olatoye, Tosin Adewumi, Hamam Mokayed, Christine Mwase, Wangui Kimotho, Foutse Yuehgoh, Anuoluwapo Aremu, Jessica Ojo, Shamsuddeen Hassan Muhammad, Salomey Osei, Abdul-Hakeem Omotayo, Chiamaka Chukwuneke, Perez Ogayo, Oumaima Hourrane , et al. (33 additional authors not shown)

    Abstract: Despite the recent progress on scaling multilingual machine translation (MT) to several under-resourced African languages, accurately measuring this progress remains challenging, since evaluation is often performed on n-gram matching metrics such as BLEU, which typically show a weaker correlation with human judgments. Learned metrics such as COMET have higher correlation; however, the lack of eval… ▽ More

    Submitted 23 April, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: Accepted by NAACL 2024

  33. arXiv:2311.03213  [pdf, other

    cs.SE

    On the Model Update Strategies for Supervised Learning in AIOps Solutions

    Authors: Yingzhe Lyu, Heng Li, Zhen Ming, Jiang, Ahmed E. Hassan

    Abstract: AIOps (Artificial Intelligence for IT Operations) solutions leverage the massive data produced during the operation of large-scale systems and machine learning models to assist software engineers in their system operations. As operation data produced in the field are constantly evolving due to factors such as the changing operational environment and user base, the models in AIOps solutions need to… ▽ More

    Submitted 11 April, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

  34. arXiv:2310.12155  [pdf

    cs.NE

    Balancing exploration and exploitation phases in whale optimization algorithm: an insightful and empirical analysis

    Authors: Aram M. Ahmed, Tarik A. Rashid, Bryar A. Hassan, Jaffer Majidpour, Kaniaw A. Noori, Chnoor Maheadeen Rahman, Mohmad Hussein Abdalla, Shko M. Qader, Noor Tayfor, Naufel B Mohammed

    Abstract: Agents of any metaheuristic algorithms are moving in two modes, namely exploration and exploitation. Obtaining robust results in any algorithm is strongly dependent on how to balance between these two modes. Whale optimization algorithm as a robust and well recognized metaheuristic algorithm in the literature, has proposed a novel scheme to achieve this balance. It has also shown superior results… ▽ More

    Submitted 3 September, 2023; originally announced October 2023.

    Comments: 11 pages

  35. arXiv:2310.09423  [pdf, other

    cs.NI

    QUIC is not Quick Enough over Fast Internet

    Authors: Xumiao Zhang, Shuowei Jin, Yi He, Ahmad Hassan, Z. Morley Mao, Feng Qian, Zhi-Li Zhang

    Abstract: QUIC is expected to be a game-changer in improving web application performance. In this paper, we conduct a systematic examination of QUIC's performance over high-speed networks. We find that over fast Internet, the UDP+QUIC+HTTP/3 stack suffers a data rate reduction of up to 45.2% compared to the TCP+TLS+HTTP/2 counterpart. Moreover, the performance gap between QUIC and HTTP/2 grows as the underl… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

    Comments: 10 pages, 16 figures

  36. arXiv:2310.07723  [pdf

    cs.NE

    Equitable and Fair Performance Evaluation of Whale Optimization Algorithm

    Authors: Bryar A. Hassan, Tarik A. Rashid, Aram Ahmed, Shko M. Qader, Jaffer Majidpour, Mohmad Hussein Abdalla, Noor Tayfor, Hozan K. Hamarashid, Haval Sidqi, Kaniaw A. Noori

    Abstract: It is essential that all algorithms are exhaustively, somewhat, and intelligently evaluated. Nonetheless, evaluating the effectiveness of optimization algorithms equitably and fairly is not an easy process for various reasons. Choosing and initializing essential parameters, such as the size issues of the search area for each method and the number of iterations required to reduce the issues, might… ▽ More

    Submitted 4 September, 2023; originally announced October 2023.

    Comments: 21 pages

    Journal ref: 2023

  37. arXiv:2310.05940  [pdf

    cs.CR

    Dynamic S-BOX using Chaotic Map for VPN Data Security

    Authors: Kashif Ishaq, Khwaja Ahmad Hassan, Yahya Tauqeer Bhatti

    Abstract: A dynamic SBox using a chaotic map is a cryptography technique that changes the SBox during encryption based on iterations of a chaotic map, adding an extra layer of confusion and security to symmetric encryption algorithms like AES. The chaotic map introduces unpredictability, non-linearity, and key dependency, enhancing the overall security of the encryption process. The existing work on dynamic… ▽ More

    Submitted 25 August, 2023; originally announced October 2023.

