72,814 results on '"Sultan, A."'
Search Results
2. Granite Embedding Models
- Author
-
Awasthy, Parul, Trivedi, Aashka, Li, Yulong, Bornea, Mihaela, Cox, David, Daniels, Abraham, Franz, Martin, Goodhart, Gabe, Iyer, Bhavani, Kumar, Vishwajeet, Lastras, Luis, McCarley, Scott, Murthy, Rudra, P, Vignesh, Rosenthal, Sara, Roukos, Salim, Sen, Jaydeep, Sharma, Sukriti, Sil, Avirup, Soule, Kate, Sultan, Arafat, and Florian, Radu
- Subjects
Computer Science - Information Retrieval ,Computer Science - Computation and Language - Abstract
We introduce the Granite Embedding models, a family of encoder-based embedding models designed for retrieval tasks, spanning dense-retrieval and sparse retrieval architectures, with both English and Multilingual capabilities. This report provides the technical details of training these highly effective 12 layer embedding models, along with their efficient 6 layer distilled counterparts. Extensive evaluations show that the models, developed with techniques like retrieval oriented pretraining, contrastive finetuning, knowledge distillation, and model merging significantly outperform publicly available models of similar sizes on both internal IBM retrieval and search tasks, and have equivalent performance on widely used information retrieval benchmarks, while being trained on high-quality data suitable for enterprise use. We publicly release all our Granite Embedding models under the Apache 2.0 license, allowing both research and commercial use at https://huggingface.co/collections/ibm-granite.
- Published
- 2025
3. Correlated Dephasing in a Piezoelectrically Transduced Silicon Phononic Waveguide
- Author
-
Hitchcock, Oliver A., Mayor, Felix M., Jiang, Wentao, Maksymowych, Matthew P., Malik, Sultan, and Safavi-Naeini, Amir H.
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Quantum Physics - Abstract
Nanomechanical waveguides offer a multitude of applications in quantum and classical technologies. Here, we design, fabricate, and characterize a compact silicon single-mode phononic waveguide actuated by a thin-film lithium niobate piezoelectric element. Our device directly transduces between microwave frequency photons and phonons propagating in the silicon waveguide, providing a route for coupling to superconducting circuits. We probe the device at millikelvin temperatures through a superconducting microwave resonant matching cavity to reveal harmonics of the silicon waveguide and extract a piezoelectric coupling rate $g/2\pi= 1.1$ megahertz and a mechanical coupling rate $f/2\pi=5$ megahertz. Through time-domain measurements of the silicon mechanical modes, we observe energy relaxation timescales of $T_{1,\text{in}} \approx 500$ microseconds, pure dephasing timescales of $T_\phi \approx {60}$ microseconds and dephasing dynamics that indicate the presence of an underlying frequency noise process with a non-uniform spectral distribution. We measure phase noise cross-correlations between silicon mechanical modes and observe detuning-dependent positively-correlated frequency fluctuations. Our measurements provide valuable insights into the dynamics and decoherence characteristics of hybrid piezoelectric-silicon acoustic devices, and suggest approaches for mitigating and circumventing noise processes for emerging quantum acoustic systems., Comment: 13 pages, 4 main figures, 3 appendix figures
- Published
- 2025
4. External Large Foundation Model: How to Efficiently Serve Trillions of Parameters for Online Ads Recommendation
- Author
-
Liang, Mingfu, Liu, Xi, Jin, Rong, Liu, Boyang, Suo, Qiuling, Zhou, Qinghai, Zhou, Song, Chen, Laming, Zheng, Hua, Li, Zhiyuan, Jiang, Shali, Yang, Jiyan, Xia, Xiaozhen, Yang, Fan, Badr, Yasmine, Wen, Ellie, Xu, Shuyu, Chen, Hansey, Zhang, Zhengyu, Nie, Jade, Yang, Chunzhi, Zeng, Zhichen, Zhang, Weilin, Huang, Xingliang, Li, Qianru, Wang, Shiquan, Lyu, Evelyn, Lu, Wenjing, Zhang, Rui, Wang, Wenjun, Rudy, Jason, Hang, Mengyue, Wang, Kai, Ma, Yinbin, Wang, Shuaiwen, Zeng, Sihan, Tang, Tongyi, Wei, Xiaohan, Jin, Longhao, Zhang, Jamey, Chen, Marcus, Zhang, Jiayi, Huang, Angie, Zhang, Chi, Zhao, Zhengli, Yang, Jared, Jin, Qiang, Chen, Xian, Amlesahwaram, Amit Anand, Song, Lexi, Luo, Liang, Hao, Yuchen, Xiao, Nan, Yetim, Yavuz, Pan, Luoshang, Liu, Gaoxiang, Hu, Yuxi, Huang, Yuzhen, Xu, Jackie, Zhu, Rich, Zhang, Xin, Liu, Yiqun, Yin, Hang, Chen, Yuxin, Zhang, Buyun, Liu, Xiaoyi, Wang, Xingyuan, Mao, Wenguang, Li, Zhijing, Huang, Qin, Sun, Chonglin, Mao, Shupin, Au, Benjamin, Qin, Jingzheng, Yao, Peggy, Choi, Jae-Woo, Gao, Bin, Wang, Ernest, Zhang, Lei, Chen, Wen-Yen, Lee, Ted, Zha, Jay, Meng, Yi, Gong, Alex, Gao, Edison, Vahdatpour, Alireza, Han, Yiping, Yao, Yantao, Kureha, Toshinari, Chang, Shuo, Sultan, Musharaf, Bocharov, John, Chordia, Sagar, Gan, Xiaorui, Sun, Peng, Liu, Rocky, Long, Bo, Chen, Wenlin, Kolay, Santanu, and Li, Huayu
- Subjects
Computer Science - Information Retrieval ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Ads recommendation is a prominent service of online advertising systems and has been actively studied. Recent studies indicate that scaling-up and advanced design of the recommendation model can bring significant performance improvement. However, with a larger model scale, such prior studies have a significantly increasing gap from industry as they often neglect two fundamental challenges in industrial-scale applications. First, training and inference budgets are restricted for the model to be served, exceeding which may incur latency and impair user experience. Second, large-volume data arrive in a streaming mode with data distributions dynamically shifting, as new users/ads join and existing users/ads leave the system. We propose the External Large Foundation Model (ExFM) framework to address the overlooked challenges. Specifically, we develop external distillation and a data augmentation system (DAS) to control the computational cost of training/inference while maintaining high performance. We design the teacher in a way like a foundation model (FM) that can serve multiple students as vertical models (VMs) to amortize its building cost. We propose Auxiliary Head and Student Adapter to mitigate the data distribution gap between FM and VMs caused by the streaming data issue. Comprehensive experiments on internal industrial-scale applications and public datasets demonstrate significant performance gain by ExFM., Comment: Accepted by the ACM Web Conference (WWW) 2025 Industrial Track as Oral Presentation
- Published
- 2025
5. Applying a star formation model calibrated on high-resolution interstellar medium simulations to cosmological simulations of galaxy formation
- Author
-
Burger, Jan D., Springel, Volker, Ostriker, Eve C., Kim, Chang-Goo, Jeffreson, Sarah M. R., Smith, Matthew C., Pakmor, Rüdiger, Hassan, Sultan, Fielding, Drummond, Hernquist, Lars, Bryan, Greg L., Somerville, Rachel S., Bennett, Jake S., and Weinberger, Rainer
- Subjects
Astrophysics - Astrophysics of Galaxies - Abstract
Modern high-resolution simulations of the interstellar medium (ISM) have shown that key factors in governing star formation are the competing influences of radiative dissipation, pressure support driven by stellar feedback, and the relentless pull of gravity. Cosmological simulations of galaxy formation, such as IllustrisTNG or ASTRID, are however not able to resolve this physics in detail and therefore need to rely on approximate treatments. These have often taken the form of empirical subgrid models of the ISM expressed in terms of an effective equation of state (EOS) that relates the mean ISM pressure to the mean gas density. Here we seek to improve these heuristic models by directly fitting their key ingredients to results of the high-resolution TIGRESS simulations, which have shown that the dynamical equilibrium of the ISM can be understood in terms of a pressure-regulated, feedback modulated (PRFM) model for star formation. Here we explore a simple subgrid model that draws on the PRFM concept but uses only local quantities. It accurately reproduces PRFM for pure gas disks, while it predicts slightly less star formation than PRFM in the presence of an additional thin stellar disk. We compare the properties of this model with the older Springel and Hernquist and TNG prescriptions, and apply all three to isolated simulations of disk galaxies as well as to a set of high-resolution zoom-in simulations carried out with a novel 'multi-zoom' technique that we introduce in this study. The softer EOS implied by TIGRESS produces substantially thinner disk galaxies, which has important ramifications for disk stability and galaxy morphology. The total stellar mass of galaxies is however hardly modified at low redshift, reflecting the dominating influence of large-scale gaseous inflows and outflows to galaxies, which are not sensitive to the EOS itself, Comment: 22 pages, 21 figures, to be submitted to MNRAS. This is a Learning the Universe publication
- Published
- 2025
6. Correlative X-ray and electron tomography for scale-bridging, quantitative analysis of complex, hierarchical particle systems
- Author
-
Götz, Alexander, Lutter, Fabian, Possart, Dennis Simon, Augsburger, Daniel, Arslan, Usman, Pechmann, Sabrina, Rubach, Carmen, Buwen, Moritz, Sultan, Umair, Kichigin, Alexander, Böhmer, Johannes, Vorlaufer, Nora, Suter, Peter, Hildebrand, Tor, Thommes, Matthias, Felfer, Peter, Vogel, Nicolas, Breininger, Katharina, Christiansen, Silke, Zubiri, Benjamin Apeleo, and Spiecker, Erdmann
- Subjects
Condensed Matter - Materials Science - Abstract
This study presents a comprehensive workflow for investigating particulate materials through combined 360{\deg} electron tomography (ET), nano-computed X-ray tomography (nanoCT), and micro-computed X-ray tomography (microCT), alongside a versatile sample preparation routine. The workflow enables the investigation of size, morphology, and pore systems across multiple scales, from individual particles to large hierarchical structures. A customized tapered sample shape is fabricated using focused ion beam milling with the aim to optimize each imaging technique's field of view, facilitating high-resolution analysis of small volumes containing single particles, while also allowing for large-scale studies of thousands of particles for statistical relevance. By correlating data from same locations in different imaging modalities, the approach enhances the precision of quantitative analyses. The study highlights the importance of cross-scale, correlative three-dimensional microscopy for a comprehensive understanding of complex hierarchical materials. Precise data registration, segmentation using machine learning, and multimodal imaging techniques are crucial for unlocking insights into process-structure-property relationships and thus to optimize functional, hierarchical materials.
