Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–25 of 25 results for author: Mohammed, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14766  [pdf, other

    cs.CL cs.LG

    Evaluating Large Language Models for Public Health Classification and Extraction Tasks

    Authors: Joshua Harris, Timothy Laurence, Leo Loman, Fan Grayson, Toby Nonnenmacher, Harry Long, Loes WalsGriffith, Amy Douglas, Holly Fountain, Stelios Georgiou, Jo Hardstaff, Kathryn Hopkins, Y-Ling Chi, Galena Kuyumdzhieva, Lesley Larkin, Samuel Collins, Hamish Mohammed, Thomas Finnie, Luke Hounsome, Steven Riley

    Abstract: Advances in Large Language Models (LLMs) have led to significant interest in their potential to support human experts across a range of domains, including public health. In this work we present automated evaluations of LLMs for public health tasks involving the classification and extraction of free text. We combine six externally annotated datasets with seven new internally annotated datasets to e… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 33 pages. Feedback and comments are highly appreciated

    MSC Class: 68T50

  2. arXiv:2307.10513  [pdf

    cs.HC

    Technology in Association With Mental Health: Meta-ethnography

    Authors: Hamza Mohammed

    Abstract: This research paper presents a meta-analysis of the multifaceted role of technology in mental health. The pervasive influence of technology on daily lives necessitates a deep understanding of its impact on mental health services. This study synthesizes literature covering Behavioral Intervention Technologies (BITs), digital mental health interventions during COVID-19, young men's attitudes toward… ▽ More

    Submitted 26 July, 2023; v1 submitted 19 July, 2023; originally announced July 2023.

    Comments: Nine-page Meta-ethnography on technology's association with mental health

  3. arXiv:2207.08139  [pdf

    cs.CV cs.AI

    2D Self-Organized ONN Model For Handwritten Text Recognition

    Authors: Hanadi Hassen Mohammed, Junaid Malik, Somaya Al-Madeed, Serkan Kiranyaz

    Abstract: Deep Convolutional Neural Networks (CNNs) have recently reached state-of-the-art Handwritten Text Recognition (HTR) performance. However, recent research has shown that typical CNNs' learning performance is limited since they are homogeneous networks with a simple (linear) neuron model. With their heterogeneous network structure incorporating non-linear neurons, Operational Neural Networks (ONNs)… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

    Comments: To appear in in Applied Soft Computing Journal (Elsevier)

  4. arXiv:2201.04205  [pdf, other

    cs.GR

    JSOL: JavaScript Open-source Library for Grammar of Graphics

    Authors: Waleed A. Yousef, Hisham E. Mohammed, Andrew A. Naguib, Rafat S. Eid, Sherif E. Emabrak, Ahmed F. Hamed, Yusuf M. Khalifa, Shrouk T. AbdElrheem, Eman A. Awad, Sara G. Gaafar, Alaa M. Mamdoh, Nada A. Shawky

    Abstract: In this paper, we introduce the JavaScript Open-source Library (\libname), a high-level grammar for representing data in visualization graphs and plots. \libname~perspective on the grammar of graphics is unique; it provides state-of-art rules for encoding visual primitives that can be used to generate a known scene or to invent a new one. \libname~has ton rules developed specifically for data-mung… ▽ More

    Submitted 11 January, 2022; originally announced January 2022.

  5. Chaotic Fitness Dependent Optimizer for Planning and Engineering Design

    Authors: Hardi M. Mohammed, Tarik A. Rashid

    Abstract: Fitness Dependent Optimizer (FDO) is a recent metaheuristic algorithm that mimics the reproduction behavior of the bee swarm in finding better hives. This algorithm is similar to Particle Swarm Optimization (PSO) but it works differently. The algorithm is very powerful and has better results compared to other common metaheuristic algorithms. This paper aims at improving the performance of FDO, thu… ▽ More

    Submitted 21 August, 2021; originally announced October 2021.