    Comments: 11 Pages

  38. arXiv:2310.02104  [pdf, other

    cs.SE

    An empirical study of ChatGPT-3.5 on question answering and code maintenance

    Authors: Md Mahir Asef Kabir, Sk Adnan Hassan, Xiaoyin Wang, Ying Wang, Hai Yu, Na Meng

    Abstract: Ever since the launch of ChatGPT in 2022, a rising concern is whether ChatGPT will replace programmers and kill jobs. Motivated by this widespread concern, we conducted an empirical study to systematically compare ChatGPT against programmers in question-answering and software-maintaining. We reused a dataset introduced by prior work, which includes 130 StackOverflow (SO) discussion threads referre… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  39. arXiv:2309.15040  [pdf

    cs.IT

    Zero-Energy-Device for 6G: First Real-Time Backscatter Communication thanks to the Detection of Pilots from an Ambient Commercial Cellular Network

    Authors: Papis Ndiaye, Dinh-Thuy Phan-Huy, Ayman Hassan, Jingyi Liao, Xiyu Wang, Kalle Ruttik, Riku Jantti

    Abstract: Ambient backscatter communication technology (AmBC) and a novel device category called zero-energy devices (ZED) have recently emerged as potential components for the forthcoming 6th generation (6G) networks. A ZED communicates with a smartphone without emitting additional radio waves, by backscattering ambient waves from base stations. Thanks to its very low consumption, a ZED powers itself by ha… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: 3 pages, 7 figures , 6Get2023

  40. arXiv:2308.16688  [pdf

    cs.CL cs.AI

    Using Large Language Models to Automate Category and Trend Analysis of Scientific Articles: An Application in Ophthalmology

    Authors: Hina Raja, Asim Munawar, Mohammad Delsoz, Mohammad Elahi, Yeganeh Madadi, Amr Hassan, Hashem Abu Serhan, Onur Inam, Luis Hermandez, Sang Tran, Wuqas Munir, Alaa Abd-Alrazaq, Hao Chen, SiamakYousefi

    Abstract: Purpose: In this paper, we present an automated method for article classification, leveraging the power of Large Language Models (LLM). The primary focus is on the field of ophthalmology, but the model is extendable to other fields. Methods: We have developed a model based on Natural Language Processing (NLP) techniques, including advanced LLMs, to process and analyze the textual content of scient… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

  41. arXiv:2308.03128  [pdf, other

    cs.LG stat.ML

    Iterative Magnitude Pruning as a Renormalisation Group: A Study in The Context of The Lottery Ticket Hypothesis

    Authors: Abu-Al Hassan

    Abstract: This thesis delves into the intricate world of Deep Neural Networks (DNNs), focusing on the exciting concept of the Lottery Ticket Hypothesis (LTH). The LTH posits that within extensive DNNs, smaller, trainable subnetworks termed "winning tickets", can achieve performance comparable to the full model. A key process in LTH, Iterative Magnitude Pruning (IMP), incrementally eliminates minimal weights… ▽ More

    Submitted 6 August, 2023; originally announced August 2023.

    Comments: MSci thesis, 40 pages, 13 figures

  42. arXiv:2307.06300  [pdf, other

    cs.RO

    A Comparative Analysis Between the Additive and the Multiplicative Extended Kalman Filter for Satellite Attitude Determination

    Authors: Hamza A. Hassan, William Tolstrup, Johanes P. Suriana, Ibrahim D. Kiziloklu

    Abstract: The general consensus is that the Multiplicative Extended Kalman Filter (MEKF) is superior to the Additive Extended Kalman Filter (AEKF) based on a wealth of theoretical evidence. This paper deals with a practical comparison between the two filters in simulation with the goal of verifying if the previous theoretical foundations are true. The AEKF and MEKF are two variants of the Extended Kalman Fi… ▽ More

    Submitted 13 July, 2023; v1 submitted 12 July, 2023; originally announced July 2023.

