Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Shaik, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20071  [pdf

    physics.med-ph cs.LG

    A Staged Approach using Machine Learning and Uncertainty Quantification to Predict the Risk of Hip Fracture

    Authors: Anjum Shaik, Kristoffer Larsen, Nancy E. Lane, Chen Zhao, Kuan-Jui Su, Joyce H. Keyak, Qing Tian, Qiuying Sha, Hui Shen, Hong-Wen Deng, Weihua Zhou

    Abstract: Despite advancements in medical care, hip fractures impose a significant burden on individuals and healthcare systems. This paper focuses on the prediction of hip fracture risk in older and middle-aged adults, where falls and compromised bone quality are predominant factors. We propose a novel staged model that combines advanced imaging and clinical data to improve predictive performance. By using… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 29 pages, 5 figures, 6 tables

  2. arXiv:2311.14459  [pdf, other

    cs.CV cs.RO

    IDD-AW: A Benchmark for Safe and Robust Segmentation of Drive Scenes in Unstructured Traffic and Adverse Weather

    Authors: Furqan Ahmed Shaik, Abhishek Malreddy, Nikhil Reddy Billa, Kunal Chaudhary, Sunny Manchanda, Girish Varma

    Abstract: Large-scale deployment of fully autonomous vehicles requires a very high degree of robustness to unstructured traffic, and weather conditions, and should prevent unsafe mispredictions. While there are several datasets and benchmarks focusing on segmentation for drive scenes, they are not specifically focused on safety and robustness issues. We introduce the IDD-AW dataset, which provides 5000 pair… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Comments: 8 pages excluding references. Accepted in WACV 2024

  3. Comparative Analysis of Imbalanced Malware Byteplot Image Classification using Transfer Learning

    Authors: Jayasudha M, Ayesha Shaik, Gaurav Pendharkar, Soham Kumar, Muhesh Kumar B, Sudharshanan Balaji

    Abstract: Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: accepted at PEIS2023 and will be published in Lecture Notes in Electrical Engineering

  4. arXiv:2208.01708   

    cs.RO cs.AI cs.CV

    Autonomous Agriculture Robot for Smart Farming

    Authors: Vinay Ummadi, Aravind Gundlapalle, Althaf Shaik, Shaik Mohammad Rafi B

    Abstract: This project aims to develop and demonstrate a ground robot with intelligence capable of conducting semi-autonomous farm operations for different low-heights vegetable crops referred as Agriculture Application Robot(AAR). AAR is a lightweight, solar-electric powered robot that uses intelligent perception for conducting detection and classification of plants and their characteristics. The system al… ▽ More

    Submitted 7 September, 2023; v1 submitted 2 August, 2022; originally announced August 2022.

    Comments: Due to author interest conflicts

  5. arXiv:2106.12763  [pdf, other

    eess.AS cs.SD eess.IV eess.SP

    SRIB-LEAP submission to Far-field Multi-Channel Speech Enhancement Challenge for Video Conferencing

    Authors: R G Prithvi Raj, Rohit Kumar, M K Jayesh, Anurenjan Purushothaman, Sriram Ganapathy, M A Basha Shaik

    Abstract: This paper presents the details of the SRIB-LEAP submission to the ConferencingSpeech challenge 2021. The challenge involved the task of multi-channel speech enhancement to improve the quality of far field speech from microphone arrays in a video conferencing room. We propose a two stage method involving a beamformer followed by single channel enhancement. For the beamformer, we incorporated self-… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

  6. arXiv:2005.04876  [pdf, ps, other

    cs.LG stat.ML

    Hierarchical Attention Transformer Architecture For Syntactic Spell Correction

    Authors: Abhishek Niranjan, M Ali Basha Shaik, Kushal Verma

    Abstract: The attention mechanisms are playing a boosting role in advancements in sequence-to-sequence problems. Transformer architecture achieved new state of the art results in machine translation, and it's variants are since being introduced in several other sequence-to-sequence problems. Problems which involve a shared vocabulary, can benefit from the similar semantic and syntactic structure in the sour… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

  7. arXiv:2004.09347  [pdf, other

    eess.AS cs.CL cs.LG cs.SD stat.ML

    End-to-End Whisper to Natural Speech Conversion using Modified Transformer Network

    Authors: Abhishek Niranjan, Mukesh Sharma, Sai Bharath Chandra Gutha, M Ali Basha Shaik

    Abstract: Machine recognition of an atypical speech like whispered speech, is a challenging task. We introduce whisper-to-natural-speech conversion using sequence-to-sequence approach by proposing enhanced transformer architecture, which uses both parallel and non-parallel data. We investigate different features like Mel frequency cepstral coefficients and smoothed spectral features. The proposed networks a… ▽ More

    Submitted 5 April, 2021; v1 submitted 20 April, 2020; originally announced April 2020.

  8. arXiv:1510.07563  [pdf, other

    cs.CR

    Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems

    Authors: Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert

    Abstract: Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation "Long Term Evolution" (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers. We carefully anal… ▽ More

    Submitted 7 August, 2017; v1 submitted 26 October, 2015; originally announced October 2015.

  9. arXiv:cs/0603055  [pdf

    cs.CR

    Improved Watermarking Scheme Using Decimal Sequences

    Authors: Ashfaq N Shaik

    Abstract: This paper presents watermarking algorithms using d-sequences so that the peak signal to noise ratio (PSNR) is maximized and the distortion introduced in the image due to the embedding is minimized. By exploiting the cross correlation property of decimal sequences, the concept of embedding more than one watermark in the same cover image is investigated.

    Submitted 14 March, 2006; originally announced March 2006.

    Comments: 7 pages, 10 figures