212,390 results on '"Sayed, A"'
Search Results
2. Investigating the relationship between employees' green knowledge, green service behavior and environmental performance in the hotel industry of Bangladesh
- Author
-
Karmoker, Kajol, Nazifa, Muhtadee Noor, Sayed, Azharul Islam, Kona, Farhana Amin, Jamim, Asifa Afrin, Roy, Brito, and Paul, Ripon Kumar
- Published
- 2024
- Full Text
- View/download PDF
3. Formulating a Research Problem in Education and Language Learning Research: A Comprehensive Guide
- Author
-
Mahmoud Mohammad Sayed Abdallah
- Abstract
This article by Dr. Mahmoud M. S. Abdallah provides a comprehensive guide to formulating a research problem in education and language learning, particularly for TESOL/TEFL researchers. It emphasizes the importance of a well-defined research problem as the cornerstone of any research project, guiding the selection of methods, data collection, and overall research trajectory. The article outlines key sources of research problems, including practical classroom challenges, gaps in existing literature, and broader societal issues. It offers practical steps for identifying and formulating research problems, such as starting with personal interests, reviewing literature, and ensuring the problem's relevance and feasibility. The article also highlights the significance of precision, empirical testability, and relevance in crafting a research problem. Through illustrative examples and theoretical frameworks, it aims to equip researchers with the tools needed to navigate the complexities of early-stage research design, ultimately contributing to the advancement of knowledge and improvement of educational practices.
- Published
- 2024
4. The protective effect of garden cress Lepidium sativum against lipopolysaccharide (LPS) induced hepatotoxicity in mice model
- Author
-
Sayed, Abdalla A., Ali, Ali M., and Bekhet, Gamal M.
- Published
- 2021
- Full Text
- View/download PDF
5. A light-weight model to generate NDWI from Sentinel-1
- Author
-
Ahmed, Saleh Sakib, Jony, Saifur Rahman, Toufikuzzaman, Md., Sayed, Saifullah, Zzaman, Rashed Uz, Nowreen, Sara, and Rahman, M. Sohel
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
The use of Sentinel-2 images to compute Normalized Difference Water Index (NDWI) has many applications, including water body area detection. However, cloud cover poses significant challenges in this regard, which hampers the effectiveness of Sentinel-2 images in this context. In this paper, we present a deep learning model that can generate NDWI given Sentinel-1 images, thereby overcoming this cloud barrier. We show the effectiveness of our model, where it demonstrates a high accuracy of 0.9134 and an AUC of 0.8656 to predict the NDWI. Additionally, we observe promising results with an R2 score of 0.4984 (for regressing the NDWI values) and a Mean IoU of 0.4139 (for the underlying segmentation task). In conclusion, our model offers a first and robust solution for generating NDWI images directly from Sentinel-1 images and subsequent use for various applications even under challenging conditions such as cloud cover and nighttime.
- Published
- 2025
6. Starting a Synthetic Biological Intelligence Lab from Scratch
- Author
-
Tanveer, Md Sayed, Patel, Dhruvik, Schweiger, Hunter E., Abu-Bonsrah, Kwaku Dad, Watmuff, Brad, Azadi, Azin, Pryshchep, Sergey, Narayanan, Karthikeyan, Puleo, Christopher, Natarajan, Kannathal, Mostajo-Radji, Mohammed A., Kagan, Brett J., and Wang, Ge
- Subjects
Quantitative Biology - Neurons and Cognition - Abstract
With the recent advancements in artificial intelligence, researchers and industries are deploying gigantic models trained on billions of samples. While training these models consumes a huge amount of energy, human brains produce similar outputs (along with other capabilities) with massively lower data and energy requirements. For this reason, more researchers are increasingly considering alternatives. One of these alternatives is known as synthetic biological intelligence, which involves training \textit{in vitro} neurons for goal-directed tasks. This multidisciplinary field requires knowledge of tissue engineering, bio-materials, digital signal processing, computer programming, neuroscience, and even artificial intelligence. The multidisciplinary requirements make starting synthetic biological intelligence research highly non-trivial and time-consuming. Generally, most labs either specialize in the biological aspects or the computational ones. Here, we propose how a lab focusing on computational aspects, including machine learning and device interfacing, can start working on synthetic biological intelligence, including organoid intelligence. We will also discuss computational aspects, which can be helpful for labs that focus on biological research. To facilitate synthetic biological intelligence research, we will describe such a general process step by step, including risks and precautions that could lead to substantial delay or additional cost.
- Published
- 2024
7. Comparative Analysis of Mel-Frequency Cepstral Coefficients and Wavelet Based Audio Signal Processing for Emotion Detection and Mental Health Assessment in Spoken Speech
- Author
-
Agbo, Idoko, El-Sayed, Dr Hoda, and Sarker, M. D Kamruzzan
- Subjects
Computer Science - Sound ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Audio and Speech Processing - Abstract
The intersection of technology and mental health has spurred innovative approaches to assessing emotional well-being, particularly through computational techniques applied to audio data analysis. This study explores the application of Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) models on wavelet extracted features and Mel-frequency Cepstral Coefficients (MFCCs) for emotion detection from spoken speech. Data augmentation techniques, feature extraction, normalization, and model training were conducted to evaluate the models' performance in classifying emotional states. Results indicate that the CNN model achieved a higher accuracy of 61% compared to the LSTM model's accuracy of 56%. Both models demonstrated better performance in predicting specific emotions such as surprise and anger, leveraging distinct audio features like pitch and speed variations. Recommendations include further exploration of advanced data augmentation techniques, combined feature extraction methods, and the integration of linguistic analysis with speech characteristics for improved accuracy in mental health diagnostics. Collaboration for standardized dataset collection and sharing is recommended to foster advancements in affective computing and mental health care interventions.
- Published
- 2024
8. TransferLight: Zero-Shot Traffic Signal Control on any Road-Network
- Author
-
Schmidt, Johann, Dreyer, Frank, Hashimi, Sayed Abid, and Stober, Sebastian
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Traffic signal control plays a crucial role in urban mobility. However, existing methods often struggle to generalize beyond their training environments to unseen scenarios with varying traffic dynamics. We present TransferLight, a novel framework designed for robust generalization across road-networks, diverse traffic conditions and intersection geometries. At its core, we propose a log-distance reward function, offering spatially-aware signal prioritization while remaining adaptable to varied lane configurations - overcoming the limitations of traditional pressure-based rewards. Our hierarchical, heterogeneous, and directed graph neural network architecture effectively captures granular traffic dynamics, enabling transferability to arbitrary intersection layouts. Using a decentralized multi-agent approach, global rewards, and novel state transition priors, we develop a single, weight-tied policy that scales zero-shot to any road network without re-training. Through domain randomization during training, we additionally enhance generalization capabilities. Experimental results validate TransferLight's superior performance in unseen scenarios, advancing practical, generalizable intelligent transportation systems to meet evolving urban traffic demands., Comment: AAAI Workshop Paper (MALTA)
- Published
- 2024
9. The Extended Crosswise Model Adjusted for Random Answering
- Author
-
Sayed, Khadiga H. A., Cruyff, Maarten J. L. F., Petróczi, Andrea, and van der Heijden, Peter G. M.
