Skip to main content

Showing 1–24 of 24 results for author: Akram, A

  1. arXiv:2405.03223  [pdf, other

    cs.SE

    The Kansei Engineering Approach in Web Design:Case of Transportation Website

    Authors: Alisher Akram, Aray Kozhamuratova, Pakizar Shamoi

    Abstract: Kansei Engineering (KE) is a user-centered design approach that emphasizes the emotional aspects of user experience. This paper explores the integration of KE in the case of a transportation company that focuses on connecting cargo owners with transportation providers. The methodology involves aligning the design process with the company's strategy, collecting and semantic scaling Kansei words, an… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: submitted to Springer journal for consideration

  2. arXiv:2404.14617  [pdf, other

    cs.AR

    TDRAM: Tag-enhanced DRAM for Efficient Caching

    Authors: Maryam Babaie, Ayaz Akram, Wendy Elsasser, Brent Haukness, Michael Miller, Taeksang Song, Thomas Vogelsang, Steven Woo, Jason Lowe-Power

    Abstract: As SRAM-based caches are hitting a scaling wall, manufacturers are integrating DRAM-based caches into system designs to continue increasing cache sizes. While DRAM caches can improve the performance of memory systems, existing DRAM cache designs suffer from high miss penalties, wasted data movement, and interference between misses and demand requests. In this paper, we propose TDRAM, a novel DRAM… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  3. arXiv:2404.01981  [pdf, ps, other

    cs.LG cs.SD eess.AS

    Zero-Shot Multi-Lingual Speaker Verification in Clinical Trials

    Authors: Ali Akram, Marija Stanojevic, Malikeh Ehghaghi, Jekaterina Novikova

    Abstract: Due to the substantial number of clinicians, patients, and data collection environments involved in clinical trials, gathering data of superior quality poses a significant challenge. In clinical trials, patients are assessed based on their speech data to detect and monitor cognitive and mental health disorders. We propose using these speech recordings to verify the identities of enrolled patients… ▽ More

    Submitted 5 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  4. arXiv:2403.13812  [pdf

    cs.DL cs.AI cs.CL cs.CY cs.LG stat.OT

    Quantitative Analysis of AI-Generated Texts in Academic Research: A Study of AI Presence in Arxiv Submissions using AI Detection Tool

    Authors: Arslan Akram

    Abstract: Many people are interested in ChatGPT since it has become a prominent AIGC model that provides high-quality responses in various contexts, such as software development and maintenance. Misuse of ChatGPT might cause significant issues, particularly in public safety and education, despite its immense potential. The majority of researchers choose to publish their work on Arxiv. The effectiveness and… ▽ More

    Submitted 9 February, 2024; originally announced March 2024.

    Comments: 8 pages, 6 figures, 1 table

    MSC Class: 62P25 ACM Class: I.7; G.1; G.3

  5. arXiv:2402.18746  [pdf, other

    cs.AR cs.LG

    Accelerating Computer Architecture Simulation through Machine Learning

    Authors: Wajid Ali, Ayaz Akram

    Abstract: This paper presents our approach to accelerate computer architecture simulation by leveraging machine learning techniques. Traditional computer architecture simulations are time-consuming, making it challenging to explore different design choices efficiently. Our proposed model utilizes a combination of application features and micro-architectural features to predict the performance of an applicat… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  6. arXiv:2311.10116  [pdf, other

    cs.CV

    Wildfire Smoke Detection with Cross Contrast Patch Embedding

    Authors: Chong Wang, Cheng Xu, Adeel Akram, Zhilin Shan, Qixing Zhang

    Abstract: The Transformer-based deep networks have increasingly shown significant advantages over CNNs. Some existing work has applied it in the field of wildfire recognition or detection. However, we observed that the vanilla Transformer is not friendly for extracting smoke features. Because low-level information such as color, transparency and texture is very important for smoke recognition, and transform… ▽ More

    Submitted 31 December, 2023; v1 submitted 16 November, 2023; originally announced November 2023.

