Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Hashem, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.19324  [pdf, other

    cs.LG cs.CY

    Deep Learning Based Crime Prediction Models: Experiments and Analysis

    Authors: Rittik Basak Utsha, Muhtasim Noor Alif, Yeasir Rayhan, Tanzima Hashem, Mohammad Eunus Ali

    Abstract: Crime prediction is a widely studied research problem due to its importance in ensuring safety of city dwellers. Starting from statistical and classical machine learning based crime prediction methods, in recent years researchers have focused on exploiting deep learning based models for crime prediction. Deep learning based crime prediction models use complex architectures to capture the latent fe… ▽ More

    Submitted 27 July, 2024; originally announced July 2024.

    Comments: 20 pages, 6 figures

  2. arXiv:2404.16549  [pdf, other

    cs.LG

    Application of Long-Short Term Memory and Convolutional Neural Networks for Real-Time Bridge Scour Prediction

    Authors: Tahrima Hashem, Negin Yousefpour

    Abstract: Scour around bridge piers is a critical challenge for infrastructures around the world. In the absence of analytical models and due to the complexity of the scour process, it is difficult for current empirical methods to achieve accurate predictions. In this paper, we exploit the power of deep learning algorithms to forecast the scour depth variations around bridge piers based on historical sensor… ▽ More

    Submitted 3 May, 2024; v1 submitted 25 April, 2024; originally announced April 2024.

  3. arXiv:2308.06488  [pdf, other

    cs.CL cs.AI

    Generating Faithful Text From a Knowledge Graph with Noisy Reference Text

    Authors: Tahsina Hashem, Weiqing Wang, Derry Tanti Wijaya, Mohammed Eunus Ali, Yuan-Fang Li

    Abstract: Knowledge Graph (KG)-to-Text generation aims at generating fluent natural-language text that accurately represents the information of a given knowledge graph. While significant progress has been made in this task by exploiting the power of pre-trained language models (PLMs) with appropriate graph structure-aware modules, existing models still fall short of generating faithful text, especially when… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

  4. arXiv:2306.06600  [pdf, other

    cs.CY

    Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions

    Authors: Mohammed Eunus Ali, Muhammad Aamir Cheema, Tanzima Hashem, Anwaar Ulhaq, Muhammad Ali Babar

    Abstract: A Digital Twin (DT) is a virtual replica of a physical object or system, created to monitor, analyze, and optimize its behavior and characteristics. A Spatial Digital Twin (SDT) is a specific type of digital twin that emphasizes the geospatial aspects of the physical entity, incorporating precise location and dimensional attributes for a comprehensive understanding within its spatial environment.… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

    Comments: 26 pages, 2 figures

  5. arXiv:2112.13760  [pdf, other

    cs.DB

    A Crowd-enabled Solution for Privacy-Preserving and Personalized Safe Route Planning for Fixed or Flexible Destinations (Full Version)

    Authors: Fariha Tabassum Islam, Tanzima Hashem, Rifat Shahriyar

    Abstract: Ensuring travelers' safety on roads has become a research challenge in recent years. We introduce a novel safe route planning problem and develop an efficient solution to ensure the travelers' safety on roads. Though few research attempts have been made in this regard, all of them assume that people share their sensitive travel experiences with a centralized entity for finding the safest routes, w… ▽ More

    Submitted 9 September, 2022; v1 submitted 27 December, 2021; originally announced December 2021.

  6. arXiv:2107.14122  [pdf, other

    cs.DB

    Safest Nearby Neighbor Queries in Road Networks (Full Version)

    Authors: Punam Biswas, Tanzima Hashem, Muhammad Aamir Cheema

    Abstract: Traditional route planning and k nearest neighbors queries only consider distance or travel time and ignore road safety altogether. However, many travellers prefer to avoid risky or unpleasant road conditions such as roads with high crime rates (e.g., robberies, kidnapping, riots etc.) and bumpy roads. To facilitate safe travel, we introduce a novel query for road networks called the k safest near… ▽ More

    Submitted 26 April, 2022; v1 submitted 29 July, 2021; originally announced July 2021.

