Zum Hauptinhalt springen

Showing 1–23 of 23 results for author: Afreen

.
  1. arXiv:2409.10490  [pdf, other

    cs.SE

    Code Vulnerability Detection: A Comparative Analysis of Emerging Large Language Models

    Authors: Shaznin Sultana, Sadia Afreen, Nasir U. Eisty

    Abstract: The growing trend of vulnerability issues in software development as a result of a large dependence on open-source projects has received considerable attention recently. This paper investigates the effectiveness of Large Language Models (LLMs) in identifying vulnerabilities within codebases, with a focus on the latest advancements in LLM technology. Through a comparative analysis, we assess the pe… ▽ More

    Submitted 16 September, 2024; originally announced September 2024.

  2. arXiv:2407.01474  [pdf

    cs.CR

    Survey and Analysis of IoT Operating Systems: A Comparative Study on the Effectiveness and Acquisition Time of Open Source Digital Forensics Tools

    Authors: Jeffrey Fairbanks, Md Mashrur Arifin, Sadia Afreen, Alex Curtis

    Abstract: The main goal of this research project is to evaluate the effectiveness and speed of open-source forensic tools for digital evidence collecting from various Internet-of-Things (IoT) devices. The project will create and configure many IoT environments, across popular IoT operating systems, and run common forensics tasks in order to accomplish this goal. To validate these forensic analysis operation… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  3. arXiv:2405.12126  [pdf, other

    cs.CV cs.ET cs.LG cs.MM

    Alzheimer's Magnetic Resonance Imaging Classification Using Deep and Meta-Learning Models

    Authors: Nida Nasir, Muneeb Ahmed, Neda Afreen, Mustafa Sameer

    Abstract: Deep learning, a cutting-edge machine learning approach, outperforms traditional machine learning in identifying intricate structures in complex high-dimensional data, particularly in the domain of healthcare. This study focuses on classifying Magnetic Resonance Imaging (MRI) data for Alzheimer's disease (AD) by leveraging deep learning techniques characterized by state-of-the-art CNNs. Brain imag… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  4. A Genetic Algorithm-Based Support Vector Machine Approach for Intelligent Usability Assessment of m-Learning Applications

    Authors: Muhammad Asghar, Imran Sarwar Bajwa, Shabana Ramzan, Hina Afreen, Saima Abdullah

    Abstract: In the field of human-computer interaction (HCI), the usability assessment of m-learning (mobile-learning) applications is a real challenge. Such assessment typically involves extraction of the best features of an application like efficiency, effectiveness, learnability, cognition, memorability, etc., and further ranking of those features for an overall assessment of the quality of the mobile appl… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: 20 pages, 22 Figures, Journal Paper

    Journal ref: Mobile Information Systems Mobile Information Systems, Volume 2022, Article ID 1609757, 20 pages

  5. arXiv:2403.09375  [pdf, ps, other

    math.OC eess.SY

    Solvability of the Inverse Optimal Control problem based on the minimum principle

    Authors: Afreen Islam, Guido Herrmann, Joaquin Carrasco

    Abstract: In this paper, the solvability of the Inverse Optimal Control (IOC) problem based on two existing minimum principal methods, is analysed. The aim of this work is to answer the question regarding what kinds of trajectories, that is depending on the initial conditions of the closed-loop system and system dynamics, of the original optimal control problem, will result in the recovery of the true weigh… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: 8 pages, submitted to IEEE Transactions on Automatic Control

  6. arXiv:2403.09040  [pdf, other

    cs.CL

    RAGGED: Towards Informed Design of Retrieval Augmented Generation Systems

    Authors: Jennifer Hsia, Afreen Shaikh, Zhiruo Wang, Graham Neubig

    Abstract: Retrieval-augmented generation (RAG) can significantly improve the performance of language models (LMs) by providing additional context for tasks such as document-based question answering (DBQA). However, the effectiveness of RAG is highly dependent on its configuration. To systematically find the optimal configuration, we introduce RAGGED, a framework for analyzing RAG configurations across vario… ▽ More

    Submitted 12 August, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

  7. arXiv:2403.08825  [pdf, ps, other

    math.OC

    Stochastic controllability for a non-autonomous fractional neutral differential equation with infinite delay in abstract space

