Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Khan, F H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14323  [pdf, other

    cs.CY

    SmartCS: Enabling the Creation of ML-Powered Computer Vision Mobile Apps for Citizen Science Applications without Coding

    Authors: Fahim Hasan Khan, Akila de Silva, Gregory Dusek, James Davis, Alex Pang

    Abstract: It is undeniable that citizen science contributes to the advancement of various fields of study. There are now software tools that facilitate the development of citizen science apps. However, apps developed with these tools rely on individual human skills to correctly collect useful data. Machine learning (ML)-aided apps provide on-field guidance to citizen scientists on data collection tasks. How… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2404.01352  [pdf, other

    physics.flu-dyn cs.AI cs.CV cs.GR

    VortexViz: Finding Vortex Boundaries by Learning from Particle Trajectories

    Authors: Akila de Silva, Nicholas Tee, Omkar Ghanekar, Fahim Hasan Khan, Gregory Dusek, James Davis, Alex Pang

    Abstract: Vortices are studied in various scientific disciplines, offering insights into fluid flow behavior. Visualizing the boundary of vortices is crucial for understanding flow phenomena and detecting flow irregularities. This paper addresses the challenge of accurately extracting vortex boundaries using deep learning techniques. While existing methods primarily train on velocity components, we propose… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: Under review

  3. arXiv:2401.11358  [pdf, other

    cs.CV

    ANNA: A Deep Learning Based Dataset in Heterogeneous Traffic for Autonomous Vehicles

    Authors: Mahedi Kamal, Tasnim Fariha, Afrina Kabir Zinia, Md. Abu Syed, Fahim Hasan Khan, Md. Mahbubur Rahman

    Abstract: Recent breakthroughs in artificial intelligence offer tremendous promise for the development of self-driving applications. Deep Neural Networks, in particular, are being utilized to support the operation of semi-autonomous cars through object identification and semantic segmentation. To assess the inadequacy of the current dataset in the context of autonomous and semi-autonomous cars, we created a… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  4. arXiv:2302.12983  [pdf, other

    cs.GR cs.CV cs.LG cs.MM

    RipViz: Finding Rip Currents by Learning Pathline Behavior

    Authors: Akila de Silva, Mona Zhao, Donald Stewart, Fahim Hasan Khan, Gregory Dusek, James Davis, Alex Pang

    Abstract: We present a hybrid machine learning and flow analysis feature detection method, RipViz, to extract rip currents from stationary videos. Rip currents are dangerous strong currents that can drag beachgoers out to sea. Most people are either unaware of them or do not know what they look like. In some instances, even trained personnel such as lifeguards have difficulty identifying them. RipViz produc… ▽ More

    Submitted 24 February, 2023; originally announced February 2023.

    Comments: This is the author's version of the article published in IEEE Transactions on Visualization and Computer Graphics, 2023

  5. Authoring Platform for Mobile Citizen Science Apps with Client-side ML

    Authors: Fahim Hasan Khan, Akila de Silva, Gregory Dusek, James Davis, Alex Pang

    Abstract: Data collection is an integral part of any citizen science project. Given the wide variety of projects, some level of expertise or, alternatively, some guidance for novice participants can greatly improve the quality of the collected data. A significant portion of citizen science projects depends on visual data, where photos or videos of different subjects are needed. Often these visual data are c… ▽ More

    Submitted 11 December, 2022; originally announced December 2022.

  6. arXiv:2212.05386  [pdf, other

    cs.SI

    A Hierarchical Approach for Investigating Social Features of a City from Mobile Phone Call Detail Records

    Authors: Fahim Hasan Khan, Mohammed Eunus Ali

    Abstract: Cellphone service-providers continuously collect Call Detail Records (CDR) as a usage log containing spatio-temporal traces of phone users. We proposed a multi-layered hierarchical analytical model for large spatio-temporal datasets and applied that for the progressive exploration of social features of a city, e.g., social activities, relationships, and groups, from CDR. This approach utilizes CDR… ▽ More

    Submitted 10 December, 2022; originally announced December 2022.

