Zum Hauptinhalt springen

Showing 1–22 of 22 results for author: Hassan, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.15193  [pdf, other

    cs.CC

    The Complexity of (P3, H)-Arrowing and Beyond

    Authors: Zohair Raza Hassan

    Abstract: Often regarded as the study of how order emerges from randomness, Ramsey theory has played an important role in mathematics and computer science, giving rise to applications in numerous domains such as logic, parallel processing, and number theory. The core of graph Ramsey theory is arrowing: For fixed graphs $F$ and $H$, the $(F, H)$-Arrowing problem asks whether a given graph, $G$, has a red/blu… ▽ More

    Submitted 21 July, 2024; originally announced July 2024.

    Comments: To appear in MFCS 2024

  2. arXiv:2401.10251  [pdf, other

    cs.IT

    Non-Terrestrial Network (NTN): a Novel Alternate Fractional Programming for the Downlink Channels Power Allocation

    Authors: Mahfuzur Rahman, Zoheb Hassan, Jeffrey H. Reed, Lingjia Liu

    Abstract: Non-terrestrial network (NTN) communication has garnered considerable attention from government entities, industries, and academia in recent times. NTN networks encompass a variety of systems, including Low Earth Orbit (LEO) satellites, Medium Earth Orbit (MEO) satellites, Geostationary Earth Orbit (GEO) satellites, High Altitude Platforms (HAPS), and Low Altitude Platforms (LAPS). Furthermore, th… ▽ More

    Submitted 17 December, 2023; originally announced January 2024.

  3. arXiv:2401.09354  [pdf

    eess.AS cs.AI cs.SD

    Transcending Controlled Environments Assessing the Transferability of ASRRobust NLU Models to Real-World Applications

    Authors: Hania Khan, Aleena Fatima Khalid, Zaryab Hassan

    Abstract: This research investigates the transferability of Automatic Speech Recognition (ASR)-robust Natural Language Understanding (NLU) models from controlled experimental conditions to practical, real-world applications. Focused on smart home automation commands in Urdu, the study assesses model performance under diverse noise profiles, linguistic variations, and ASR error scenarios. Leveraging the Urdu… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  4. arXiv:2307.10510  [pdf, other

    cs.CC

    The Complexity of $(P_k, P_\ell)$-Arrowing

    Authors: Zohair Raza Hassan, Edith Hemaspaandra, Stanisław Radziszowski

    Abstract: For fixed nonnegative integers $k$ and $\ell$, the $(P_k, P_\ell)$-Arrowing problem asks whether a given graph, $G$, has a red/blue coloring of $E(G)$ such that there are no red copies of $P_k$ and no blue copies of $P_\ell$. The problem is trivial when $\max(k,\ell) \leq 3$, but has been shown to be coNP-complete when $k = \ell = 4$. In this work, we show that the problem remains coNP-complete fo… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: Accepted to FCT 2023

  5. arXiv:2303.09494  [pdf, other

    eess.IV cs.CV

    Knowledge Distillation for Adaptive MRI Prostate Segmentation Based on Limit-Trained Multi-Teacher Models

    Authors: Eddardaa Ben Loussaief, Hatem Rashwan, Mohammed Ayad, Mohammed Zakaria Hassan, Domenec Puig

    Abstract: With numerous medical tasks, the performance of deep models has recently experienced considerable improvements. These models are often adept learners. Yet, their intricate architectural design and high computational complexity make deploying them in clinical settings challenging, particularly with devices with limited resources. To deal with this issue, Knowledge Distillation (KD) has been propose… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  6. arXiv:2303.00032  [pdf, other

    cs.IT

    Decentralized Model Dissemination Empowered Federated Learning in mmWave Aerial-Terrestrial Integrated Networks

