Zum Hauptinhalt springen

Showing 1–27 of 27 results for author: Siddique, A B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.15055  [pdf, other

    cs.CL

    Natural Language Task-Oriented Dialog System 2.0

    Authors: Adib Mosharrof, A. B. Siddique

    Abstract: Task-oriented dialog (TOD) systems play a crucial role in facilitating efficient interactions between users and machines by focusing on achieving specific goals through natural language communication. These systems traditionally rely on manually annotated metadata, such as dialog states and policy annotations, which is labor-intensive, expensive, inconsistent, and prone to errors, thereby limiting… ▽ More

    Submitted 21 July, 2024; originally announced July 2024.

  2. arXiv:2407.04868  [pdf, ps, other

    cs.AI cs.SE

    Looking into Black Box Code Language Models

    Authors: Muhammad Umair Haider, Umar Farooq, A. B. Siddique, Mark Marron

    Abstract: Language Models (LMs) have shown their application for tasks pertinent to code and several code~LMs have been proposed recently. The majority of the studies in this direction only focus on the improvements in performance of the LMs on different benchmarks, whereas LMs are considered black boxes. Besides this, a handful of works attempt to understand the role of attention layers in the code~LMs. No… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  3. arXiv:2405.17740  [pdf, other

    cs.CL

    MobileConvRec: A Conversational Dataset for Mobile Apps Recommendations

    Authors: Srijata Maji, Moghis Fereidouni, Vinaik Chhetri, Umar Farooq, A. B. Siddique

    Abstract: Existing recommendation systems have focused on two paradigms: 1- historical user-item interaction-based recommendations and 2- conversational recommendations. Conversational recommendation systems facilitate natural language dialogues between users and the system, allowing the system to solicit users' explicit needs while enabling users to inquire about recommendations and provide feedback. Due t… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  4. arXiv:2404.10887  [pdf, other

    cs.CL

    Search Beyond Queries: Training Smaller Language Models for Web Interactions via Reinforcement Learning

    Authors: Moghis Fereidouni, A. B. Siddique

    Abstract: Traditional search systems focus on query formulation for effective results but face challenges in scenarios such as product searches where crucial product details (e.g., size, color) remain concealed until users visit specific product pages. This highlights the need for intelligent web navigation agents capable of formulating queries and navigating web pages according to users' high-level intents… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 9 pages

  5. Zero-Shot Generalizable End-to-End Task-Oriented Dialog System using Context Summarization and Domain Schema

    Authors: Adib Mosharrof, M. H. Maqbool, A. B. Siddique

    Abstract: Task-oriented dialog systems empower users to accomplish their goals by facilitating intuitive and expressive natural language interactions. State-of-the-art approaches in task-oriented dialog systems formulate the problem as a conditional sequence generation task and fine-tune pre-trained causal language models in the supervised setting. This requires labeled training data for each new domain or… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Report number: 133072

    Journal ref: The International FLAIRS Conference Proceedings, Vol. 36, 2023

  6. Toward Open-domain Slot Filling via Self-supervised Co-training

    Authors: Adib Mosharrof, Moghis Fereidouni, A. B. Siddique

    Abstract: Slot filling is one of the critical tasks in modern conversational systems. The majority of existing literature employs supervised learning methods, which require labeled training data for each new domain. Zero-shot learning and weak supervision approaches, among others, have shown promise as alternatives to manual labeling. Nonetheless, these learning paradigms are significantly inferior to super… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 10 pages, 6 tables, 2 figures, ACM Web Conference 2023 (WWW'23)

  7. Personalizing Task-oriented Dialog Systems via Zero-shot Generalizable Reward Function

    Authors: A. B. Siddique, M. H. Maqbool, Kshitija Taywade, Hassan Foroosh

    Abstract: Task-oriented dialog systems enable users to accomplish tasks using natural language. State-of-the-art systems respond to users in the same way regardless of their personalities, although personalizing dialogues can lead to higher levels of adoption and better user experiences. Building personalized dialog systems is an important, yet challenging endeavor and only a handful of works took on the ch… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: 11 pages, 4 tables, 31st ACM International Conference on Information and Knowledge Management (CIKM'22)