  7. arXiv:2012.06989  [pdf, other

    cs.NI cs.PF

    Network Traffic Control for Multi-homed End-hosts via SDN

    Authors: Anees Al-Najjar, Furqan Hameed Khan, Marius Portmann

    Abstract: Software Defined Networking (SDN) is an emerging technology of efficiently controlling and managing computer networks, such as in data centres, Wide Area Networks (WANs), as well as in ubiquitous communication. In this paper, we explore the idea of embedding the SDN components, represented by SDN controller and virtual switch, in end-hosts to improve network performance. In particular, we consider… ▽ More

    Submitted 13 December, 2020; originally announced December 2020.

    Comments: 13 pages, 26 Figures

    ACM Class: D.8.3; D.3.2

  8. Experimental Evaluation of LoRaWAN in NS-3

    Authors: Furqan Hameed Khan, Marius Portmann

    Abstract: Long Range Wide Area Networks (LoRaWAN) is an open medium access control (MAC) layer technology devised for the long range connectivity of massive number of low power network devices. This work gives an overview of the key aspects of LoRaWAN technology and presents results that we achieved via extensive evaluation of Class A LoRaWAN devices in different network settings using the state-of-the-art… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: 8 pages, 11 figures

    Journal ref: Proc. 28th Int. Telecommun. Netw. Appl. Conf. (ITNAC), pp. 1-8, Nov. 2019

  9. A Model for Reliable Uplink Transmissions in LoRaWAN

    Authors: Furqan Hameed Khan, Raja Jurdak, Marius Portmann

    Abstract: Long range wide area networks (LoRaWAN) technology provides a simple solution to enable low-cost services for low power internet-of-things (IoT) networks in various applications. The current evaluation of LoRaWAN networks relies on simulations or early testing, which are typically time consuming and prevent effective exploration of the design space. This paper proposes an analytical model to calcu… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: 11 pages, 8 figures

    Journal ref: Marius (2019) 147-156

  10. Joint QoS-control and Handover Optimization in Backhaul aware SDN-based LTE Networks

    Authors: Furqan Hameed Khan, Marius Portmann

    Abstract: Future cellular networks will be dense and require key traffic management technologies for fine-grained network control. The problem gets more complicated in the presence of different network segments with bottleneck links limiting the desired quality of service (QoS) delivery to the last mile user. In this work, we first design a framework for software-defined cellular networks (SDCN) and then pr… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

    Comments: 33 pages, 11 Figures. M. Wireless Netw (2019)

  11. arXiv:1003.1504  [pdf

    cs.AI

    Indexer Based Dynamic Web Services Discovery

    Authors: Saba Bashir, Farhan Hassan Khan, M. Younus Javed, Aihab Khan, Malik Sikandar Hayat Khiyal

    Abstract: Recent advancement in web services plays an important role in business to business and business to consumer interaction. Discovery mechanism is not only used to find a suitable service but also provides collaboration between service providers and consumers by using standard protocols. A static web service discovery mechanism is not only time consuming but requires continuous human interaction. Thi… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/

  12. arXiv:1003.1502  [pdf

    cs.OH

    QoS Based Dynamic Web Services Composition & Execution

    Authors: Farhan Hassan Khan, Saba Bashir, M. Younus Javed, Aihab Khan, Malik Sikandar Hayat Khiyal

    Abstract: The use of web services has dominated software industry. Existing technologies of web services are extended to give value added customized services to customers through composition. Automated web service composition is a very challenging task. This paper proposed the solution of existing problems and proposed a technique by combination of interface based and functionality based rules. The proposed… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/

  13. arXiv:0911.0785  [pdf

    cs.NI

    Management of Location Based Advertisement Services using Spatial Triggers in Cellular Networks

    Authors: M. Irfan, M. M. Tahir N. Baig, Furqan H. Khan, Raheel M. Hashmi, Khurram Shehzad, Assad Ali

    Abstract: This paper discusses the advent of new technologies which have emerged under the area of Location Based Services (LBS). An innovative implementation and approach has been presented for design of applications which are inventive and attractive towards the user. Spatial Trigger is one of the most promising additions to the LBS technologies. This paper describes ways in which mobile advertisement s… ▽ More

    Submitted 4 November, 2009; originally announced November 2009.

    Comments: 5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 181-185, October 2009, USA