Skip to main content

Showing 1–24 of 24 results for author: Mahmood, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.07034  [pdf, ps, other

    cs.IR

    NetSight: Graph Attention Based Traffic Forecasting in Computer Networks

    Authors: Jinming Xing, Guoheng Sun, Hui Sun, Linchao Pan, Shakir Mahmood, Xuanhao Luo, Muhammad Shahzad

    Abstract: The traffic in today's networks is increasingly influenced by the interactions among network nodes as well as by the temporal fluctuations in the demands of the nodes. Traditional statistical prediction methods are becoming obsolete due to their inability to address the non-linear and dynamic spatio-temporal dependencies present in today's network traffic. The most promising direction of research… ▽ More

    Submitted 11 May, 2025; originally announced May 2025.

  2. arXiv:2504.14269  [pdf, other

    cs.HC

    Recognition of Frequencies of Short-Time SSVEP Signals Utilizing an SSCCA-Based Spatio-Spectral Feature Fusion Framework

    Authors: Saif Bashar, Samia Nasir Nira, Shabbir Mahmood, Md. Humaun Kabir, Sujit Roy, Iffat Farhana

    Abstract: A brain-computer interface (BCI) facilitates direct communication between the brain and external equipment through EEG, which is preferred for its superior temporal resolution. Among EEG techniques, the steady-state visual evoked potential (SSVEP) is favored due to its robust signal-to-noise ratio, minimal training demands, and elevated information transmission rate. Frequency detection in SSVEP-b… ▽ More

    Submitted 19 April, 2025; originally announced April 2025.

    Comments: This paper is presented in the Undergraduate Conference on Intelligent Computing and Systems (UCICS 2025) organised by Varendra University, Rajshahi, Bangladesh, 2025

  3. arXiv:2504.04664  [pdf, other

    eess.SP cs.CV

    Classification of ADHD and Healthy Children Using EEG Based Multi-Band Spatial Features Enhancement

    Authors: Md Bayazid Hossain, Md Anwarul Islam Himel, Md Abdur Rahim, Shabbir Mahmood, Abu Saleh Musa Miah, Jungpil Shin

    Abstract: Attention Deficit Hyperactivity Disorder (ADHD) is a common neurodevelopmental disorder in children, characterized by difficulties in attention, hyperactivity, and impulsivity. Early and accurate diagnosis of ADHD is critical for effective intervention and management. Electroencephalogram (EEG) signals have emerged as a non-invasive and efficient tool for ADHD detection due to their high temporal… ▽ More

    Submitted 6 April, 2025; originally announced April 2025.

  4. arXiv:2503.16832  [pdf, other

    cs.CV

    Joint Self-Supervised Video Alignment and Action Segmentation

    Authors: Ali Shah Ali, Syed Ahmed Mahmood, Mubin Saeed, Andrey Konin, M. Zeeshan Zia, Quoc-Huy Tran

    Abstract: We introduce a novel approach for simultaneous self-supervised video alignment and action segmentation based on a unified optimal transport framework. In particular, we first tackle self-supervised video alignment by developing a fused Gromov-Wasserstein optimal transport formulation with a structural prior, which trains efficiently on GPUs and needs only a few iterations for solving the optimal t… ▽ More

    Submitted 21 March, 2025; originally announced March 2025.

  5. arXiv:2502.10771  [pdf, other

    cs.CR

    Assessing the Trustworthiness of Electronic Identity Management Systems: Framework and Insights from Inception to Deployment

    Authors: Mirko Bottarelli, Gregory Epiphaniou, Shah Mahmood, Mark Hooper, Carsten Maple

    Abstract: The growing dependence on Electronic Identity Management Systems (EIDS) and recent advancements, such as non-human ID management, require a thorough evaluation of their trustworthiness. Assessing EIDS's trustworthiness ensures security, privacy, and reliability in managing sensitive user information. It safeguards against fraud, unauthorised access, and data breaches, fostering user confidence. Ex… ▽ More

    Submitted 15 February, 2025; originally announced February 2025.