    Authors: Areefa Khatoon, Abdur Raheem, Asma Afreen

    Abstract: This paper deals with the controllability for a class of non-autonomous neutral differential equations of fractional order with infinite delay in an abstract space. The semi-group theory of bounded linear operators, fractional calculus, and stochastic analysis techniques have been implemented to achieve the main result. We prove the existence of mild solution and controllability of the system by u… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

    MSC Class: 26A33; 93B05; 34K05; 34K35; 47H08

  8. arXiv:2403.07823  [pdf, ps, other

    math.NA math.DS

    Time-discretization method for a multi-term time fractional differential equation with delay

    Authors: Areefa Khatoon, Abdur Raheem, Asma Afreen

    Abstract: This paper discusses a multi-term time-fractional delay differential equation in a real Hilbert space. An iterative scheme for a multi-term time-fractional differential equation is established using Rothe's method. The method of semi-discretization is extended to this kind of time fractional problem with delay in the case that the time delay parameter $ν>0$ satisfies $ν\leq T$, where $T$ denotes t… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    MSC Class: 34G20; 26A33; 37M15; 47H06; 34K30

  9. arXiv:2312.01676  [pdf, ps, other

    math.DS

    Controllability of a second-order impulsive neutral differential equation via resolvent operator technique

    Authors: Asma Afreen, Abdur Raheem, Areefa Khatoon

    Abstract: This paper uses the resolvent operator technique to investigate second-order non-autonomous neutral integrodifferential equations with impulsive conditions in a Banach space. We study the existence of a mild solution and the system's approximate controllability. The semigroup and resolvent operator theory, graph norm, and Krasnoselskii's fixed point theorem are used to demonstrate the results. Fin… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  10. arXiv:2311.17503  [pdf, ps, other

    math.DS

    Optimal controllability for multi-term time-fractional stochastic systems with non-instantaneous impulses

    Authors: Asma Afreen, Abdur Raheem, Areefa Khatoon

    Abstract: In the present paper, we study the existence and optimal controllability of a multi-term time-fractional stochastic system with non-instantaneous impulses. Using semigroup theory, stochastic analysis theory, and Krasnoselskii's fixed point theorem, we first establish the existence of a mild solution. Further, we obtain that there exists an optimal state-control pair of the system. Some examples ar… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  11. arXiv:2311.17497  [pdf, ps, other

    math.DS

    A study of nonlocal fractional neutral stochastic integrodifferential inclusions of order $1<α<2$ with impulses

    Authors: Asma Afreen, Abdur Raheem, Areefa Khatoon

    Abstract: This paper considers a class of nonlocal fractional neutral stochastic integrodifferential inclusions of order $1<α<2$ with impulses in a Hilbert space. We study the existence of the mild solution for the cases when the multi-valued map has convex and non-convex values. The results are obtained by combining fixed-point theorems with the fractional order cosine family, semigroup theory, and stochas… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  12. arXiv:2311.03664  [pdf

    cs.CY cs.CR

    Healthcare Security Breaches in the United States: Insights and their Socio-Technical Implications

    Authors: Megha M. Moncy, Sadia Afreen, Saptarshi Purkayastha

    Abstract: This research examines the pivotal role of human behavior in the realm of healthcare data management, situated at the confluence of technological advancements and human conduct. An in-depth analysis of security breaches in the United States from 2009 to the present elucidates the dominance of human-induced security breaches. While technological weak points are certainly a concern, our study highli… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: Accepted for presentation at the Workshop on Information Security and Privacy (WISP) 2023 Hosted by AIS SIGSEC Hyderabad, India, Sunday, December 10, 2023

  13. arXiv:2307.03485  [pdf

    physics.optics

    Enhancing the ultrafast third order nonlinear optical response by charge transfer in VSe2-reduced graphene oxide hybrid

    Authors: Vinod Kumar, Afreen, K. A. Sree Raj, Pratap mane, Brahmananda Chakraborty, Chandra S. Rout, K. V. Adarsh

    Abstract: Nonlinear optical phenomena play a critical role in understanding microscopic light-matter interactions and have far-reaching applications across various fields, such as biosensing, quantum information, optical switching, and all-optical data processing. Most of these applications require materials with high third-order absorptive and refractive optical nonlinearities. However, most materials show… ▽ More

    Submitted 7 July, 2023; originally announced July 2023.