- Published
- 2025
7. RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning
- Author
-
Sultan, Nazatul H., Bo, Yan, Gao, Yansong, Camtepe, Seyit, Mahboubi, Arash, Bui, Hang Thanh, Chauhan, Aufeef, Aboutorab, Hamed, Bewong, Michael, Gauravaram, Praveen, Islam, Rafiqul, and Abuadbba, Sharif
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,68P27 ,E.3 - Abstract
Federated Learning (FL) allows users to collaboratively train a global machine learning model by sharing local model only, without exposing their private data to a central server. This distributed learning is particularly appealing in scenarios where data privacy is crucial, and it has garnered substantial attention from both industry and academia. However, studies have revealed privacy vulnerabilities in FL, where adversaries can potentially infer sensitive information from the shared model parameters. In this paper, we present an efficient masking-based secure aggregation scheme utilizing lightweight cryptographic primitives to mitigate privacy risks. Our scheme offers several advantages over existing methods. First, it requires only a single setup phase for the entire FL training session, significantly reducing communication overhead. Second, it minimizes user-side overhead by eliminating the need for user-to-user interactions, utilizing an intermediate server layer and a lightweight key negotiation method. Third, the scheme is highly resilient to user dropouts, and the users can join at any FL round. Fourth, it can detect and defend against malicious server activities, including recently discovered model inconsistency attacks. Finally, our scheme ensures security in both semi-honest and malicious settings. We provide security analysis to formally prove the robustness of our approach. Furthermore, we implemented an end-to-end prototype of our scheme. We conducted comprehensive experiments and comparisons, which show that it outperforms existing solutions in terms of communication and computation overhead, functionality, and security., Comment: 16 pages, 10 Figures
- Published
- 2025
8. Breaking the Fake News Barrier: Deep Learning Approaches in Bangla Language
- Author
-
Mondal, Pronoy Kumar, Khan, Sadman Sadik, Rana, Md. Masud, Ramit, Shahriar Sultan, Sattar, Abdus, and Rahman, Md. Sadekur
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
The rapid development of digital stages has greatly compounded the dispersal of untrue data, dissolving certainty and judgment in society, especially among the Bengali-speaking community. Our ponder addresses this critical issue by presenting an interesting strategy that utilizes a profound learning innovation, particularly the Gated Repetitive Unit (GRU), to recognize fake news within the Bangla dialect. The strategy of our proposed work incorporates intensive information preprocessing, which includes lemmatization, tokenization, and tending to course awkward nature by oversampling. This comes about in a dataset containing 58,478 passages. We appreciate the creation of a demonstration based on GRU (Gated Repetitive Unit) that illustrates remarkable execution with a noteworthy precision rate of 94%. This ponder gives an intensive clarification of the methods included in planning the information, selecting the show, preparing it, and assessing its execution. The performance of the model is investigated by reliable metrics like precision, recall, F1 score, and accuracy. The commitment of the work incorporates making a huge fake news dataset in Bangla and a demonstration that has outperformed other Bangla fake news location models., Comment: 6 pages, THE 15th INTERNATIONAL IEEE CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT)
- Published
- 2025
- Full Text
- View/download PDF
9. Provisioning Time-Based Subscription in NDN: A Secure and Efficient Access Control Scheme
- Author
-
Sultan, Nazatul H., Kumar, Chandan, Dulal, Saurab, Varadharajan, Vijay, Camtepe, Seyit, and Nepal, Surya
- Subjects
Computer Science - Cryptography and Security ,E.3 ,C.2.2 - Abstract
This paper proposes a novel encryption-based access control mechanism for Named Data Networking (NDN). The scheme allows data producers to share their content in encrypted form before transmitting it to consumers. The encryption mechanism incorporates time-based subscription access policies directly into the encrypted content, enabling only consumers with valid subscriptions to decrypt it. This makes the scheme well-suited for real-world, subscription-based applications like Netflix. Additionally, the scheme introduces an anonymous and unlinkable signature-based authentication mechanism that empowers edge routers to block bogus content requests at the network's entry point, thereby mitigating Denial of Service (DoS) attacks. A formal security proof demonstrates the scheme's resistance to Chosen Plaintext Attacks (CPA). Performance analysis, using Mini-NDN-based emulation and a Charm library implementation, further confirms the practicality of the scheme. Moreover, it outperforms closely related works in terms of functionality, security, and communication overhead., Comment: 25 pages, 8 figures
- Published
- 2025
10. Comparative Analysis of Hand-Crafted and Machine-Driven Histopathological Features for Prostate Cancer Classification and Segmentation
- Author
-
Baqain, Feda Bolus Al and Al-Kadi, Omar Sultan
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Quantitative Biology - Quantitative Methods - Abstract
Histopathological image analysis is a reliable method for prostate cancer identification. In this paper, we present a comparative analysis of two approaches for segmenting glandular structures in prostate images to automate Gleason grading. The first approach utilizes a hand-crafted learning technique, combining Gray Level Co-Occurrence Matrix (GLCM) and Local Binary Pattern (LBP) texture descriptors to highlight spatial dependencies and minimize information loss at the pixel level. For machine driven feature extraction, we employ a U-Net convolutional neural network to perform semantic segmentation of prostate gland stroma tissue. Support vector machine-based learning of hand-crafted features achieves impressive classification accuracies of 99.0% and 95.1% for GLCM and LBP, respectively, while the U-Net-based machine-driven features attain 94% accuracy. Furthermore, a comparative analysis demonstrates superior segmentation quality for histopathological grades 1, 2, 3, and 4 using the U-Net approach, as assessed by Jaccard and Dice metrics. This work underscores the utility of machine-driven features in clinical applications that rely on automated pixel-level segmentation in prostate tissue images., Comment: 13 pages, 14 figures, 2 tables
- Published
- 2025
- Full Text
- View/download PDF
11. Optimizing Secure Quantum Information Transmission in Entanglement-Assisted Quantum Networks
- Author
-
Karim, Tasmin, Shaon, Md. Shazzad Hossain, Sultan, Md. Fahim, and Akter, Mst Shapna
- Subjects
Computer Science - Cryptography and Security - Abstract
Quantum security improves cryptographic protocols by applying quantum mechanics principles, assuring resistance to both quantum and conventional computer attacks. This work addresses these issues by integrating Quantum Key Distribution (QKD) utilizing the E91 method with Multi-Layer Chaotic Encryption, which employs a variety of patterns to detect eavesdropping, resulting in a highly secure image-transmission architecture. The method leverages entropy calculations to determine the unpredictability and integrity of encrypted and decrypted pictures, guaranteeing strong security. Extensive statistical scenarios illustrate the framework's effectiveness in image encryption while preserving high entropy and sensitivity to the original visuals. The findings indicate significant improvement in encryption and decryption performance, demonstrating the framework's potential as a robust response to weaknesses introduced by advances in quantum computing. Several metrics, such as Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), Normalized Cross-Correlation (NCC), Bit Error Rate (BER), entropy values for original, encrypted, and decrypted images, and the correlation between original and decrypted images, validate the framework's effectiveness. The combination of QKD with Multi-Layer Chaotic Encryption provides a scalable and resilient technique to secure image communication. As quantum computing advances, this framework offers a future-proof approach for defining secure communication protocols in crucial sectors such as medical treatment, forensic computing, and national security, where information confidentiality is valuable., Comment: no