    Authors: Mohammed S. Al-Abiad, Md. Zoheb Hassan, Md. Jahangir Hossain

    Abstract: It is anticipated that aerial-terrestrial integrated networks incorporating unmanned aerial vehicles (UAVs) mounted relays will offer improved coverage and connectivity in the beyond 5G era. Meanwhile, federated learning (FL) is a promising distributed machine learning technique for building inference models over wireless networks due to its ability to maintain user privacy and reduce communicatio… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    Comments: 12 figures, 14 pages

  7. arXiv:2111.11471  [pdf, ps, other

    cs.CL

    Visual Sentiment Analysis: A Natural DisasterUse-case Task at MediaEval 2021

    Authors: Syed Zohaib Hassan, Kashif Ahmad, Michael A. Riegler, Steven Hicks, Nicola Conci, Paal Halvorsen, Ala Al-Fuqaha

    Abstract: The Visual Sentiment Analysis task is being offered for the first time at MediaEval. The main purpose of the task is to predict the emotional response to images of natural disasters shared on social media. Disaster-related images are generally complex and often evoke an emotional response, making them an ideal use case of visual sentiment analysis. We believe being able to perform meaningful analy… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: 3 pages

  8. arXiv:2109.01494  [pdf, other

    cs.LG cs.AI cs.DS

    Computing Graph Descriptors on Edge Streams

    Authors: Zohair Raza Hassan, Sarwan Ali, Imdadullah Khan, Mudassir Shabbir, Waseem Abbas

    Abstract: Feature extraction is an essential task in graph analytics. These feature vectors, called graph descriptors, are used in downstream vector-space-based graph analysis models. This idea has proved fruitful in the past, with spectral-based graph descriptors providing state-of-the-art classification accuracy. However, known algorithms to compute meaningful descriptors do not scale to large graphs sinc… ▽ More

    Submitted 8 April, 2023; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Extension of work accepted to PAKDD 2020. Accepted to ACM TKDD in 2023

  9. arXiv:2107.03520  [pdf, other

    eess.SP cs.LG

    Energy Efficient Federated Learning in Integrated Fog-Cloud Computing Enabled Internet-of-Things Networks

    Authors: Mohammed S. Al-Abiad, Md. Zoheb Hassan, Md. Jahangir Hossain

    Abstract: We investigate resource allocation scheme to reduce the energy consumption of federated learning (FL) in the integrated fog-cloud computing enabled Internet-of-things (IoT) networks. In the envisioned system, IoT devices are connected with the centralized cloud server (CS) via multiple fog access points (F-APs). We consider two different scenarios for training the local models. In the first scenar… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

    Comments: 30, 10, article

  10. arXiv:2104.11801  [pdf, other

    cs.IT

    Task Offloading Optimization in NOMA-Enabled Multi-hop Mobile Edge Computing System Using Conflict Graph

    Authors: Mohammed S. Al-Abiad, Md. Zoheb Hassan, Md. Jahangir Hossain

    Abstract: Resource allocation is investigated for offloading computational-intensive tasks in multi-hop mobile edge computing (MEC) system. The envisioned system has both the cooperative access points (AP) with the computing capability and the MEC servers. A user-device (UD) therefore first uploads a computing task to the nearest AP, and the AP can either locally process the received task or offload to MEC… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 15 pages, 9 figures, paper

  11. arXiv:2103.12134  [pdf, other

    cs.IT

    A Joint Reinforcement-Learning Enabled Caching and Cross-Layer Network Code for Sum-Rate Maximization in F-RAN with D2D Communications

    Authors: Mohammed S. Al-Abiad, Md. Zoheb Hassan, Md. Jahangir Hossain

    Abstract: In this paper, we leverage reinforcement learning (RL) and cross-layer network coding (CLNC) for efficiently pre-fetching users' contents to the local caches and delivering these contents to users in a downlink fog-radio access network (F-RAN) with device-to-device (D2D) communications. In the considered system, fog access points (F-APs) and cache-enabled D2D (CE-D2D) users are equipped with local… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

    Comments: 15 pages, 9 figures, journal

  12. arXiv:2103.01196  [pdf, other

    cs.CL

    Sentiment Analysis of Users' Reviews on COVID-19 Contact Tracing Apps with a Benchmark Dataset