- Subjects
Statistics - Methodology - Abstract
The Extended Crosswise Model is a popular randomized response design that employs a sensitive and a randomized innocuous statement, and asks respondents if one of these statements is true, or that none or both are true. The model has a degree of freedom to test for response biases, but is unable to detect random answering. In this paper, we propose two new methods to indirectly estimate and correct for random answering. One method uses a non-sensitive control statement and a quasi-randomized innocuous statement to which both answers are known to estimate the proportion of random respondents. The other method assigns less weight in the estimation procedure to respondents who complete the survey in an unrealistically short time. For four surveys among elite athletes, we use these methods to correct the prevalence estimates of doping use for random answering.
- Published
- 2024
10. Effect of feeding graded levels of palm kernel meal with exogenous enzymes on performance, nutrient digestibility and carcass traits of growing rabbits
- Author
-
Al-Sultan, S.I., Abdel-Raheem, S.M., and Sayed, A.N.
- Published
- 2021
- Full Text
- View/download PDF
11. Faculty Members' Experience of Student Incivility in Public Institutions of Higher Education: A Case Study of a Conflict-Stricken Country
- Author
-
Sayeed Naqibullah Orfan and Sayed Shafiullah Obaidi
- Abstract
Incivility, a growing challenge in higher education institutions, interferes with and disrupts the learning process. This study examined faculty members' experiences of students' incivilities in institutions of higher education in Afghanistan. A survey questionnaire was used to collect data from 289 faculty members who were teaching in various higher education institutions across Afghanistan. Descriptive and inferential statistics and thematic analysis were used to analyze the data. The findings showed that faculty members experienced varying degrees of a wide range of incivilities in and outside the classroom, including conversing loudly in the class, interruption, and harassment. They also experienced a variety of incivilities related to assessment and grading. A small number of them experienced more serious forms of incivilities including beating, stabbing, and death threats. The findings also revealed that there were not significant differences between participants' experiences of student incivility by their gender, but there were significant differences between faculty members' experience by their level of education and years of teaching experience. The study recommends faculty members and higher education institutions take practical measures to address incivilities inside and outside the classroom in order to create a safe learning environment for faculty members and students.
- Published
- 2024
12. Analyzing Multimodal Data to Understand Medical Trainees' Regulation Strategies and Physiological Responses in High- Fidelity Medical Simulation Scenarios
- Author
-
Matthew Moreno, Lucia Patino Melo, Keerat Grewal, Negar Matin, Sayed Azher, and Jason M. Harley
- Abstract
Medical simulations allow trainees to work within teams to develop their self-regulated learning (SRL) and socially-shared regulated learning (SSRL) skills (Bransen et al., 2022). Both skillsets help to better prepare medical trainees for the multifaceted challenges inherent in clinical practice. SRL skills are imperative in empowering learners to optimize their performance and become autonomous guiders of their own learning (Jarvela & Hadwin, 2013), while SSRL skills are needed to ensure that teams can work collectively to regulate their behaviors and to regulate their own learning to make decisions (Hadwin & Oshige, 2011). Questions remain about not only how medical trainees' behaviors, regulation strategies, and physiological responses vary while they participate in a high-fidelity medical simulation, but how additional data channels to measure human response can provide indicators of teams' regulation strategies. Using a mixed-methods convergence design incorporating multimodal data (Azevedo & Gaševic, 2019), including behavioral, SRL and SSRL codes, and electrodermal activity, researchers studied twenty-nine (N = 29) 1st to 3rd year medical residents as they engaged in high-fidelity simulation scenarios. Results suggest that the mean-level of psychophysiological activation increase as simulations progress, in conjunction with an increase in team-regulated learning strategies to manage the effective provision of patient care from initial contact through to the delivery of critical procedures. These results provide valuable insights into the advancement of a team regulation-based framework within a high-fidelity medical simulation environment, leveraging multimodal data to reach an understanding of medical trainees' adoption of team-based approaches to team-regulation during simulation scenarios.
- Published
- 2024
- Full Text
- View/download PDF
13. Ultrasensitive detection of intact SARS-CoV-2 particles in complex biofluids using microfluidic affinity capture
- Author
-
Rabe, Daniel C, Choudhury, Adarsh, Lee, Dasol, Luciani, Evelyn G, Ho, Uyen K, Clark, Alex E, Glasgow, Jeffrey E, Veiga, Sara, Michaud, William A, Capen, Diane, Flynn, Elizabeth A, Hartmann, Nicola, Garretson, Aaron F, Muzikansky, Alona, Goldberg, Marcia B, Kwon, Douglas S, Yu, Xu, Carlin, Aaron F, Theriault, Yves, Wells, James A, Lennerz, Jochen K, Lai, Peggy S, Rabi, Sayed Ali, Hoang, Anh N, Boland, Genevieve M, and Stott, Shannon L
- Subjects
Analytical Chemistry ,Biomedical and Clinical Sciences ,Chemical Sciences ,Lung ,Biotechnology ,Emerging Infectious Diseases ,Coronaviruses ,Infectious Diseases ,Bioengineering ,Biodefense ,Infection ,Good Health and Well Being ,Humans ,SARS-CoV-2 ,COVID-19 ,Angiotensin-Converting Enzyme 2 ,Saliva ,Viral Load ,Lab-On-A-Chip Devices ,Feces ,Microfluidics ,Microfluidic Analytical Techniques - Abstract
Measuring virus in biofluids is complicated by confounding biomolecules coisolated with viral nucleic acids. To address this, we developed an affinity-based microfluidic device for specific capture of intact severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Our approach used an engineered angiotensin-converting enzyme 2 to capture intact virus from plasma and other complex biofluids. Our device leverages a staggered herringbone pattern, nanoparticle surface coating, and processing conditions to achieve detection of as few as 3 viral copies per milliliter. We further validated our microfluidic assay on 103 plasma, 36 saliva, and 29 stool samples collected from unique patients with COVID-19, showing SARS-CoV-2 detection in 72% of plasma samples. Longitudinal monitoring in the plasma revealed our device's capacity for ultrasensitive detection of active viral infections over time. Our technology can be adapted to target other viruses using relevant cell entry molecules for affinity capture. This versatility underscores the potential for widespread application in viral load monitoring and disease management.
- Published
- 2025
14. A preference for dynamical phantom dark energy using one-parameter model with Planck, DESI DR1 BAO and SN data
- Author
-
Fikri, Ramy, ElKhateeb, Esraa, Lashin, El Sayed, and Hanafy, Waleed El
- Subjects
Astrophysics - Cosmology and Nongalactic Astrophysics - Abstract
Baryon Acoustic Oscillation (BAO) provides a powerful tool to measure cosmic expansion and consequently the nature of the Dark Energy (DE). Recent precise BAO measurements by Dark Energy Spectroscopic Instrument data release 1 (DESI DR1), when combined with Cosmic Microwave Background (CMB) data from Planck and Supernovae of Type Ia (SN Ia), favor evolving dark energy over cosmological constant. This result is strongly related to the assumed priors on the Chevallier-Polarski-Linder (CPL) parameterization of DE. We test another parametrization which introduces two free parameters $n$ and $\alpha$, only $n$ is independent. Thus, it reduces the parameter space compared to the CPL model, which derives a more robust preference for evolving DE, if any. The model potentially produces three cosmological scenarios according to the values of its parameters. For $n=3$, the $\Lambda$CDM model is recovered, quintessence for $n<3$, and phantom for $n>3$. In the present study, we test the model on the background level, and, to our knowledge for the first time, on the linear perturbation level. Bayesian evidence analysis shows a weak preference for dynamical DE in the phantom regime over the cosmological constant DE using Planck, DESI, and PantheonPlus\&SH0ES data. The model predicts current phantom DE $w_{de,0} = -1.073 \pm 0.032$ and $H_0=70.9\pm 1.4$ km/s/Mpc when Planck+DESI data is used, which decreases the tension with $H_0$ local measurements to $1.2\sigma$ level., Comment: 24 pages, 9 figures, 4 tables
- Published
- 2024
15. Energy-aware operation of HPC systems in Germany
- Author
-
Suarez, Estela, Bockelmann, Hendryk, Eicker, Norbert, Eitzinger, Jan, Sayed, Salem El, Fieseler, Thomas, Frank, Martin, Frech, Peter, Giesselmann, Pay, Hackenberg, Daniel, Hager, Georg, Herten, Andreas, Ilsche, Thomas, Koller, Bastian, Laure, Erwin, Manzano, Cristina, Oeste, Sebastian, Ott, Michael, Reuter, Klaus, Schneider, Ralf, Thust, Kay, and Vieth, Benedikt von St.