  7. arXiv:2310.01423  [pdf

    cs.CL cs.AI cs.LG

    An Empirical Study of AI Generated Text Detection Tools

    Authors: Arslan Akram

    Abstract: Since ChatGPT has emerged as a major AIGC model, providing high-quality responses across a wide range of applications (including software development and maintenance), it has attracted much interest from many individuals. ChatGPT has great promise, but there are serious problems that might arise from its misuse, especially in the realms of education and public safety. Several AIGC detectors are av… ▽ More

    Submitted 27 September, 2023; originally announced October 2023.

    Comments: 15 Pages, 4 Figures, 2 Tables, 42 References

    Report number: 42 MSC Class: 53 ACM Class: I.2.6; I.2.7

    Journal ref: 2023

  8. Fuzzy Approach for Audio-Video Emotion Recognition in Computer Games for Children

    Authors: Pavel Kozlov, Alisher Akram, Pakizar Shamoi

    Abstract: Computer games are widespread nowadays and enjoyed by people of all ages. But when it comes to kids, playing these games can be more than just fun, it is a way for them to develop important skills and build emotional intelligence. Facial expressions and sounds that kids produce during gameplay reflect their feelings, thoughts, and moods. In this paper, we propose a novel framework that integrates… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

    Comments: 8 pages. Prepared for the Elsevier conference

  9. arXiv:2306.12444  [pdf, other

    eess.AS cs.AI cs.LG cs.SD

    Factors Affecting the Performance of Automated Speaker Verification in Alzheimer's Disease Clinical Trials

    Authors: Malikeh Ehghaghi, Marija Stanojevic, Ali Akram, Jekaterina Novikova

    Abstract: Detecting duplicate patient participation in clinical trials is a major challenge because repeated patients can undermine the credibility and accuracy of the trial's findings and result in significant health and financial risks. Developing accurate automated speaker verification (ASV) models is crucial to verify the identity of enrolled individuals and remove duplicates, but the size and quality o… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: Accepted to the 5th Clinical Natural Language Processing Workshop (ClinicalNLP) at ACL 2023

  10. SARGAN: Spatial Attention-based Residuals for Facial Expression Manipulation

    Authors: Arbish Akram, Nazar Khan

    Abstract: Encoder-decoder based architecture has been widely used in the generator of generative adversarial networks for facial manipulation. However, we observe that the current architecture fails to recover the input image color, rich facial details such as skin color or texture and introduces artifacts as well. In this paper, we present a novel method named SARGAN that addresses the above-mentioned limi… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

    Journal ref: IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2023

  11. arXiv:2303.13029  [pdf, other

    cs.AR cs.PF

    Enabling Design Space Exploration of DRAM Caches in Emerging Memory Systems

    Authors: Maryam Babaie, Ayaz Akram, Jason Lowe-Power

    Abstract: The increasing growth of applications' memory capacity and performance demands has led the CPU vendors to deploy heterogeneous memory systems either within a single system or via disaggregation. For instance, systems like Intel's Knights Landing and Sapphire Rapids can be configured to use high bandwidth memory as a cache to main memory. While there is significant research investigating the design… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  12. arXiv:2303.13026  [pdf, other

    cs.AR cs.PF

    A Cycle-level Unified DRAM Cache Controller Model for 3DXPoint Memory Systems in gem5

    Authors: Maryam Babaie, Ayaz Akram, Jason Lowe-Power

    Abstract: To accommodate the growing memory footprints of today's applications, CPU vendors have employed large DRAM caches, backed by large non-volatile memories like Intel Optane (e.g., Intel's Cascade Lake). The existing computer architecture simulators do not provide support to model and evaluate systems which use DRAM devices as a cache to the non-volatile main memory. In this work, we present a cycle-… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  13. BC-IoDT: Blockchain-based Framework for Authentication in Internet of Drone Things

