Skip to main content

Showing 1–18 of 18 results for author: Ismail, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.15202  [pdf, other

    cs.RO cs.AI

    A Unified Framework for Real-Time Failure Handling in Robotics Using Vision-Language Models, Reactive Planner and Behavior Trees

    Authors: Faseeh Ahmad, Hashim Ismail, Jonathan Styrud, Maj Stenmark, Volker Krueger

    Abstract: Robotic systems often face execution failures due to unexpected obstacles, sensor errors, or environmental changes. Traditional failure recovery methods rely on predefined strategies or human intervention, making them less adaptable. This paper presents a unified failure recovery framework that combines Vision-Language Models (VLMs), a reactive planner, and Behavior Trees (BTs) to enable real-time… ▽ More

    Submitted 21 March, 2025; v1 submitted 19 March, 2025; originally announced March 2025.

  2. arXiv:2501.11094  [pdf, other

    cs.CL cs.AI cs.CY

    Enhanced Suicidal Ideation Detection from Social Media Using a CNN-BiLSTM Hybrid Model

    Authors: Mohaiminul Islam Bhuiyan, Nur Shazwani Kamarudin, Nur Hafieza Ismail

    Abstract: Suicidal ideation detection is crucial for preventing suicides, a leading cause of death worldwide. Many individuals express suicidal thoughts on social media, offering a vital opportunity for early detection through advanced machine learning techniques. The identification of suicidal ideation in social media text is improved by utilising a hybrid framework that integrates Convolutional Neural Net… ▽ More

    Submitted 19 January, 2025; originally announced January 2025.

  3. Understanding Mental Health Content on Social Media and Its Effect Towards Suicidal Ideation

    Authors: Mohaiminul Islam Bhuiyan, Nur Shazwani Kamarudin, Nur Hafieza Ismail

    Abstract: This review underscores the critical need for effective strategies to identify and support individuals with suicidal ideation, exploiting technological innovations in ML and DL to further suicide prevention efforts. The study details the application of these technologies in analyzing vast amounts of unstructured social media data to detect linguistic patterns, keywords, phrases, tones, and context… ▽ More

    Submitted 16 January, 2025; originally announced January 2025.

  4. 6RLR-ABC: 6LoWPAN Routing Protocol With Local Repair Using Bio Inspired Artificial Bee Colony

    Authors: Nurul Halimatul Asmak Ismail, Samer A. B. Awwad, Rosilah Hassan

    Abstract: In recent years, Micro-Electro-Mechanical System (MEMS) has successfully enabled the development of IPv6 over Low power Wireless Personal Area Network (6LoWPAN). This network is equipped with low-cost, low-power, lightweight and varied functions devices. These devices are capable of amassing, storing, processing environmental information and conversing with neighbouring sensors. These requisites p… ▽ More

    Submitted 5 June, 2020; originally announced June 2020.

    Comments: 19 pages, 12 figures

  5. arXiv:2005.14026  [pdf

    cs.AI

    An Exploratory Study of Hierarchical Fuzzy Systems Approach in Recommendation System

    Authors: Tajul Rosli Razak, Iman Hazwam Abd Halim, Muhammad Nabil Fikri Jamaludin, Mohammad Hafiz Ismail, Shukor Sanim Mohd Fauzi

    Abstract: Recommendation system or also known as a recommender system is a tool to help the user in providing a suggestion of a specific dilemma. Thus, recently, the interest in developing a recommendation system in many fields has increased. Fuzzy Logic system (FLSs) is one of the approaches that can be used to model the recommendation systems as it can deal with uncertainty and imprecise information. Howe… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Journal ref: Jurnal Intelek Vol 14 No 2 December 2019

  6. arXiv:1911.07633  [pdf

    cs.CY cs.NI

    Reducing Honeypot Log Storage Capacity Consumption -- Cron Job with Perl-Script Approach

    Authors: Iman Hazwam Abd Halim, Nur Muhammad Irfan Abu Hassan, Tajul Rosli Razak, Muhammad Nabil Fikri Jamaluddin, Mohammad Hafiz Ismail

    Abstract: Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty w… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

    Journal ref: Journal of Computing Research & Innovation (JCRINN) Vol 4, No 1 (2019)

  7. arXiv:1908.03475  [pdf

    cs.IR

    A Simple Recommender Engine for Matching Final-Year Project Student with Supervisor

    Authors: Mohammad Hafiz Ismail, Tajul Rosli Razak, Muhamad Arif Hashim, Alif Faisal Ibrahim

    Abstract: This paper discusses a simple recommender engine, which can match final year project student based on their interests with potential supervisors. The recommender engine is constructed based on Euclidean distance algorithm. The initial input data for the recommender system is obtained by distributing questionnaire to final year students and recording their response in CSV format. The recommender en… ▽ More

    Submitted 8 August, 2019; originally announced August 2019.

