33,082 results on '"Muhammad, Ali"'
Search Results
2. Are the Majority of Public Computational Notebooks Pathologically Non-Executable?
- Author
-
Nguyen, Tien, Gill, Waris, and Gulzar, Muhammad Ali
- Subjects
Computer Science - Software Engineering - Abstract
Computational notebooks are the de facto platforms for exploratory data science, offering an interactive programming environment where users can create, modify, and execute code cells in any sequence. However, this flexibility often introduces code quality issues, with prior studies showing that approximately 76% of public notebooks are non-executable, raising significant concerns about reusability. We argue that the traditional notion of executability - requiring a notebook to run fully and without error - is overly rigid, misclassifying many notebooks and overestimating their non-executability. This paper investigates pathological executability issues in public notebooks under varying notions and degrees of executability. Even partially improving executability can improve code comprehension and offer a pathway for dynamic analyses. With this insight, we first categorize notebooks into potentially restorable and pathological non-executable notebooks and then measure how removing misconfiguration and superficial execution issues in notebooks can improve their executability (i.e., additional cells executed without error). In a dataset of 42,546 popular public notebooks containing 34,659 non-executable notebooks, only 21.3% are truly pathologically non-executable. For restorable notebooks, LLM-based methods fully restore 5.4% of previously non-executable notebooks. Among the partially restored, the executability of notebooks improves by 42.7% and 28% by installing the correct modules and generating synthetic data. These findings challenge prior assumptions, suggesting that notebooks have higher executability than previously reported, many of which offer valuable partial execution, and that their executability should be evaluated within the interactive notebook paradigm rather than through traditional software executability standards., Comment: 12 pages, 10 figures, 3 tables, the 22nd International Conference on Mining Software Repositories (MSR 2025)
- Published
- 2025
3. Joint Power and Spectrum Orchestration for D2D Semantic Communication Underlying Energy-Efficient Cellular Networks
- Author
-
Xia, Le, Sun, Yao, Sun, Haijian, Hu, Rose Qingyang, Niyato, Dusit, and Imran, Muhammad Ali
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Semantic communication (SemCom) has been recently deemed a promising next-generation wireless technique to enable efficient spectrum savings and information exchanges, thus naturally introducing a novel and practical network paradigm where cellular and device-to-device (D2D) SemCom approaches coexist. Nevertheless, the involved wireless resource management becomes complicated and challenging due to the unique semantic performance measurements and energy-consuming semantic coding mechanism. To this end, this paper jointly investigates power control and spectrum reuse problems for energy-efficient D2D SemCom cellular networks. Concretely, we first model the user preference-aware semantic triplet transmission and leverage a novel metric of semantic value to identify the semantic information importance conveyed in SemCom. Then, we define the additional power consumption from semantic encoding in conjunction with basic power amplifier dissipation to derive the overall system energy efficiency (semantics/Joule). Next, we formulate an energy efficiency maximization problem for joint power and spectrum allocation subject to several SemCom-related and practical constraints. Afterward, we propose an optimal resource management solution by employing the fractional-to-subtractive problem transformation and decomposition while developing a three-stage method with theoretical analysis of its optimality guarantee and computational complexity. Numerical results demonstrate the adequate performance superiority of our proposed solution compared with different benchmarks., Comment: This paper has been submitted to IEEE Transactions on Wireless Communications for peer review
- Published
- 2025
4. An Information-Theoretic Efficient Capacity Region for Multi-User Interference Channel
- Author
-
Bhattacharya, Sagnik, Gorle, Abhiram Rao, Mohsin, Muhammad Ali, and Cioffi, John M.
- Subjects
Computer Science - Information Theory - Abstract
We investigate the capacity region of multi-user interference channels (IC), where each user encodes multiple sub-user components. By unifying chain-rule decomposition with the Entropy Power Inequality (EPI), we reason that single-user Gaussian codebooks suffice to achieve optimal performance, thus obviating any need for intricate auxiliary variables or joint typicality arguments. Our partial-MAC formulation enumerates sub-user decoding orders while only imposing constraints for sub-users actually decoded. This significantly reduces complexity relative to enumerating all subsets or bruteforcing over all successive interference cancellation (SIC) decoding order combinations at all receivers. This leads to a finite but comprehensive construction of all achievable rate tuples under sum-power constraints, while guaranteeing that each receiver fully recovers its intended sub-user signals. Consequently, known single-user Gaussian capacity results generalize naturally to multi-user scenarios, revealing a cohesive framework for analyzing multi-user IC. Our results thus offer a streamlined, tractable pathway for designing next-generation cell-free wireless networks that rely on IC mechanisms, efficiently exploiting interference structure while minimizing overhead. Overall, this provides a unifying perspective.