    Report number: 25 pages

    Journal ref: Soft Computing, 2021

  6. arXiv:2107.05828  [pdf, other

    cs.CV

    Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things

    Authors: Hawzhin Mohammed, Tolulope A. Odetola, Nan Guo, Syed Rafay Hasan

    Abstract: In this paper, dynamic deployment of Convolutional Neural Network (CNN) architecture is proposed utilizing only IoT-level devices. By partitioning and pipelining the CNN, it horizontally distributes the computation load among resource-constrained devices (called horizontal collaboration), which in turn increases the throughput. Through partitioning, we can decrease the computation and energy consu… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

    Comments: 5 pages, 4 figures, and 4 tables

  7. FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack

    Authors: Tolulope Odetola, Faiq Khalid, Travis Sandefur, Hawzhin Mohammed, Syed Rafay Hasan

    Abstract: To reduce the time-to-market and access to state-of-the-art techniques, CNN hardware mapping and deployment on embedded accelerators are often outsourced to untrusted third parties, which is going to be more prevalent in futuristic artificial intelligence of things (AIoT) systems. These AIoT systems anticipate horizontal collaboration among different resource-constrained AIoT node devices, where C… ▽ More

    Submitted 25 August, 2021; v1 submitted 12 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in IEEE Access

    Journal ref: IEEE Access, vol. 9, pp. 115370-115387, 2021

  8. A New K means Grey Wolf Algorithm for Engineering Problems

    Authors: Hardi M. Mohammed, Zrar Kh. Abdul, Tarik A. Rashid, Abeer Alsadoon, Nebojsa Bacanin

    Abstract: Purpose: The development of metaheuristic algorithms has increased by researchers to use them extensively in the field of business, science, and engineering. One of the common metaheuristic optimization algorithms is called Grey Wolf Optimization (GWO). The algorithm works based on imitation of the wolves' searching and the process of attacking grey wolves. The main purpose of this paper to overco… ▽ More

    Submitted 26 February, 2021; originally announced March 2021.

    Comments: 15 pages. World Journal of Engineering, 2021

  9. arXiv:2102.09099  [pdf

    eess.IV cs.CV cs.LG q-bio.QM

    NuCLS: A scalable crowdsourcing, deep learning approach and dataset for nucleus classification, localization and segmentation

    Authors: Mohamed Amgad, Lamees A. Atteya, Hagar Hussein, Kareem Hosny Mohammed, Ehab Hafiz, Maha A. T. Elsebaie, Ahmed M. Alhusseiny, Mohamed Atef AlMoslemany, Abdelmagid M. Elmatboly, Philip A. Pappalardo, Rokia Adel Sakr, Pooya Mobadersany, Ahmad Rachid, Anas M. Saad, Ahmad M. Alkashash, Inas A. Ruhban, Anas Alrefai, Nada M. Elgazar, Ali Abdulkarim, Abo-Alela Farag, Amira Etman, Ahmed G. Elsaeed, Yahya Alagha, Yomna A. Amer, Ahmed M. Raslan , et al. (12 additional authors not shown)

    Abstract: High-resolution mapping of cells and tissue structures provides a foundation for developing interpretable machine-learning models for computational pathology. Deep learning algorithms can provide accurate mappings given large numbers of labeled instances for training and validation. Generating adequate volume of quality labels has emerged as a critical barrier in computational pathology given the… ▽ More

    Submitted 17 February, 2021; originally announced February 2021.

    Journal ref: GigaScience, 11 (2022)

  10. arXiv:2007.07858  [pdf, other

    cs.DB

    Continuous Prefetch for Interactive Data Applications

    Authors: Haneen Mohammed, Ziyun Wei, Eugene Wu, Ravi Netravali

    Abstract: Interactive data visualization and exploration (DVE) applications are often network-bottlenecked due to bursty request patterns, large response sizes, and heterogeneous deployments over a range of networks and devices. This makes it difficult to ensure consistently low response times (< 100ms). Khameleon is a framework for DVE applications that uses a novel combination of prefetching and response… ▽ More

    Submitted 15 July, 2020; originally announced July 2020.

  11. arXiv:2006.09301  [pdf, other

    cs.NI

    Collaborative Pipeline Using Opportunistic Mobile Resources via D2D for Computation-Intensive Tasks

    Authors: Terry N. Guo, Hawzhin Mohammed, Syed R. Hasan

    Abstract: This paper proposes a mobile pipeline computing concept in a Device-to-Device (D2D) communication setup and studies related issues, where D2D is likely based on millimeter-wave (mmWave) in the 5G mobile communication. The proposed opportunistic system employs a cluster of pipelined resource-limited devices on the move to handle real-time on-site computation-intensive tasks for which current cloud… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  12. arXiv:2006.09276  [pdf, other

    cs.CV cs.CR

    How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?