- Published
- 2025
12. The Goofus & Gallant Story Corpus for Practical Value Alignment
- Author
-
Nahian, Md Sultan Al, Tasrin, Tasmia, Frazier, Spencer, Riedl, Mark, and Harrison, Brent
- Subjects
Computer Science - Artificial Intelligence - Abstract
Values or principles are key elements of human society that influence people to behave and function according to an accepted standard set of social rules to maintain social order. As AI systems are becoming ubiquitous in human society, it is a major concern that they could violate these norms or values and potentially cause harm. Thus, to prevent intentional or unintentional harm, AI systems are expected to take actions that align with these principles. Training systems to exhibit this type of behavior is difficult and often requires a specialized dataset. This work presents a multi-modal dataset illustrating normative and non-normative behavior in real-life situations described through natural language and artistic images. This training set contains curated sets of images that are designed to teach young children about social principles. We argue that this is an ideal dataset to use for training socially normative agents given this fact., Comment: Accepted by International Conference on Machine Learning and Applications (ICMLA) 2024. Main Conference, Long Paper
- Published
- 2025
- Full Text
- View/download PDF
13. Well-posedness of a time discretization scheme for a stochastic p-Laplace equation with Neumann boundary conditions
- Author
-
Bauzet, Caroline, Schmitz, Kerstin, Sultan, Cédric, and Zimmermann, Aleksandra
- Subjects
Mathematics - Analysis of PDEs ,60H15, 35K55, 35K92 - Abstract
In this contribution, we are interested in the analysis of a semi-implicit time discretization scheme for the approximation of a parabolic equation driven by multiplicative colored noise involving a $p$-Laplace operator (with $p\geq 2$), nonlinear source terms and subject to Neumann boundary conditions. Using the Minty-Browder theorem, we are able to prove the well-posedness of such a scheme.
- Published
- 2025
14. RIS Optimization Algorithms for Urban Wireless Scenarios in Sionna RT
- Author
-
Güneşer, Ahmet Esad, Şekeroğlu, Berkay, Kayraklık, Sefa, Karakoca, Erhan, Hökelek, İbrahim, Aldirmaz-Colak, Sultan, and Görçin, Ali
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper evaluates the performance of reconfigurable intelligent surface (RIS) optimization algorithms, which utilize channel estimation methods, in ray tracing (RT) simulations within urban digital twin environments. Beyond Sionna's native capabilities, we implement and benchmark additional RIS optimization algorithms based on channel estimation, enabling an evaluation of RIS strategies under various deployment conditions. Coverage maps for RIS-assisted communication systems are generated through the integration of Sionna's RT simulations. Moreover, real-world experimentation underscores the necessity of validating algorithms in near-realistic simulation environments, as minor variations in measurement setups can significantly affect performance., Comment: Submitted to possible IEEE conference
- Published
- 2025
15. Optimized Sampling for Non-Line-of-Sight Imaging Using Modified Fast Fourier Transforms
- Author
-
Sultan, Talha, Bocchieri, Alex, Gu, Chaoying, Liu, Xiaochun, Polynkin, Pavel, and Velten, Andreas
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition ,Electrical Engineering and Systems Science - Signal Processing ,Physics - Optics - Abstract
Non-line-of-Sight (NLOS) imaging systems collect light at a diffuse relay surface and input this measurement into computational algorithms that output a 3D volumetric reconstruction. These algorithms utilize the Fast Fourier Transform (FFT) to accelerate the reconstruction process but require both input and output to be sampled spatially with uniform grids. However, the geometry of NLOS imaging inherently results in non-uniform sampling on the relay surface when using multi-pixel detector arrays, even though such arrays significantly reduce acquisition times. Furthermore, using these arrays increases the data rate required for sensor readout, posing challenges for real-world deployment. In this work, we utilize the phasor field framework to demonstrate that existing NLOS imaging setups typically oversample the relay surface spatially, explaining why the measurement can be compressed without significantly sacrificing reconstruction quality. This enables us to utilize the Non-Uniform Fast Fourier Transform (NUFFT) to reconstruct from sparse measurements acquired from irregularly sampled relay surfaces of arbitrary shapes. Furthermore, we utilize the NUFFT to reconstruct at arbitrary locations in the hidden volume, ensuring flexible sampling schemes for both the input and output. Finally, we utilize the Scaled Fast Fourier Transform (SFFT) to reconstruct larger volumes without increasing the number of samples stored in memory. All algorithms introduced in this paper preserve the computational complexity of FFT-based methods, ensuring scalability for practical NLOS imaging applications.
- Published
- 2025
16. Coupled channel effects for the bottom-strange mesons
- Author
-
Hao, Wei, Sultan, M. Atif, and Wang, En
- Subjects
High Energy Physics - Phenomenology - Abstract
We have calculated the mass spectrum of $B_s$ mesons within a nonrelativistic potential model considering coupled channel effects, and the corresponding strong decay widths within the $^3P_0$ model using the numerically calculated wave functions. By comparing with the available experimental data, we find that the states $B_s$, $B_s^*$, $B_{s1}(5830)$, and $B_{s2}^*(5840)$ could be interpreted as the $B_s(1^1S_0)$, $B_s(1^3S_1)$, $B_s(1P^\prime)$, and $B_s(1^3P_2)$, respectively. Although the quantum numbers of the newly observed $B_s(6064)$ and $B_s(6158)$ states have not been determined, our results support the assignments of $B_s(1^3D_3)$ and $B_s(1^3D_1)$ for them. Our predictions are helpful in searching for the bottom-strange meson in future experiments.
- Published
- 2025
17. An unsupervised method for MRI recovery: Deep image prior with structured sparsity
- Author
-
Sultan, Muhammad Ahmad, Chen, Chong, Liu, Yingmin, Gil, Katarzyna, Zareba, Karolina, and Ahmad, Rizwan
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Objective: To propose and validate an unsupervised MRI reconstruction method that does not require fully sampled k-space data. Materials and Methods: The proposed method, deep image prior with structured sparsity (DISCUS), extends the deep image prior (DIP) by introducing group sparsity to frame-specific code vectors, enabling the discovery of a low-dimensional manifold for capturing temporal variations. \discus was validated using four studies: (I) simulation of a dynamic Shepp-Logan phantom to demonstrate its manifold discovery capabilities, (II) comparison with compressed sensing and DIP-based methods using simulated single-shot late gadolinium enhancement (LGE) image series from six distinct digital cardiac phantoms in terms of normalized mean square error (NMSE) and structural similarity index measure (SSIM), (III) evaluation on retrospectively undersampled single-shot LGE data from eight patients, and (IV) evaluation on prospectively undersampled single-shot LGE data from eight patients, assessed via blind scoring from two expert readers. Results: DISCUS outperformed competing methods, demonstrating superior reconstruction quality in terms of NMSE and SSIM (Studies I--III) and expert reader scoring (Study IV). Discussion: An unsupervised image reconstruction method is presented and validated on simulated and measured data. These developments can benefit applications where acquiring fully sampled data is challenging.
