Skip to main content

Showing 1–34 of 34 results for author: Mustafa, H

.
  1. arXiv:2506.07745  [pdf

    physics.comp-ph

    First-principles Quantum Insights into Bandgap Engineering, Valley Quantum Hall Effect, and Nonlinear Optical Response of Ge-Doped Graphene for Potential Optoelectronic Applications

    Authors: Sana Maroof, Abdul Sattar, Azmat Iqbal Bashir, Muhammad Irfan, Hamid Latif, Hina Mustafa, Ahmad Saeed, Raja Junaid Amjad, Farah Alvi

    Abstract: The valley in the band structure of materials has gained a lot of attention recently. The promising applications of the valley degree of freedom include the next-generation valleytronic devices, quantum information processing, quantum computing, and optoelectronic devices. Graphene is an ideal quantum material for high-speed valleytronic applications because of its high carrier mobility and conven… ▽ More

    Submitted 11 June, 2025; v1 submitted 9 June, 2025; originally announced June 2025.

    Comments: 21 pages, 10 figure

  2. arXiv:2504.16584  [pdf, other

    cs.CR cs.AI

    Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code

    Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat

    Abstract: Large Language Models (LLMs) have demonstrated significant capabilities in understanding and analyzing code for security vulnerabilities, such as Common Weakness Enumerations (CWEs). However, their reliance on cloud infrastructure and substantial computational requirements pose challenges for analyzing sensitive or proprietary codebases due to privacy concerns and inference costs. This work explor… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

    Comments: 11 pages, 2 figures, 3 tables. Dataset available at https://huggingface.co/datasets/floxihunter/synthetic_python_cwe. Model available at https://huggingface.co/floxihunter/codegen-mono-CWEdetect. Keywords: Small Language Models (SLMs), Vulnerability Detection, CWE, Fine-tuning, Python Security, Privacy-Preserving Code Analysis

  3. arXiv:2504.03732  [pdf, other

    cs.AR cs.DC q-bio.GN

    SAGe: A Lightweight Algorithm-Architecture Co-Design for Mitigating the Data Preparation Bottleneck in Large-Scale Genome Analysis

    Authors: Nika Mansouri Ghiasi, Talu Güloglu, Harun Mustafa, Can Firtina, Konstantina Koliogeorgi, Konstantinos Kanellopoulos, Haiyu Mao, Rakesh Nadig, Mohammad Sadrosadati, Jisung Park, Onur Mutlu

    Abstract: Given the exponentially growing volumes of genomic data, there are extensive efforts to accelerate genome analysis. We demonstrate a major bottleneck that greatly limits and diminishes the benefits of state-of-the-art genome analysis accelerators: the data preparation bottleneck, where genomic data is stored in compressed form and needs to be decompressed and formatted first before an accelerator… ▽ More

    Submitted 21 April, 2025; v1 submitted 31 March, 2025; originally announced April 2025.

  4. arXiv:2410.17801  [pdf, other

    q-bio.GN

    Rawsamble: Overlapping and Assembling Raw Nanopore Signals using a Hash-based Seeding Mechanism

    Authors: Can Firtina, Maximilian Mordig, Harun Mustafa, Sayan Goswami, Nika Mansouri Ghiasi, Stefano Mercogliano, Furkan Eris, Joël Lindegger, Andre Kahles, Onur Mutlu

    Abstract: Raw nanopore signal analysis is a common approach in genomics to provide fast and resource-efficient analysis without translating the signals to bases (i.e., without basecalling). However, existing solutions cannot interpret raw signals directly if a reference genome is unknown due to a lack of accurate mechanisms to handle increased noise in pairwise raw signal comparison. Our goal is to enable t… ▽ More

    Submitted 23 October, 2024; originally announced October 2024.

  5. arXiv:2406.19113  [pdf, other

    cs.AR cs.DC q-bio.GN

    MegIS: High-Performance, Energy-Efficient, and Low-Cost Metagenomic Analysis with In-Storage Processing

    Authors: Nika Mansouri Ghiasi, Mohammad Sadrosadati, Harun Mustafa, Arvid Gollwitzer, Can Firtina, Julien Eudine, Haiyu Mao, Joël Lindegger, Meryem Banu Cavlak, Mohammed Alser, Jisung Park, Onur Mutlu