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
High-Performance Computing (HPC) systems are among the most energy-intensive scientific facilities, with electric power consumption reaching and often exceeding 20 megawatts per installation. Unlike other major scientific infrastructures such as particle accelerators or high-intensity light sources, which are few around the world, the number and size of supercomputers are continuously increasing. Even if every new system generation is more energy efficient than the previous one, the overall growth in size of the HPC infrastructure, driven by a rising demand for computational capacity across all scientific disciplines, and especially by artificial intelligence workloads (AI), rapidly drives up the energy demand. This challenge is particularly significant for HPC centers in Germany, where high electricity costs, stringent national energy policies, and a strong commitment to environmental sustainability are key factors. This paper describes various state-of-the-art strategies and innovations employed to enhance the energy efficiency of HPC systems within the national context. Case studies from leading German HPC facilities illustrate the implementation of novel heterogeneous hardware architectures, advanced monitoring infrastructures, high-temperature cooling solutions, energy-aware scheduling, and dynamic power management, among other optimizations. By reviewing best practices and ongoing research, this paper aims to share valuable insight with the global HPC community, motivating the pursuit of more sustainable and energy-efficient HPC operations., Comment: 30 pages, 3 figures, 4 tables
- Published
- 2024
16. Uncovering the Hidden Ferroaxial Density Wave as the Origin of the Axial Higgs Mode in RTe$_3$
- Author
-
Singh, Birender, McNamara, Grant, Kim, Kyung-Mo, Siddique, Saif, Funni, Stephen D., Zhang, Weizhe, Luo, Xiangpeng, Sakrikar, Piyush, Kenney, Eric M., Singha, Ratnadwip, Alekseev, Sergey, Ghorashi, Sayed Ali Akbar, Hicken, Thomas J., Baines, Christopher, Luetkens, Hubertus, Wang, Yiping, Plisson, Vincent M., Geiwitz, Michael, Occhialini, Connor A., Comin, Riccardo, Graf, Michael J., Zhao, Liuyan, Cano, Jennifer, Fernandes, Rafael M., Cha, Judy J., Schoop, Leslie M., and Burch, Kenneth S.
- Subjects
Condensed Matter - Strongly Correlated Electrons - Abstract
The recent discovery of an axial amplitude (Higgs) mode in the long-studied charge density wave (CDW) systems GdTe$_3$ and LaTe$_3$ suggests a heretofore unidentified hidden order. A theoretical study proposed that the axial Higgs results from a hidden ferroaxial component of the CDW, which could arise from non-trivial orbital texture. Here, we report extensive experimental studies on ErTe$_3$ and HoTe$_3$ that possess a high-temperature CDW similar to other RTe$_3$ (R = rare earth), along with an additional low-temperature CDW with an orthogonal ordering vector. Combining Raman spectroscopy with large-angle convergent beam electron diffraction (LACBED), rotational anisotropy second-harmonic generation (RA-SHG), and muon-spin relaxation ($\mu$SR), we provide unambiguous evidence that the high-temperature CDW breaks translation, rotation, and all vertical and diagonal mirror symmetries, but not time-reversal or inversion. In contrast, the low-temperature CDW only additionally breaks translation symmetry. Simultaneously, Raman scattering shows the high-temperature CDW produces an axial Higgs mode while the low-temperature mode is scalar. The weak monoclinic structural distortion and clear axial response in Raman and SHG are consistent with a ferroaxial phase in RTe$_3$ driven by coupled orbital and charge orders. Thus, our study provides a new standard for uncovering unconventional orders and confirms the power of Higgs modes to reveal them., Comment: 28 pages, 5 figures
- Published
- 2024
17. Enhancing Graph Neural Networks in Large-scale Traffic Incident Analysis with Concurrency Hypothesis
- Author
-
Chen, Xiwen, Boroujeni, Sayed Pedram Haeri, Shu, Xin, Li, Huayu, and Razi, Abolfazl
- Subjects
Computer Science - Machine Learning ,Computer Science - Social and Information Networks - Abstract
Despite recent progress in reducing road fatalities, the persistently high rate of traffic-related deaths highlights the necessity for improved safety interventions. Leveraging large-scale graph-based nationwide road network data across 49 states in the USA, our study first posits the Concurrency Hypothesis from intuitive observations, suggesting a significant likelihood of incidents occurring at neighboring nodes within the road network. To quantify this phenomenon, we introduce two novel metrics, Average Neighbor Crash Density (ANCD) and Average Neighbor Crash Continuity (ANCC), and subsequently employ them in statistical tests to validate the hypothesis rigorously. Building upon this foundation, we propose the Concurrency Prior (CP) method, a powerful approach designed to enhance the predictive capabilities of general Graph Neural Network (GNN) models in semi-supervised traffic incident prediction tasks. Our method allows GNNs to incorporate concurrent incident information, as mentioned in the hypothesis, via tokenization with negligible extra parameters. The extensive experiments, utilizing real-world data across states and cities in the USA, demonstrate that integrating CP into 12 state-of-the-art GNN architectures leads to significant improvements, with gains ranging from 3% to 13% in F1 score and 1.3% to 9% in AUC metrics. The code is publicly available at https://github.com/xiwenc1/Incident-GNN-CP., Comment: Accepted by Sigspatial 2024
- Published
- 2024
18. SPRING Lab IITM's submission to Low Resource Indic Language Translation Shared Task
- Author
-
Sayed, Hamees, Joglekar, Advait, and Umesh, Srinivasan
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
We develop a robust translation model for four low-resource Indic languages: Khasi, Mizo, Manipuri, and Assamese. Our approach includes a comprehensive pipeline from data collection and preprocessing to training and evaluation, leveraging data from WMT task datasets, BPCC, PMIndia, and OpenLanguageData. To address the scarcity of bilingual data, we use back-translation techniques on monolingual datasets for Mizo and Khasi, significantly expanding our training corpus. We fine-tune the pre-trained NLLB 3.3B model for Assamese, Mizo, and Manipuri, achieving improved performance over the baseline. For Khasi, which is not supported by the NLLB model, we introduce special tokens and train the model on our Khasi corpus. Our training involves masked language modelling, followed by fine-tuning for English-to-Indic and Indic-to-English translations., Comment: Published in WMT 2024. Low-Resource Indic Language Translation Shared Task
- Published
- 2024
19. SafePyScript: A Web-Based Solution for Machine Learning-Driven Vulnerability Detection in Python
- Author
-
Farasat, Talaya, Ahmadzai, Atiqullah, George, Aleena Elsa, Qaderi, Sayed Alisina, Dordevic, Dusan, and Posegga, Joachim
- Subjects
Computer Science - Software Engineering - Abstract