- Published
- 2025
5. Multivariate Time Series Anomaly Detection by Capturing Coarse-Grained Intra- and Inter-Variate Dependencies
- Author
-
Xie, Yongzheng, Zhang, Hongyu, and Babar, Muhammad Ali
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Multivariate time series anomaly detection is essential for failure management in web application operations, as it directly influences the effectiveness and timeliness of implementing remedial or preventive measures. This task is often framed as a semi-supervised learning problem, where only normal data are available for model training, primarily due to the labor-intensive nature of data labeling and the scarcity of anomalous data. Existing semi-supervised methods often detect anomalies by capturing intra-variate temporal dependencies and/or inter-variate relationships to learn normal patterns, flagging timestamps that deviate from these patterns as anomalies. However, these approaches often fail to capture salient intra-variate temporal and inter-variate dependencies in time series due to their focus on excessively fine granularity, leading to suboptimal performance. In this study, we introduce MtsCID, a novel semi-supervised multivariate time series anomaly detection method. MtsCID employs a dual network architecture: one network operates on the attention maps of multi-scale intra-variate patches for coarse-grained temporal dependency learning, while the other works on variates to capture coarse-grained inter-variate relationships through convolution and interaction with sinusoidal prototypes. This design enhances the ability to capture the patterns from both intra-variate temporal dependencies and inter-variate relationships, resulting in improved performance. Extensive experiments across seven widely used datasets demonstrate that MtsCID achieves performance comparable or superior to state-of-the-art benchmark methods., Comment: 9 pages, 3 figures, Accepted to TheWebConference 2025
- Published
- 2025
6. The Light Neutralino Dark Matter in the Generalized Minimal Supergravity (GmSUGRA)
- Author
-
Khan, Imtiaz, Ahmed, Waqas, Li, Tianjun, Raza, Shabbar, and Muhammad, Ali
- Subjects
High Energy Physics - Phenomenology - Abstract
We investigate both the $Z$ and $H$ poles solutions for the Higgsino mass parameter $\mu>0$ and $\mu<0$ for the neutralino dark matter in light of the LHC supersymmetry searches and the direct detection dark matter experiments, LUX-ZEPLIN (LZ), in the Generalized Minimal Supergravity (GmSUGRA). Our study indicates that the latest experimental constraints from the LHC and LZ Collaborations exclude the light Higgsinos in the $Z$ and $H$ pole regions for the $\mu>0$ case. Interestingly, for the $\mu < 0$ case, a very light Higgsinos can still be consistent with the current constraints from the electroweakino searches and LZ experiment in the $Z$ and $H$ poles. Consequently, the $\mu < 0$ case appears more promising and thus requires the dedicated efforts to make definitive conclusions about their current status from the experimental Collaborations. In this framework, our findings indicate a deviation of up to $2\sigma$ from the central value of \( a_\mu \equiv (g-2)_\mu/2 \), resonating with the experimental results reported by CMD and BDM., Comment: 8 pages and 4 figures
- Published
- 2025
7. Attention based Bidirectional GRU hybrid model for inappropriate content detection in Urdu language
- Author
-
Shoukat, Ezzah, Irfan, Rabia, Basharat, Iqra, Tahir, Muhammad Ali, and Shaukat, Sameen
- Subjects
Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
With the increased use of the internet and social networks for online discussions, the spread of toxic and inappropriate content on social networking sites has also increased. Several studies have been conducted in different languages. However, there is less work done for South Asian languages for inappropriate content identification using deep learning techniques. In Urdu language, the spellings are not unique, and people write different common spellings for the same word, while mixing it other languages, like English in the text makes it more challenging, and limited research work is available to process such language with the finest algorithms. The use of attention layer with a deep learning model can help handling the long-term dependencies and increase its efficiency . To explore the effects of the attention layer, this study proposes attention-based Bidirectional GRU hybrid model for identifying inappropriate content in Urdu Unicode text language. Four different baseline deep learning models; LSTM, Bi-LSTM, GRU, and TCN, are used to compare the performance of the proposed model. The results of these models were compared based on evaluation metrics, dataset size, and impact of the word embedding layer. The pre-trained Urdu word2Vec embeddings were utilized for our case. Our proposed model BiGRU-A outperformed all other baseline models by yielding 84\% accuracy without using pre-trained word2Vec layer. From our experiments, we have established that the attention layer improves the model's efficiency, and pre-trained word2Vec embedding does not work well with an inappropriate content dataset.
- Published
- 2025
8. Artificial Intelligence, Ambient Backscatter Communication and Non-Terrestrial Networks: A 6G Commixture
- Author
-
Jamshed, Muhammad Ali, Haq, Bushra, Mohsin, Muhammad Ahmed, Nauman, Ali, and Yanikomeroglu, Halim
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
The advent of Non-Terrestrial Networks (NTN) represents a compelling response to the International Mobile Telecommunications 2030 (IMT-2030) framework, enabling the delivery of advanced, seamless connectivity that supports reliable, sustainable, and resilient communication systems. Nevertheless, the integration of NTN with Terrestrial Networks (TN) necessitates considerable alterations to the existing cellular infrastructure in order to address the challenges intrinsic to NTN implementation. Additionally, Ambient Backscatter Communication (AmBC), which utilizes ambient Radio Frequency (RF) signals to transmit data to the intended recipient by altering and reflecting these signals, exhibits considerable potential for the effective integration of NTN and TN. Furthermore, AmBC is constrained by its limitations regarding power, interference, and other related factors. In contrast, the application of Artificial Intelligence (AI) within wireless networks demonstrates significant potential for predictive analytics through the use of extensive datasets. AI techniques enable the real-time optimization of network parameters, mitigating interference and power limitations in AmBC. These predictive models also enhance the adaptive integration of NTN and TN, driving significant improvements in network reliability and Energy Efficiency (EE). In this paper, we present a comprehensive examination of how the commixture of AI, AmBC, and NTN can facilitate the integration of NTN and TN. We also provide a thorough analysis indicating a marked enhancement in EE predicated on this triadic relationship., Comment: 9 pages, 4 figures, 1 table; submitted to IEEE IoT Magazine
- Published
- 2025
9. Probing Loop Quantum Gravity via Kerr Black Hole and EHT Results
- Author
-
Raza, Muhammad Ali, Zubair, M., Atamurotov, Farruh, and Abdujabbarov, Ahmadjon
- Subjects
General Relativity and Quantum Cosmology ,Astrophysics - High Energy Astrophysical Phenomena ,High Energy Physics - Theory - Abstract
Recently, a study on shadow of quantum Schwarzschild black hole appeared in [Ye et al., Phys.Lett. B 851, 138566, (2024)] for a fixed value of Barbero-Immirzi parameter $\gamma$. Following this approach, we considered its rotating counterpart being a deformed Kerr metric in Loop Quantum Gravity and studied its deviation from Kerr black hole for a fixed value of $\gamma$. We proved a theorem describing the location of unstable circular null orbits for all metrics of this kind. The deviation between the shadows of the quantum Kerr and Kerr black holes has also been studied, and parameters are constrained by comparison with the EHT results for M87* and Sgr A* to precisely probe the quantity of deviation due to quantum correction. Lastly, we immersed the deformed Kerr black hole in an inhomogeneous plasma and studied its impact on the shadow size. We found that the unstable null orbits for the quantum black hole are always smaller than the unstable null orbits for Kerr black hole. The quantum correction allows the deformed Kerr black hole to mimic Sgr A* with a higher probability than the Kerr black hole. However, the quantum-corrected Kerr black hole barely mimics M87*. The plasma reduces the size of black hole shadow and the plasma parameter in the case II is more sensitive than that in case I., Comment: 12 pages, 5 figures