    Authors: Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan

    Abstract: Convolutional Neural Networks (CNN) has found successful adoption in many applications. The deployment of CNN on resource-constrained edge devices have proved challenging. CNN distributed deployment across different edge devices has been adopted. In this paper, we propose Trojan attacks on CNN deployed across a distributed edge network across different nodes. We propose five stealthy attack scenar… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  13. A Novel Hybrid GWO with WOA for Global Numerical Optimization and Solving Pressure Vessel Design

    Authors: Hardi M. Mohammed, Tarik A. Rashid

    Abstract: A recent metaheuristic algorithm, such as Whale Optimization Algorithm (WOA), was proposed. The idea of proposing this algorithm belongs to the hunting behavior of the humpback whale. However, WOA suffers from poor performance in the exploitation phase and stagnates in the local best solution. Grey Wolf Optimization (GWO) is a very competitive algorithm comparing to other common metaheuristic algo… ▽ More

    Submitted 28 February, 2020; originally announced March 2020.

    Comments: 28 pages

    Journal ref: Neural Computing and Applications, 2020

  14. arXiv:2001.11567  [pdf, other

    cs.NI eess.SP

    Learning from Peers at the Wireless Edge

    Authors: Shuvam Chakraborty, Hesham Mohammed, Dola Saha

    Abstract: The last mile connection is dominated by wireless links where heterogeneous nodes share the limited and already crowded electromagnetic spectrum. Current contention based decentralized wireless access system is reactive in nature to mitigate the interference. In this paper, we propose to use neural networks to learn and predict spectrum availability in a collaborative manner such that its availabi… ▽ More

    Submitted 30 January, 2020; originally announced January 2020.

  15. arXiv:1911.00783  [pdf, other

    cs.CR cs.LG stat.ML

    A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)

    Authors: Tolulope A. Odetola, Hawzhin Raoof Mohammed, Syed Rafay Hasan

    Abstract: Deep learning architectures (DLA) have shown impressive performance in computer vision, natural language processing and so on. Many DLA make use of cloud computing to achieve classification due to the high computation and memory requirements. Privacy and latency concerns resulting from cloud computing has inspired the deployment of DLA on embedded hardware accelerators. To achieve short time-to-ma… ▽ More

    Submitted 27 January, 2021; v1 submitted 2 November, 2019; originally announced November 2019.

  16. arXiv:1909.01086  [pdf

    cs.CY

    Automated Data Integration, Cleaning and Analysis Using Data Mining and SPSS Tool For Technical School in Malaysia

    Authors: Tajul Rosli Razak, Abdul Hapes Mohammed, Noorfaizalfarid Mohd Noor, Muhamad Arif Hashim

    Abstract: This study aims to integrate, clean and analysis through automated data mining techniques. Using data mining (DM) techniques is one of the processes of transferring raw data from current educational system to meaningful information that can be used to help the school community to make a right decision to achieve much better results. This proved DM provides means to assist both educators and studen… ▽ More

    Submitted 15 August, 2019; originally announced September 2019.

    Journal ref: International Journal of Computer Science and Security (IJCSS 2012)

  17. arXiv:1903.10027  [pdf

    eess.SP cs.NI

    Core Access Hybridization in 5G

    Authors: Sudhir K. Routray, Habib H. Mohammed

    Abstract: The fifth generation (5G) cellular communication system will have several advanced features, majority of which will come into existence for the first time. According to the ITU recommendations, 5G will provide minimum 3 GB/s end to end data rates under the static conditions and in the mobile condition the minimum data rate is 100 Mb/s. The latency will be brought down to 1 ms and the device densit… ▽ More

    Submitted 24 March, 2019; originally announced March 2019.

    Comments: 4 pages, conference paper

  18. arXiv:1903.08763  [pdf

    cs.NE

    A Systematic and Meta-analysis Survey of Whale Optimization Algorithm

    Authors: Hardi M. Mohammed, Shahla U. Umar, Tarik A. Rashid

    Abstract: Whale Optimization Algorithm (WOA) is a nature-inspired meta-heuristic optimization algorithm, which was proposed by Mirjalili and Lewis in 2016. This algorithm has shown its ability to solve many problems. Comprehensive surveys have been conducted about some other nature-inspired algorithms, such as ABC, PSO, etc.Nonetheless, no survey search work has been conducted on WOA. Therefore, in this pap… ▽ More

    Submitted 24 April, 2019; v1 submitted 20 March, 2019; originally announced March 2019.