Software vulnerabilities are a fundamental cause of cyber attacks. Effectively identifying these vulnerabilities is essential for robust cybersecurity, yet it remains a complex and challenging task. In this paper, we present SafePyScript, a machine learning-based web application designed specifically to identify vulnerabilities in Python source code. Despite Python's significance as a major programming language, there is currently no convenient and easy-to-use machine learning-based web application for detecting vulnerabilities in its source code. SafePyScript addresses this gap by providing an accessible solution for Python programmers to ensure the security of their applications. SafePyScript link: https://safepyscript.com/
- Published
- 2024
20. Fine-tuning Large Language Models for DGA and DNS Exfiltration Detection
- Author
-
Sayed, Md Abu, Rahman, Asif, Kiekintveld, Christopher, and Garcia, Sebastian
- Subjects
Computer Science - Cryptography and Security - Abstract
Domain Generation Algorithms (DGAs) are malicious techniques used by malware to dynamically generate seemingly random domain names for communication with Command & Control (C&C) servers. Due to the fast and simple generation of DGA domains, detection methods must be highly efficient and precise to be effective. Large Language Models (LLMs) have demonstrated their proficiency in real-time detection tasks, making them ideal candidates for detecting DGAs. Our work validates the effectiveness of fine-tuned LLMs for detecting DGAs and DNS exfiltration attacks. We developed LLM models and conducted comprehensive evaluation using a diverse dataset comprising 59 distinct real-world DGA malware families and normal domain data. Our LLM model significantly outperformed traditional natural language processing techniques, especially in detecting unknown DGAs. We also evaluated its performance on DNS exfiltration datasets, demonstrating its effectiveness in enhancing cybersecurity measures. To the best of our knowledge, this is the first work that empirically applies LLMs for DGA and DNS exfiltration detection., Comment: Accepted in Proceedings of the Workshop at AI for Cyber Threat Intelligence (WAITI), 2024
- Published
- 2024
21. Diagnosis of Knee Osteoarthritis Using Bioimpedance and Deep Learning
- Author
-
Al-Nabulsi, Jamal, Ahmad, Mohammad Al-Sayed, Hasaneiah, Baraa, and AlZoubi, Fayhaa
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Human-Computer Interaction ,Computer Science - Machine Learning - Abstract
Diagnosing knee osteoarthritis (OA) early is crucial for managing symptoms and preventing further joint damage, ultimately improving patient outcomes and quality of life. In this paper, a bioimpedance-based diagnostic tool that combines precise hardware and deep learning for effective non-invasive diagnosis is proposed. system features a relay-based circuit and strategically placed electrodes to capture comprehensive bioimpedance data. The data is processed by a neural network model, which has been optimized using convolutional layers, dropout regularization, and the Adam optimizer. This approach achieves a 98% test accuracy, making it a promising tool for detecting knee osteoarthritis musculoskeletal disorders.
- Published
- 2024
22. FSCsec: Collaboration in Financial Sector Cybersecurity -- Exploring the Impact of Resource Sharing on IT Security
- Author
-
Sayeed, Sayed Abu, Rahman, Mir Mehedi, Alam, Samiul, and Kshetri, Naresh
- Subjects
Computer Science - Cryptography and Security - Abstract
The financial sector's dependence on digital infrastructure increases its vulnerability to cybersecurity threats, requiring strong IT security protocols with other entities. This collaboration, however, is often identified as the most vulnerable link in the chain of cybersecurity. Adopting both symbolic and substantive measures lessens the impact of IT security spending on decreasing the frequency of data security breaches in the long run. The Protection Motivation Theory clarifies actions triggered by data sharing with other organizations, and the Institutional theory aids in comprehending the intricate relationship between transparency and organizational conduct. We investigate how things like regulatory pressure, teamwork among institutions, and people's motivations to protect themselves influence cybersecurity. By using simple theories to understand these factors, this research aims to provide insights that can help financial institutions make better decisions to protect. We have also included the discussion, conclusion, and future directions in regard to collaboration in financial sector cybersecurity for exploring impact of resource sharing., Comment: 8 pages, 2 figures
- Published
- 2024
23. Hidden Kondo lattice physics in single-orbital Hubbard models
- Author
-
Werner, Philipp and Ghorashi, Sayed Ali Akbar
- Subjects
Condensed Matter - Strongly Correlated Electrons - Abstract
Single-orbital Hubbard models exhibit remarkably nontrivial correlation phenomena, even on nonfrustrated bipartite lattices. Some of these, like non-Fermi-liquid metal states, or the coexistence of heavy and light quasi-particles, are reminiscent of the properties of more complex multi-orbital or Kondo-lattice systems. Here, we use basis transformations to map single-orbital models to effective multi-orbital descriptions and clarify how a ferromagnetic Kondo-lattice-like behavior emerges in prototypical models with flat bands or van Hove singularities in the density of states: the Hubbard model on the diamond chain, square-lattice, Lieb lattice and honeycomb lattice. In particular, this mapping explains the non-Fermi-liquid states and pseudo-gaps found in the correlated metal regime.
- Published
- 2024
24. An Explainable AI Model for Predicting the Recurrence of Differentiated Thyroid Cancer
- Author
-
Ahmad, Mohammad Al-Sayed and Haddad, Jude
- Subjects
Computer Science - Machine Learning ,Statistics - Applications - Abstract
Thyroid carcinoma, a significant yet often controllable cancer, has seen a rise in cases, largely due to advancements in diagnostic methods. Differentiated thyroid cancer (DTC), which includes papillary and follicular varieties, is typically associated with a positive prognosis in academic circles. Nevertheless, there are still some individuals who may experience a recurrence. This study employs machine learning, particularly deep learning models, to predict the recurrence of DTC, with the goal of improving patient care through personalized treatment approaches. By analysing a dataset containing clinicopathological features of patients, the model achieved remarkable accuracy rates of 98% during training and 96% during testing. To improve the model's interpretability, we used techniques like LIME and Morris Sensitivity Analysis. These methods gave us valuable insights into how the model makes decisions. The results suggest that combining deep learning models with interpretability techniques can be extremely useful in quickly identifying the recurrence of thyroid cancer in patients. This can help in making informed therapeutic choices and customizing treatment approaches for individual patients.