- Published
- 2025
10. A Tutorial on Non-Terrestrial Networks: Towards Global and Ubiquitous 6G Connectivity
- Author
-
Jamshed, Muhammad Ali, Kaushik, Aryan, Manzoor, Sanaullah, Shakir, Muhammad Zeeshan, Seong, Jaehyup, Toka, Mesut, Shin, Wonjae, and Schellmann, Malte
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Information Theory - Abstract
The International Mobile Telecommunications (IMT)-2030 framework recently adopted by the International Telecommunication Union Radiocommunication Sector (ITU-R) envisions 6G networks to deliver intelligent, seamless connectivity that supports reliable, sustainable, and resilient communications. Recent developments in the 3rd Generation Partnership Project (3GPP) Releases 17-19, particularly within the Radio Access Network (RAN)4 working group addressing satellite and cellular spectrum sharing and RAN2 enhancing New Radio (NR)/IoT for NTN, highlight the critical role NTN is set to play in the evolution of 6G standards. The integration of advanced signal processing, edge and cloud computing, and Deep Reinforcement Learning (DRL) for Low Earth Orbit (LEO) satellites and aerial platforms, such as Uncrewed Aerial Vehicles (UAV) and high-, medium-, and low-altitude platform stations, has revolutionized the convergence of space, aerial, and Terrestrial Networks (TN). Artificial Intelligence (AI)-powered deployments for NTN and NTN-IoT, combined with Next Generation Multiple Access (NGMA) technologies, have dramatically reshaped global connectivity. This tutorial paper provides a comprehensive exploration of emerging NTN-based 6G wireless networks, covering vision, alignment with 5G-Advanced and 6G standards, key principles, trends, challenges, real-world applications, and novel problem solving frameworks. It examines essential enabling technologies like AI for NTN (LEO satellites and aerial platforms), DRL, edge computing for NTN, AI for NTN trajectory optimization, Reconfigurable Intelligent Surfaces (RIS)-enhanced NTN, and robust Multiple-Input-Multiple-Output (MIMO) beamforming. Furthermore, it addresses interference management through NGMA, including Rate-Splitting Multiple Access (RSMA) for NTN, and the use of aerial platforms for access, relay, and fronthaul/backhaul connectivity., Comment: 83 pages, 9 figures, 6 tables
- Published
- 2024
11. Warping the Edge: Where Instant Mobility in 5G Meets Stateful Applications
- Author
-
Ahmad, Mukhtiar, Bilal, Faaiq, Ali, Mutahar, Nawazish, Muhammad Ali, Salman, Amir, Ali, Shazer, Ahmad, Fawad, and Qazi, Zafar Ayyub
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Edge computing is considered a key paradigm for supporting real-time applications over 5G networks, as hosting applications at the network edge can substantially reduce delays. A significant fraction of real-time applications over 5G are expected to be highly mobile applications. However, one challenge with hosting mobile applications on the network edge is ensuring that users continue to get low latency as they move across different locations. This requires the support to handover clients to different edge sites with negligible application delays. However, many edge applications are stateful and can experience significant downtime during state migration over 5G. This paper addresses the problem of enabling stateful mobile edge applications in 5G networks. We first identify the key architectural issues and then propose a new system design, EdgeWarp, that mitigates delays during mobility through proactive application state migration. To enable this, we extend the existing edge data stores with the design of a novel two-step application state synchronization protocol, that leverages the early prediction of the target edge host. Additionally, EdgeWarp prioritizes the handover of latency-sensitive edge applications by communicating their latency requirements to the 5G control plane at the beginning of a data session. Our evaluation with real edge applications shows up to a 15.4x reduction in application downtime under mobility. We have made our anonymized code publicly accessible here.
- Published
- 2024
12. Multi-scale and Multi-path Cascaded Convolutional Network for Semantic Segmentation of Colorectal Polyps
- Author
-
Manan, Malik Abdul, Jinchao, Feng, Yaqub, Muhammad, Ahmed, Shahzad, Imran, Syed Muhammad Ali, Chuhan, Imran Shabir, and Khan, Haroon Ahmed
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Colorectal polyps are structural abnormalities of the gastrointestinal tract that can potentially become cancerous in some cases. The study introduces a novel framework for colorectal polyp segmentation named the Multi-Scale and Multi-Path Cascaded Convolution Network (MMCC-Net), aimed at addressing the limitations of existing models, such as inadequate spatial dependence representation and the absence of multi-level feature integration during the decoding stage by integrating multi-scale and multi-path cascaded convolutional techniques and enhances feature aggregation through dual attention modules, skip connections, and a feature enhancer. MMCC-Net achieves superior performance in identifying polyp areas at the pixel level. The Proposed MMCC-Net was tested across six public datasets and compared against eight SOTA models to demonstrate its efficiency in polyp segmentation. The MMCC-Net's performance shows Dice scores with confidence intervals ranging between (77.08, 77.56) and (94.19, 94.71) and Mean Intersection over Union (MIoU) scores with confidence intervals ranging from (72.20, 73.00) to (89.69, 90.53) on the six databases. These results highlight the model's potential as a powerful tool for accurate and efficient polyp segmentation, contributing to early detection and prevention strategies in colorectal cancer.
- Published
- 2024
- Full Text
- View/download PDF
13. Full 3D Model of Modulation Efficiency of Complementary Metal Oxide Semiconductor (CMOS) Compatible, Submicron, Interleaved Junction Optical Phase Shifters
- Author
-
Shaikh, Abdurrahman Javid, Packeer, Fauzi, Baig, Mirza Muhammad Ali, and Sidek, Othman
- Subjects
Physics - Optics ,Electrical Engineering and Systems Science - Signal Processing ,Physics - Applied Physics - Abstract
Performance optimization associated with optical modulators requires reasonably accurate predictive models for key figures of merit. Interleaved PN-junction topology offers the maximum mode/junction overlap and is the most efficient modulator in depletion-mode of operation. Due to its structure, the accurate modelling process must be fully three-dimensional, which is a nontrivial computational problem. This paper presents a rigorous 3D model for the modulation efficiency of silicon-on-insulator interleaved junction optical phase modulators with submicron dimensions. Solution of Drift-Diffusion and Poisson equations were carried out on 3D finite-element-mesh and Maxwell equations were solved using Finite-Difference-Time-Domain (FDTD) method on 3D Yee-cells. Whole of the modelling process has been detailed and all the coefficients required in the model are presented. Model validation suggests < 10% RMS error.
- Published
- 2024
- Full Text
- View/download PDF
14. Confinement Specific Design of SOI Rib Waveguides with Submicron Dimensions and Single Mode Operation
- Author
-
Shaikh, Abdurrahman Javid, Abro, Abdul Ghani, Baig, Mirza Muhammad Ali, Siddiqui, Muhammad Adeel Ahmad, and Abbas, Syed Mohsin
- Subjects
Physics - Optics ,Electrical Engineering and Systems Science - Signal Processing ,Electrical Engineering and Systems Science - Systems and Control ,Physics - Applied Physics ,Physics - Computational Physics - Abstract
Full-vectorial finite difference method with perfectly matched layers boundaries is used to identify the single mode operation region of submicron rib waveguides fabricated using sili-con-on-insulator material system. Achieving high mode power confinement factors is emphasized while maintaining the single mode operation. As opposed to the case of large cross-section rib waveguides, theoretical single mode conditions have been demonstrated to hold for sub-micron waveguides with accuracy approaching 100%. Both, the deeply and the shallowly etched rib waveguides have been considered and the single mode condition for entire sub-micrometer range is presented while adhering to design specific mode confinement requirements.