  14. arXiv:2306.03723  [pdf, other

    cs.CL cs.AI cs.CE

    Financial Numeric Extreme Labelling: A Dataset and Benchmarking for XBRL Tagging

    Authors: Soumya Sharma, Subhendu Khatuya, Manjunath Hegde, Afreen Shaikh. Koustuv Dasgupta, Pawan Goyal, Niloy Ganguly

    Abstract: The U.S. Securities and Exchange Commission (SEC) mandates all public companies to file periodic financial statements that should contain numerals annotated with a particular label from a taxonomy. In this paper, we formulate the task of automating the assignment of a label to a particular numeral span in a sentence from an extremely large label set. Towards this task, we release a dataset, Financ… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: Accepted to ACL'23 Findings Paper

  15. arXiv:2210.12467  [pdf, other

    cs.CL

    ECTSum: A New Benchmark Dataset For Bullet Point Summarization of Long Earnings Call Transcripts

    Authors: Rajdeep Mukherjee, Abhinav Bohra, Akash Banerjee, Soumya Sharma, Manjunath Hegde, Afreen Shaikh, Shivani Shrivastava, Koustuv Dasgupta, Niloy Ganguly, Saptarshi Ghosh, Pawan Goyal

    Abstract: Despite tremendous progress in automatic summarization, state-of-the-art methods are predominantly trained to excel in summarizing short newswire articles, or documents with strong layout biases such as scientific articles or government reports. Efficient techniques to summarize financial documents, including facts and figures, have largely been unexplored, majorly due to the unavailability of sui… ▽ More

    Submitted 26 October, 2022; v1 submitted 22 October, 2022; originally announced October 2022.

    Comments: 14 pages; Accepted as a Long Paper in EMNLP 2022 (Main Conference); Codes: https://github.com/rajdeep345/ECTSum

    ACM Class: I.2.7

  16. arXiv:2210.10005  [pdf, other

    cs.CV

    Otsu based Differential Evolution Method for Image Segmentation

    Authors: Afreen Shaikh, Sharmila Botcha, Murali Krishna

    Abstract: This paper proposes an OTSU based differential evolution method for satellite image segmentation and compares it with four other methods such as Modified Artificial Bee Colony Optimizer (MABC), Artificial Bee Colony (ABC), Genetic Algorithm (GA), and Particle Swarm Optimization (PSO) using the objective function proposed by Otsu for optimal multilevel thresholding. The experiments conducted and th… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    ACM Class: I.2.10; I.4.6

  17. arXiv:2208.02670  [pdf

    stat.ML cs.LG

    Development and Validation of ML-DQA -- a Machine Learning Data Quality Assurance Framework for Healthcare

    Authors: Mark Sendak, Gaurav Sirdeshmukh, Timothy Ochoa, Hayley Premo, Linda Tang, Kira Niederhoffer, Sarah Reed, Kaivalya Deshpande, Emily Sterrett, Melissa Bauer, Laurie Snyder, Afreen Shariff, David Whellan, Jeffrey Riggio, David Gaieski, Kristin Corey, Megan Richards, Michael Gao, Marshall Nichols, Bradley Heintze, William Knechtle, William Ratliff, Suresh Balu

    Abstract: The approaches by which the machine learning and clinical research communities utilize real world data (RWD), including data captured in the electronic health record (EHR), vary dramatically. While clinical researchers cautiously use RWD for clinical investigations, ML for healthcare teams consume public datasets with minimal scrutiny to develop new algorithms. This study bridges this gap by devel… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: Presented at 2022 Machine Learning in Health Care Conference

  18. High-Performance Computing for SKA Transient Search: Use of FPGA based Accelerators -- a brief review

    Authors: R. Aafreen, R. Abhishek, B. Ajithkumar, Arunkumar M. Vaidyanathan, Indrajit. V. Barve, Sahana Bhattramakki, Shashank Bhat, B. S. Girish, Atul Ghalame, Y. Gupta, Harshal G. Hayatnagarkar, P. A. Kamini, A. Karastergiou, L. Levin, S. Madhavi, M. Mekhala, M. Mickaliger, V. Mugundhan, Arun Naidu, J. Oppermann, B. Arul Pandian, N. Patra, A. Raghunathan, Jayanta Roy, Shiv Sethi , et al. (12 additional authors not shown)