- Published
- 2025
18. Using Artificial Intelligence for English Language Learning: Saudi EFL Learners' Opinions, Attitudes and Challenges
- Author
-
Mohammad Jamsh, Iftikhar Alam, Sultan Al Sultan, and Sameena Banu
- Abstract
The study investigates EFL (English as a Foreign Language) learners' opinions, attitudes and the challenges of incorporating AI-powered teaching and learning. It also examines how their ideas and attitudes are affected by demographic variables. 258 students were selected using a random sampling method from a population comprising students studying in different levels of programs at the College of Science and College of Business Administration, Prince Sattam bin Abdul-Aziz University, KSA. A questionnaire was self-developed using some modified items from prior studies as the study looks at how certain independent variables (e.g., study level, residential background and parents' educational level) affect the dependent variable (e.g., learners' opinions, attitudes and challenges for AI-powered learning and teaching). The quantitative approach (descriptive quantitative design) revealed that Saudi EFL students held a high level of positive opinions and attitudes towards AI-powered learning. However, the analysis found that many students thought implementing AI-powered learning was challenging. A one-way ANOVA showed no significant difference based on respondents' residential background and parental education. However, respondents differed significantly based on their level or year of study. The study findings will assist administrators and course teachers in using AI-powered technologies to overcome challenges and prepare students for achievement in the English language.
- Published
- 2024
19. Instructional Leadership Behaviors of School Administrators Working in Public Secondary Schools: A Mixed Method Research
- Author
-
Sultan Dogru, Cenk Akay, and Yusuf Inandi
- Abstract
This study was conducted in order to reveal the level of instructional leadership behavior scores of school administrators working in public secondary schools according to the opinions of teachers and to examine them in terms of various variables. The working group of this research, which was designed in the converging parallel pattern of the mixed method, was formed through easily accessible sampling. 383 teachers in the central districts of Mersin province formed the quantitative data study group and 5 teachers formed the qualitative data study group. The semistructured interview form prepared by the researcher and the "Instructional Leadership Scale" developed by Alig-Meilcarek (2003) and adapted to Turkish by Sahin (2011) were used as data collection tools. Kolmogorov Smirnov test was applied for normality test. Kolmogorov Smirnov value is <0.05. Skewness value is between -+ 3 values and the kurtosis value is between +-10 values. Kline (2011) mentioned that normality tests can be performed if the normal distribution has a skewness value of ± 3 and a kurtosis value of ± 10. Since the quantitative data showed a normal distribution, they were analyzed by independent T-test analysis, while the qualitative data were analyzed with the help of content analysis. When the research findings were evaluated, it was found that there was no significant difference between the school administrators' instructional leadership scores according to the gender of the participants.
- Published
- 2024
20. Female garment workers in Bangladesh facing human rights violation; a search to find the root causes
- Author
-
Basirulla, Md, Tasnim, Farhat, and Mahmud, Md Sultan
- Published
- 2024
21. EF-Net: A Deep Learning Approach Combining Word Embeddings and Feature Fusion for Patient Disposition Analysis
- Author
-
Feroz, Nafisa Binte, Sarker, Chandrima, Ahsan, Tanzima, Sultan, K M Arefeen, and Rab, Raqeebir
- Subjects
Computer Science - Machine Learning - Abstract
One of the most urgent problems is the overcrowding in emergency departments (EDs), caused by an aging population and rising healthcare costs. Patient dispositions have become more complex as a result of the strain on hospital infrastructure and the scarcity of medical resources. Individuals with more dangerous health issues should be prioritized in the emergency room. Thus, our research aims to develop a prediction model for patient disposition using EF-Net. This model will incorporate categorical features into the neural network layer and add numerical features with the embedded categorical features. We combine the EF-Net and XGBoost models to attain higher accuracy in our results. The result is generated using the soft voting technique. In EF-Net, we attained an accuracy of 95.33%, whereas in the Ensemble Model, we achieved an accuracy of 96%. The experiment's analysis shows that EF-Net surpasses existing works in accuracy, AUROC, and F1-Score on the MIMIC-IV-ED dataset, demonstrating its potential as a scalable solution for patient disposition assessment. Our code is available at https://github.com/nafisa67/thesis, Comment: Accepted to ICCIT2024
- Published
- 2024
22. ConfliBERT: A Language Model for Political Conflict
- Author
-
Brandt, Patrick T., Alsarra, Sultan, D`Orazio, Vito J., Heintze, Dagmar, Khan, Latifur, Meher, Shreyas, Osorio, Javier, and Sianan, Marcus
- Subjects
Computer Science - Computation and Language - Abstract
Conflict scholars have used rule-based approaches to extract information about political violence from news reports and texts. Recent Natural Language Processing developments move beyond rigid rule-based approaches. We review our recent ConfliBERT language model (Hu et al. 2022) to process political and violence related texts. The model can be used to extract actor and action classifications from texts about political conflict. When fine-tuned, results show that ConfliBERT has superior performance in accuracy, precision and recall over other large language models (LLM) like Google's Gemma 2 (9B), Meta's Llama 3.1 (7B), and Alibaba's Qwen 2.5 (14B) within its relevant domains. It is also hundreds of times faster than these more generalist LLMs. These results are illustrated using texts from the BBC, re3d, and the Global Terrorism Dataset (GTD)., Comment: 30 pages, 4 figures, 5 tables
- Published
- 2024
23. Local well-posedness of the Benjamin-Ono equation with spatially quasiperiodic data
- Author
-
Aitzhan, Sultan and Ambrose, David M.
- Subjects
Mathematics - Analysis of PDEs - Abstract
We consider the Benjamin-Ono equation in the spatially quasiperiodic setting. We establish local well-posedness of the initial value problem with initial data in quasiperiodic Sobolev spaces. This requires developing some of the fundamental properties of Sobolev spaces and the energy method for quasiperiodic functions. We discuss prospects for global existence. We demonstrate that while conservation laws still hold, these quantities no longer control the associated Sobolev norms, thereby preventing the establishment of global results by usual arguments.
- Published
- 2024
24. Strangeonium spectrum with the screening effects and interpretation of $h_1(1911)$ and $h_1(2316)$ observed by BESIII
- Author
-
Hao, Wei, Sultan, M. Atif, Liu, Li-Juan, and Wang, En
- Subjects
High Energy Physics - Phenomenology - Abstract
Motivated by two news states $h_1(1911)$ and $h_1(2316)$ observed by BESIII, we have investigated the mass spectrum and the strong decay properties of the strangeonium mesons within the modified Godfrey-Isgur model by considering the screening effects. We have determined the free parameters using the masses and widths of the well established $s\bar{s}$ states $\phi(1020)$, $\phi(1680)$, $h_1(1415)$, $f_2^\prime(1525)$, and $\phi_3(1850)$. According to our results, $h_1(1911)$ and $h_1(2316)$ could be well explained as states $h_1(2^1P_1)$ and $h_1(3^1P_1)$ $s\bar{s}$ states, respectively. Meanwhile, the possible assignments of $X(2000)$, $\eta_2(1870)$, and $\phi(2170)$ as $3^3S_1$, $1^1D_2$, and $2^3D_1$ are also discussed. Furthermore, the masses and widths of the $2S$, $3S$, $1P$, $2P$, $3P$, $1D$, and $2D$ $s\bar{s}$ states are also given and compared with various theoretical predictions, which is helpful for the observations and confirmations of these states in future.
- Published
- 2024
25. Iterating the Transient Light Transport Matrix for Non-Line-of-Sight Imaging
- Author
-
Sultan, Talha, Brandt, Eric, Masumnia-Bisheh, Khadijeh, Riccardo, Simone, Polynkin, Pavel, Tosi, Alberto, and Velten, Andreas
- Subjects
Physics - Optics ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Active imaging systems sample the Transient Light Transport Matrix (TLTM) for a scene by sequentially illuminating various positions in this scene using a controllable light source, and then measuring the resulting spatiotemporal light transport with time of flight (ToF) sensors. Time-resolved Non-line-of-sight (NLOS) imaging employs an active imaging system that measures part of the TLTM of an intermediary relay surface, and uses the indirect reflections of light encoded within this TLTM to "see around corners". Such imaging systems have applications in diverse areas such as disaster response, remote surveillance, and autonomous navigation. While existing NLOS imaging systems usually measure a subset of the full TLTM, development of customized gated Single Photon Avalanche Diode (SPAD) arrays \cite{riccardo_fast-gated_2022} has made it feasible to probe the full measurement space. In this work, we demonstrate that the full TLTM on the relay surface can be processed with efficient algorithms to computationally focus and detect our illumination in different parts of the hidden scene, turning the relay surface into a second-order active imaging system. These algorithms allow us to iterate on the measured, first-order TLTM, and extract a \textbf{second order TLTM for surfaces in the hidden scene}. We showcase three applications of TLTMs in NLOS imaging: (1) Scene Relighting with novel illumination, (2) Separation of direct and indirect components of light transport in the hidden scene, and (3) Dual Photography. Additionally, we empirically demonstrate that SPAD arrays enable parallel acquisition of photons, effectively mitigating long acquisition times.