- Published
- 2024
- Full Text
- View/download PDF
15. Some optical properties of rotating wormhole in Bopp-Podolsky electrodynamics
- Author
-
Raza, Muhammad Ali, Tello-Ortiz, Francisco, Zubair, M., and Gómez-Leyton, Y.
- Subjects
General Relativity and Quantum Cosmology - Abstract
In this work, we consider a static wormhole in Bopp-Podolsky electrodynamics and convert it into its rotating counterpart by reducing it into Morris-Thorne form. We further study the null geodesics and effective potential along with the shadows for inner and outer unstable orbits for specific choices of parameters. It is found that for some cases smooth shadow curves are formed and for a few cases, the shadows formed are cuspy. All parameters have a significant impact on the shadows except for the parameter $b$ when either $a$ or $Q$ are kept small. We also analyze the gravitational lensing in the strong regime, considering that the observer and the source are on opposite sides of the throat. For this situation, we explore in detail the behavior of the deflection angle, Einstein rings and lensing observables.
- Published
- 2024
16. Knowledge-Assisted Privacy Preserving in Semantic Communication
- Author
-
Liu, Xuesong, Sun, Yao, Cheng, Runze, Xia, Le, Abumarshoud, Hanaa, Zhang, Lei, and Imran, Muhammad Ali
- Subjects
Computer Science - Cryptography and Security - Abstract
Semantic communication (SC) offers promising advancements in data transmission efficiency and reliability by focusing on delivering true meaning rather than solely binary bits of messages. However, privacy concerns in SC might become outstanding. Eavesdroppers equipped with advanced semantic coding models and extensive knowledge could be capable of correctly decoding and reasoning sensitive semantics from just a few stolen bits. To this end, this article explores utilizing knowledge to enhance data privacy in SC networks. Specifically, we first identify the potential attacks in SC based on the analysis of knowledge. Then, we propose a knowledge-assisted privacy preserving SC framework, which consists of a data transmission layer for precisely encoding and decoding source messages, and a knowledge management layer responsible for injecting appropriate knowledge into the transmission pair. Moreover, we elaborate on the transceiver design in the proposed SC framework to explain how knowledge should be utilized properly. Finally, some challenges of the proposed SC framework are discussed to expedite the practical implementation.
- Published
- 2024
17. Employability on Vocational High School Students in the '3T' Area Bawean Island
- Author
-
Fatwa Tentama, Budi Santosa, and Raden Muhammad Ali
- Abstract
Vocational high schools in "3T" area on Bawean Island have limitations in human resources quality, equipment, production or practice tools, and industrial partnership, which differed from the vocational high schools located in advanced and developed areas. This research objective is to discover the description of employability to the vocational high school students in "3T" area in Bawean island. The research method applied was the qualitative method using the phenomenology approach. The data collection was obtained through semi-structured interviews. This research participant was eight students at vocational high school "X," "Y," "Z," and "W" schools in Bawean Island, which is one of the "3T" area. The analysis method in this research was content analysis. This research result shows that students in the "3T" area were showing their effort to prepare themselves in facing the job market by enhancing their employability in learning activities within the class or practice in the laboratory. The students' employability includes skills, knowledge, comprehension, personality, career identity, social and human relations, and personal adaptability. Students realize that they are in the "3T" area and must work harder to improve their work skills so as not to lose their jobs.
- Published
- 2024
18. Martensitic transformation temperature modification of Fe-SMA for efficient medical implants
- Author
-
Rasheed, Muhammad Muneeb, Saif, Ahmed, ur Rahman, Rana Atta, Nasir, Muhammad Ali, Mehmood, Shahid, Usman, Muhammad, and Rao, Abdul Moiz
- Published
- 2024
19. Developing a Software-Defined Networking-Based Simulation Framework for the Internet of Space Things
- Author
-
Shah, Awais Aziz, Jamshed, Muhammad Ali, Jamshed, Muhammad Ali, editor, and Nauman, Ali, editor
- Published
- 2025
- Full Text
- View/download PDF
20. Integrated Terrestrial and Non-Terrestrial Network: An Overview
- Author
-
Haq, Bushra, Jamshed, Muhammad Ali, Nauman, Ali, Jamshed, Muhammad Ali, editor, and Nauman, Ali, editor
- Published
- 2025
- Full Text
- View/download PDF
21. CBAM-SwinT-BL: Small Rail Surface Defect Detection Method Based on Swin Transformer with Block Level CBAM Enhancement
- Author
-
Zhao, Jiayi, Yeung, Alison Wun-lam, Muhammad, Ali, Lai, Songjiang, and NG, Vincent To-Yee
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Under high-intensity rail operations, rail tracks endure considerable stresses resulting in various defects such as corrugation and spellings. Failure to effectively detect defects and provide maintenance in time would compromise service reliability and public safety. While advanced models have been developed in recent years, efficiently identifying small-scale rail defects has not yet been studied, especially for categories such as Dirt or Squat on rail surface. To address this challenge, this study utilizes Swin Transformer (SwinT) as baseline and incorporates the Convolutional Block Attention Module (CBAM) for enhancement. Our proposed method integrates CBAM successively within the swin transformer blocks, resulting in significant performance improvement in rail defect detection, particularly for categories with small instance sizes. The proposed framework is named CBAM-Enhanced Swin Transformer in Block Level (CBAM-SwinT-BL). Experiment and ablation study have proven the effectiveness of the framework. The proposed framework has a notable improvement in the accuracy of small size defects, such as dirt and dent categories in RIII dataset, with mAP-50 increasing by +23.0% and +38.3% respectively, and the squat category in MUET dataset also reaches +13.2% higher than the original model. Compares to the original SwinT, CBAM-SwinT-BL increase overall precision around +5% in the MUET dataset and +7% in the RIII dataset, reaching 69.1% and 88.1% respectively. Meanwhile, the additional module CBAM merely extend the model training speed by an average of +0.04s/iteration, which is acceptable compared to the significant improvement in system performance., Comment: 27 pages, 17 figures
- Published
- 2024
22. Accessibility Issues in Ad-Driven Web Applications
- Author
-
Amjad, Abdul Haddi, Danish, Muhammad, Jah, Bless, and Gulzar, Muhammad Ali
- Subjects
Computer Science - Software Engineering - Abstract
Website accessibility is essential for inclusiveness and regulatory compliance. Although third-party advertisements (ads) are a vital revenue source for free web services, they introduce significant accessibility challenges. Leasing a website\'s space to ad-serving technologies like DoubleClick results in developers losing control over ad content accessibility. Even on highly accessible websites, third-party ads can undermine adherence to Web Content Accessibility Guidelines (WCAG). We conduct the first large-scale investigation of 430K website elements, including nearly 100K ad elements, to understand the accessibility of ads on websites. We seek to understand the prevalence of inaccessible ads and their overall impact on the accessibility of websites. Our findings show that 67% of websites experience increased accessibility violations due to ads, with common violations including Focus Visible and On Input. Popular ad-serving technologies like Taboola, DoubleClick, and RevContent often serve ads that fail to comply with WCAG standards. Even when ads are WCAG compliant, 27% of them have alternative text in ad images that misrepresents information, potentially deceiving users. Manual inspection of a sample of these misleading ads revealed that user-identifiable data is collected on 94% of websites through interactions, such as hovering or pressing enter. Since users with disabilities often rely on tools like screen readers that require hover events to access website content, they have no choice but to compromise their privacy in order to navigate website ads. Based on our findings, we further dissect the root cause of these violations and provide design guidelines to both website developers and ad-serving technologies to achieve WCAG-compliant ad integration.