    Authors: Junaid Akram, Awais Akram, Rutvij H. Jhaveri, Mamoun Alazab, Haoran Chi

    Abstract: We leverage blockchain technology for drone node authentication in internet of drone things (IoDT). During the authentication procedure, the credentials of drone nodes are examined to remove malicious nodes from the system. In IoDT, drones are responsible for gathering data and transmitting it to cluster heads (CHs) for further processing. The CH collects and organizes data. Due to computational l… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 6 pages, 3 figures, ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond

    Journal ref: 2022 ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond

  14. arXiv:2202.07755  [pdf

    eess.IV cs.CV q-bio.QM

    Deep Learning-Assisted Co-registration of Full-Spectral Autofluorescence Lifetime Microscopic Images with H&E-Stained Histology Images

    Authors: Qiang Wang, Susan Fernandes, Gareth O. S. Williams, Neil Finlayson, Ahsan R. Akram, Kevin Dhaliwal, James R. Hopgood, Marta Vallejo

    Abstract: Autofluorescence lifetime images reveal unique characteristics of endogenous fluorescence in biological samples. Comprehensive understanding and clinical diagnosis rely on co-registration with the gold standard, histology images, which is extremely challenging due to the difference of both images. Here, we show an unsupervised image-to-image translation network that significantly improves the succ… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: 21 pages, 9 figures, 5 equations, 1 table

  15. US-GAN: On the importance of Ultimate Skip Connection for Facial Expression Synthesis

    Authors: Arbish Akram, Nazar Khan

    Abstract: We demonstrate the benefit of using an ultimate skip (US) connection for facial expression synthesis using generative adversarial networks (GAN). A direct connection transfers identity, facial, and color details from input to output while suppressing artifacts. The intermediate layers can therefore focus on expression generation only. This leads to a light-weight US-GAN model comprised of encoding… ▽ More

    Submitted 7 April, 2023; v1 submitted 24 December, 2021; originally announced December 2021.

    Journal ref: Multimed Tools Appl (2023)

  16. arXiv:2012.15032  [pdf

    cs.LG

    Unsupervised Real Time Prediction of Faults Using the Support Vector Machine

    Authors: Zhiyuan Chen, Isa Dino, Nik Ahmad Akram

    Abstract: This paper aims at improving the classification accuracy of a Support Vector Machine (SVM) classifier with Sequential Minimal Optimization (SMO) training algorithm in order to properly classify failure and normal instances from oil and gas equipment data. Recent applications of failure analysis have made use of the SVM technique without implementing SMO training algorithm, while in our study we sh… ▽ More

    Submitted 29 December, 2020; originally announced December 2020.

    Comments: This paper is published at IEEE RTCSA 2013

  17. arXiv:2012.04105  [pdf, other

    cs.LG cs.AR

    The Tribes of Machine Learning and the Realm of Computer Architecture

    Authors: Ayaz Akram, Jason Lowe-Power

    Abstract: Machine learning techniques have influenced the field of computer architecture like many other fields. This paper studies how the fundamental machine learning techniques can be applied towards computer architecture problems. We also provide a detailed survey of computer architecture research that employs different machine learning methods. Finally, we present some future opportunities and the outs… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  18. Masked Linear Regression for Learning Local Receptive Fields for Facial Expression Synthesis

    Authors: Nazar Khan, Arbish Akram, Arif Mahmood, Sania Ashraf, Kashif Murtaza

    Abstract: Compared to facial expression recognition, expression synthesis requires a very high-dimensional mapping. This problem exacerbates with increasing image sizes and limits existing expression synthesis approaches to relatively small images. We observe that facial expressions often constitute sparsely distributed and locally correlated changes from one expression to another. By exploiting this observ… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: IJCV Journal

    Journal ref: International Journal of Computer Vision, vol 128, no 5, 2020

  19. arXiv:2010.14397  [pdf, other

    cs.CV

    Pixel-based Facial Expression Synthesis

    Authors: Arbish Akram, Nazar Khan

    Abstract: Facial expression synthesis has achieved remarkable advances with the advent of Generative Adversarial Networks (GANs). However, GAN-based approaches mostly generate photo-realistic results as long as the testing data distribution is close to the training data distribution. The quality of GAN results significantly degrades when testing images are from a slightly different distribution. Moreover, r… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: ICPR 2020, 7 pages, 5 figures