    Abstract: Metagenomics has led to significant advances in many fields. Metagenomic analysis commonly involves the key tasks of determining the species present in a sample and their relative abundances. These tasks require searching large metagenomic databases. Metagenomic analysis suffers from significant data movement overhead due to moving large amounts of low-reuse data from the storage system. In-storag… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: To appear in ISCA 2024. arXiv admin note: substantial text overlap with arXiv:2311.12527

  6. arXiv:2311.12527  [pdf, other

    cs.AR q-bio.GN q-bio.QM

    MetaStore: High-Performance Metagenomic Analysis via In-Storage Computing

    Authors: Nika Mansouri Ghiasi, Mohammad Sadrosadati, Harun Mustafa, Arvid Gollwitzer, Can Firtina, Julien Eudine, Haiyu Ma, Joël Lindegger, Meryem Banu Cavlak, Mohammed Alser, Jisung Park, Onur Mutlu

    Abstract: Metagenomics has led to significant advancements in many fields. Metagenomic analysis commonly involves the key tasks of determining the species present in a sample and their relative abundances. These tasks require searching large metagenomic databases containing information on different species' genomes. Metagenomic analysis suffers from significant data movement overhead due to moving large amo… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

  7. arXiv:2311.12032  [pdf

    q-bio.OT

    Effect of some plant extracts on hardwood cuttings of Bottlebrush (Callistemon viminalis)

    Authors: Hemn Abdalla Mustafa, Tariq Abubakr Ahmad, Aram Akram Mohammed, Zainab Sabah Lazim, Chopi Omer Ibrahim, Roshna Faeq Kak bra, Shvan Ramzi Salih

    Abstract: The study was conducted at the Collage of Agricultural Engineering Sciences, University of Sulaimani, Kurdistan Region-Iraq so as to investigate response hardwood cuttings of Callistemon viminalis to some plant extracts. The hardwood cuttings were taken on 11 March 2021 and soaked separately in 3 and 6 g/L aqueous extracts of moringa leaf, licorice root, willow shoot, fenugreek seed and cinnamon b… ▽ More

    Submitted 9 September, 2023; originally announced November 2023.

  8. arXiv:2309.10452  [pdf, ps, other

    math.AC

    Essential cohomology modules

    Authors: Runak H. Mustafa, Ismael Akray

    Abstract: In this article, we give a generalization to injective modules by using $e$-exact sequences introduced by Akray in [1] and name it $e$-injective modules and investigate their properties. We reprove both Baer criterion and comparison theorem of homology using $e$-injective modules and $e$-injective resolutions. Furthermore, we apply the notion $e$-injective modules into local cohomology to construc… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    MSC Class: 13C11; 46M18; 13D45

  9. arXiv:2309.10442  [pdf, ps, other

    math.AC

    Essential ideal transforms

    Authors: Runak H. Mustafa, Ismael Akray

    Abstract: It is our intention in this research generalized some concept in local cohomology such as contravarint functor $ext$, covariant functor $Ext$, covarian functor $Tor$ and ideal transforms with $e$-exact sequences. The $e$-exact sequence was introduced by Akray and Zebari \cite{AZ} in 2020. We obtain for a torsion-free modules $B$, $_eext^n_R(P,B)=0$ while $_eExt^n_R(A,E)=0$ for every module $A$. Al… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    MSC Class: 13C11; 46M18; 13D45

  10. arXiv:2307.11109  [pdf

    q-bio.OT

    Influence of phytohormones on seed germination of Solanum linnaeanum

    Authors: Aram Akram Mohammed, Haidar Anwar Arkwazee, Ayub Karim Mahmood, Hemn Abdalla Mustafa, Hawar Sleman Halshoy, Salam Mahmud Sulaiman, Jalal Hamasalih Ismael, Nawroz Abdul-razzak Tahir

    Abstract: The aim of this study was to determine the germination ability and seedling growth of the apple of Sodom by soaking in water, gibberellin (GA3), naphthylacetic acid (NAA), and salicylic acid (SA), separately. The findings showed that NAA at 50 mgL-1 produced superior germination (77.78%), germination speed (1.43 seeds/time interval), hypocotyl length (1.01 cm), hypocotyl diameter (1.13 mm), leaf n… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  11. arXiv:2211.07854  [pdf, other

    quant-ph cs.LG

    Variational Quantum Algorithms for Chemical Simulation and Drug Discovery

    Authors: Hasan Mustafa, Sai Nandan Morapakula, Prateek Jain, Srinjoy Ganguly

    Abstract: Quantum computing has gained a lot of attention recently, and scientists have seen potential applications in this field using quantum computing for Cryptography and Communication to Machine Learning and Healthcare. Protein folding has been one of the most interesting areas to study, and it is also one of the biggest problems of biochemistry. Each protein folds distinctively, and the difficulty of… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  12. arXiv:2210.09048  [pdf, other

    physics.ins-det hep-ex nucl-ex

    ATHENA Detector Proposal -- A Totally Hermetic Electron Nucleus Apparatus proposed for IP6 at the Electron-Ion Collider