- Published
- 2024
23. SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting
- Author
-
Chauhan, Muhammad Aufeef, Babar, Muhammad Ali, and Rabhi, Fethi
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Software Engineering - Abstract
A Software Reference Architecture (SRA) is a useful tool for standardising existing architectures in a specific domain and facilitating concrete architecture design, development and evaluation by instantiating SRA and using SRA as a benchmark for the development of new systems. In this paper, we have presented an SRA for Security Data Orchestration, Analysis and Reporting (SecDOAR) to provide standardisation of security data platforms that can facilitate the integration of security orchestration, analysis and reporting tools for security data. The SecDOAR SRA has been designed by leveraging existing scientific literature and security data standards. We have documented SecDOAR SRA in terms of design methodology, meta-models to relate to different concepts in the security data architecture, and details on different elements and components of the SRA. We have evaluated SecDOAR SRA for its effectiveness and completeness by comparing it with existing commercial solutions. We have demonstrated the feasibility of the proposed SecDOAR SRA by instantiating it as a prototype platform to support security orchestration, analysis and reporting for a selected set of tools. The proposed SecDOAR SRA consists of meta-models for security data, security events and security data management processes as well as security metrics and corresponding measurement schemes, a security data integration model, and a description of SecDOAR SRA components. The proposed SecDOAR SRA can be used by researchers and practitioners as a structured approach for designing and implementing cybersecurity monitoring, analysis and reporting systems in various domains., Comment: 21 pages, 17 Figures, 5 Tables
- Published
- 2024
24. Near-Field Localization with Antenna Arrays in the Presence of Direction-Dependent Mutual Coupling
- Author
-
Ebadi, Zohreh, Molaei, Amir Masoud, Alexandropoulos, George C., Abbasi, Muhammad Ali Babar, Cotton, Simon, Tukmanov, Anvar, and Yurduseven, Okan
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Localizing near-field sources considering practical arrays is a recent challenging topic for next generation wireless communication systems. Practical antenna array apertures with closely spaced elements exhibit direction-dependent mutual coupling (MC), which can significantly degrade the performance localization techniques. A conventional method for near-field localization in the presence of MC is the three-dimensional (3D) multiple signal classification technique, which, however, suffers from extremely high computational complexity. Recently, two-dimensional (2D) search alternatives have been presented, exhibiting increased complexity still for direction-dependent MC scenarios. In this paper, we devise a low complexity one-dimensional (1D) iterative method based on an oblique projection operator (IMOP) that estimates direction-dependent MC and the locations of multiple near-field sources. The proposed method first estimates the initial direction of arrival (DOA) and MC using the approximate wavefront model, and then, estimates the initial range of one near-field source using the exact wavefront model. Afterwards, at each iteration, the oblique projection operator is used to isolate components associated with one source from those of other sources. The DOA and range of this one source are estimated using the exact wavefront model and 1D searches. Finally, the direction-dependent MC is estimated for each pair of the estimated DOA and range. The performance of the proposed near-field localization approach is comprehensively investigated and verified using both a full-wave electromagnetic solver and synthetic simulations. It is showcased that our IMOP scheme performs almost similarly to a state-of-the-art approach but with a 42 times less computational complexity., Comment: 13 pages, 11 figures, submitted to an IEEE Transactions
- Published
- 2024
25. Hybrid Semantic/Bit Communication Based Networking Problem Optimization
- Author
-
Xia, Le, Sun, Yao, Niyato, Dusit, Zhang, Lan, Zhang, Lei, and Imran, Muhammad Ali
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Information Theory ,Electrical Engineering and Systems Science - Systems and Control - Abstract
This paper jointly investigates user association (UA), mode selection (MS), and bandwidth allocation (BA) problems in a novel and practical next-generation cellular network where two modes of semantic communication (SemCom) and conventional bit communication (BitCom) coexist, namely hybrid semantic/bit communication network (HSB-Net). Concretely, we first identify a unified performance metric of message throughput for both SemCom and BitCom links. Next, we comprehensively develop a knowledge matching-aware two-stage tandem packet queuing model and theoretically derive the average packet loss ratio and queuing latency. Combined with several practical constraints, we then formulate a joint optimization problem for UA, MS, and BA to maximize the overall message throughput of HSB-Net. Afterward, we propose an optimal resource management strategy by employing a Lagrange primal-dual method and devising a preference list-based heuristic algorithm. Finally, numerical results validate the performance superiority of our proposed strategy compared with different benchmarks., Comment: This paper has been accepted for publication and will be presented in 2024 IEEE Global Communications Conference (GlobeCom 2024). arXiv admin note: substantial text overlap with arXiv:2404.04162
- Published
- 2024
26. Hamiltonian Lattice Formulation of Compact Maxwell-Chern-Simons Theory
- Author
-
Peng, Changnan, Diamantini, Maria Cristina, Funcke, Lena, Hassan, Syed Muhammad Ali, Jansen, Karl, Kühn, Stefan, Luo, Di, and Naredi, Pranay
- Subjects
High Energy Physics - Theory ,High Energy Physics - Lattice ,Quantum Physics - Abstract
In this paper, a Hamiltonian lattice formulation for 2+1D compact Maxwell-Chern-Simons theory is derived. We analytically solve this theory and demonstrate that the mass gap in the continuum limit matches the well-known continuum formula. Our formulation preserves topological features such as the quantization of the Chern-Simons level, the degeneracy of energy eigenstates, the non-trivial properties of Wilson loops, and the mutual and self statistics of anyons. This work lays the groundwork for future Hamiltonian-based simulations of Maxwell-Chern-Simons theory on classical and quantum computers.