- Published
- 2024
26. SmolTulu: Higher Learning Rate to Batch Size Ratios Can Lead to Better Reasoning in SLMs
- Author
-
Alrashed, Sultan
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
We present SmolTulu-1.7b-Instruct, referenced in this report as SmolTulu-DPO-1130, an instruction-tuned language model that adapts AllenAI's Tulu 3 post-training pipeline to enhance Huggingface's SmolLM2-1.7B base model. Through comprehensive empirical analysis using a 135M parameter model, we demonstrate that the relationship between learning rate and batch size significantly impacts model performance in a task-dependent manner. Our findings reveal a clear split: reasoning tasks like ARC and GSM8K benefit from higher learning rate to batch size ratios, while pattern recognition tasks such as HellaSwag and IFEval show optimal performance with lower ratios. These insights informed the development of SmolTulu, which achieves state-of-the-art performance among sub-2B parameter models on instruction following, scoring 67.7% on IFEval ($\Delta$11%), and mathematical reasoning with 51.6% on GSM8K ($\Delta$3.4%), with an alternate version achieving scoring 57.1% on ARC ($\Delta5.4%$). We release our model, training recipes, and ablation studies to facilitate further research in efficient model alignment, demonstrating that careful adaptation of optimization dynamics can help bridge the capability gap between small and large language models., Comment: 10 pages, 4 figures, and 13 tables. For the SmolTulu-1.7b-instruct model, see: https://huggingface.co/SultanR/SmolTulu-1.7b-Instruct
- Published
- 2024
27. Depression detection from Social Media Bangla Text Using Recurrent Neural Networks
- Author
-
Ahmed, Sultan, Rakin, Salman, Waliur, Mohammad Washeef Ibn, Islam, Nuzhat Binte, Hossain, Billal, and Akbar, Md. Mostofa
- Subjects
Computer Science - Human-Computer Interaction ,Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
Emotion artificial intelligence is a field of study that focuses on figuring out how to recognize emotions, especially in the area of text mining. Today is the age of social media which has opened a door for us to share our individual expressions, emotions, and perspectives on any event. We can analyze sentiment on social media posts to detect positive, negative, or emotional behavior toward society. One of the key challenges in sentiment analysis is to identify depressed text from social media text that is a root cause of mental ill-health. Furthermore, depression leads to severe impairment in day-to-day living and is a major source of suicide incidents. In this paper, we apply natural language processing techniques on Facebook texts for conducting emotion analysis focusing on depression using multiple machine learning algorithms. Preprocessing steps like stemming, stop word removal, etc. are used to clean the collected data, and feature extraction techniques like stylometric feature, TF-IDF, word embedding, etc. are applied to the collected dataset which consists of 983 texts collected from social media posts. In the process of class prediction, LSTM, GRU, support vector machine, and Naive-Bayes classifiers have been used. We have presented the results using the primary classification metrics including F1-score, and accuracy. This work focuses on depression detection from social media posts to help psychologists to analyze sentiment from shared posts which may reduce the undesirable behaviors of depressed individuals through diagnosis and treatment., Comment: Initial version with Bangla text. arXiv admin note: substantial text overlap with arXiv:2411.04542
- Published
- 2024
28. Motion-Guided Deep Image Prior for Cardiac MRI
- Author
-
Vornehm, Marc, Chen, Chong, Sultan, Muhammad Ahmad, Arshad, Syed Murtaza, Han, Yuchi, Knoll, Florian, and Ahmad, Rizwan
- Subjects
Physics - Medical Physics ,Computer Science - Computer Vision and Pattern Recognition ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
Cardiovascular magnetic resonance imaging is a powerful diagnostic tool for assessing cardiac structure and function. Traditional breath-held imaging protocols, however, pose challenges for patients with arrhythmias or limited breath-holding capacity. We introduce Motion-Guided Deep Image prior (M-DIP), a novel unsupervised reconstruction framework for accelerated real-time cardiac MRI. M-DIP employs a spatial dictionary to synthesize a time-dependent template image, which is further refined using time-dependent deformation fields that model cardiac and respiratory motion. Unlike prior DIP-based methods, M-DIP simultaneously captures physiological motion and frame-to-frame content variations, making it applicable to a wide range of dynamic applications. We validate M-DIP using simulated MRXCAT cine phantom data as well as free-breathing real-time cine and single-shot late gadolinium enhancement data from clinical patients. Comparative analyses against state-of-the-art supervised and unsupervised approaches demonstrate M-DIP's performance and versatility. M-DIP achieved better image quality metrics on phantom data, as well as higher reader scores for in-vivo patient data.
- Published
- 2024
29. Analyzing Computing Undergraduate Majors from Job Market Perspective
- Author
-
Alabdulkarim, Yazeed, Alruwayti, Khalid, Alsaleh, Hamad, Alfallaj, Sultan, Bablail, Ahmed, and Almaslukh, Abdulaziz
- Subjects
Computer Science - Computers and Society - Abstract
The demand for computing education increases due to the rapid development of technology and its involvement in most daily activities. Academic institutes offer a variety of computing majors, such as Computer Engineering, Computer Science, Information Systems, Information Technology, Software Engineering, Cybersecurity, and Data Science. Since a major objective of earning a bachelor's degree is to improve career opportunities, it is crucial to understand how the job market perceives these computing majors. This study analyzed the relationships between various computing majors and the job market in Saudi Arabia, using LinkedIn public profile data, discovering insights into the strong relationship between the focus of certain computing majors and the employment of relevant job positions. Moreover, job category trends were analyzed over the past ten years, observing that demands for System Admin and Technical Support positions declined while demands for Business Analysis and Artificial Intelligence and Data Science inclined. This study also compared earned professional certifications between different computing major graduates that correspond to job position findings.
- Published
- 2024
30. Enhanced LLM-Based Framework for Predicting Null Pointer Dereference in Source Code
- Author
-
Sultan, Md. Fahim, Karim, Tasmin, Shaon, Md. Shazzad Hossain, Wardat, Mohammad, and Akter, Mst Shapna
- Subjects
Computer Science - Software Engineering - Abstract
Software security is crucial in any field where breaches can exploit sensitive data, and lead to financial losses. As a result, vulnerability detection becomes an essential part of the software development process. One of the key steps in maintaining software integrity is identifying vulnerabilities in the source code before deployment. A security breach like CWE-476, which stands for NULL pointer dereferences (NPD), is crucial because it can cause software crashes, unpredictable behavior, and security vulnerabilities. In this scientific era, there are several vulnerability checkers, where, previous tools often fall short in analyzing specific feature connections of the source code, which weakens the tools in real-world scenarios. In this study, we propose another novel approach using a fine-tuned Large Language Model (LLM) termed "DeLLNeuN". This model leverages the advantage of various layers to reduce both overfitting and non-linearity, enhancing its performance and reliability. Additionally, this method provides dropout and dimensionality reduction to help streamline the model, making it faster and more efficient. Our model showed 87% accuracy with 88% precision using the Draper VDISC dataset. As software becomes more complex and cyber threats continuously evolve, the need for proactive security measures will keep growing. In this particular case, the proposed model looks promising to use as an early vulnerability checker in software development.
- Published
- 2024
31. A Combined Feature Embedding Tools for Multi-Class Software Defect and Identification
- Author
-
Sultan, Md. Fahim, Karim, Tasmin, Shaon, Md. Shazzad Hossain, Wardat, Mohammad, and Akter, Mst Shapna
- Subjects
Computer Science - Software Engineering - Abstract
In software, a vulnerability is a defect in a program that attackers might utilize to acquire unauthorized access, alter system functions, and acquire information. These vulnerabilities arise from programming faults, design flaws, incorrect setups, and a lack of security protective measures. To mitigate these vulnerabilities, regular software upgrades, code reviews, safe development techniques, and the use of security tools to find and fix problems have been important. Several ways have been delivered in recent studies to address difficulties related to software vulnerabilities. However, previous approaches have significant limitations, notably in feature embedding and precisely recognizing specific vulnerabilities. To overcome these drawbacks, we present CodeGraphNet, an experimental method that combines GraphCodeBERT and Graph Convolutional Network (GCN) approaches, where, CodeGraphNet reveals data in a high-dimensional vector space, with comparable or related properties grouped closer together. This method captures intricate relationships between features, providing for more exact identification and separation of vulnerabilities. Using this feature embedding approach, we employed four machine learning models, applying both independent testing and 10-fold cross-validation. The DeepTree model, which is a hybrid of a Decision Tree and a Neural Network, outperforms state-of-the-art approaches. In additional validation, we evaluated our model using feature embeddings from LSA, GloVe, FastText, CodeBERT and GraphCodeBERT, and found that the CodeGraphNet method presented improved vulnerability identification with 98% of accuracy. Our model was tested on a real-time dataset to determine its capacity to handle real-world data and to focus on defect localization, which might influence future studies.