    Authors: ATHENA Collaboration, J. Adam, L. Adamczyk, N. Agrawal, C. Aidala, W. Akers, M. Alekseev, M. M. Allen, F. Ameli, A. Angerami, P. Antonioli, N. J. Apadula, A. Aprahamian, W. Armstrong, M. Arratia, J. R. Arrington, A. Asaturyan, E. C. Aschenauer, K. Augsten, S. Aune, K. Bailey, C. Baldanza, M. Bansal, F. Barbosa, L. Barion , et al. (415 additional authors not shown)

    Abstract: ATHENA has been designed as a general purpose detector capable of delivering the full scientific scope of the Electron-Ion Collider. Careful technology choices provide fine tracking and momentum resolution, high performance electromagnetic and hadronic calorimetry, hadron identification over a wide kinematic range, and near-complete hermeticity. This article describes the detector design and its e… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Journal ref: JINST 17 (2022) 10, P10019

  13. arXiv:2209.01147  [pdf, other

    cs.DS cs.CG cs.LG stat.ML

    Algorithms for Discrepancy, Matchings, and Approximations: Fast, Simple, and Practical

    Authors: Mónika Csikós, Nabil H. Mustafa

    Abstract: We study one of the key tools in data approximation and optimization: low-discrepancy colorings. Formally, given a finite set system $(X,\mathcal S)$, the \emph{discrepancy} of a two-coloring $χ:X\to\{-1,1\}$ is defined as $\max_{S \in \mathcal S}|{χ(S)}|$, where $χ(S)=\sum\limits_{x \in S}χ(x)$. We propose a randomized algorithm which, for any $d>0$ and $(X,\mathcal S)$ with dual shatter functi… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

  14. arXiv:2202.10400  [pdf, other

    cs.AR cs.DC cs.OS q-bio.GN

    GenStore: A High-Performance and Energy-Efficient In-Storage Computing System for Genome Sequence Analysis

    Authors: Nika Mansouri Ghiasi, Jisung Park, Harun Mustafa, Jeremie Kim, Ataberk Olgun, Arvid Gollwitzer, Damla Senol Cali, Can Firtina, Haiyu Mao, Nour Almadhoun Alserr, Rachata Ausavarungnirun, Nandita Vijaykumar, Mohammed Alser, Onur Mutlu

    Abstract: Read mapping is a fundamental, yet computationally-expensive step in many genomics applications. It is used to identify potential matches and differences between fragments (called reads) of a sequenced genome and an already known genome (called a reference genome). To address the computational challenges in genome analysis, many prior works propose various approaches such as filters that select th… ▽ More

    Submitted 6 April, 2023; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: Published at ASPLOS 2022

  15. arXiv:2201.03927  [pdf, ps, other

    math.AC

    Melkersson condition for extension of Serre subcategories

    Authors: Ismael Akray, Runak H. Mustafa, Reza Sazeedeh

    Abstract: Let $R$ be a commutative noetherian ring and let $\frak a$ be an ideal of $R$. In this paper, we study a certain condition, namely $C_{\frak a}$, introduced by Aghapournahr and Melkersson, on the extension of two subcategories of $R$-modules. We extend and generalize some of the main results of Yoshizawa [Y1,Y2]. As an example of extension of subcategories, we study the weakly Laskerian modules an… ▽ More

    Submitted 11 January, 2022; originally announced January 2022.

    MSC Class: 13D45

  16. arXiv:2010.06882  [pdf

    math.GN

    Certain properties of contra-T*12-continuous functions

    Authors: Hadi J. Mustafa, Layth M. Alabdulsada

    Abstract: The concept of contra function was introduced by Dontchev [2], in this work, we use the notion of T*12-open to study a new class of function called a contra-T*12-continuous function as a generalization of contra-continuous.