- Published
- 2024
25. Coherent X-rays reveal anomalous molecular diffusion and cage effects in crowded protein solutions
- Author
-
Girelli, Anita, Bin, Maddalena, Filianina, Mariia, Dargasz, Michelle, Anthuparambil, Nimmi Das, Möller, Johannes, Zozulya, Alexey, Andronis, Iason, Timmermann, Sonja, Berkowicz, Sharon, Retzbach, Sebastian, Reiser, Mario, Raza, Agha Mohammad, Kowalski, Marvin, Akhundzadeh, Mohammad Sayed, Schrage, Jenny, Woo, Chang Hee, Senft, Maximilian D., Reichart, Lara Franziska, Leonau, Aliaksandr, Rajaiah, Prince Prabhu, Chèvremont, William, Seydel, Tilo, Hallmann, Jörg, Rodriguez-Fernandez, Angel, Pudell, Jan-Etienne, Brausse, Felix, Boesenberg, Ulrike, Wrigley, James, Youssef, Mohamed, Lu, Wei, Jo, Wonhyuk, Shayduk, Roman, Madsen, Anders, Lehmkühler, Felix, Paulus, Michael, Zhang, Fajun, Schreiber, Frank, Gutt, Christian, and Perakis, Fivos
- Subjects
Condensed Matter - Soft Condensed Matter ,Physics - Chemical Physics - Abstract
Understanding protein motion within the cell is crucial for predicting reaction rates and macromolecular transport in the cytoplasm. A key question is how crowded environments affect protein dynamics through hydrodynamic and direct interactions at molecular length scales. Using megahertz X-ray Photon Correlation Spectroscopy (MHz-XPCS) at the European X-ray Free Electron Laser (EuXFEL), we investigate ferritin diffusion at microsecond time scales. Our results reveal anomalous diffusion, indicated by the non-exponential decay of the intensity autocorrelation function $g_2(q,t)$ at high concentrations. This behavior is consistent with the presence of cage-trapping in between the short- and long-time protein diffusion regimes. Modeling with the $\delta\gamma$-theory of hydrodynamically interacting colloidal spheres successfully reproduces the experimental data by including a scaling factor linked to the protein direct interactions. These findings offer new insights into the complex molecular motion in crowded protein solutions, with potential applications for optimizing ferritin-based drug delivery, where protein diffusion is the rate-limiting step.
- Published
- 2024
26. Machine Learning for Missing Value Imputation
- Author
-
Ahmad, Abu Fuad, Alshammari, Khaznah, Ahmed, Istiaque, and Sayed, MD Shohel
- Subjects
Computer Science - Machine Learning - Abstract
In recent times, a considerable number of research studies have been carried out to address the issue of Missing Value Imputation (MVI). MVI aims to provide a primary solution for datasets that have one or more missing attribute values. The advancements in Artificial Intelligence (AI) drive the development of new and improved machine learning (ML) algorithms and methods. The advancements in ML have opened up significant opportunities for effectively imputing these missing values. The main objective of this article is to conduct a comprehensive and rigorous review, as well as analysis, of the state-of-the-art ML applications in MVI methods. This analysis seeks to enhance researchers' understanding of the subject and facilitate the development of robust and impactful interventions in data preprocessing for Data Analytics. The review is performed following the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) technique. More than 100 articles published between 2014 and 2023 are critically reviewed, considering the methods and findings. Furthermore, the latest literature is examined to scrutinize the trends in MVI methods and their evaluation. The accomplishments and limitations of the existing literature are discussed in detail. The survey concludes by identifying the current gaps in research and providing suggestions for future research directions and emerging trends in related fields of interest.
- Published
- 2024
27. Long-Range Reading of Multiple Chipless Sensors from the Isoline Processing of 3D Radar Images
- Author
-
Djilani, A. Hadj, Henry, Dominique, Ahmad, A. El Sayed, Pons, Patrick, and Aubert, Hervé
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
In this paper, we report the long-range and wireless interrogation of multiple chipless sensors from the isoline processing of three-dimensional polarimetric radar images. A Frequency-Modulated Continuous-Wave Radar operating at 24 GHz is used for the indoor interrogation of four sensors in the basement of a Laboratory. In such cluttered environment, the proposed radar image processing based on isolines computation allows the wireless measurement range of sensors up to 5.8m.
- Published
- 2024
- Full Text
- View/download PDF
28. Exploiting HDMI and USB Ports for GPU Side-Channel Insights
- Author
-
Arefin, Sayed Erfan and Serwadda, Abdul
- Subjects
Computer Science - Cryptography and Security - Abstract
Modern computers rely on USB and HDMI ports for connecting external peripherals and display devices. Despite their built-in security measures, these ports remain susceptible to passive power-based side-channel attacks. This paper presents a new class of attacks that exploit power consumption patterns at these ports to infer GPU activities. We develop a custom device that plugs into these ports and demonstrate that its high-resolution power measurements can drive successful inferences about GPU processes, such as neural network computations and video rendering. The ubiquitous presence of USB and HDMI ports allows for discreet placement of the device, and its non-interference with data channels ensures that no security alerts are triggered. Our findings underscore the need to reevaluate and strengthen the current generation of HDMI and USB port security defenses.
- Published
- 2024
29. AssessITS: Integrating procedural guidelines and practical evaluation metrics for organizational IT and Cybersecurity risk assessment
- Author
-
Rahman, Mir Mehedi, Kshetri, Naresh, Sayeed, Sayed Abu, and Rana, Md Masud
- Subjects
Computer Science - Cryptography and Security - Abstract
In today's digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces 'AssessITS', an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, 'AssessITS' bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. 'AssessITS' aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards., Comment: 25 pages, 8 figures, 7 tables
- Published
- 2024
30. Adaptive Data Transport Mechanism for UAV Surveillance Missions in Lossy Environments
- Author
-
Mehrabi, Niloufar, Boroujeni, Sayed Pedram Haeri, Hofseth, Jenna, Razi, Abolfazl, Cheng, Long, Kaur, Manveen, Martin, James, and Amin, Rahul
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Unmanned Aerial Vehicles (UAVs) play an increasingly critical role in Intelligence, Surveillance, and Reconnaissance (ISR) missions such as border patrolling and criminal detection, thanks to their ability to access remote areas and transmit real-time imagery to processing servers. However, UAVs are highly constrained by payload size, power limits, and communication bandwidth, necessitating the development of highly selective and efficient data transmission strategies. This has driven the development of various compression and optimal transmission technologies for UAVs. Nevertheless, most methods strive to preserve maximal information in transferred video frames, missing the fact that only certain parts of images/video frames might offer meaningful contributions to the ultimate mission objectives in the ISR scenarios involving moving object detection and tracking (OD/OT). This paper adopts a different perspective, and offers an alternative AI-driven scheduling policy that prioritizes selecting regions of the image that significantly contributes to the mission objective. The key idea is tiling the image into small patches and developing a deep reinforcement learning (DRL) framework that assigns higher transmission probabilities to patches that present higher overlaps with the detected object of interest, while penalizing sharp transitions over consecutive frames to promote smooth scheduling shifts. Although we used Yolov-8 object detection and UDP transmission protocols as a benchmark testing scenario the idea is general and applicable to different transmission protocols and OD/OT methods. To further boost the system's performance and avoid OD errors for cluttered image patches, we integrate it with interframe interpolations.
- Published
- 2024
31. Survey Data Integration for Distribution Function Estimation
- Author
-
Flood, Jeremy and Mostafa, Sayed
- Subjects
Mathematics - Statistics Theory ,Statistics - Applications ,Statistics - Methodology ,Statistics - Other Statistics - Abstract
Integration of probabilistic and non-probabilistic samples for the estimation of finite population totals (or means) has recently received considerable attention in the field of survey sampling; yet, to the best of our knowledge, this framework has not been extended to cumulative distribution function (CDF) estimation. To address this gap, we propose a novel CDF estimator that integrates data from probability samples with data from (potentially large) nonprobability samples. Assuming that a set of shared covariates are observed in both samples, while the response variable is observed only in the latter, the proposed estimator uses a survey-weighted empirical CDF of regression residuals trained on the convenience sample to estimate the CDF of the response variable. Under some regularity conditions, we show that our CDF estimator is both design-consistent for the finite population CDF and asymptotically normally distributed. Additionally, we define and study a quantile estimator based on the proposed CDF estimator. Furthermore, we use both the bootstrap and asymptotic formulae to estimate their respective sampling variances. Our empirical results show that the proposed CDF estimator is robust to model misspecification under ignorability, and robust to ignorability under model misspecification. When both assumptions are violated, our residual-based CDF estimator still outperforms its 'plug-in' mass imputation and naive siblings, albeit with noted decreases in efficiency.