  6. arXiv:2412.08540  [pdf, other

    cs.NI

    Orderly Management of Packets in RDMA by Eunomia

    Authors: Sana Mahmood, Jinqi Lu, Soudeh Ghorbani

    Abstract: To fulfill the low latency requirements of today's applications, deployment of RDMA in datacenters has become prevalent over the recent years. However, the in-order delivery requirement of RDMAs prevents them from leveraging powerful techniques that help improve the performance of datacenters, ranging from fine-grained load balancers to throughput-optimal expander topologies. We demonstrate experi… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

    ACM Class: C.2.2

  7. arXiv:2402.09432  [pdf

    cs.LG cs.NE cs.NI

    An Enhanced Analysis of Traffic Intelligence in Smart Cities Using Sustainable Deep Radial Function

    Authors: Ayad Ghany Ismaeel, S. J. Jereesha Mary, C. Anitha, Jaganathan Logeshwaran, Sarmad Nozad Mahmood, Sameer Alani, Akram H. Shather

    Abstract: Smart cities have revolutionized urban living by incorporating sophisticated technologies to optimize various aspects of urban infrastructure, such as transportation systems. Effective traffic management is a crucial component of smart cities, as it has a direct impact on the quality of life of residents and tourists. Utilizing deep radial basis function (RBF) networks, this paper describes a nove… ▽ More

    Submitted 24 January, 2024; originally announced February 2024.

    Comments: 25 pages, 6 figures, and 3 Tables

    Journal ref: Sustainability 2023, 15, x FOR PEER REVIEW

  8. Traffic Pattern Classification in Smart Cities Using Deep Recurrent Neural Network

    Authors: Ayad Ghany Ismaeel, Krishnadas Janardhanan, Manishankar Sankar, Yuvaraj Natarajan, Sarmad Nozad Mahmood, Sameer Alani, Akram H. Shather

    Abstract: This paper examines the use of deep recurrent neural networks to classify traffic patterns in smart cities. We propose a novel approach to traffic pattern classification based on deep recurrent neural networks, which can effectively capture traffic patterns' dynamic and sequential features. The proposed model combines convolutional and recurrent layers to extract features from traffic pattern data… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: 18 pages, 6 figures, 3 tables

    Journal ref: sustainability 2023, 15, 14522

  9. arXiv:2211.13996  [pdf

    cs.SE cs.IT

    A Vision of DevOps Requirements Change Management Standardization

    Authors: Muhammad Azeem Akbar, Arif Ali Khan, Sajjad Mahmood, Saima Rafi

    Abstract: DevOps (development and operations) aims to shorten the software development process and provide continuous delivery with high software quality. To get the potential gains of DevOps, the software development industry considering global software development (GSD) environment to hire skilled human resources and round-the-clock working hours. However, due to the lack of frequent communication and coo… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

  10. arXiv:2211.13990  [pdf

    cs.SE cs.PL

    Quantum Software Engineering: A New Genre of Computing

    Authors: Muhammad Azeem Akbar, Arif Ali Khan, Sajjad Mahmood, Saima Rafi

    Abstract: Quantum computing (QC) is no longer only a scientific interest but is rapidly becoming an industrially available technology that can potentially tackle the limitations of classical computing. Over the last few years, major technology giants have invested in developing hardware and programming frameworks to develop quantum-specific applications. QC hardware technologies are gaining momentum, howeve… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

  11. arXiv:2209.09007  [pdf, other

    cs.LG cs.AI cs.NE cs.RO

    Comparative Study of Q-Learning and NeuroEvolution of Augmenting Topologies for Self Driving Agents

    Authors: Arhum Ishtiaq, Maheen Anees, Sara Mahmood, Neha Jafry

    Abstract: Autonomous driving vehicles have been of keen interest ever since automation of various tasks started. Humans are prone to exhaustion and have a slow response time on the road, and on top of that driving is already quite a dangerous task with around 1.35 million road traffic incident deaths each year. It is expected that autonomous driving can reduce the number of driving accidents around the worl… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

  12. arXiv:2106.10714  [pdf, other

    quant-ph cs.LG

    Quantum Machine Learning: Fad or Future?