    Abstract: This paper presents the High-Performance computing efforts with FPGA for the accelerated pulsar/transient search for the SKA. Case studies are presented from within SKA and pathfinder telescopes highlighting future opportunities. It reviews the scenario that has shifted from offline processing of the radio telescope data to digitizing several hundreds/thousands of antenna outputs over huge bandwid… ▽ More

    Submitted 17 January, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Accepted for publication in the JoAA special issue on SKA (2023)

  19. arXiv:2205.01931  [pdf, other

    cs.CV cs.LG

    Mapping the landscape of histomorphological cancer phenotypes using self-supervised learning on unlabeled, unannotated pathology slides

    Authors: Adalberto Claudio Quiros, Nicolas Coudray, Anna Yeaton, Xinyu Yang, Bojing Liu, Hortense Le, Luis Chiriboga, Afreen Karimkhan, Navneet Narula, David A. Moore, Christopher Y. Park, Harvey Pass, Andre L. Moreira, John Le Quesne, Aristotelis Tsirigos, Ke Yuan

    Abstract: Definitive cancer diagnosis and management depend upon the extraction of information from microscopy images by pathologists. These images contain complex information requiring time-consuming expert human interpretation that is prone to human bias. Supervised deep learning approaches have proven powerful for classification tasks, but they are inherently limited by the cost and quality of annotation… ▽ More

    Submitted 1 September, 2023; v1 submitted 4 May, 2022; originally announced May 2022.

  20. arXiv:2111.12317  [pdf, other

    cs.CL

    Handling tree-structured text: parsing directory pages

    Authors: Sarang Shrivastava, Afreen Shaikh, Shivani Shrivastava, Chung Ming Ho, Pradeep Reddy, Vijay Saraswat

    Abstract: The determination of the reading sequence of text is fundamental to document understanding. This problem is easily solved in pages where the text is organized into a sequence of lines and vertical alignment runs the height of the page (producing multiple columns which can be read from left to right). We present a situation -- the directory page parsing problem -- where information is presented on… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  21. arXiv:1902.09987  [pdf

    physics.med-ph

    Review of Cost Reduction Methods in Photoacoustic Computed Tomography

    Authors: Afreen Fatima, Karl Kratkiewicz, Rayyan Manwar, Mohsin Zafar, Ruiying Zhang, Bin Huang, Neda Dadashzadesh, Jun Xia, Mohammad Avanaki

    Abstract: Photoacoustic Computed Tomography (PACT) is a major configuration of photoacoustic imaging, a hybrid noninvasive modality for both functional and molecular imaging. PACT has rapidly gained importance in the field of biomedical imaging due to superior performance as compared to conventional optical imaging counterparts. However, the overall cost of developing a PACT system is one of the challenges… ▽ More

    Submitted 29 May, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 33 pages, 10 figures, 5 tables

  22. arXiv:1805.04882  [pdf

    cs.DL

    Interdisciplinary collaboration in research networks: Empirical analysis of energy-related research in Greece

    Authors: Georgios A. Tritsaris, Afreen Siddiqi

    Abstract: Technological innovation is intimately related to knowledge creation and recombination. In this work we introduce a combined statistical and network-based approach to study collaboration in scientific authorship. We apply it to characterize recent research efforts in renewable energy technology and its intersections with the domains of nanoscience and nanotechnology with focus on materials, and el… ▽ More

    Submitted 31 March, 2019; v1 submitted 13 May, 2018; originally announced May 2018.

    Comments: 21 pages, 6 figures, 2 tables, 1 SI

  23. arXiv:1107.3631  [pdf

    cs.CR

    A Review on Elliptic Curve Cryptography for Embedded Systems

    Authors: Rahat Afreen, S. C. Mehrotra

    Abstract: Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985.Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC systems, the strength of security depends on la… ▽ More

    Submitted 19 July, 2011; originally announced July 2011.

    Comments: Review Article

    Journal ref: International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011, Pp 84-103