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: 5 pages

  17. arXiv:2008.08970  [pdf, ps, other

    cs.LG cs.CG math.CO stat.ML

    Optimal Approximations Made Easy

    Authors: Mónika Csikós, Nabil H. Mustafa

    Abstract: The fundamental result of Li, Long, and Srinivasan on approximations of set systems has become a key tool across several communities such as learning theory, algorithms, computational geometry, combinatorics and data analysis. The goal of this paper is to give a modular, self-contained, intuitive proof of this result for finite set systems. The only ingredient we assume is the standard Chernoff'… ▽ More

    Submitted 1 September, 2022; v1 submitted 20 August, 2020; originally announced August 2020.

    Journal ref: Published in Information Processing Letters, Volume 176, June 2022, 106250

  18. arXiv:1911.04200  [pdf, other

    cs.CE cs.DC cs.PF q-bio.GN

    Communication-Efficient Jaccard Similarity for High-Performance Distributed Genome Comparisons

    Authors: Maciej Besta, Raghavendra Kanakagiri, Harun Mustafa, Mikhail Karasikov, Gunnar Rätsch, Torsten Hoefler, Edgar Solomonik

    Abstract: The Jaccard similarity index is an important measure of the overlap of two sets, widely used in machine learning, computational genomics, information retrieval, and many other areas. We design and implement SimilarityAtScale, the first communication-efficient distributed algorithm for computing the Jaccard similarity among pairs of large datasets. Our algorithm provides an efficient encoding of th… ▽ More

    Submitted 11 November, 2020; v1 submitted 11 November, 2019; originally announced November 2019.

    Journal ref: Proceedings of the 34st IEEE International Parallel and Distributed Processing Symposium (IPDPS'20), 2020

  19. arXiv:1909.13146  [pdf, other

    q-bio.GN cs.LG stat.ML

    META$^\mathbf{2}$: Memory-efficient taxonomic classification and abundance estimation for metagenomics with deep learning

    Authors: Andreas Georgiou, Vincent Fortuin, Harun Mustafa, Gunnar Rätsch

    Abstract: Metagenomic studies have increasingly utilized sequencing technologies in order to analyze DNA fragments found in environmental samples.One important step in this analysis is the taxonomic classification of the DNA fragments. Conventional read classification methods require large databases and vast amounts of memory to run, with recent deep learning methods suffering from very large model sizes. W… ▽ More

    Submitted 10 February, 2020; v1 submitted 28 September, 2019; originally announced September 2019.

  20. Novel Artificial Human Optimization Field Algorithms - The Beginning

    Authors: Satish Gajawada, Hassan Mustafa

    Abstract: New Artificial Human Optimization (AHO) Field Algorithms can be created from scratch or by adding the concept of Artificial Humans into other existing Optimization Algorithms. Particle Swarm Optimization (PSO) has been very popular for solving complex optimization problems due to its simplicity. In this work, new Artificial Human Optimization Field Algorithms are created by modifying existing PSO… ▽ More

    Submitted 26 March, 2019; originally announced March 2019.

    Comments: 25 pages, 41 figures

    Journal ref: Transactions on Machine Learning and Artificial Intelligence (TMLAI), Volume 7, Issue 1, February 2019

  21. arXiv:1807.07924  [pdf, ps, other

    cs.LG cs.CG stat.ML

    Optimal Bounds on the VC-dimension

    Authors: Monika Csikos, Andrey Kupavskii, Nabil H. Mustafa

    Abstract: The VC-dimension of a set system is a way to capture its complexity and has been a key parameter studied extensively in machine learning and geometry communities. In this paper, we resolve two longstanding open problems on bounding the VC-dimension of two fundamental set systems: $k$-fold unions/intersections of half-spaces, and the simplices set system. Among other implications, it settles an ope… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

  22. arXiv:1806.08725  [pdf, other

    math.MG cs.CG math.CO math.PR

    Theorems of Carathéodory, Helly, and Tverberg without dimension

    Authors: Karim Adiprasito, Imre Bárány, Nabil H. Mustafa, Tamás Terpai

    Abstract: We prove a no-dimensional version of Carathédory's theorem: given an $n$-element set $P\subset \Re^d$, a point $a \in \conv P$, and an integer $r\le d$, $r \le n$, there is a subset $Q\subset P$ of $r$ elements such that the distance between $a$ and $\conv Q$ is less than $\diam P/\sqrt {2r}$. A general no-dimension Helly type result is also proved with colourful and fractional consequences. Simil… ▽ More

    Submitted 28 August, 2019; v1 submitted 22 June, 2018; originally announced June 2018.