    Authors: Arhum Ishtiaq, Sara Mahmood

    Abstract: For the last few decades, classical machine learning has allowed us to improve the lives of many through automation, natural language processing, predictive analytics and much more. However, a major concern is the fact that we're fast approach the threshold of the maximum possible computational capacity available to us by the means of classical computing devices including CPUs, GPUs and Applicatio… ▽ More

    Submitted 20 June, 2021; originally announced June 2021.

  13. arXiv:2105.10059  [pdf, other

    cs.LG

    Model Compression

    Authors: Arhum Ishtiaq, Sara Mahmood, Maheen Anees, Neha Mumtaz

    Abstract: With time, machine learning models have increased in their scope, functionality and size. Consequently, the increased functionality and size of such models requires high-end hardware to both train and provide inference after the fact. This paper aims to explore the possibilities within the domain of model compression, discuss the efficiency of combining various levels of pruning and quantization,… ▽ More

    Submitted 4 September, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

  14. arXiv:2011.05805  [pdf

    cs.CY cs.AI cs.LO

    Crime Prediction Using Multiple-ANFIS Architecture and Spatiotemporal Data

    Authors: Mashnoon Islam, Redwanul Karim, Kalyan Roy, Saif Mahmood, Sadat Hossain, M. Rashedur Rahman

    Abstract: Statistical values alone cannot bring the whole scenario of crime occurrences in the city of Dhaka. We need a better way to use these statistical values to predict crime occurrences and make the city a safer place to live. Proper decision-making for the future is key in reducing the rate of criminal offenses in an area or a city. If the law enforcement bodies can allocate their resources efficient… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: Accepted Version, 2018 IEEE International Conference on Intelligent Systems (IS) September 25-27, Funchal - Madeira, Portugal

    MSC Class: 03B52; 68T07 ACM Class: I.2.3; I.2.6

  15. arXiv:2004.14439  [pdf, other

    cs.SI

    EER: Enterprise Expert Ranking using Employee Reputation

    Authors: Saba Mahmood, Anwar Ghani, Ali Daud, Syed Muhammad Saqlain

    Abstract: The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and knowledge of an employee that is not documented or self-disclosed has been addressed in this article. The existing reputation based approaches towards expertise ranking in enterprises uti… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 16 pages, 8 Figures, 6 Tables, 49 References

  16. arXiv:1912.07361  [pdf

    eess.SP cs.CV cs.LG eess.IV

    Classification of Brainwave Signals Based on Hybrid Deep Learning and an Evolutionary Algorithm

    Authors: Zhyar Rzgar K. Rostam, Sozan Abdullah Mahmood

    Abstract: Brainwave signals are read through Electroencephalogram (EEG) devices. These signals are generated from an active brain based on brain activities and thoughts. The classification of brainwave signals is a challenging task due to its non-stationary nature. To address the issue, this paper proposes a Convolutional Neural Network (CNN) model to classify brainwave signals. In order to evaluate the per… ▽ More

    Submitted 8 December, 2019; originally announced December 2019.

    Comments: 10 pages, 6 tables, and 5 figures

    Report number: 4_JZS_Comp_19

    Journal ref: JZS (2019) 21_2 35_44

  17. arXiv:1907.12741  [pdf, other

    cs.CV eess.IV

    Statistical Descriptors-based Automatic Fingerprint Identification: Machine Learning Approaches

    Authors: Hamid Jan, Amjad Ali, Shahid Mahmood, Gautam Srivastava

    Abstract: Identification of a person from fingerprints of good quality has been used by commercial applications and law enforcement agencies for many years, however identification of a person from latent fingerprints is very difficult and challenging. A latent fingerprint is a fingerprint left on a surface by deposits of oils and/or perspiration from the finger. It is not usually visible to the naked eye bu… ▽ More

    Submitted 18 July, 2019; originally announced July 2019.

