Skip to main content

Showing 1–13 of 13 results for author: Basha, S

Searching in archive cs. Search in all archives.
.
  1. Data Augmentation for Cognitive Behavioral Therapy: Leveraging ERNIE Language Models using Artificial Intelligence

    Authors: Bosubabu Sambana, Kondreddygari Archana, Suram Indhra Sena Reddy, Shaik Meethaigar Jameer Basha, Shaik Karishma

    Abstract: Cognitive Behavioral Therapy (CBT) is a proven approach for addressing the irrational thought patterns associated with mental health disorders, but its effectiveness relies on accurately identifying cognitive pathways to provide targeted treatment. In today's digital age, individuals often express negative emotions on social media, where they may reveal cognitive distortions, and in severe cases,… ▽ More

    Submitted 29 June, 2025; originally announced June 2025.

    Comments: 6 Pages, 5 Figures, IEEE IDCIoT 2025

  2. arXiv:2205.05967  [pdf, other

    cs.CV

    Target Aware Network Architecture Search and Compression for Efficient Knowledge Transfer

    Authors: S. H. Shabbeer Basha, Debapriya Tula, Sravan Kumar Vinakota, Shiv Ram Dubey

    Abstract: Transfer Learning enables Convolutional Neural Networks (CNN) to acquire knowledge from a source domain and transfer it to a target domain, where collecting large-scale annotated examples is time-consuming and expensive. Conventionally, while transferring the knowledge learned from one task to another task, the deeper layers of a pre-trained CNN are finetuned over the target dataset. However, thes… ▽ More

    Submitted 24 January, 2024; v1 submitted 12 May, 2022; originally announced May 2022.

    Comments: This paper is accepted for publication in Multimedia Systems Journal

  3. HRel: Filter Pruning based on High Relevance between Activation Maps and Class Labels

    Authors: CH Sarvani, Mrinmoy Ghorai, Shiv Ram Dubey, SH Shabbeer Basha

    Abstract: This paper proposes an Information Bottleneck theory based filter pruning method that uses a statistical measure called Mutual Information (MI). The MI between filters and class labels, also called \textit{Relevance}, is computed using the filter's activation maps and the annotations. The filters having High Relevance (HRel) are considered to be more important. Consequently, the least important fi… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

    Journal ref: "Neural Networks Volume 147, March 2022, Pages 186-197 " https://www.sciencedirect.com/science/article/abs/pii/S0893608021004962

  4. arXiv:2109.12504  [pdf, other

    cs.LG math.OC

    AdaInject: Injection Based Adaptive Gradient Descent Optimizers for Convolutional Neural Networks

    Authors: Shiv Ram Dubey, S. H. Shabbeer Basha, Satish Kumar Singh, Bidyut Baran Chaudhuri

    Abstract: The convolutional neural networks (CNNs) are generally trained using stochastic gradient descent (SGD) based optimization techniques. The existing SGD optimizers generally suffer with the overshooting of the minimum and oscillation near minimum. In this paper, we propose a new approach, hereafter referred as AdaInject, for the gradient descent optimizers by injecting the second order moment into t… ▽ More

    Submitted 18 September, 2022; v1 submitted 26 September, 2021; originally announced September 2021.

    Comments: Accepted By IEEE Transactions on Artificial Intelligence

  5. arXiv:2102.00160  [pdf, other

    cs.CV

    Deep Model Compression based on the Training History

    Authors: S. H. Shabbeer Basha, Mohammad Farazuddin, Viswanath Pulabaigari, Shiv Ram Dubey, Snehasis Mukherjee

    Abstract: Deep Convolutional Neural Networks (DCNNs) have shown promising performances in several visual recognition problems which motivated the researchers to propose popular architectures such as LeNet, AlexNet, VGGNet, ResNet, and many more. These architectures come at a cost of high computational complexity and parameter storage. To get rid of storage and computational complexity, deep model compressio… ▽ More

    Submitted 12 May, 2022; v1 submitted 30 January, 2021; originally announced February 2021.

  6. AutoTune: Automatically Tuning Convolutional Neural Networks for Improved Transfer Learning

    Authors: S. H. Shabbeer Basha, Sravan Kumar Vinakota, Viswanath Pulabaigari, Snehasis Mukherjee, Shiv Ram Dubey

    Abstract: Transfer learning enables solving a specific task having limited data by using the pre-trained deep networks trained on large-scale datasets. Typically, while transferring the learned knowledge from source task to the target task, the last few layers are fine-tuned (re-trained) over the target dataset. However, these layers are originally designed for the source task that might not be suitable for… ▽ More

    Submitted 3 December, 2020; v1 submitted 25 April, 2020; originally announced May 2020.