  7. arXiv:2012.08713  [pdf, other

    cs.LG

    AIST: An Interpretable Attention-based Deep Learning Model for Crime Prediction

    Authors: Yeasir Rayhan, Tanzima Hashem

    Abstract: Accuracy and interpretability are two essential properties for a crime prediction model. Because of the adverse effects that the crimes can have on human life, economy and safety, we need a model that can predict future occurrence of crime as accurately as possible so that early steps can be taken to avoid the crime. On the other hand, an interpretable model reveals the reason behind a model's pre… ▽ More

    Submitted 21 November, 2021; v1 submitted 15 December, 2020; originally announced December 2020.

  8. arXiv:1802.07046  [pdf, ps, other

    math.FA cs.CC

    Elementary Proofs of Some Stirling Bounds

    Authors: Nader H. Bshouty, Vivian E. Bshouty-Hurani, George Haddad, Thomas Hashem, Fadi Khoury, Omar Sharafy

    Abstract: We give elementary proofs of several Stirling's precise bounds. We first improve all the precise bounds from the literature and give new precise bounds. In particular, we show that for all $n\ge 8$ $$\sqrt{2πn}\left(\frac{n}{e}\right)^n e^{\frac{1}{12n}-\frac{1}{360n^3+103n}} \ge n!\ge \sqrt{2πn}\left(\frac{n}{e}\right)^n e^{\frac{1}{12n}-\frac{1}{360n^3+102n}}$$ and for all $n\ge 3$… ▽ More

    Submitted 22 May, 2018; v1 submitted 20 February, 2018; originally announced February 2018.

  9. arXiv:1712.00615  [pdf, ps, other

    cs.DS

    Adaptive Group Testing Algorithms to Estimate the Number of Defectives

    Authors: Nader H. Bshouty, Vivian E. Bshouty-Hurani, George Haddad, Thomas Hashem, Fadi Khoury, Omar Sharafy

    Abstract: We study the problem of estimating the number of defective items in adaptive Group testing by using a minimum number of queries. We improve the existing algorithm and prove a lower bound that show that, for constant estimation, the number of tests in our algorithm is optimal.

    Submitted 21 December, 2023; v1 submitted 2 December, 2017; originally announced December 2017.

  10. arXiv:1510.07382  [pdf, other

    cs.HC cs.CY cs.SI

    Impact of Imbalance Usage of Social Networking Sites on Families

    Authors: Anika Anwar, Ishrat Ahmed, Tanzima Hashem, Jalal Mahmud

    Abstract: With the proliferation of social networking sites (SNSs) such as Facebook and Google+, investigating the impact of SNSs on our lives has become an important research area in recent years. Though SNS usage plays a key role in connecting people with friends and families from distant places, SNSs also bring concern for families. We focus on imbalance SNS usage, i.e., an individual remains busy in usi… ▽ More

    Submitted 26 October, 2015; originally announced October 2015.

  11. Shared Execution of Path Queries on Road Networks

    Authors: Hossain Mahmud, Ashfaq Mahmood Amin, Mohammed Eunus Ali, Tanzima Hashem

    Abstract: The advancement of mobile technologies and the proliferation of map-based applications have enabled a user to access a wide variety of services that range from information queries to navigation systems. Due to the popularity of map-based applications among the users, the service provider often requires to answer a large number of simultaneous queries. Thus, processing queries efficiently on spatia… ▽ More

    Submitted 25 October, 2012; originally announced October 2012.

    Comments: 20 pages, 7 figures

    Journal ref: Lecture Notes in Computer Science book series (LNCS, 2013, volume 8098)

  12. arXiv:1104.2756  [pdf, other

    cs.DB

    Privacy Preserving Moving KNN Queries

    Authors: Tanzima Hashem, Lars Kulik, Rui Zhang

    Abstract: We present a novel approach that protects trajectory privacy of users who access location-based services through a moving k nearest neighbor (MkNN) query. An MkNN query continuously returns the k nearest data objects for a moving user (query point). Simply updating a user's imprecise location such as a region instead of the exact position to a location-based service provider (LSP) cannot ensure pr… ▽ More

    Submitted 14 April, 2011; originally announced April 2011.