- Published
- 2024
32. Improvement of NACA6309 Airfoil with Passive Air-Flow Control by using Trailing Edge Flap
- Author
-
Shanto, Mahadi Hasan, Ahmed, Sayed Tanvir, and Ashikuzzaman, A K M
- Subjects
Physics - Fluid Dynamics ,Physics - Applied Physics ,Physics - Computational Physics - Abstract
When fossil fuel supplies can no longer be replenished and hence fossil fuel power generation becomes outdated, wind energy will become a vital solution to the impending energy crisis. A horizontal-axis wind turbine is a widely used technology that is highly dependent on the design of high-performing airfoils. In this paper, we have studied the performance of the NACA6309 airfoil and designed it by modifying the airfoil with a trailing edge plain flap. Computational Fluid Dynamic (CFD) simulations are utilized for this purpose. We have designed sixteen configurations of NACA 6309 airfoil by using plain flaps at the trailing edge and studied their aerodynamic performance. After comparing the lift, drag, and lift-to-drag ratios, it is evident that the \(1^\circ\) up-flap configuration generates the best output. In addition, the \(10^\circ\) down flap provides the worst performance among all configurations. Finally, pressure contours and velocity contours around the airfoils are presented, which describe the overall characteristics.
- Published
- 2024
33. Effects of Trailing Edge Thickness on NACA 4412 Airfoil Performance at Low Reynolds Numbers: A CFD Analysis
- Author
-
Ahmed, Sayed Tanvir and Shanto, Mahadi Hasan
- Subjects
Physics - Fluid Dynamics ,Physics - Applied Physics ,Physics - Computational Physics - Abstract
Due to the augmentation of the significance of wind energy, giving a high priority to the \text{airfoil's} efficiency enhancement is obligatory. To improve the performance of airfoils, many impressive techniques are already invented. In this article, the trailing edge of the NACA 4412 airfoil is modified by changing the thickness. CFD is used in this study, which aids in the identification of several important details. For our investigation, we choose the reliable Spalart Almaras model and the Reynolds number is 300k. Overall, the results demonstrate that using \(0.8\%\) thickness at the trailing edge of the NACA 4412 airfoil is viable to obtain the best output. The predominant reason is that not only the better coefficient of lift but also the preferable lift-to-drag \(\frac{C_L}{C_D}\) ratio is found in this configuration. However, using \(0.2\%\) thickness at the trailing edge reduces performance as a whole. So, it is recommended to utilize \(0.2\%\) thickness on the trailing edge of the NACA 4412 airfoil.
- Published
- 2024
34. Attosecond Inner-Shell Lasing at Angstrom Wavelengths
- Author
-
Linker, Thomas M., Halavanau, Aliaksei, Kroll, Thomas, Benediktovitch, Andrei, Zhang, Yu, Michine, Yurina, Chuchurka, Stasis, Abhari, Zain, Ronchetti, Daniele, Fransson, Thomas, Weninger, Clemens, Fuller, Franklin D., Aquila, Andy, Alonso-Mori, Roberto, Boutet, Sebastien, Guetg, Marc W., Marinelli, Agostino, Lutman, Alberto A., Yabashi, Makina, Inoue, Ichiro, Osaka, Taito, Yamada, Jumpei, Inubushi, Yuichi, Yamaguchi, Gota, Hara, Toru, Babu, Ganguli, Salpekar, Devashish, Sayed, Farheen N., Ajayan, Pulickel M., Kern, Jan, Yano, Junko, Yachandra, Vittal K., Kling, Matthias F., Pellegrini, Claudio, Yoneda, Hitoki, Rohringer, Nina, and Bergmann, Uwe
- Subjects
Physics - Optics ,Physics - Atomic Physics - Abstract
Since the invention of the laser nonlinear effects such as filamentation, Rabi-cycling and collective emission have been explored in the optical regime leading to a wide range of scientific and industrial applications. X-ray free electron lasers (XFELs) have led to the extension of many optical techniques to X-rays for their advantages of angstrom scale spatial resolution and elemental specificity. One such example is XFEL driven population inversion of 1s core hole states resulting in inner-shell K${\alpha}$ (2p to 1s) X-ray lasing in elements ranging from neon to copper, which has been utilized for nonlinear spectroscopy and development of next generation X-ray laser sources. Here we show that strong lasing effects, similar to those observed in the optical regime, can occur at 1.5 to 2.1 angstrom wavelengths during high intensity (> ${10^{19}}$ W/cm${^{2}}$) XFEL driven inner-shell lasing and superfluorescence of copper and manganese. Depending on the temporal substructure of the XFEL pump pulses, the resulting inner-shell X-ray laser pulses can exhibit strong spatial inhomogeneities as well as spectral inhomogeneities and broadening. Through 3D Maxwell Bloch theory we show that the observed spatial inhomogeneities result from X-ray filamentation, and that the spectral broadening is driven by Rabi cycling with sub-femtosecond periods. These findings indicate that we have generated Angstrom-wavelength x-ray pulses (containing ${10^{6}}$ - ${10^{8}}$ photons) in the strong lasing regime, some of them with pulse lengths of less than 100 attoseconds.
- Published
- 2024
35. Augmenting the Quality and Shelf Life of Ras Cheese by Adding Microencapsulated Allspice Berry Extract Nanoemulsion
- Author
-
El-Sayed, Samah M., Kholif, Adel M. M., El-Sayed, Hoda S., and Youssef, Ahmed M.
- Published
- 2025
- Full Text
- View/download PDF
36. Dietary multi-strains Bacillus spp. enhanced growth performance, blood metabolites, digestive tissues histology, gene expression of Oreochromis niloticus, and resistance to Aspergillus flavus infection
- Author
-
Dighiesh, Hagar Sedeek, Alharbi, Nouf A., Awlya, Ohaad F., Alhassani, Walaa E., Hassoubah, Shahira A., Albaqami, Najah M., Aljahdali, Nesreen, Abd El-Aziz, Yasmin M., Eissa, El-Sayed Hemdan, Munir, Mohammad Bodrul, and Sakr, Salah El-Sayed
- Published
- 2024
- Full Text
- View/download PDF
37. Biosynthesis of Silver, Copper, and Their Bi-metallic Combination of Nanocomposites by Staphylococcus aureus: Their Antimicrobial, Anticancer Activity, and Cytotoxicity Effect
- Author
-
Sayed, Mohsen A., El-Rahman, Tahany M. A. Abd, Abdelsalam, H. K., El-Souad, Sayed M. S. Abo, Shady, Rawan Muhammad, Amen, Radwa Abdallnasser, Zaki, Mostafa Ahmed, Mohsen, Martina, Desouky, Sara, Saeed, Samar, Omar, Seif, and El-Bassuony, Asmaa A. H.