    Comments: 10 pages, 4 figures

  18. arXiv:1901.01462  [pdf, other

    cs.NE

    Rethinking the Artificial Neural Networks: A Mesh of Subnets with a Central Mechanism for Storing and Predicting the Data

    Authors: Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, Asad Ullah, Uzair Saeed

    Abstract: The Artificial Neural Networks (ANNs) have been originally designed to function like a biological neural network, but does an ANN really work in the same way as a biological neural network? As we know, the human brain holds information in its memory cells, so if the ANNs use the same model as our brains, they should store datasets in a similar manner. The most popular type of ANN architecture is b… ▽ More

    Submitted 5 January, 2019; originally announced January 2019.

    Comments: SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS

  19. arXiv:1702.02537  [pdf

    cs.CV

    Soft Biometrics: Gender Recognition from Unconstrained Face Images using Local Feature Descriptor

    Authors: Olasimbo Ayodeji Arigbabu, Sharifah Mumtazah Syed Ahmad, Wan Azizun Wan Adnan, Salman Yussof, Saif Mahmood

    Abstract: Gender recognition from unconstrained face images is a challenging task due to the high degree of misalignment, pose, expression, and illumination variation. In previous works, the recognition of gender from unconstrained face images is approached by utilizing image alignment, exploiting multiple samples per individual to improve the learning ability of the classifier, or learning gender based on… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Journal ref: Journal of Information and Communication Technology (JICT), 2015

  20. arXiv:1611.06478  [pdf

    cs.CL cs.HC

    Visualizing Linguistic Shift

    Authors: Salman Mahmood, Rami Al-Rfou, Klaus Mueller

    Abstract: Neural network based models are a very powerful tool for creating word embeddings, the objective of these models is to group similar words together. These embeddings have been used as features to improve results in various applications such as document classification, named entity recognition, etc. Neural language models are able to learn word representations which have been used to capture semant… ▽ More

    Submitted 20 November, 2016; originally announced November 2016.

  21. MODLEACH: A Variant of LEACH for WSNs

    Authors: D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A. M. Memon, T. Zaman

    Abstract: Wireless sensor networks are appearing as an emerging need for mankind. Though, Such networks are still in research phase however, they have high potential to be applied in almost every field of life. Lots of research is done and a lot more is awaiting to be standardized. In this work, cluster based routing in wireless sensor networks is studied precisely. Further, we modify one of the most promin… ▽ More

    Submitted 26 July, 2013; originally announced July 2013.

    Comments: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, France

  22. arXiv:1206.2544  [pdf, other

    cs.CY cs.SI

    Education in Conflict Zones: a Web and Mobility Approach

    Authors: Shah Mahmood, Ismatullah Nazar

    Abstract: We propose a new framework for education in conflict zones, considering the explosive growth of social media, web services, and mobile Internet over the past decade. Moreover, we focus on one conflict zone, Afghanistan, as a case study, because of its alarmingly high illiteracy rate, lack of qualified teachers, rough terrain, and relatively high mobile penetration of over 50%. In several of Afghan… ▽ More

    Submitted 12 June, 2012; originally announced June 2012.

  23. arXiv:1203.4043  [pdf, ps, other

    cs.SI cs.CY physics.soc-ph

    Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract)

    Authors: Shah Mahmood, Yvo Desmedt

    Abstract: With over 750 million active users, Facebook is the most famous social networking website. One particular aspect of Facebook widely discussed in the news and heavily researched in academic circles is the privacy of its users. In this paper we introduce a zero day privacy loophole in Facebook. We call this the deactivated friend attack. The concept of the attack is very similar to cloaking in Star… ▽ More

    Submitted 19 March, 2012; originally announced March 2012.

    Comments: Full paper is presented at IEEE International Workshop on Security and Social Networking SESOC 2012, Lugano, Switzerland

  24. arXiv:1111.3530  [pdf, other

    cs.SI cs.CR

    Preliminary Analysis of Google+'s Privacy

    Authors: Shah Mahmood, Yvo Desmedt

    Abstract: In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Goog… ▽ More

    Submitted 15 November, 2011; originally announced November 2011.

    Comments: CCS'11, October 17-21, 2011, Chicago, Illinois, USA

    ACM Class: K.4.1; K.6.5