- Published
- 2024
32. MulModSeg: Enhancing Unpaired Multi-Modal Medical Image Segmentation with Modality-Conditioned Text Embedding and Alternating Training
- Author
-
Li, Chengyin, Zhu, Hui, Sultan, Rafi Ibn, Ebadian, Hassan Bagher, Khanduri, Prashant, Indrin, Chetty, Thind, Kundan, and Zhu, Dongxiao
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition - Abstract
In the diverse field of medical imaging, automatic segmentation has numerous applications and must handle a wide variety of input domains, such as different types of Computed Tomography (CT) scans and Magnetic Resonance (MR) images. This heterogeneity challenges automatic segmentation algorithms to maintain consistent performance across different modalities due to the requirement for spatially aligned and paired images. Typically, segmentation models are trained using a single modality, which limits their ability to generalize to other types of input data without employing transfer learning techniques. Additionally, leveraging complementary information from different modalities to enhance segmentation precision often necessitates substantial modifications to popular encoder-decoder designs, such as introducing multiple branched encoding or decoding paths for each modality. In this work, we propose a simple Multi-Modal Segmentation (MulModSeg) strategy to enhance medical image segmentation across multiple modalities, specifically CT and MR. It incorporates two key designs: a modality-conditioned text embedding framework via a frozen text encoder that adds modality awareness to existing segmentation frameworks without significant structural modifications or computational overhead, and an alternating training procedure that facilitates the integration of essential features from unpaired CT and MR inputs. Through extensive experiments with both Fully Convolutional Network and Transformer-based backbones, MulModSeg consistently outperforms previous methods in segmenting abdominal multi-organ and cardiac substructures for both CT and MR modalities. The code is available in this {\href{https://github.com/ChengyinLee/MulModSeg_2024}{link}}., Comment: Accepted by WACV-2025
- Published
- 2024
33. A Decision Support System for daily scheduling and routing of home healthcare workers with a lunch break consideration
- Author
-
Öztürkoğlu, Ömer, Özsakallı, Gökberk, and Qadri, Syed Shah Sultan Mohiuddin
- Subjects
Computer Science - Computers and Society - Abstract
This study examines a home healthcare scheduling and routing problem (HHSRP) with a lunch break requirement. This problem especially consists of lunch break constraints for caregivers in addition to other typical features of the HHSRP in literature such as hard time window constraints for both patients and caregivers and patient preferences. The objective is to minimize both travel distance in a route and unvisited patient (penalty) cost. For this NP-Hard problem, we developed an effective Adaptive Large Neighborhood Search algorithm to provide high-quality solutions in a short amount of time. We tested the proposed four variants of the algorithm with the selected problem instances from the literature. The algorithms provided nearly all optimal solutions for 30-patient problem instances in 12 seconds on average. Additionally, they provided better solutions to 36 problem instances up to 36% improvement in some instance classes. Moreover, the improved solutions achieved to visit up to 10 more patients. The algorithms are also shown to be very robust due to their low coefficient variance of 0.3 on average. The algorithm also requires a very reasonable amount of time to generate solutions up to 54 seconds for solving 100-patient instances. A decision support system, namely Home Healthcare Decision Support System (HHCSS) was also designed to play a positive role in preventing the COVID-19 global pandemic. The system employs the proposed ALNS algorithm to solve various instances of approximately generated COVID-19 patient data from Turkey. The main aim of developing HHCSS is to support the administrative staff of home healthcare from the tedious task of scheduling and routing of caregivers and to increase service responsiveness.
- Published
- 2024
34. Empowering Meta-Analysis: Leveraging Large Language Models for Scientific Synthesis
- Author
-
Ahad, Jawad Ibn, Sultan, Rafeed Mohammad, Kaikobad, Abraham, Rahman, Fuad, Amin, Mohammad Ruhul, Mohammed, Nabeel, and Rahman, Shafin
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Information Retrieval - Abstract
This study investigates the automation of meta-analysis in scientific documents using large language models (LLMs). Meta-analysis is a robust statistical method that synthesizes the findings of multiple studies support articles to provide a comprehensive understanding. We know that a meta-article provides a structured analysis of several articles. However, conducting meta-analysis by hand is labor-intensive, time-consuming, and susceptible to human error, highlighting the need for automated pipelines to streamline the process. Our research introduces a novel approach that fine-tunes the LLM on extensive scientific datasets to address challenges in big data handling and structured data extraction. We automate and optimize the meta-analysis process by integrating Retrieval Augmented Generation (RAG). Tailored through prompt engineering and a new loss metric, Inverse Cosine Distance (ICD), designed for fine-tuning on large contextual datasets, LLMs efficiently generate structured meta-analysis content. Human evaluation then assesses relevance and provides information on model performance in key metrics. This research demonstrates that fine-tuned models outperform non-fine-tuned models, with fine-tuned LLMs generating 87.6% relevant meta-analysis abstracts. The relevance of the context, based on human evaluation, shows a reduction in irrelevancy from 4.56% to 1.9%. These experiments were conducted in a low-resource environment, highlighting the study's contribution to enhancing the efficiency and reliability of meta-analysis automation., Comment: Accepted in 2024 IEEE International Conference on Big Data (IEEE BigData)
- Published
- 2024
35. Towards cosmological inference on unlabeled out-of-distribution HI observational data
- Author
-
Andrianomena, Sambatra and Hassan, Sultan
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics ,Astrophysics - Cosmology and Nongalactic Astrophysics - Abstract
We present an approach that can be utilized in order to account for the covariate shift between two datasets of the same observable with different distributions. This helps improve the generalizability of a neural network model trained on in-distribution samples (IDs) when inferring cosmology at the field level on out-of-distribution samples (OODs) of {\it unknown labels}. We make use of HI maps from the two simulation suites in CAMELS, IllustrisTNG and SIMBA. We consider two different techniques, namely adversarial approach and optimal transport, to adapt a target network whose initial weights are those of a source network pre-trained on a labeled dataset. Results show that after adaptation, salient features that are extracted by source and target encoders are well aligned in the embedding space. This indicates that the target encoder has learned the representations of the target domain via the adversarial training and optimal transport. Furthermore, in all scenarios considered in our analyses, the target encoder, which does not have access to any labels ($\Omega_{\rm m}$) during adaptation phase, is able to retrieve the underlying $\Omega_{\rm m}$ from out-of-distribution maps to a great accuracy of $R^{2}$ score $\ge$ 0.9, comparable to the performance of the source encoder trained in a supervised learning setup. We further test the viability of the techniques when only a few out-of-distribution instances are available for training and find that the target encoder still reasonably recovers the matter density. Our approach is critical in extracting information from upcoming large scale surveys., Comment: 14 pages, 9 figures, 4 tables
- Published
- 2024
36. BlueME: Robust Underwater Robot-to-Robot Communication Using Compact Magnetoelectric Antennas
- Author
-
Talebi, Mehron, Mahmud, Sultan, Khalifa, Adam, and Islam, Md Jahidul
- Subjects
Computer Science - Robotics ,Electrical Engineering and Systems Science - Signal Processing - Abstract
We present the design, development, and experimental validation of BlueME, a compact magnetoelectric (ME) antenna array system for underwater robot-to-robot communication. BlueME employs ME antennas operating at their natural mechanical resonance frequency to efficiently transmit and receive very-low-frequency (VLF) electromagnetic signals underwater. We outline the design, simulation, fabrication, and integration of the proposed system on low-power embedded platforms focusing on portable and scalable applications. For performance evaluation, we deployed BlueME on an autonomous surface vehicle (ASV) and a remotely operated vehicle (ROV) in open-water field trials. Our tests demonstrate that BlueME maintains reliable signal transmission at distances beyond 200 meters while consuming only 1 watt of power. Field trials show that the system operates effectively in challenging underwater conditions such as turbidity, obstacles, and multipath interference -- that generally affect acoustics and optics. Our analysis also examines the impact of complete submersion on system performance and identifies key deployment considerations. This work represents the first practical underwater deployment of ME antennas outside the laboratory, and implements the largest VLF ME array system to date. BlueME demonstrates significant potential for marine robotics and automation in multi-robot cooperative systems and remote sensor networks.
- Published
- 2024
37. Fineweb-Edu-Ar: Machine-translated Corpus to Support Arabic Small Language Models
- Author
-
Alrashed, Sultan, Khizbullin, Dmitrii, and Pugh, David R.