  43. arXiv:2305.13884  [pdf, other

    cs.CR cs.AI cs.SE

    Multi-Granularity Detector for Vulnerability Fixes

    Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, Xuan-Bach D. Le, David Lo

    Abstract: With the increasing reliance on Open Source Software, users are exposed to third-party library vulnerabilities. Software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA requires the identification of vulnerability-fixing commits. Prior works have proposed methods that can automatically identify such vulnerability-fixing commits. However, identifying s… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Journal ref: IEEE Transactions on Software Engineering, 2023

  44. arXiv:2305.05654  [pdf, other

    cs.SE

    Using Knowledge Units of Programming Languages to Recommend Reviewers for Pull Requests: An Empirical Study

    Authors: Md Ahasanuzzaman, Gustavo A. Oliva, Ahmed E. Hassan

    Abstract: Code review is a key element of quality assurance in software development. Determining the right reviewer for a given code change requires understanding the characteristics of the changed code, identifying the skills of each potential reviewer (expertise profile), and finding a good match between the two. To facilitate this task, we design a code reviewer recommender that operates on the knowledge… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  45. arXiv:2305.04756  [pdf

    cs.IT eess.SP

    Random Linear Network Coding for Non-Orthogonal Multiple Access in Multicast Optical Wireless Systems

    Authors: Ahmed Ali Hassan, Ahmed Adnan Qidan, Taisir Elgorashi, Jaafar Elmirghani

    Abstract: Optical Wireless Communication networks (OWC) has emerged as a promising technology that enables high-speed and reliable communication bandwidth for a variety of applications. In this work, we investigated applying Random Linear Network Coding (RLNC) over NOMA-based OWC networks to improve the performance of the proposed high density indoor optical wireless network where users are divided into mul… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: 5 pages, 4 figures

  46. Awareness requirement and performance management for adaptive systems: a survey

    Authors: Tarik A. Rashid, Bryar A. Hassan, Abeer Alsadoon, Shko Qader, S. Vimal, Amit Chhabra, Zaher Mundher Yaseen

    Abstract: Self-adaptive software can assess and modify its behavior when the assessment indicates that the program is not performing as intended or when improved functionality or performance is available. Since the mid-1960s, the subject of system adaptivity has been extensively researched, and during the last decade, many application areas and technologies involving self-adaptation have gained prominence.… ▽ More

    Submitted 22 January, 2023; originally announced February 2023.

    Report number: 20 pages

    Journal ref: J Supercomput., 2023

  47. Fitness Dependent Optimizer with Neural Networks for COVID-19 patients

    Authors: Maryam T. Abdulkhaleq, Tarik A. Rashid, Bryar A. Hassan, Abeer Alsadoon, Nebojsa Bacanin, Amit Chhabra, S. Vimal

    Abstract: The Coronavirus, known as COVID-19, which appeared in 2019 in China, has significantly affected global health and become a huge burden on health institutions all over the world. These effects are continuing today. One strategy for limiting the virus's transmission is to have an early diagnosis of suspected cases and take appropriate measures before the disease spreads further. This work aims to di… ▽ More

    Submitted 6 January, 2023; originally announced February 2023.

    Comments: 38 pages

    Journal ref: Computer Methods and Programs in Biomedicine Update, 2023

  48. arXiv:2212.14109  [pdf

    cs.CR cs.AI

    Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks

    Authors: Abdelmageed Ahmed Hassan, Mohamed Sayed Hussein, Ahmed Shehata AboMoustafa, Sarah Hossam Elmowafy

    Abstract: Network Intrusion Detection Systems (NIDS) are tools or software that are widely used to maintain the computer networks and information systems keeping them secure and preventing malicious traffics from penetrating into them, as they flag when somebody is trying to break into the system. Best effort has been set up on these systems, and the results achieved so far are quite satisfying, however, ne… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  49. arXiv:2212.07979  [pdf, other

    cs.SE cs.CR cs.HC cs.PL

    Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies

    Authors: Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant

    Abstract: Regular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worst-case execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although th… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Comments: IEEE Security & Privacy 2023

  50. arXiv:2211.15733  [pdf, other

    cs.SE cs.AI

    An Empirical Study of Library Usage and Dependency in Deep Learning Frameworks

    Authors: Mohamed Raed El aoun, Lionel Nganyewou Tidjon, Ben Rombaut, Foutse Khomh, Ahmed E. Hassan

    Abstract: Recent advances in deep learning (dl) have led to the release of several dl software libraries such as pytorch, Caffe, and TensorFlow, in order to assist machine learning (ml) practitioners in developing and deploying state-of-the-art deep neural networks (DNN), but they are not able to properly cope with limitations in the dl libraries such as testing or data processing. In this paper, we present… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.