    Comments: This paper is published in Neural Networks journal

  7. arXiv:2002.02100  [pdf, other

    cs.CV cs.LG

    An Information-rich Sampling Technique over Spatio-Temporal CNN for Classification of Human Actions in Videos

    Authors: S. H. Shabbeer Basha, Viswanath Pulabaigari, Snehasis Mukherjee

    Abstract: We propose a novel scheme for human action recognition in videos, using a 3-dimensional Convolutional Neural Network (3D CNN) based classifier. Traditionally in deep learning based human activity recognition approaches, either a few random frames or every $k^{th}$ frame of the video is considered for training the 3D CNN, where $k$ is a small positive integer, like 4, 5, or 6. This kind of sampling… ▽ More

    Submitted 7 February, 2020; v1 submitted 6 February, 2020; originally announced February 2020.

  8. arXiv:2001.11951  [pdf, other

    cs.CV cs.LG eess.IV

    AutoFCL: Automatically Tuning Fully Connected Layers for Handling Small Dataset

    Authors: S. H. Shabbeer Basha, Sravan Kumar Vinakota, Shiv Ram Dubey, Viswanath Pulabaigari, Snehasis Mukherjee

    Abstract: Deep Convolutional Neural Networks (CNN) have evolved as popular machine learning models for image classification during the past few years, due to their ability to learn the problem-specific features directly from the input images. The success of deep learning models solicits architecture engineering rather than hand-engineering the features. However, designing state-of-the-art CNN for a given ta… ▽ More

    Submitted 28 January, 2021; v1 submitted 22 January, 2020; originally announced January 2020.

    Comments: This paper is published in Neural Computing & Applications Journal

  9. arXiv:1902.02771  [pdf, other

    cs.CV cs.LG cs.NE eess.IV

    Impact of Fully Connected Layers on Performance of Convolutional Neural Networks for Image Classification

    Authors: S. H. Shabbeer Basha, Shiv Ram Dubey, Viswanath Pulabaigari, Snehasis Mukherjee

    Abstract: The Convolutional Neural Networks (CNNs), in domains like computer vision, mostly reduced the need for handcrafted features due to its ability to learn the problem-specific features from the raw input data. However, the selection of dataset-specific CNN architecture, which mostly performed by either experience or expertise is a time-consuming and error-prone process. To automate the process of lea… ▽ More

    Submitted 19 November, 2019; v1 submitted 21 January, 2019; originally announced February 2019.

    Comments: This paper is accepted for publication in Neurocomputing Journal

  10. arXiv:1810.02797  [pdf, other

    cs.CV cs.AI cs.LG stat.ML

    RCCNet: An Efficient Convolutional Neural Network for Histological Routine Colon Cancer Nuclei Classification

    Authors: S H Shabbeer Basha, Soumen Ghosh, Kancharagunta Kishan Babu, Shiv Ram Dubey, Viswanath Pulabaigari, Snehasis Mukherjee

    Abstract: Efficient and precise classification of histological cell nuclei is of utmost importance due to its potential applications in the field of medical image analysis. It would facilitate the medical practitioners to better understand and explore various factors for cancer treatment. The classification of histological cell nuclei is a challenging task due to the cellular heterogeneity. This paper propo… ▽ More

    Submitted 8 June, 2019; v1 submitted 30 September, 2018; originally announced October 2018.

    Comments: Published in ICARCV 2018

  11. arXiv:1711.09739  [pdf

    cs.CY

    Automatic Pill Reminder for Easy Supervision

    Authors: A. Jabeena, Animesh Kumar Sahu, Rohit Roy, N. Sardar Basha

    Abstract: In this paper we present a working model of an automatic pill reminder and dispenser setup that can alleviate irregularities in taking prescribed dosage of medicines at the right time dictated by the medical practitioner and switch from approaches predominantly dependent on human memory to automation with negligible supervision, thus relieving persons from error-prone tasks of giving wrong medicin… ▽ More

    Submitted 17 November, 2017; originally announced November 2017.

    Comments: 5 pages, 7 figures, ICISS- 2017 (IEEE Conference)

  12. An exhaustive survey of trust models in p2p network

    Authors: S. Udhaya Shree, Dr. M. S. Saleem Basha

    Abstract: Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust… ▽ More

    Submitted 13 October, 2014; originally announced November 2014.

    Comments: 12 pages, 4 figures, 1 table, International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014

  13. arXiv:1004.1239  [pdf

    cs.SE

    Analysis of Empirical Software Effort Estimation Models

    Authors: Saleem Basha, Dhavachelvan Ponnurangam

    Abstract: Reliable effort estimation remains an ongoing challenge to software engineers. Accurate effort estimation is the state of art of software engineering, effort estimation of software is the preliminary phase between the client and the business enterprise. The relationship between the client and the business enterprise begins with the estimation of the software. The credibility of the client to the b… ▽ More

    Submitted 7 April, 2010; originally announced April 2010.

    Comments: IEEE Publication format, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Journal ref: IJCSIS, Vol. 7 No. 3, March 2010