    Journal ref: Colloquium in Computer & Mathematical Sciences Education (2015)

  8. arXiv:1907.09103  [pdf, other

    cs.LO cs.AI cs.SC

    A Unified Algebraic Framework for Non-Monotonicity

    Authors: Nourhan Ehab, Haythem O. Ismail

    Abstract: Tremendous research effort has been dedicated over the years to thoroughly investigate non-monotonic reasoning. With the abundance of non-monotonic logical formalisms, a unified theory that enables comparing the different approaches is much called for. In this paper, we present an algebraic graded logic we refer to as LogAG capable of encompassing a wide variety of non-monotonic formalisms. We bui… ▽ More

    Submitted 21 July, 2019; originally announced July 2019.

    Comments: In Proceedings TARK 2019, arXiv:1907.08335

    Journal ref: EPTCS 297, 2019, pp. 155-174

  9. arXiv:1509.02492  [pdf

    cs.LO cs.SE

    Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems (extended version)

    Authors: Alessandro Trindade, Hussama Ismail, Lucas Cordeiro

    Abstract: We present an alternative approach to solve the hardware (HW) and software (SW) partitioning problem, which uses Bounded Model Checking (BMC) based on Satisfiability Modulo Theories (SMT) in conjunction with a multi-core support using Open Multi-Processing. The multi-core SMT-based BMC approach allows initializing many verification instances based on processors cores numbers available to the model… ▽ More

    Submitted 8 September, 2015; originally announced September 2015.

    Comments: extended version of paper published at SBESC'15

  10. arXiv:1509.02471  [pdf, ps, other

    cs.LO cs.SE

    Model Checking Embedded C Software using k-Induction and Invariants (extended version)

    Authors: Herbert Rocha, Hussama Ismail, Lucas Cordeiro, Raimundo Barreto

    Abstract: We present a proof by induction algorithm, which combines k-induction with invariants to model check embedded C software with bounded and unbounded loops. The k-induction algorithm consists of three cases: in the base case, we aim to find a counterexample with up to k loop unwindings; in the forward condition, we check whether loops have been fully unrolled and that the safety property P holds in… ▽ More

    Submitted 8 September, 2015; originally announced September 2015.

    Comments: extended version of paper published at SBESC'15. arXiv admin note: substantial text overlap with arXiv:1502.02327

  11. arXiv:1502.02327  [pdf, other

    cs.LO cs.SE

    Model Checking C Programs with Loops via k-Induction and Invariants

    Authors: Herbert Rocha, Hussama Ismail, Lucas Cordeiro, Raimundo Barreto

    Abstract: We present a novel proof by induction algorithm, which combines k-induction with invariants to model check C programs with bounded and unbounded loops. The k-induction algorithm consists of three cases: in the base case, we aim to find a counterexample with up to k loop unwindings; in the forward condition, we check whether loops have been fully unrolled and that the safety property P holds in all… ▽ More

    Submitted 8 February, 2015; originally announced February 2015.

  12. arXiv:1408.6427  [pdf, ps, other

    cs.IT

    Achievable Degrees-of-Freedom of the K-user SISO Interference Channel with Blind Interference Alignment using Staggered Antenna Switching

    Authors: Ahmed M. Alaa, Mahmoud H. Ismail

    Abstract: In this letter, we present the first characterization for the achievable Degrees-of-Freedom (DoF) by Blind Interference Alignment (BIA) using staggered antenna switching in the $K$-user Gaussian Interference Channel. In such scheme, each transmitter is equipped with one conventional antenna and each receiver is equipped with one reconfigurable (multi-mode) antenna. Assuming that the channel is kno… ▽ More

    Submitted 21 May, 2016; v1 submitted 27 August, 2014; originally announced August 2014.