    Comments: Computational Intelligence and Neuroscience, Hindawi, Computational Intelligence and Neuroscience, Article ID 8718571

    Journal ref: Computational Intelligence and Neuroscience, 2019

  19. arXiv:1810.01851  [pdf, other

    cs.CR

    EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks

    Authors: Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya

    Abstract: In Advanced Metering Infrastructure (AMI) networks, smart meters should send fine-grained power consumption readings to electric utilities to perform real-time monitoring and energy management. However, these readings can leak sensitive information about consumers' activities. Various privacy-preserving schemes for collecting fine-grained readings have been proposed for AMI networks. These schemes… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

  20. arXiv:1807.11565  [pdf, other

    cs.CR

    Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks

    Authors: Hawzhin Mohammed, Syed Rafay Hasan, Mohammad Ashiqur Rahman

    Abstract: In Advanced Metering Infrastructure (AMI) systems, smart meters (SM) send fine-grained power consumption information to the utility company, yet this power consumption information can uncover sensitive information about the consumers' lifestyle. To allow the utility company to gather the power consumption information while safeguarding the consumers' privacy, different methods that broadly utilize… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: 6 pages, 8 figures, coference

  21. arXiv:1304.3183  [pdf

    cs.NI

    Characterization of Downlink Transmit Power Control during Soft Handover in WCDMA Systems

    Authors: Palash Gupta, Hussain Mohammed, M. M. A. Hashem

    Abstract: This paper presents the characterization of power control in WCDMA systems. We know that CDMA is an interference limited system. It is shown that the unbalance scheme is reliable and successful for both 2-way and 3-way soft handover. Unbalance scheme minimizes interference and speed up the soft handover algorithm to support more users quickly. Furthermore it requires minimum time to make decision… ▽ More

    Submitted 10 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 9th International Conference on Computer and Information Technology (ICCIT 2006), pp. 448-452, Dhaka, Bangladesh, December 21-23, (2006)

  22. arXiv:1302.1642  [pdf

    cs.NI

    The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET

    Authors: Hussein A. Mohammed, Adnan Hussein Ali, Hawraa Jassim Mohammed

    Abstract: Voice over Internet Protocol is a service from the Internet services that allows users to communicate with each other. Quality of Service is very sensitive to delay so that Voice over Internet Protocol needs it. The objective of this research is to study the effect of different queuing algorithms within the router on Voice over Internet Protocol Quality of Service. In this work, simulation tool OP… ▽ More

    Submitted 6 February, 2013; originally announced February 2013.

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013International Journal of Computer Networks

  23. Secure electronic lock using pic 16f628a microcontroller

    Authors: Muhanad Hayder Mohammed

    Abstract: The proposed system implements the electronic embedded lock, its provides a great benefit over traditional lock, which use the manual key, so if the key lost or theft then anybody could open the lock, while thieving or losing the long and complex password is harder compare to traditional key, furthermore combining both manual key with computerized password make the system more secure. Long passwor… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

    Journal ref: International Journal of Research in Computer Science IJORCS, September 21, 2012

  24. arXiv:1110.5889  [pdf, ps, other

    cs.GT math.PR

    The Multi-player Nonzero-sum Dynkin Game in Continuous Time

    Authors: Hamadene Said, Hassani Mohammed

    Abstract: In this paper we study the N-player nonzero-sum Dynkin game ($N\geq 3$) in continuous time, which is a non-cooperative game where the strategies are stopping times. We show that the game has a Nash equilibrium point for general payoff processes.

    Submitted 29 September, 2011; originally announced October 2011.

    MSC Class: 91A15; 91A10; 91A30; 60G40; 91A60

  25. arXiv:0711.3299  [pdf

    cs.OH

    Influence of Micro-Cantilever Geometry and Gap on Pull-in Voltage

    Authors: W. Faris, H. Mohammed, M. M. Abdalla, C. -H. Ling

    Abstract: In this paper, we study the behaviour of a microcantilever beam under electrostatic actuation using finite difference method. This problem has a lot of applications in MEMS based devices like accelerometers, switches and others. In this paper, we formulated the problem of a cantilever beam with proof mass at its end and carried out the finite difference solution. we studied the effects of length… ▽ More

    Submitted 21 November, 2007; originally announced November 2007.

    Comments: Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)

    Journal ref: Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)