- Published
- 2024
- Full Text
- View/download PDF
38. The Academic Motivation Scale: Evaluation Evidence of Intrinsic, Extrinsic, and Amotivation in Faculty of Education Students
- Author
-
Mahmoud Ali Moussa and Abdul Nasser El Sayed Amer
- Abstract
The study aimed to develop and validate academic motivation measures among university students. The study adopted the correlational method. An available sample of university students selected from the Faculty of Education, Suez Canal University. The study sample consisted of 453 people. The scales responded online to the students after they accepted the informed consent and wrote their data online in the same submission file. The study investigated the factor structures of the Academic Motivation Scale (three-, four, five-, and seven-factor models). The seven-factor model, the four-factor model, and the five-factor model were the most appropriate. According to the convergent validity, it was positively associated with the motives of autonomy and measures of cognitive styles, However, the lack of motivation subscale was nonsignificant with the Cognitive Styles scale and the Self-motivation subscale. The study indicates the psychological validity of the academic motivation scale for university students.
- Published
- 2024
39. The Magic of Saida by <string-name>M. G. Vassanji</string-name> (review)
- Author
-
Sayed, Asma
- Published
- 2022
- Full Text
- View/download PDF
40. Early Effect of Maximal Utilization of Internal Mammary Arteries on Kidney Function in the Egypt
- Author
-
Nafeh, M., Mortada, Kh., and Sayed, A.
- Published
- 2019
- Full Text
- View/download PDF
41. Molecular characterization of chicken Janus kinase2 (JAK2) and its expression analysis in different tissues and cell lines
- Author
-
Sayed, Abdalla A.
- Published
- 2019
- Full Text
- View/download PDF
42. Pattern of renal pathology in fish from Al-Hassa waterways, Saudi Arabia
- Author
-
Moneim, Ashraf Abdel, Elmenshawy, Omar, Al-Kahtani, Mohamed, Sayed, Abdalla, and Alfwuaires, Manal
- Published
- 2019
- Full Text
- View/download PDF
43. An Analysis of the COVID-19-Induced Flexible Grading Policy at a Public University
- Author
-
Sayed A. Mostafa, Robert Ferguson, Guoqing Tang, and Mujahid Ashqer
- Abstract
To help students cope with the challenges of the COVID-19 pandemic, higher education institutions offered students flexible grading policies that blended traditional letter grades with alternative grading options such as the pass--fail or credit--no credit options. This study conducted an in-depth analysis of the flexible grading policy at a medium-sized university in the USA. We studied the differential selection of flexible grading options by course characteristics and students' sociodemographics and academic profiles between Spring 2020 and Spring 2021. We also examined the impacts of the policy on sequential courses. Our analysis utilized administrative and transcript data for undergraduate students at the study institution and employed a combination of descriptive statistics and regression models. The analysis revealed that the flexible grading policy was utilized differently depending on course characteristics, with core courses and subjects like mathematics, chemistry, and economics having higher rates of usage. Additionally, sociodemographic and academic profile factors led to varying degrees of utilization, with males, urban students, freshmen, and non-STEM majors using the policy more frequently. Furthermore, the analysis suggested that the policy may have disadvantaged some students as they struggled in subsequent courses after using the pass option. Several implications and directions for future research are discussed.
- Published
- 2024
- Full Text
- View/download PDF
44. Lobular capillary hemangioma in the hard palate: A rare case
- Author
-
Khutwad, Gaurav, Sayed, Heena, Bhagwat, Harshad, and Sayed, Aatif
- Published
- 2018
- Full Text
- View/download PDF
45. Beirut Port Blast: Use of Electronic Health Record System During a Mass Casualty Event
- Author
-
Hitti, Eveline, Hadid, Dima, Saliba, Miriam, Sadek, Zouhair, Jabbour, Rima, Antoun, Rula, and El Sayed, Mazen
- Subjects
Disaster Response ,Emergency Preparedness Plan ,Mass Casualty Incidents ,Electronic Medical Records ,Electronic Health Records ,disaster response ,Emergency Preparedness Plan ,Mass Casualty Incidents ,Electronic Medical Records - Abstract
Introduction: Emergency departments (ED) play a central role in defining the effectiveness and quality of the overall hospital’s mass casualty incident (MCI) response. The use of electronic health records (EHR) in hospital settings has been rapidly growing globally. There is, however, a paucity of literature on the use and performance of EHR during MCIs.Methods: In this study we aimed to describe EHR use, as well as the challenges and lessons learnt in response to the 2020 explosion in the Port of Beirut, Lebanon, during which the hospital received over 360 casualties.Results: Information technology support, reducing EHR system restrictions, cross-function training, focus on registration and patient identification, patient flow and tracking, mobility and bedside access, and alternate sites of care are all important areas to focus on during emergency/disaster response planning.Conclusion: Innovative solutions that help address logistical challenges for different aspects of the disaster response are needed.
- Published
- 2024
46. Dementia risk reduction in the African context: Multi-national implementation of multimodal strategies to promote healthy brain aging in Africa (the Africa-FINGERS project).
- Author
-
Udeh-Momoh, Chinedu, Maina, Rachel, Anazodo, Udunna, Akinyemi, Rufus, Atwoli, Lukoye, Baker, Laura, Bassil, Darina, Blackmon, Karen, Bosire, Edna, Chemutai, Gloria, Crivelli, Lucia, Eze, Laz, Ibanez, Agustin, Kafetsouli, Dimitra, Karikari, Thomas, Khakali, Linda, Kumar, Manasi, Lengyel, Imre, de Jager Loots, Celeste, Mangialasche, Francesca, Mbugua, Sylvia, Merali, Zul, Mielke, Michelle, Mostert, Cyprian, Muthoni, Eunice, Nesic-Taylor, Olivera, Ngugi, Anthony, Nguku, Samuel, Ogunniyi, Adesola, Ogunyemi, Adedoyin, Okonkwo, Ozioma, Okubadejo, Njideka, Perneczky, Robert, Peto, Tunde, Rianga, Roselyter, Saleh, Mansoor, Sayed, Shaheen, Shah, Jasmit, Shah, Sheena, Solomon, Alina, Thesen, Thomas, Trepel, Dominic, Ucheagwu, Valentine, Valcour, Victor, Waa, Sheila, Watermeyer, Tamlyn, Yokoyama, Jennifer, Zetterberg, Henrik, and Kivipelto, Miia
- Subjects
Alzheimers disease ,brain banking ,community‐based participatory research ,dementia prevention trials ,fluid and neuroimaging biomarkers ,health economics ,implementation science ,retinal imaging - Abstract
Dementia prevention in Africa is critically underexplored, despite the continents high prevalence of modifiable risk factors. With a predominantly young and middle-aged population, Africa presents a prime opportunity to implement evidence-based strategies that could significantly reduce future dementia cases and mitigate its economic impact. The multinational Africa-FINGERS program offers an innovative solution, pioneering culturally sensitive, multidomain interventions tailored to the unique challenges of the region. Leveraging insights from landmark global studies such as Worldwide-FINGERS and Alzheimers Disease Neuroimaging Initiative, the program employs a multideterminant precision prevention framework, grounded in community based systems dynamics. Africa-FINGERS further integrates cutting-edge state-of-the-art multimodal biomarker evaluations tailored to regional contexts, with the goal of advancing brain health and establishing a global standard for dementia prevention. This groundbreaking initiative highlights the potential for scalableand sustainable interventions, thus is poised to transform dementia risk reduction efforts across the continent. HIGHLIGHTS: Dementia rates are escalating in Africa, largely due to longer life spans and increased prevalence of modifiable risk factors. Yet, few regional interventions have directly targeted lifestyle factors to reduce dementia risk. The multinational Africa-FINGERS study will address this gap by adapting the successful FINGERS lifestyle intervention to African populations. Africa-FINGERS will pioneer a culturally informed, multidomain dementia risk reduction intervention in the African region through feasibility dementia prevention trials in rural and urban sites across Kenya and Nigeria in the first instance, enrolling 600 at-risk adults (≥ 50 years). The program adopts participatory research methods to develop culturally appropriate interventions and build infrastructure to evaluate dementia biomarkers from ante and post mortem samples. A cost-effectiveness analysis will be conducted to guide the strategic implementation of Africa-FINGERS into regional health systems. The Africa-FINGERS strategy aligns with the Worldwide-FINGERS framework and integrates the global Alzheimers Disease Neuroimaging Initiative approach, emphasizing multimodal analysis.