    Comments: 23 pages, 1 figure

  23. arXiv:1711.01198  [pdf

    cs.CR

    Design and Analysis of a Secure Three Factor User Authentication Scheme Using Biometric and Smart Card

    Authors: Hossen Asiful Mustafa, Hasan Muhammad Kafi

    Abstract: Password security can no longer provide enough security in the area of remote user authentication. Considering this security drawback, researchers are trying to find solution with multifactor remote user authentication system. Recently, three factor remote user authentication using biometric and smart card has drawn a considerable attention of the researchers. However, most of the current proposed… ▽ More

    Submitted 3 November, 2017; originally announced November 2017.

    Comments: 12 pages, 6 figures, 2 tables

    Journal ref: International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 6, June 2017

  24. arXiv:1708.01590  [pdf, other

    math.CO cs.DM math.MG

    Bounding the size of an almost-equidistant set in Euclidean space

    Authors: Andrey Kupavskii, Nabil H. Mustafa, Konrad J. Swanepoel

    Abstract: A set of points in d-dimensional Euclidean space is almost equidistant if among any three points of the set, some two are at distance 1. We show that an almost-equidistant set in $\mathbb{R}^d$ has cardinality $O(d^{4/3})$.

    Submitted 4 August, 2017; originally announced August 2017.

    Comments: 6 pages

    MSC Class: 52C10

    Journal ref: Combinator. Probab. Comp. 28 (2019) 280-286

  25. arXiv:1702.03676  [pdf, ps, other

    cs.CG math.CO math.PR

    Epsilon-approximations and epsilon-nets

    Authors: Nabil H. Mustafa, Kasturi R. Varadarajan

    Abstract: The use of random samples to approximate properties of geometric configurations has been an influential idea for both combinatorial and algorithmic purposes. This chapter considers two related notions---$ε$-approximations and $ε$-nets---that capture the most important quantitative properties that one would expect from a random sample with respect to an underlying geometric configuration.

    Submitted 8 August, 2017; v1 submitted 13 February, 2017; originally announced February 2017.

    Comments: Chapter 47 in Handbook on Discrete and Computational Geometry, 3rd edition. 27 pages

  26. arXiv:1606.03668  [pdf, other

    cs.IT

    Spatial and Social Paradigms for Interference and Coverage Analysis in Underlay D2D Network

    Authors: Hafiz Attaul Mustafa, Muhammad Zeeshan Shakir, Muhammad Ali Imran, Rahim Tafazolli

    Abstract: The homogeneous Poisson point process (PPP) is widely used to model spatial distribution of base stations and mobile terminals. The same process can be used to model underlay device-to-device (D2D) network, however, neglecting homophilic relation for D2D pairing presents underestimated system insights. In this paper, we model both spatial and social distributions of interfering D2D nodes as proxim… ▽ More

    Submitted 28 April, 2017; v1 submitted 12 June, 2016; originally announced June 2016.

    Comments: 10 pages, 10 figures

  27. Separation Framework: An Enabler for Cooperative and D2D Communication for Future 5G Networks

    Authors: Hafiz Attaul Mustafa, Muhammad Ali Imran, Muhammad Zeeshan Shakir, Ali Imran, Rahim Tafazolli

    Abstract: Soaring capacity and coverage demands dictate that future cellular networks need to soon migrate towards ultra-dense networks. However, network densification comes with a host of challenges that include compromised energy efficiency, complex interference management, cumbersome mobility management, burdensome signaling overheads and higher backhaul costs. Interestingly, most of the problems, that b… ▽ More

    Submitted 10 April, 2016; originally announced April 2016.

    Comments: 28 pages, 11 figures, IEEE Communications Surveys & Tutorials 2015

  28. arXiv:1603.05934  [pdf

    q-bio.TO

    Mathematical modeling of T-cells activation dynamics for CD3 molecules recycling process

    Authors: Qasim Ali, Ibrahim H. Mustafa, Ali Elkamel, Eric Touboul, Frederic Gruy, Claude Lambert

    Abstract: The down regulation of CD3 protein present on the surface of a T-cell triggers the process of activation. A rapid decrease of CD3 from the surface is required to reach the threshold that is necessary for the continuation of the activation process. By flow cytometry technique, it is well established that an amount of down regulated CD3 proteins recycle and may come on the surface of T-cell. This ar… ▽ More

    Submitted 15 March, 2016; originally announced March 2016.