  8. arXiv:2303.06588  [pdf, other

    cs.IR cs.LG cs.SE

    MobileRec: A Large-Scale Dataset for Mobile Apps Recommendation

    Authors: M. H. Maqbool, Umar Farooq, Adib Mosharrof, A. B. Siddique, Hassan Foroosh

    Abstract: Recommender systems have become ubiquitous in our digital lives, from recommending products on e-commerce websites to suggesting movies and music on streaming platforms. Existing recommendation datasets, such as Amazon Product Reviews and MovieLens, greatly facilitated the research and development of recommender systems in their respective domains. While the number of mobile users and applications… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: 10 pages, 4 tables, 4 figures, Under submission at SIGIR'23

  9. arXiv:2204.00144  [pdf, other

    cs.LG

    Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks

    Authors: Ayesha S. Dina, A. B. Siddique, D. Manivannan

    Abstract: Attacks on computer networks have increased significantly in recent days, due in part to the availability of sophisticated tools for launching such attacks as well as thriving underground cyber-crime economy to support it. Over the past several years, researchers in academia and industry used machine learning (ML) techniques to design and implement Intrusion Detection Systems (IDSes) for computer… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

  10. arXiv:2102.02925  [pdf, other

    cs.CL cs.AI

    Generalized Zero-shot Intent Detection via Commonsense Knowledge

    Authors: A. B. Siddique, Fuad Jamour, Luxun Xu, Vagelis Hristidis

    Abstract: Identifying user intents from natural language utterances is a crucial step in conversational systems that has been extensively studied as a supervised classification problem. However, in practice, new intents emerge after deploying an intent detection model. Thus, these models should seamlessly adapt and classify utterances with both seen and unseen intents -- unseen intents emerge after deployme… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  11. arXiv:2101.06514  [pdf, other

    cs.CL

    Linguistically-Enriched and Context-Aware Zero-shot Slot Filling

    Authors: A. B. Siddique, Fuad Jamour, Vagelis Hristidis

    Abstract: Slot filling is identifying contiguous spans of words in an utterance that correspond to certain parameters (i.e., slots) of a user request/query. Slot filling is one of the most important challenges in modern task-oriented dialog systems. Supervised learning approaches have proven effective at tackling this challenge, but they need a significant amount of labeled training data in a given domain.… ▽ More

    Submitted 16 January, 2021; originally announced January 2021.

  12. arXiv:2010.11978  [pdf

    eess.IV cs.CV cs.LG cs.NE

    Deep Convolutional Neural Networks Model-based Brain Tumor Detection in Brain MRI Images

    Authors: Md. Abu Bakr Siddique, Shadman Sakib, Mohammad Mahmudur Rahman Khan, Abyaz Kader Tanzeem, Madiha Chowdhury, Nowrin Yasmin

    Abstract: Diagnosing Brain Tumor with the aid of Magnetic Resonance Imaging (MRI) has gained enormous prominence over the years, primarily in the field of medical science. Detection and/or partitioning of brain tumors solely with the aid of MR imaging is achieved at the cost of immense time and effort and demands a lot of expertise from engaged personnel. This substantiates the necessity of fabricating an a… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: 4th International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2020), IEEE, 7-9 October 2020, TamilNadu, INDIA

    Journal ref: 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)

  13. Prediction of Temperature and Rainfall in Bangladesh using Long Short Term Memory Recurrent Neural Networks

    Authors: Mohammad Mahmudur Rahman Khan, Md. Abu Bakr Siddique, Shadman Sakib, Anas Aziz, Ihtyaz Kader Tasawar, Ziad Hossain