  13. arXiv:1407.1383  [pdf, ps, other

    cs.IT

    Opportunistic Beamforming using Dumb Basis Patterns in Multiple Access Cognitive Channels

    Authors: Ahmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik

    Abstract: In this paper, we investigate multiuser diversity in interference-limited Multiple Access (MAC) underlay cognitive channels with Line-of-Sight interference (LoS) from the secondary to the primary network. It is shown that for $N$ secondary users, and assuming Rician interference channels, the secondary sum capacity scales like… ▽ More

    Submitted 5 July, 2014; originally announced July 2014.

  14. arXiv:1406.1724  [pdf, ps, other

    cs.IT

    Random Aerial Beamforming for Underlay Cognitive Radio with Exposed Secondary Users

    Authors: Ahmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik

    Abstract: In this paper, we introduce the exposed secondary users problem in underlay cognitive radio systems, where both the secondary-to-primary and primary-to-secondary channels have a Line-of-Sight (LoS) component. Based on a Rician model for the LoS channels, we show, analytically and numerically, that LoS interference hinders the achievable secondary user capacity when interference constraints are imp… ▽ More

    Submitted 1 August, 2015; v1 submitted 6 June, 2014; originally announced June 2014.

  15. arXiv:1403.7532  [pdf, ps, other

    cs.IT

    Opportunistic Spectrum Sharing using Dumb Basis Patterns: The Line-of-Sight Interference Scenario

    Authors: Ahmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik

    Abstract: We investigate a spectrum-sharing system with non-severely faded mutual interference links, where both the secondary-to-primary and primary-to-secondary channels have a Line-of-Sight (LoS) component. Based on a Rician model for the LoS channels, we show, analytically and numerically, that LoS interference hinders the achievable secondary user capacity. This is caused by the poor dynamic range of t… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

  16. arXiv:1403.0930  [pdf, ps, other

    cs.NI cs.IT

    Spectrum Sensing Via Reconfigurable Antennas: Fundamental Limits and Potential Gains

    Authors: Ahmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik

    Abstract: We propose a novel paradigm for spectrum sensing in cognitive radio networks that provides diversity and capacity benefits using a single antenna at the Secondary User (SU) receiver. The proposed scheme is based on a reconfigurable antenna: an antenna that is capable of altering its radiation characteristics by changing its geometric configuration. Each configuration is designated as an antenna mo… ▽ More

    Submitted 4 March, 2014; originally announced March 2014.

  17. Spectrum Sensing Via Reconfigurable Antennas: Is Cooperation of Secondary Users Indispensable?

    Authors: Ahmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik

    Abstract: This work presents an analytical framework for characterizing the performance of cooperative and noncooperative spectrum sensing schemes by figuring out the tradeoff between the achieved diversity and coding gains in each scheme. Based on this analysis, we try to answer the fundamental question: can we dispense with SUs cooperation and still achieve an arbitrary diversity gain? It is shown that th… ▽ More

    Submitted 30 January, 2014; originally announced January 2014.

    Comments: Accepted for IEEE WCNC 2014

  18. The IceProd Framework: Distributed Data Processing for the IceCube Neutrino Observatory

    Authors: M. G. Aartsen, R. Abbasi, M. Ackermann, J. Adams, J. A. Aguilar, M. Ahlers, D. Altmann, C. Arguelles, J. Auffenberg, X. Bai, M. Baker, S. W. Barwick, V. Baum, R. Bay, J. J. Beatty, J. Becker Tjus, K. -H. Becker, S. BenZvi, P. Berghaus, D. Berley, E. Bernardini, A. Bernhard, D. Z. Besson, G. Binder, D. Bindig , et al. (262 additional authors not shown)

    Abstract: IceCube is a one-gigaton instrument located at the geographic South Pole, designed to detect cosmic neutrinos, iden- tify the particle nature of dark matter, and study high-energy neutrinos themselves. Simulation of the IceCube detector and processing of data require a significant amount of computational resources. IceProd is a distributed management system based on Python, XML-RPC and GridFTP. It… ▽ More

    Submitted 22 August, 2014; v1 submitted 22 November, 2013; originally announced November 2013.

    Journal ref: Journal of Parallel & Distributed Computing 75:198,2015