  29. Coverage gain and Device-to-Device user Density: Stochastic Geometry Modeling and Analysis

    Authors: Hafiz Attaul Mustafa, Muhammad Zeeshan Shakir, Muhammad Ali Imran, Ali Imran, Rahim Tafazolli

    Abstract: Device-to-device (D2D) communication has huge potential for capacity and coverage enhancements for next generation cellular networks. The number of potential nodes for D2D communication is an important parameter that directly impacts the system capacity. In this paper, we derive analytic expression for average coverage probability of cellular user and corresponding number of potential D2D users. I… ▽ More

    Submitted 5 March, 2016; originally announced March 2016.

    Comments: 4 pages, 5 figures

    Journal ref: IEEE Comml, Volume:19, Issue:10, pp. 1742-1745, 2015

  30. arXiv:1603.01694  [pdf, ps, other

    cs.IT

    Intracell Interference Characterization and Cluster Inference for D2D Communication

    Authors: Hafiz Attaul Mustafa, Muhammad Zeeshan Shakir, Ali Riza Ekti, Muhammad Ali Imran, Rahim Tafazolli

    Abstract: The homogeneous poisson point process (PPP) is widely used to model temporal, spatial or both topologies of base stations (BSs) and mobile terminals (MTs). However, negative spatial correlation in BSs, due to strategical deployments, and positive spatial correlations in MTs, due to homophilic relations, cannot be captured by homogeneous spatial PPP (SPPP). In this paper, we assume doubly stochasti… ▽ More

    Submitted 5 March, 2016; originally announced March 2016.

    Comments: 11 pages, 14 figures

  31. arXiv:1509.04020  [pdf, ps, other

    cs.CG

    A Note on the Size-Sensitive Packing Lemma

    Authors: Nabil H. Mustafa

    Abstract: We show that the size-sensitive packing lemma follows from a simple modification of the standard proof, due to Haussler and simplified by Chazelle, of the packing lemma.

    Submitted 15 September, 2015; v1 submitted 14 September, 2015; originally announced September 2015.

    Comments: Modified title of the paper. 2 pages

  32. arXiv:1501.03246  [pdf, other

    cs.CG

    Tighter Estimates for epsilon-nets for Disks

    Authors: Norbert Bus, Shashwat Garg, Nabil H. Mustafa, Saurabh Ray

    Abstract: The geometric hitting set problem is one of the basic geometric combinatorial optimization problems: given a set $P$ of points, and a set $\mathcal{D}$ of geometric objects in the plane, the goal is to compute a small-sized subset of $P$ that hits all objects in $\mathcal{D}$. In 1994, Bronniman and Goodrich made an important connection of this problem to the size of fundamental combinatorial stru… ▽ More

    Submitted 13 January, 2015; originally announced January 2015.

  33. arXiv:1403.0835  [pdf, other

    cs.CG

    QPTAS for Geometric Set-Cover Problems via Optimal Separators

    Authors: Nabil H. Mustafa, Rajiv Raman, Saurabh Ray

    Abstract: Weighted geometric set-cover problems arise naturally in several geometric and non-geometric settings (e.g. the breakthrough of Bansal-Pruhs (FOCS 2010) reduces a wide class of machine scheduling problems to weighted geometric set-cover). More than two decades of research has succeeded in settling the $(1+ε)$-approximability status for most geometric set-cover problems, except for four basic scena… ▽ More

    Submitted 5 April, 2014; v1 submitted 4 March, 2014; originally announced March 2014.

    Comments: 26 pages. Revised to include an additional set-cover QPTAS for halfspaces

  34. arXiv:1002.4831  [pdf

    cs.NE

    On Analysis and Evaluation of Multi-Sensory Cognitive Learning of a Mathematical Topic Using Artificial Neural Networks

    Authors: F. A. Al-Zahrani, H. M. Mustafa, A. Al-Hamadi

    Abstract: This piece of research belongs to the field of educational assessment issue based upon the cognitive multimedia theory. Considering that theory; visual and auditory material should be presented simultaneously to reinforce the retention of a mathematical learned topic, a carefully computer-assisted learning (CAL) module is designed for development of a multimedia tutorial for our suggested mathem… ▽ More

    Submitted 25 February, 2010; originally announced February 2010.

    Comments: Journal of Telecommunications,Volume 1, Issue 1, pp99-104, February 2010