    Abstract: Temperature and rainfall have a significant impact on economic growth as well as the outbreak of seasonal diseases in a region. In spite of that inadequate studies have been carried out for analyzing the weather pattern of Bangladesh implementing the artificial neural network. Therefore, in this study, we are implementing a Long Short-term Memory (LSTM) model to forecast the month-wise temperature… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: 4th International Symposium on Multidisciplinary Studies and Innovative Technologies, IEEE, 22-24 October, 2020, TURKEY

    Journal ref: 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)

  14. arXiv:2007.15793  [pdf, other

    cs.SE cs.LG

    App-Aware Response Synthesis for User Reviews

    Authors: Umar Farooq, A. B. Siddique, Fuad Jamour, Zhijia Zhao, Vagelis Hristidis

    Abstract: Responding to user reviews promptly and satisfactorily improves application ratings, which is key to application popularity and success. The proliferation of such reviews makes it virtually impossible for developers to keep up with responding manually. To address this challenge, recent work has shown the possibility of automatic response generation. However, because the training review-response pa… ▽ More

    Submitted 10 November, 2020; v1 submitted 30 July, 2020; originally announced July 2020.

    Journal ref: IEEE International Conference on Big Data (IEEE BigData) 2020

  15. Performance Evaluation of t-SNE and MDS Dimensionality Reduction Techniques with KNN, ENN and SVM Classifiers

    Authors: Shadman Sakib, Md. Abu Bakr Siddique, Md. Abdur Rahman

    Abstract: The central goal of this paper is to establish two commonly available dimensionality reduction (DR) methods i.e. t-distributed Stochastic Neighbor Embedding (t-SNE) and Multidimensional Scaling (MDS) in Matlab and to observe their application in several datasets. These DR techniques are applied to nine different datasets namely CNAE9, Segmentation, Seeds, Pima Indians diabetes, Parkinsons, Movemen… ▽ More

    Submitted 20 June, 2020; originally announced July 2020.

    Comments: 2020 IEEE Region 10 Symposium (TENSYMP), 5-7 June 2020, Dhaka, Bangladesh

    Journal ref: 2020 IEEE Region 10 Symposium (TENSYMP)

  16. arXiv:2007.02244  [pdf, ps, other

    cs.CL cs.AI cs.LG

    Unsupervised Paraphrasing via Deep Reinforcement Learning

    Authors: A. B. Siddique, Samet Oymak, Vagelis Hristidis

    Abstract: Paraphrasing is expressing the meaning of an input sentence in different wording while maintaining fluency (i.e., grammatical and syntactical correctness). Most existing work on paraphrasing use supervised models that are limited to specific domains (e.g., image captions). Such models can neither be straightforwardly transferred to other domains nor generalize well, and creating labeled training d… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

  17. Performance Analysis of Deep Autoencoder and NCA Dimensionality Reduction Techniques with KNN, ENN and SVM Classifiers

    Authors: Md. Abu Bakr Siddique, Shadman Sakib, Md. Abdur Rahman

    Abstract: The central aim of this paper is to implement Deep Autoencoder and Neighborhood Components Analysis (NCA) dimensionality reduction methods in Matlab and to observe the application of these algorithms on nine unlike datasets from UCI machine learning repository. These datasets are CNAE9, Movement Libras, Pima Indians diabetes, Parkinsons, Knowledge, Segmentation, Seeds, Mammographic Masses, and Ion… ▽ More

    Submitted 24 December, 2019; v1 submitted 11 December, 2019; originally announced December 2019.