- Published
- 2024
47. A living organoid biobank of patients with Crohn’s disease reveals molecular subtypes for personalized therapeutics
- Author
-
Tindle, Courtney, Fonseca, Ayden G, Taheri, Sahar, Katkar, Gajanan D, Lee, Jasper, Maity, Priti, Sayed, Ibrahim M, Ibeawuchi, Stella-Rita, Vidales, Eleadah, Pranadinata, Rama F, Fuller, Mackenzie, Stec, Dominik L, Anandachar, Mahitha Shree, Perry, Kevin, Le, Helen N, Ear, Jason, Boland, Brigid S, Sandborn, William J, Sahoo, Debashis, Das, Soumita, and Ghosh, Pradipta
- Subjects
Biomedical and Clinical Sciences ,Precision Medicine ,Crohn's Disease ,Biotechnology ,Digestive Diseases ,Stem Cell Research ,Clinical Research ,Genetics ,Autoimmune Disease ,Inflammatory Bowel Disease ,2.1 Biological and endogenous factors ,5.1 Pharmaceuticals ,Oral and gastrointestinal ,Good Health and Well Being ,Humans ,Crohn Disease ,Organoids ,Biological Specimen Banks ,Adult ,Male ,Female ,Phenotype ,Transcriptome ,Colon ,Middle Aged ,Adult Stem Cells ,barrier integrity ,host-microbe interaction ,inflammatory bowel disease ,patient-derived organoids ,therapeutics ,Biomedical and clinical sciences - Abstract
Crohn's disease (CD) is a complex and heterogeneous condition with no perfect preclinical model or cure. To address this, we explore adult stem cell-derived organoids that retain their tissue identity and disease-driving traits. We prospectively create a biobank of CD patient-derived organoid cultures (PDOs) from colonic biopsies of 53 subjects across all clinical subtypes and healthy subjects. Gene expression analyses enabled benchmarking of PDOs as tools for modeling the colonic epithelium in active disease and identified two major molecular subtypes: immune-deficient infectious CD (IDICD) and stress and senescence-induced fibrostenotic CD (S2FCD). Each subtype shows internal consistency in the transcriptome, genome, and phenome. The spectrum of morphometric, phenotypic, and functional changes within the "living biobank" reveals distinct differences between the molecular subtypes. Drug screens reverse subtype-specific phenotypes, suggesting phenotyped-genotyped CD PDOs can bridge basic biology and patient trials by enabling preclinical phase "0" human trials for personalized therapeutics.
- Published
- 2024
48. Topological edge conduction induced by strong anisotropic exchange interactions
- Author
-
Sayed, Shehrin, Brahma, Pratik, Hsu, Cheng-Hsiang, and Salahuddin, Sayeef
- Subjects
Physical Sciences ,Condensed Matter Physics ,Chemical sciences ,Engineering ,Physical sciences - Abstract
We predict that an interplay between isotropic and anisotropic exchange interactions in a honeycomb lattice structure can lead to topological edge conduction when the anisotropic interaction is at least twice the strength of the isotropic interaction. For materials like Na2IrO3, such a strong anisotropic exchange interaction simultaneously induces a zigzag type of antiferromagnetic order that breaks the time-reversal symmetry of the topological edge conductor. We show that the electronic transport in such topological conductors will exhibit a quantized Hall conductance without any external magnetic field when the Fermi energy lies within a particular energy range.
- Published
- 2024
49. Application-Driven Exascale: The JUPITER Benchmark Suite
- Author
-
Herten, Andreas, Achilles, Sebastian, Alvarez, Damian, Badwaik, Jayesh, Behle, Eric, Bode, Mathis, Breuer, Thomas, Caviedes-Voullième, Daniel, Cherti, Mehdi, Dabah, Adel, Sayed, Salem El, Frings, Wolfgang, Gonzalez-Nicolas, Ana, Gregory, Eric B., Mood, Kaveh Haghighi, Hater, Thorsten, Jitsev, Jenia, John, Chelsea Maria, Meinke, Jan H., Meyer, Catrin I., Mezentsev, Pavel, Mirus, Jan-Oliver, Nassyr, Stepan, Penke, Carolin, Römmer, Manoel, Sinha, Ujjwal, Vieth, Benedikt von St., Stein, Olaf, Suarez, Estela, Willsch, Dennis, and Zhukov, Ilya
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Hardware Architecture ,Computer Science - Performance ,B.8.2 ,C.0 ,C.5.1 ,D.1.0 ,C.4 - Abstract
Benchmarks are essential in the design of modern HPC installations, as they define key aspects of system components. Beyond synthetic workloads, it is crucial to include real applications that represent user requirements into benchmark suites, to guarantee high usability and widespread adoption of a new system. Given the significant investments in leadership-class supercomputers of the exascale era, this is even more important and necessitates alignment with a vision of Open Science and reproducibility. In this work, we present the JUPITER Benchmark Suite, which incorporates 16 applications from various domains. It was designed for and used in the procurement of JUPITER, the first European exascale supercomputer. We identify requirements and challenges and outline the project and software infrastructure setup. We provide descriptions and scalability studies of selected applications and a set of key takeaways. The JUPITER Benchmark Suite is released as open source software with this work at https://github.com/FZJ-JSC/jubench., Comment: To be published in Proceedings of The International Conference for High Performance Computing Networking, Storage, and Analysis (SC '24) (2024)
- Published
- 2024
- Full Text
- View/download PDF
50. Pruning By Explaining Revisited: Optimizing Attribution Methods to Prune CNNs and Transformers
- Author
-
Hatefi, Sayed Mohammad Vakilzadeh, Dreyer, Maximilian, Achtibat, Reduan, Wiegand, Thomas, Samek, Wojciech, and Lapuschkin, Sebastian
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
To solve ever more complex problems, Deep Neural Networks are scaled to billions of parameters, leading to huge computational costs. An effective approach to reduce computational requirements and increase efficiency is to prune unnecessary components of these often over-parameterized networks. Previous work has shown that attribution methods from the field of eXplainable AI serve as effective means to extract and prune the least relevant network components in a few-shot fashion. We extend the current state by proposing to explicitly optimize hyperparameters of attribution methods for the task of pruning, and further include transformer-based networks in our analysis. Our approach yields higher model compression rates of large transformer- and convolutional architectures (VGG, ResNet, ViT) compared to previous works, while still attaining high performance on ImageNet classification tasks. Here, our experiments indicate that transformers have a higher degree of over-parameterization compared to convolutional neural networks. Code is available at https://github.com/erfanhatefi/Pruning-by-eXplaining-in-PyTorch., Comment: Accepted as a workshop paper at ECCV 2024, 26 pages (11 pages manuscript, 3 pages references, 12 pages appendix)
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.