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
As large language models (LLMs) grow and develop, so do their data demands. This is especially true for multilingual LLMs, where the scarcity of high-quality and readily available data online has led to a multitude of synthetic dataset generation approaches. A key technique in this space is machine translation (MT), where high-quality English text is adapted to a target, comparatively low-resource language. This report introduces FineWeb-Edu-Ar, a machine-translated version of the exceedingly popular (deduplicated) FineWeb-Edu dataset from HuggingFace. To the best of our knowledge, FineWeb-Edu-Ar is the largest publicly available machine-translated Arabic dataset out there, with its size of 202B tokens of an Arabic-trained tokenizer.
- Published
- 2024
38. Automatic Identification of Political Hate Articles from Social Media using Recurrent Neural Networks
- Author
-
Ahmed, Sultan, Rakin, Salman, Urmi, Khadija, Nag, Chandan Kumar, and Akbar, Md. Mostofa
- Subjects
Computer Science - Human-Computer Interaction - Abstract
The increasing growth of social media provides us with an instant opportunity to be informed of the opinions of a large number of politically active individuals in real-time. We can get an overall idea of the ideologies of these individuals on governmental issues by analyzing the social media texts. Nowadays, different kinds of news websites and popular social media such as Facebook, YouTube, Instagram, etc. are the most popular means of communication for the mass population. So the political perception of the users toward different parties in the country is reflected in the data collected from these social sites. In this work, we have extracted three types of features, such as the stylometric feature, the word-embedding feature, and the TF-IDF feature. Traditional machine learning classifiers and deep learning models are employed to identify political ideology from the text. We have compared our methodology with the research work in different languages. Among them, the word embedding feature with LSTM outperforms all other models with 88.28% accuracy., Comment: 8 Pages !
- Published
- 2024
39. Emotion Analysis of Social Media Bangla Text and Its Impact on Identifying the Author's Gender
- Author
-
Ahmed, Sultan, Rakin, Salman, Urmi, Khadija, Nag, Chandan Kumar, and Akbar, Md. Mostofa
- Subjects
Computer Science - Human-Computer Interaction - Abstract
The Gender Identification (GI) problem is concerned with determining the gender of the author from a given text. It has numerous applications in different fields like forensics, literature, security, marketing, trade, etc. Due to its importance, researchers have put extensive efforts into identifying gender from the text for different languages. Unfortunately, the same statement is not true for the Bangla language despite its being the 7th most spoken language in the world. In this work, we explore Gender Identification from Social media Bangla Text. Specially, we consider two approaches for feature extraction. The first one is Bag-Of-Words(BOW) approach and another one is based on computing features from sentiment and emotions. There is a common stereotype that female authors write in a more emotional way than male authors. One goal of this work is to validate this stereotype for the Bangla language., Comment: 7 pages
- Published
- 2024
40. Spectrum and decay properties of the charmed mesons involving the coupled channel effects
- Author
-
Hao, Wei, Sultan, M. Atif, and Wang, En
- Subjects
High Energy Physics - Phenomenology - Abstract
The mass spectrum of the charmed mesons is investigated by considering the coupled channel effects within the nonrelativistic potential model. The predicted masses of the charmed mesons are in agreement with experimental data. The strong decay properties are further analyzed within the $^3P_0$ model by using numerical wave functions obtained from nonrelativistic potential model. Based on the predicted masses and decay properties, we give a classification of the recently observed charmed states. Especially, we have effectively explained the masses and decay properties of the $D_1^*(2600)$ and $D_1^*(2760)$ by considering the $S$-$D$ mixing. Furthermore, the predicted masses and decay properties of the $2P$ wave states are helpful to search for them experimentally in future.
- Published
- 2024
41. Cooling Flows as a Reference Solution for the Hot Circumgalactic Medium
- Author
-
Sultan, Imran, Faucher-Giguère, Claude-André, Stern, Jonathan, Rotshtein, Shaked, Byrne, Lindsey, and Wijers, Nastasha
- Subjects
Astrophysics - Astrophysics of Galaxies - Abstract
The circumgalactic medium (CGM) in $\gtrsim 10^{12}$ $\mathrm{M}_{\odot}$ halos is dominated by a hot phase ($T \gtrsim 10^{6}$ K). While many models exist for the hot gas structure, there is as yet no consensus. We compare cooling flow models, in which the hot CGM flows inward due to radiative cooling, to the CGM of $\sim 10^{12}-10^{13}$ $\mathrm{M}_{\odot}$ halos in galaxy formation simulations from the FIRE project at $z\sim0$. The simulations include realistic cosmological evolution and feedback from stars but neglect AGN feedback. At both mass scales, CGM inflows are typically dominated by the hot phase rather than by the `precipitation' of cold gas. Despite being highly idealized, we find that cooling flows describe $\sim 10^{13}$ $\mathrm{M}_{\odot}$ halos very well, with median agreement in the density and temperature profiles of $\sim 20\%$ and $\sim 10\%$, respectively. This indicates that stellar feedback has little impact on CGM scales in those halos. For $\sim 10^{12}$ $\mathrm{M}_{\odot}$ halos, the thermodynamic profiles are also accurately reproduced in the outer CGM. For some of these lower-mass halos, cooling flows significantly overpredict the hot gas density in the inner CGM. This could be due to multidimensional angular momentum effects not well captured by our 1D cooling flow models and/or to the larger cold gas fractions in these regions. Turbulence, which contributes $\sim 10-40\%$ of the total pressure, must be included to accurately reproduce the temperature profiles. Overall, cooling flows predict entropy profiles in better agreement with the FIRE simulations than other idealized models in the literature., Comment: 20 pages, 14 figures. Submitted to MNRAS
- Published
- 2024
42. TabSeq: A Framework for Deep Learning on Tabular Data via Sequential Ordering
- Author
-
Habib, Al Zadid Sultan Bin, Wang, Kesheng, Hartley, Mary-Anne, Doretto, Gianfranco, and Adjeroh, Donald A.
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Effective analysis of tabular data still poses a significant problem in deep learning, mainly because features in tabular datasets are often heterogeneous and have different levels of relevance. This work introduces TabSeq, a novel framework for the sequential ordering of features, addressing the vital necessity to optimize the learning process. Features are not always equally informative, and for certain deep learning models, their random arrangement can hinder the model's learning capacity. Finding the optimum sequence order for such features could improve the deep learning models' learning process. The novel feature ordering technique we provide in this work is based on clustering and incorporates both local ordering and global ordering. It is designed to be used with a multi-head attention mechanism in a denoising autoencoder network. Our framework uses clustering to align comparable features and improve data organization. Multi-head attention focuses on essential characteristics, whereas the denoising autoencoder highlights important aspects by rebuilding from distorted inputs. This method improves the capability to learn from tabular data while lowering redundancy. Our research, demonstrating improved performance through appropriate feature sequence rearrangement using raw antibody microarray and two other real-world biomedical datasets, validates the impact of feature ordering. These results demonstrate that feature ordering can be a viable approach to improved deep learning of tabular data., Comment: This paper has been accepted for presentation at the 27th International Conference on Pattern Recognition (ICPR 2024) in Kolkata, India
- Published
- 2024
43. KinDEL: DNA-Encoded Library Dataset for Kinase Inhibitors
- Author
-
Chen, Benson, Danel, Tomasz, McEnaney, Patrick J., Jain, Nikhil, Novikov, Kirill, Akki, Spurti Umesh, Turnbull, Joshua L., Pandya, Virja Atul, Belotserkovskii, Boris P., Weaver, Jared Bryce, Biswas, Ankita, Nguyen, Dat, Dreiman, Gabriel H. S., Sultan, Mohammad, Stanley, Nathaniel, Whalen, Daniel M, Kanichar, Divya, Klein, Christoph, Fox, Emily, and Watts, R. Edward
- Subjects
Quantitative Biology - Quantitative Methods ,Computer Science - Machine Learning - Abstract
DNA-Encoded Libraries (DEL) are combinatorial small molecule libraries that offer an efficient way to characterize diverse chemical spaces. Selection experiments using DELs are pivotal to drug discovery efforts, enabling high-throughput screens for hit finding. However, limited availability of public DEL datasets hinders the advancement of computational techniques designed to process such data. To bridge this gap, we present KinDEL, one of the first large, publicly available DEL datasets on two kinases: Mitogen-Activated Protein Kinase 14 (MAPK14) and Discoidin Domain Receptor Tyrosine Kinase 1 (DDR1). Interest in this data modality is growing due to its ability to generate extensive supervised chemical data that densely samples around select molecular structures. Demonstrating one such application of the data, we benchmark different machine learning techniques to develop predictive models for hit identification; in particular, we highlight recent structure-based probabilistic approaches. Finally, we provide biophysical assay data, both on- and off-DNA, to validate our models on a smaller subset of molecules. Data and code for our benchmarks can be found at: https://github.com/insitro/kindel.