  20. arXiv:2010.13216  [pdf, other

    cs.DC cs.AR cs.CR

    Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

    Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert

    Abstract: Scientific computing sometimes involves computation on sensitive data. Depending on the data and the execution environment, the HPC (high-performance computing) user or data provider may require confidentiality and/or integrity guarantees. To study the applicability of hardware-based trusted execution environments (TEEs) to enable secure scientific computing, we deeply analyze the performance impa… ▽ More

    Submitted 25 October, 2020; originally announced October 2020.

  21. arXiv:2007.03152  [pdf, other

    cs.AR

    The gem5 Simulator: Version 20.0+

    Authors: Jason Lowe-Power, Abdul Mutaal Ahmad, Ayaz Akram, Mohammad Alian, Rico Amslinger, Matteo Andreozzi, Adrià Armejach, Nils Asmussen, Brad Beckmann, Srikant Bharadwaj, Gabe Black, Gedare Bloom, Bobby R. Bruce, Daniel Rodrigues Carvalho, Jeronimo Castrillon, Lizhong Chen, Nicolas Derumigny, Stephan Diestelhorst, Wendy Elsasser, Carlos Escuin, Marjan Fariborz, Amin Farmahini-Farahani, Pouya Fotouhi, Ryan Gambord, Jayneel Gandhi , et al. (53 additional authors not shown)

    Abstract: The open-source and community-supported gem5 simulator is one of the most popular tools for computer architecture research. This simulation infrastructure allows researchers to model modern computer hardware at the cycle level, and it has enough fidelity to boot unmodified Linux-based operating systems and run full applications for multiple architectures including x86, Arm, and RISC-V. The gem5 si… ▽ More

    Submitted 29 September, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Source, comments, and feedback: https://github.com/darchr/gem5-20-paper

  22. arXiv:1810.12043  [pdf, other

    cs.CV

    Patch-Based Sparse Representation For Bacterial Detection

    Authors: Ahmed Karam Eldaly, Yoann Altmann, Ahsan Akram, Antonios Perperidis, Kevin Dhaliwal, Stephen McLaughlin

    Abstract: In this paper, we propose an unsupervised approach for bacterial detection in optical endomicroscopy images. This approach splits each image into a set of overlapping patches and assumes that observed intensities are linear combinations of the actual intensity values associated with background image structures, corrupted by additive Gaussian noise and potentially by a sparse outlier term modelling… ▽ More

    Submitted 24 January, 2019; v1 submitted 29 October, 2018; originally announced October 2018.

  23. arXiv:1204.1179  [pdf

    cs.AR

    C-slow Technique vs Multiprocessor in designing Low Area Customized Instruction set Processor for Embedded Applications

    Authors: Muhammad Adeel Akram, Aamir Khan, Muhammad Masood Sarfaraz

    Abstract: The demand for high performance embedded processors, for consumer electronics, is rapidly increasing for the past few years. Many of these embedded processors depend upon custom built Instruction Ser Architecture (ISA) such as game processor (GPU), multimedia processors, DSP processors etc. Primary requirement for consumer electronic industry is low cost with high performance and low power consump… ▽ More

    Submitted 5 April, 2012; originally announced April 2012.

    Journal ref: International Journal of Computer Applications (0975 - 8887) Volume 36 - No.7, December 2011

  24. arXiv:1201.3720  [pdf

    cs.CV

    A Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance

    Authors: Aamir Khan, Muhammad Farhan, Aasim Khurshid, Adeel Akram

    Abstract: Essentially a biometric system is a pattern recognition system which recognizes a user by determining the authenticity of a specific anatomical or behavioral characteristic possessed by the user. With the ever increasing integration of computers and Internet into daily life style, it has become necessary to protect sensitive and personal data. This paper proposes a multimodal biometric system whic… ▽ More

    Submitted 18 January, 2012; originally announced January 2012.

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, 2011, 122-127