    Comments: 2nd International Conference on Innovation in Engineering and Technology (ICIET)

    Journal ref: 2019 2nd International Conference on Innovation in Engineering and Technology (ICIET)

  18. Non-Intrusive Electrical Appliances Monitoring and Classification using K-Nearest Neighbors

    Authors: Mohammad Mahmudur Rahman Khan, Md. Abu Bakr Siddique, Shadman Sakib

    Abstract: Non-Intrusive Load Monitoring (NILM) is the method of detecting an individual device's energy signal from an aggregated energy consumption signature [1]. As existing energy meters provide very little to no information regarding the energy consumption of individual appliances apart from the aggregated power rating, the spotting of individual appliances' energy usages by NILM will not only provide c… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: To be published in the 2nd International Conference on Innovation in Engineering and Technology (ICIET)

    Journal ref: 2019 2nd International Conference on Innovation in Engineering and Technology (ICIET)

  19. Recognition of Handwritten Digit using Convolutional Neural Network in Python with Tensorflow and Comparison of Performance for Various Hidden Layers

    Authors: Fathma Siddique, Shadman Sakib, Md. Abu Bakr Siddique

    Abstract: In recent times, with the increase of Artificial Neural Network (ANN), deep learning has brought a dramatic twist in the field of machine learning by making it more artificially intelligent. Deep learning is remarkably used in vast ranges of fields because of its diverse range of applications such as surveillance, health, medicine, sports, robotics, drones, etc. In deep learning, Convolutional Neu… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: To be published in 5th International Conference on Advances in Electrical Engineering (ICAEE-2019)

    Journal ref: 2019 5th International Conference on Advances in Electrical Engineering (ICAEE)

  20. arXiv:1904.00783  [pdf

    cs.CV cs.LG

    Implementation of Fruits Recognition Classifier using Convolutional Neural Network Algorithm for Observation of Accuracies for Various Hidden Layers

    Authors: Shadman Sakib, Zahidun Ashrafi, Md. Abu Bakr Siddique

    Abstract: Fruit recognition using Deep Convolutional Neural Network (CNN) is one of the most promising applications in computer vision. In recent times, deep learning based classifications are making it possible to recognize fruits from images. However, fruit recognition is still a problem for the stacked fruits on weighing scale because of the complexity and similarity. In this paper, a fruit recognition s… ▽ More

    Submitted 25 January, 2020; v1 submitted 1 April, 2019; originally announced April 2019.

    Comments: 4 Pages, 5 Figures

  21. arXiv:1902.11131  [pdf

    cs.CV cs.DC

    Unsupervised Segmentation Algorithms' Implementation in ITK for Tissue Classification via Human Head MRI Scans

    Authors: Shadman Sakib, Md. Abu Bakr Siddique

    Abstract: Tissue classification is one of the significant tasks in the field of biomedical image analysis. Magnetic Resonance Imaging (MRI) is of great importance in tissue classification especially in the areas of brain tissue classification which is able to recognize anatomical areas of interest such as surgical planning, monitoring therapy, clinical drug trials, image registration, stereotactic neurosurg… ▽ More

    Submitted 25 January, 2020; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 4 Pages, 2 Tables

  22. arXiv:1809.08417  [pdf

    cs.LG cs.CV

    Implementation of Fuzzy C-Means and Possibilistic C-Means Clustering Algorithms, Cluster Tendency Analysis and Cluster Validation

    Authors: Md. Abu Bakr Siddique, Rezoana Bente Arif, Mohammad Mahmudur Rahman Khan, Zahidun Ashrafi

    Abstract: In this paper, several two-dimensional clustering scenarios are given. In those scenarios, soft partitioning clustering algorithms (Fuzzy C-means (FCM) and Possibilistic c-means (PCM)) are applied. Afterward, VAT is used to investigate the clustering tendency visually, and then in order of checking cluster validation, three types of indices (e.g., PC, DI, and DBI) were used. After observing the cl… ▽ More

    Submitted 12 May, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

    Comments: 8 pages, 13 figures, 8 tables

  23. arXiv:1809.06189  [pdf

    cs.LG cs.CV stat.ML

    ADBSCAN: Adaptive Density-Based Spatial Clustering of Applications with Noise for Identifying Clusters with Varying Densities

    Authors: Mohammad Mahmudur Rahman Khan, Md. Abu Bakr Siddique, Rezoana Bente Arif, Mahjabin Rahman Oishe

    Abstract: Density-based spatial clustering of applications with noise (DBSCAN) is a data clustering algorithm which has the high-performance rate for dataset where clusters have the constant density of data points. One of the significant attributes of this algorithm is noise cancellation. However, DBSCAN demonstrates reduced performances for clusters with different densities. Therefore, in this paper, an ad… ▽ More

    Submitted 29 November, 2018; v1 submitted 17 September, 2018; originally announced September 2018.