    Authors: Kashif Ahmad, Firoj Alam, Junaid Qadir, Basheer Qolomany, Imran Khan, Talhat Khan, Muhammad Suleman, Naina Said, Syed Zohaib Hassan, Asma Gul, Ala Al-Fuqaha

    Abstract: Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. Thanks to digital technologies, such as smartphones and wearable devices, contacts of COVID-19 patients can be easily traced and informed about their potential exposure to the virus. To this aim, several interesting mobile applications have been developed. However, there are ever-growing concerns over… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Comments: 11 pages, 6 figures

  13. arXiv:2102.03405  [pdf, other

    cs.IT

    Throughput Maximization of Network-Coded and Multi-Level Cache-Enabled Heterogeneous Network

    Authors: Mohammed S. Al-Abiad, Md. Zoheb Hassan, Md. Jahangir Hossain

    Abstract: One of the paramount advantages of multi-level cache-enabled (MLCE) networks is pushing contents proximity to the network edge and proactively caching them at multiple transmitters (i.e., small base-stations (SBSs), unmanned aerial vehicles (UAVs), and cache-enabled device-to-device (CE-D2D) users). As such, the fronthaul congestion between a core network and a large number of transmitters is alle… ▽ More

    Submitted 5 February, 2021; originally announced February 2021.

    Comments: 5 pages, 4 figures, letter

  14. arXiv:2101.07291  [pdf, other

    cs.IT

    Cross-Layer Network Codes for Content Delivery in Cache-Enabled D2D Networks

    Authors: Mohammed S. Al-Abiad, Md. Zoheb Hassan, Md. Jahangir Hossain

    Abstract: In this paper, we consider the use of cross-layer network coding (CLNC), caching, and device-to-device (D2D) communications to jointly optimize the delivery of a set of popular contents to a set of user devices (UDs). In the considered D2D network, a group of near-by UDs cooperate with each other and use NC to combine their cached files, so as the completion time required for delivering all reques… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 12 pages, 5 figures, paper

  15. arXiv:2011.14944  [pdf, ps, other

    cs.CV

    Flood Detection via Twitter Streams using Textual and Visual Features

    Authors: Firoj Alam, Zohaib Hassan, Kashif Ahmad, Asma Gul, Michael Reiglar, Nicola Conci, Ala AL-Fuqaha

    Abstract: The paper presents our proposed solutions for the MediaEval 2020 Flood-Related Multimedia Task, which aims to analyze and detect flooding events in multimedia content shared over Twitter. In total, we proposed four different solutions including a multi-modal solution combining textual and visual information for the mandatory run, and three single modal image and text-based solutions as optional ru… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

    Comments: 3 pages

  16. arXiv:2009.03051  [pdf, other

    cs.CV cs.IR cs.MM

    Visual Sentiment Analysis from Disaster Images in Social Media

    Authors: Syed Zohaib Hassan, Kashif Ahmad, Steven Hicks, Paal Halvorsen, Ala Al-Fuqaha, Nicola Conci, Michael Riegler

    Abstract: The increasing popularity of social networks and users' tendency towards sharing their feelings, expressions, and opinions in text, visual, and audio content, have opened new opportunities and challenges in sentiment analysis. While sentiment analysis of text streams has been widely explored in literature, sentiment analysis from images and videos is relatively new. This article focuses on visual… ▽ More

    Submitted 4 September, 2020; originally announced September 2020.

    Comments: 10 pages, 6 figures, 6 tables. arXiv admin note: substantial text overlap with arXiv:2002.03773

  17. arXiv:2009.02945  [pdf, other

    cs.CC

    A Simpler NP-Hardness Proof for Familial Graph Compression

    Authors: Ammar Ahmed, Zohair Raza Hassan, Mudassir Shabbir

    Abstract: This document presents a simpler proof showcasing the NP-hardness of Familial Graph Compression.