- Published
- 2024
44. From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways
- Author
-
Yang, Mengmeng, Qu, Youyang, Ranbaduge, Thilina, Thapa, Chandra, Sultan, Nazatul, Ding, Ming, Suzuki, Hajime, Ni, Wei, Abuadbba, Sharif, Smith, David, Tyler, Paul, Pieprzyk, Josef, Rakotoarivelo, Thierry, Guan, Xinlong, and M'rabet, Sirine
- Subjects
Computer Science - Cryptography and Security - Abstract
The vision for 6G aims to enhance network capabilities with faster data rates, near-zero latency, and higher capacity, supporting more connected devices and seamless experiences within an intelligent digital ecosystem where artificial intelligence (AI) plays a crucial role in network management and data analysis. This advancement seeks to enable immersive mixed-reality experiences, holographic communications, and smart city infrastructures. However, the expansion of 6G raises critical security and privacy concerns, such as unauthorized access and data breaches. This is due to the increased integration of IoT devices, edge computing, and AI-driven analytics. This paper provides a comprehensive overview of 6G protocols, focusing on security and privacy, identifying risks, and presenting mitigation strategies. The survey examines current risk assessment frameworks and advocates for tailored 6G solutions. We further discuss industry visions, government projects, and standardization efforts to balance technological innovation with robust security and privacy measures.
- Published
- 2024
45. Visual Editing with LLM-based Tool Chaining: An Efficient Distillation Approach for Real-Time Applications
- Author
-
Sultan, Oren, Khasin, Alex, Shiran, Guy, Greenstein-Messica, Asnat, and Shahaf, Dafna
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
We present a practical distillation approach to fine-tune LLMs for invoking tools in real-time applications. We focus on visual editing tasks; specifically, we modify images and videos by interpreting user stylistic requests, specified in natural language ("golden hour"), using an LLM to select the appropriate tools and their parameters to achieve the desired visual effect. We found that proprietary LLMs such as GPT-3.5-Turbo show potential in this task, but their high cost and latency make them unsuitable for real-time applications. In our approach, we fine-tune a (smaller) student LLM with guidance from a (larger) teacher LLM and behavioral signals. We introduce offline metrics to evaluate student LLMs. Both online and offline experiments show that our student models manage to match the performance of our teacher model (GPT-3.5-Turbo), significantly reducing costs and latency. Lastly, we show that fine-tuning was improved by 25% in low-data regimes using augmentation., Comment: EMNLP 2024
- Published
- 2024
46. Development of Basic Physics Practicum Based on Virtual Android Observatory to Facilitate Students' ICT Literacy Abilities
- Author
-
Ma’ruf, Ana Dhiqfaini Sultan, Nurlina, and Dewi Hikmah Marisda
- Abstract
This research will be carried out at the basic physics laboratory of the physics education study program, Muhammadiyah University of Makassar. The long-term goal of this research is to produce a prototype model of basic physics practicum based on the virtual android observatory to facilitate the ICT literacy skills of prospective physics teachers. Based on the results of basic physics practical trials, experiments on determining Earth's gravity, free fall motion and the doppler effect based on a virtual android observatory, among others, based on the results of observations from the implementation of basic physics practicals when viewed from the aspect of design ability. Experimental tools and materials for determining gravitational acceleration, free fall motion and the Doppler effect. Overall, students have very good skills in designing tools, especially in the aspect of using cellphone sensors that are integrated in the virtual android observatory application. The conclusion is that the effectiveness of the results of basic physics practicum trials for determining earth's gravity, free fall motion and the virtual android observatory-based Doppler effect is in the very good category, namely 75.41%, and the results of the ICT literacy skills of prospective physics teacher students are in the good category, namely overall. students were able to use the virtual android observatory application as a whole with a proficient percentage level of 56.60%.
- Published
- 2024
47. Perception Scale of Preservice Science Teachers' Socio-Scientific Reasoning Skills
- Author
-
Sema Çildir and Dilek Sultan Acarli
- Abstract
In this study, an assessment tool was developed to measure the reasoning skills (RS) of preservice science teachers on socio-scientific issues (SSI). As a result of the literature review, the scale was developed based on five dimensions. These dimensions are complexity, questioning, having different perspectives, skeptical approach and the limitations and adequacy of science. The developed scale consists of a total of 18 items. 577 preservice science teachers participated in the study voluntarily. First-level confirmatory factor analysis (CFA) was conducted to evaluate the construct validity of the items created in line with the theoretical framework. In addition, second-level CFA was applied to test whether the dimensions represented the students' perceptions of socio-scientific reasoning (SSR) skills. When the literature was examined, it was decided that the values of the fit indices were appropriate for model verification. The findings reveal that the developed scale can be used for valid and reliable measurements in determining the perceptions of preservice teachers regarding their SSR skills.
- Published
- 2024
48. Saudi Undergraduate Students' Perceptions of Using Technology to Develop Research Skills
- Author
-
Hanan Alghamdi and Sultan Altalhab
- Abstract
This study examined Saudi undergraduate EFL students' perceptions of technology's role in enhancing their research abilities. A mixed-methods approach was employed, involving a questionnaire completed by 86 undergraduate students and interviews with 10 students. The questionnaire assessed students' technology use, perspectives on research skills development and views on university support. The interviews provided deeper insights into the students' experiences and challenges. The results highlight the role of technology in enhancing various research skills, including information searching, data analysis, organization, collaboration and language support. These findings underscore the potential of technology to transform research education and empower English as a foreign language (EFL) learners as potential capable researchers. The study also identified limitations and challenges associated with integrating technology into research skills development. Difficulties in accessing reliable and up-to-date information and evaluating sources, language barriers and the risk of overreliance on technology emerged as significant challenges. These limitations highlight the need to address these issues to fully harness the potential of technology in research skill development among undergraduate EFL students.
- Published
- 2024
49. Invastigation of Patient and Hospital Perceptions of Children Participating in Education at the House of Compassion
- Author
-
Zeynep Nur Aydin Kiliç, Fatma Tezel Sahin, and Seyma Sultan Bozkurt
- Abstract
This study was conducted to determine the perceptions of children, one of whose relatives was undergoing chemotherapy treatment and who participated in education at the House of Compassion, about the patient and hospital perceptions and their views on the House of Compassion. Case study design, one of the qualitative research designs, was used. Criterion sampling, one of the purposeful sampling types, was used to determine the study group. The study group consisted of 20 children who participated in the training at the House of Compassion in a hospital in Ankara and one of whose relatives was undergoing chemotherapy treatment. In the study, "Demographic Information Form" was used to collect information about children and parents, "Child Interview Form" and "Children's Pictures" were used to determine children's perceptions of patients, hospital and House of Compassion. The data obtained were analyzed using the descriptive analysis technique. As a result of the research, it was observed that children knew the definition of the hospital, the personnel working in the hospital, and the practices carried out, and emphasized the healing and therapeutic aspects of the hospital. Children reported coming to the House of Compassion to play games, have fun, and have a good time. It was determined that children felt happy and sound in the House of Compassion and that they liked the House of Compassion. As a result, it can be said that the House of Compassion has positive effects on children's perceptions of the patient and the hospital.
- Published
- 2024
50. The Effects of Technical Skills, Attitudes, and Knowledge on Students' Readiness to Use 4.0 Industrial Revolution Technologies in Education
- Author
-
Sultan Hammad Alshammari
- Abstract
Technological advancements have led to the emergence of the Fourth Industrial Revolution (4IR). Students' readiness to use 4IR technologies is thus essential for the development of knowledgeable, competent, and skilled graduates. However, ensuring students' readiness to use 4IR technologies is quite challenging, leading to a need to understand the factors that influence readiness in this regard. In this study, a research model was developed for examining effects of students' technical skills, attitudes, and knowledge on their readiness to use 4IR technologies. Data were collected from 182 students through an online survey. A two-step data analysis was then performed using AMOS. A confirmatory factor analysis was conducted to assess the research model, and SEM was then applied to examine the hypotheses and relationships between the constructs. The results demonstrated that students' technical skills, attitudes, and knowledge levels significantly influenced their readiness to use 4IR technologies. Recommendations for policy and decision makers in higher education were drawn from this research to increase students' readiness for adopting and using 4IR technologies.
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.