- Published
- 2024
27. Near-Field Localization with an Exact Propagation Model in Presence of Mutual Coupling
- Author
-
Ebadi, Zohreh, Molaei, Amir Masoud, Abbasi, Muhammad Ali Babar, Cotton, Simon, Tukmanov, Anvar, and Yurduseven, Okan
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Localizing near-field sources considering practical arrays is important in wireless communications. Array-based apertures exhibit mutual coupling between the array elements, which can significantly degrade the performance of the localization method. In this paper, we propose two methods to localize near-field sources by direction of arrival (DOA) and range estimations in the presence of mutual coupling. The first method utilizes a two-dimensional search to estimate DOA and the range of the source. Therefore, it suffers from a high computational load. The second method reduces the two-dimensional search to one-dimensional, thus decreasing the computational complexity while offering similar DOA and range estimation performance. Besides, our second method reduces computational time by over 50% compared to the multiple signal classification (MUSIC) algorithm., Comment: Proceedings of 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)
- Published
- 2024
28. Harnessing DRL for URLLC in Open RAN: A Trade-off Exploration
- Author
-
Sohaib, Rana Muhammad, Shah, Syed Tariq, Onireti, Oluwakayode, and Imran, Muhammad Ali
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
The advent of Ultra-Reliable Low Latency Communication (URLLC) alongside the emergence of Open RAN (ORAN) architectures presents unprecedented challenges and opportunities in Radio Resource Management (RRM) for next-generation communication systems. This paper presents a comprehensive trade-off analysis of Deep Reinforcement Learning (DRL) approaches designed to enhance URLLC performance within ORAN's flexible and dynamic framework. By investigating various DRL strategies for optimising RRM parameters, we explore the intricate balance between reliability, latency, and the newfound adaptability afforded by ORAN principles. Through extensive simulation results, our study compares the efficacy of different DRL models in achieving URLLC objectives in an ORAN context, highlighting the potential of DRL to navigate the complexities introduced by ORAN. The proposed study provides valuable insights into the practical implementation of DRL-based RRM solutions in ORAN-enabled wireless networks. It sheds light on the benefits and challenges of integrating DRL and ORAN for URLLC enhancements. Our findings contribute to the ongoing discourse on advancements in URLLC and ORAN, offering a roadmap for future research to pursue efficient, reliable, and flexible communication systems., Comment: The manuscript is currently under review in IEEE Communications Standards Magazine
- Published
- 2024
29. High Performance 5G FR-2 Millimeter-Wave Antenna Array for Point-to-Point and Point-to-Multipoint Operation: Design and OTA Measurements Using a Compact Antenna Test Range
- Author
-
Jabbar, Abdul, Kazim, Jalil Ur-Rehman, Shawky, Mahmoud A., Imran, Muhammad Ali, Abbasi, Qammer, Usman, Muhammad, and Ur-Rehman, Masood
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper presents the design and comprehensive measurements of a high-performance 8-element linear array and a compact high-gain 32-element planar antenna array covering the n257 (26.5--29.5 GHz) FR-2 millimeter-wave (mmWave) band. First, an 8-element series-fed linear array is designed with a fan-shaped pattern for 5G point-to-multipoint connectivity. Then a 4-way corporate-series feed network is designed for a high-gain 32-element compact and directive array for point-to-point mmWave connectivity. Comprehensive over-the-air (OTA) measurements are conducted using a state-of-the-art compact antenna test range (CATR) system, enabling precise characterization of radiation patterns across a 180^\circ span in the azimuth and elevation planes. The planar array achieves a peak measured gain of 18.45 dBi at 28.5 GHz, with half-power beamwidths ranging from 11^\circ--13^\circ (wide axis) and 23^\circ--27^\circ (narrow axis) across the band of interest. The sidelobe levels are below -10 dB in the desired band of interest. The measured results match well with the simulation results. The designed antenna array is applicable to various emerging 5G and beyond mmWave applications such as high data rate mmWave wireless backhaul, mmWave near-field focusing, high-resolution indoor radar systems, 28 GHz Local Multipoint Distribution Service (LMDS), as well as the characterization of mmWave path loss and channel sounding in diverse indoor environments., Comment: 11 Pages, 15 Figues, Orignalsubmission
- Published
- 2024
30. Non-Terrestrial Networks for 6G: Integrated, Intelligent and Ubiquitous Connectivity
- Author
-
Jamshed, Muhammad Ali, Kaushik, Aryan, Dajer, Miguel, Guidotti, Alessandro, Parzysz, Fanny, Lagunas, Eva, Di Renzo, Marco, Chatzinotas, Symeon, and Dobre, Octavia A.