    Comments: To be published in the 4th IEEE International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT 2018)

    Journal ref: 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT)

  24. Study and Observation of the Variations of Accuracies for Handwritten Digits Recognition with Various Hidden Layers and Epochs using Neural Network Algorithm

    Authors: Md. Abu Bakr Siddique, Mohammad Mahmudur Rahman Khan, Rezoana Bente Arif, Zahidun Ashrafi

    Abstract: In recent days, Artificial Neural Network (ANN) can be applied to a vast majority of fields including business, medicine, engineering, etc. The most popular areas where ANN is employed nowadays are pattern and sequence recognition, novelty detection, character recognition, regression analysis, speech recognition, image compression, stock market prediction, Electronic nose, security, loan applicati… ▽ More

    Submitted 29 November, 2018; v1 submitted 17 September, 2018; originally announced September 2018.

    Comments: To be published in the 4th IEEE International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT 2018)

    Journal ref: 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT)

  25. arXiv:1809.06187  [pdf

    cs.CV cs.LG cs.NE stat.ML

    Study and Observation of the Variations of Accuracies for Handwritten Digits Recognition with Various Hidden Layers and Epochs using Convolutional Neural Network

    Authors: Rezoana Bente Arif, Md. Abu Bakr Siddique, Mohammad Mahmudur Rahman Khan, Mahjabin Rahman Oishe

    Abstract: Nowadays, deep learning can be employed to a wide ranges of fields including medicine, engineering, etc. In deep learning, Convolutional Neural Network (CNN) is extensively used in the pattern and sequence recognition, video analysis, natural language processing, spam detection, topic categorization, regression analysis, speech recognition, image classification, object detection, segmentation, fac… ▽ More

    Submitted 29 November, 2018; v1 submitted 17 September, 2018; originally announced September 2018.

    Comments: To be published in the 4th IEEE International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT 2018)

    Journal ref: 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT)

  26. arXiv:1809.06186  [pdf

    cs.LG cs.CV stat.ML

    Study and Observation of the Variation of Accuracies of KNN, SVM, LMNN, ENN Algorithms on Eleven Different Datasets from UCI Machine Learning Repository

    Authors: Mohammad Mahmudur Rahman Khan, Rezoana Bente Arif, Md. Abu Bakr Siddique, Mahjabin Rahman Oishe

    Abstract: Machine learning qualifies computers to assimilate with data, without being solely programmed [1, 2]. Machine learning can be classified as supervised and unsupervised learning. In supervised learning, computers learn an objective that portrays an input to an output hinged on training input-output pairs [3]. Most efficient and widely used supervised learning algorithms are K-Nearest Neighbors (KNN… ▽ More

    Submitted 29 November, 2018; v1 submitted 17 September, 2018; originally announced September 2018.

    Comments: To be published in the 4th IEEE International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT 2018)

    Journal ref: 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT)

  27. arXiv:1703.08127  [pdf, other

    cs.IT

    Combinatorial Entropy Encoding

    Authors: Abu Bakar Siddique

    Abstract: This paper proposes a novel entropy encoding technique for lossless data compression. Representing a message string by its lexicographic index in the permutations of its symbols results in a compressed version matching Shannon entropy of the message. Commercial data compression standards make use of Huffman or arithmetic coding at some stage of the compression process. In the proposed method, like… ▽ More

    Submitted 23 March, 2017; originally announced March 2017.