    Submitted 7 September, 2020; originally announced September 2020.

  18. arXiv:2007.03827  [pdf, other

    cs.IT

    Device-Clustering and Rate-Splitting Enabled Device-to-Device Cooperation Framework in Fog Radio Access Network

    Authors: Md. Zoheb Hassan, Md. Jahangir Hossain, Julian Cheng, Victor C. M. Leung

    Abstract: Resource allocation is investigated to enhance the performance of device-to-device (D2D) cooperation in a fog radio access network (F-RAN) architecture. Our envisioned framework enables two D2D links to share certain orthogonal radio resource blocks (RRBs) by forming device-clusters. In each device-cluster, both content-holder device-users (DUs) transmit to the content-requester DUs via an enhance… ▽ More

    Submitted 14 April, 2021; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: 39 pages, 6 figures

  19. arXiv:2001.10301  [pdf, other

    cs.DB

    Estimating Descriptors for Large Graphs

    Authors: Zohair Raza Hassan, Mudassir Shabbir, Imdadullah Khan, Waseem Abbas

    Abstract: Embedding networks into a fixed dimensional feature space, while preserving its essential structural properties is a fundamental task in graph analytics. These feature vectors (graph descriptors) are used to measure the pairwise similarity between graphs. This enables applying data mining algorithms (e.g classification, clustering, or anomaly detection) on graph-structured data which have numerous… ▽ More

    Submitted 19 February, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Comments: Accepted to PAKDD 2020

  20. arXiv:1805.10271  [pdf, other

    cs.CL

    UMDuluth-CS8761 at SemEval-2018 Task 9: Hypernym Discovery using Hearst Patterns, Co-occurrence frequencies and Word Embeddings

    Authors: Arshia Z. Hassan, Manikya S. Vallabhajosyula, Ted Pedersen

    Abstract: Hypernym Discovery is the task of identifying potential hypernyms for a given term. A hypernym is a more generalized word that is super-ordinate to more specific words. This paper explores several approaches that rely on co-occurrence frequencies of word pairs, Hearst Patterns based on regular expressions, and word embeddings created from the UMBC corpus. Our system Babbage participated in Subtask… ▽ More

    Submitted 25 May, 2018; originally announced May 2018.

    Comments: 5 pages, to Appear in the Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval 2018), June 2018, New Orleans, LA

  21. arXiv:1803.06381  [pdf, other

    cs.NI

    An Edge Computing Empowered Radio Access Network With UAV-Mounted FSO Fronthaul and Backhaul: Key Challenges and Approaches

    Authors: Yanjie Dong, Md. Zoheb Hassan, Julian Cheng, Md. Jahangir Hossain, Victor C. M. Leung

    Abstract: One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network archi… ▽ More

    Submitted 16 March, 2018; originally announced March 2018.

    Comments: This work is accepted by IEEE Wireless Communications Magazine

  22. arXiv:1101.4730  [pdf, ps, other

    cond-mat.stat-mech cond-mat.dis-nn cs.SI physics.soc-ph

    Dynamic scaling, data-collapse and self-similarity in Barabási-Albert networks

    Authors: M. Kamrul Hassan, M. Zahedul Hassan, Neeaj I. Pavel

    Abstract: In this article, we show that if each node of the Barabási-Albert (BA) network is characterized by the generalized degree $q$, i.e. the product of their degree $k$ and the square root of their respective birth time, then the distribution function $F(q,t)$ exhibits dynamic scaling $F(q,t\rightarrow \infty)\sim t^{-1/2}φ(q/t^{1/2})$ where $φ(x)$ is the scaling function. We verified it by showing tha… ▽ More

    Submitted 7 April, 2011; v1 submitted 25 January, 2011; originally announced January 2011.

    Comments: 5 pages, six figures, Minor changes in the title, abstract, figures and in the text in response to referee reports

    Journal ref: J. Phys. A: Math. Theor. 44, 175101 (2011)