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Universal connectivity has been part of past and current generations of wireless systems, but as we approach 6G, the subject of social responsibility is being built as a core component. Given the advent of Non-Terrestrial Networks (NTN), reaching these goals will be much closer to realization than ever before. Owing to the benefits of NTN, the integration NTN and Terrestrial Networks (TN) is still infancy, where the past, the current and the future releases in the 3$^{\text{rd}}$ Generation Partnership Project (3GPP) provide guidelines to adopt a successfully co-existence/integration of TN and NTN. Therefore, in this article, we have illustrated through 3GPP guidelines, on how NTN and TN can effectively be integrated. Moreover, the role of beamforming and Artificial Intelligence (AI) algorithms is highlighted to achieve this integration. Finally the usefulness of integrating NTN and TN is validated through experimental analysis., Comment: submitted to IEEE Vehicular Technology Magazine
- Published
- 2024
31. Experimental analysis of a double pass solar air collector using phase change materials integrated with nanoparticle
- Author
-
Khan, Zubair, Jamil, Furqan, Nasir, Muhammad Ali, Wakeel, Aneela, and Ali, Hafiz Muhammad
- Published
- 2025
- Full Text
- View/download PDF
32. Combined Effects of Reduced Tillage and Strip Intercropping on Soil Carbon Sequestration in Semi-Arid Environment
- Author
-
Rehman, Sana ur, Ijaz, Shahzada Sohail, Din, Atta Mohi Ud, Al-Dosary, Munirah Abdullah, Ansar, Muhammad, Fatima, Shroz, Siddiqa, Ayesha, Ashraf, Muhammad Nadeem, Haider, Imran, Junaid, Muhammad Bilawal, Raza, Muhammad Ali, and Yang, Haishui
- Published
- 2025
- Full Text
- View/download PDF
33. Thermal and hydraulic performance evaluation of heat sinks using nanofluids and innovative vortex generating fins
- Author
-
Khalid, Saif Ullah, Nasir, Muhammad Ali, Aqeel, Muhammad, Khan, Muhammad Saleem, Hanna, Eddie Gazo, and Ali, Hafiz Muhammad
- Published
- 2025
- Full Text
- View/download PDF
34. Nanoparticles as an Alternative Strategy to Control Foot and Mouth Disease Virus in Bovines
- Author
-
Abbas, Rao Zahid, Ambrose, Silla, Khan, Arslan Muhammad Ali, Mobashar, Muhammad, and Mohamed, Khalil
- Published
- 2025
- Full Text
- View/download PDF
35. A Two-Stage Analysis of Interaction Between Stock and Exchange Rate Markets: Evidence from Turkey
- Author
-
Faisal, Muhammad Ali and Donduran, Murat
- Published
- 2025
- Full Text
- View/download PDF
36. Comparison Between Machine Learning and Bivariate Statistical Models for Groundwater Recharge Zones
- Author
-
Aslam, Bilal, Maqsoom, Ahsen, Hassan, Usman, Maqsoom, Sidra, Alaloul, Wesam Salah, Musarat, Muhammad Ali, Shahzaib, Muhammad, and Irfan, Muhammad
- Published
- 2025
- Full Text
- View/download PDF
37. Analyzing the Role of Enterprise Social Media and Employee Performance in Presence of Workplace Isolation: A Social Exchange Perspective
- Author
-
Ali, Huma, Sohail, Aamir, Bilal, Hamid, Mufti, Muhammad Ali, Ali, Muhammad Hasnain, Zafar, Muhammad Raza, and Zafar, Mohsin Raza
- Published
- 2025
- Full Text
- View/download PDF
38. Global genomic surveillance of monkeypox virus
- Author
-
Otieno, James R., Ruis, Christopher, Onoja, Anyebe B., Kuppalli, Krutika, Hoxha, Ana, Nitsche, Andreas, Brinkmann, Annika, Michel, Janine, Mbala-Kingebeni, Placide, Mukadi-Bamuleka, Daniel, Osman, Muntasir Mohammed, Hussein, Hanadi, Raja, Muhammad Ali, Fotsing, Richard, Herring, Belinda L., Keita, Mory, Rico, Jairo Mendez, Gresh, Lionel, Barakat, Amal, Katawera, Victoria, Nahapetyan, Karen, Naidoo, Dhamari, Floto, R. Andres, Cunningham, Jane, Van Kerkhove, Maria D., Lewis, Rosamund F., and Subissi, Lorenzo
- Published
- 2025
- Full Text
- View/download PDF
39. Mechanism of improvement and best-fit models for the prediction of geotechnical properties of lime stabilized expansive soil used in pavement subgrade
- Author
-
Naveed, Muhammad Ali, Ahmed, Sarfraz, Ullah, Arshad, and Zia, Muhammad Danish
- Published
- 2024
40. Aerospace and Thin Films
- Author
-
Alhazaa, Abdulaziz, Shar, Muhammad Ali, Chandio, Ali Dad, editor, and Channa, Iftikhar Ahmed, editor
- Published
- 2025
- Full Text
- View/download PDF
41. Microstructure and Composition
- Author
-
Shar, Muhammad Ali, Alhazaa, Abdulaziz, Chandio, Ali Dad, editor, and Channa, Iftikhar Ahmed, editor
- Published
- 2025
- Full Text
- View/download PDF
42. TinyML-Based Approach for Dynamic Transmission Power in LoRaWAN Network
- Author
-
Lodhi, Muhammad Ali, Wang, Lei, Qureshi, Khalid Ibrahim, Mahmood, Khalid, Li, Gang, Series Editor, Filipe, Joaquim, Series Editor, Xu, Zhiwei, Series Editor, Sun, Limin, editor, and Chen, Yongle, editor
- Published
- 2025
- Full Text
- View/download PDF
43. Deep Reinforcement Learning-Based Joint Transmission Power and Channel Selection in UAV-Assisted Wireless Networks
- Author
-
Qureshi, Khalid Ibrahim, Wang, Lei, Lodhi, Muhammad Ali, Ejaz, Muhammad Asim, Li, Gang, Series Editor, Filipe, Joaquim, Series Editor, Xu, Zhiwei, Series Editor, Sun, Limin, editor, and Chen, Yongle, editor
- Published
- 2025
- Full Text
- View/download PDF
44. Exploring Genetic Variability and Character Associations in China Aster (Callistephus chinensis L. Nees)
- Author
-
Naeem, Shajiha, Haider, Muhammad Zeshan, Sami, Adnan, Qureshi, Muhammad Ali, Bhatti, Muhammad Hamza Tariq, Irfan, Uswa, Mudasar, Muhammad, Tanwir, Muhammad Imtiaz, Ali, Qurban, Shafiq, Muhammad, Al-Khayri, Jameel M., Series Editor, Jain, S. Mohan, Series Editor, Jain, Shri Mohan, editor, and Wani, Muneeb Ahmad, editor
- Published
- 2025
- Full Text
- View/download PDF
45. Microbial Enzymes in Bioremediation of Water Polluted by Textile Industry Effluents
- Author
-
Ejaz, Mohammad, Sharif, Mehmoona, Safi, Sher Zaman, Nawaz, Sabir, Jamil, Sheryar, Syed, Muhammad Ali, Ahmed, Waqar, Memon, Hafeezullah, Series Editor, and Arshad, Muhammad, editor
- Published
- 2025
- Full Text
- View/download PDF
46. Environment-Based Spatial Management Combines Dignified Justice in Harmonization of Regulations
- Author
-
Adnan, Muhammad Ali, Prasetyo, Teguh, Pakpahan, Elvira Fitriyani, Nasution, Mirza, Striełkowski, Wadim, Editor-in-Chief, Black, Jessica M., Series Editor, Butterfield, Stephen A., Series Editor, Chang, Chi-Cheng, Series Editor, Cheng, Jiuqing, Series Editor, Dumanig, Francisco Perlas, Series Editor, Al-Mabuk, Radhi, Series Editor, Scheper-Hughes, Nancy, Series Editor, Urban, Mathias, Series Editor, Webb, Stephen, Series Editor, Yafie, Evania, editor, Nagari, Primasa Minerva, editor, Handayani, Sri, editor, Susilawati, Sinta Yuni, editor, Wati, Andy Prasetyo, editor, Windayu, Cinde Ririh, editor, and Prihatiningsih, Riskiyana, editor
- Published
- 2025
- Full Text
- View/download PDF
47. Towards Secure Management of Edge-Cloud IoT Microservices using Policy as Code
- Author
-
Pallewatta, Samodha and Babar, Muhammad Ali
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Software Engineering - Abstract
IoT application providers increasingly use MicroService Architecture (MSA) to develop applications that convert IoT data into valuable information. The independently deployable and scalable nature of microservices enables dynamic utilization of edge and cloud resources provided by various service providers, thus improving performance. However, IoT data security should be ensured during multi-domain data processing and transmission among distributed and dynamically composed microservices. The ability to implement granular security controls at the microservices level has the potential to solve this. To this end, edge-cloud environments require intricate and scalable security frameworks that operate across multi-domain environments to enforce various security policies during the management of microservices (i.e., initial placement, scaling, migration, and dynamic composition), considering the sensitivity of the IoT data. To address the lack of such a framework, we propose an architectural framework that uses Policy-as-Code to ensure secure microservice management within multi-domain edge-cloud environments. The proposed framework contains a "control plane" to intelligently and dynamically utilise and configure cloud-native (i.e., container orchestrators and service mesh) technologies to enforce security policies. We implement a prototype of the proposed framework using open-source cloud-native technologies such as Docker, Kubernetes, Istio, and Open Policy Agent to validate the framework. Evaluations verify our proposed framework's ability to enforce security policies for distributed microservices management, thus harvesting the MSA characteristics to ensure IoT application security needs., Comment: 16 pages, 7 figures, Accepted for full paper presentation at ECSA 2024 conference
- Published
- 2024
48. ChildDiffusion: Unlocking the Potential of Generative AI and Controllable Augmentations for Child Facial Data using Stable Diffusion and Large Language Models
- Author
-
Farooq, Muhammad Ali, Yao, Wang, and Corcoran, Peter
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
In this research work we have proposed high-level ChildDiffusion framework capable of generating photorealistic child facial samples and further embedding several intelligent augmentations on child facial data using short text prompts, detailed textual guidance from LLMs, and further image to image transformation using text guidance control conditioning thus providing an opportunity to curate fully synthetic large scale child datasets. The framework is validated by rendering high-quality child faces representing ethnicity data, micro expressions, face pose variations, eye blinking effects, facial accessories, different hair colours and styles, aging, multiple and different child gender subjects in a single frame. Addressing privacy concerns regarding child data acquisition requires a comprehensive approach that involves legal, ethical, and technological considerations. Keeping this in view this framework can be adapted to synthesise child facial data which can be effectively used for numerous downstream machine learning tasks. The proposed method circumvents common issues encountered in generative AI tools, such as temporal inconsistency and limited control over the rendered outputs. As an exemplary use case we have open-sourced child ethnicity data consisting of 2.5k child facial samples of five different classes which includes African, Asian, White, South Asian/ Indian, and Hispanic races by deploying the model in production inference phase. The rendered data undergoes rigorous qualitative as well as quantitative tests to cross validate its efficacy and further fine-tuning Yolo architecture for detecting and classifying child ethnicity as an exemplary downstream machine learning task., Comment: This work has been submitted to the IEEE Transactions Journal for possible publication
- Published
- 2024
49. Beyond Diagonal RIS for 6G Non-Terrestrial Networks: Potentials and Challenges
- Author
-
Khan, Wali Ullah, Mahmood, Asad, Jamshed, Muhammad Ali, Lagunas, Eva, Ahmed, Manzoor, and Chatzinotas, Symeon
- Subjects
Computer Science - Emerging Technologies - Abstract
Reconfigurable intelligent surface (RIS) has emerged as a promising technology in both terrestrial and non-terrestrial networks (NTNs) due to its ability to manipulate wireless environments for better connectivity. Significant studies have been focused on conventional RIS with diagonal phase response matrices. This simple RIS architecture, though less expensive, has limited flexibility in engineering the wireless channels. As the latest member of RIS technology, beyond diagonal RIS (BD-RIS) has recently been proposed in terrestrial setups. Due to the interconnected phase response elements (PREs), BD-RIS significantly enhances the control over the wireless environment. This work proposes the potential and challenges of BD-RIS in NTNs. We begin with the motivation and recent advances in BD-RIS. Subsequently, we discuss the fundamentals of BD-RIS and NTNs. We then outline the application of BD-RIS in NTNs, followed by a case study on BD-RIS enabled non-orthogonal multiple access low earth orbit satellite communication. Finally, we highlight challenges and research directions with concluding remarks., Comment: 10,4
- Published
- 2024
50. A Multivocal Review of MLOps Practices, Challenges and Open Issues
- Author
-
Eken, Beyza, Pallewatta, Samodha, Tran, Nguyen Khoi, Tosun, Ayse, and Babar, Muhammad Ali
- Subjects
Computer Science - Software Engineering - Abstract
With the increasing trend of Machine Learning (ML) enabled software applications, the paradigm of ML Operations (MLOps) has gained tremendous attention of researchers and practitioners. MLOps encompasses the practices and technologies for streamlining the resources and monitoring needs of operationalizing ML models. Software development practitioners need access to the detailed and easily understandable knowledge of MLOps workflows, practices, challenges and solutions to effectively and efficiently support the adoption of MLOps. Whilst the academic and industry literature on the MLOps has been growing rapidly, there have been relatively a few attempts at systematically synthesizing and analyzing the vast amount of existing literature of MLOps for improving ease of access and understanding. We conducted a Multivocal Literature Review (MLR) of 150 relevant academic studies and 48 gray literature to provide a comprehensive body of knowledge on MLOps. Through this MLR, we identified the emerging MLOps practices, adoption challenges and solutions related to various areas, including development and operation of complex pipelines, managing production at scale, managing artifacts, and ensuring quality, security, governance, and ethical aspects. We also report the socio-technical aspect of MLOps relating to diverse roles involved and collaboration practices across them through the MLOps lifecycle. We assert that this MLR provides valuable insights to researchers and practitioners seeking to navigate the rapidly evolving landscape of MLOps. We also identify the open issues that need to be addressed in order to advance the current state-of-the-art of MLOps., Comment: 45 pages, 4 figures
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.