Ankit Shah

ORCID: 0000-0002-4651-4651
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Topic Modeling
  • Distributed and Parallel Computing Systems
  • Multimodal Machine Learning Applications
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Natural Language Processing Techniques
  • Explainable Artificial Intelligence (XAI)
  • Speech and dialogue systems
  • Metabolism, Diabetes, and Cancer
  • Machine Learning and Algorithms
  • Advanced Malware Detection Techniques
  • Advanced Image and Video Retrieval Techniques
  • Reinforcement Learning in Robotics
  • Bariatric Surgery and Outcomes
  • Reservoir Engineering and Simulation Methods
  • Data Stream Mining Techniques
  • Oil and Gas Production Techniques
  • Robot Manipulation and Learning
  • Imbalanced Data Classification Techniques
  • Chaos-based Image/Signal Encryption
  • Gastric Cancer Management and Outcomes
  • Cryptographic Implementations and Security
  • Video Analysis and Summarization

John Brown University
2024

Inova Health System
2024

Carnegie Mellon University
2019-2023

University of South Florida
2023

United States Military Academy
2023

Tata Memorial Hospital
2023

Weatherford (Norway)
2019-2022

Inova Fairfax Hospital
2022

Jnana Deepa, Institute of Philosophy and Theology
2022

Sankalchand Patel University
2021

Recent advancements in artificial intelligence (AI) and machine learning (ML) algorithms, coupled with the availability of faster computing infrastructure, have enhanced security posture cybersecurity operations centers (defenders) through development ML-aided network intrusion detection systems (NIDS). Concurrently, abilities adversaries to evade also increased support AI/ML models. Therefore, defenders need proactively prepare for evasion attacks that exploit mechanisms NIDS. studies found...

10.48550/arxiv.2305.11039 preprint EN other-oa arXiv (Cornell University) 2023-01-01

To store and analyze Big Data, Hadoop is the most common tool for researchers scientists. The storage of huge amount data in done using Distributed File System (HDFS). HDFS uses block placement policy to split a very large file into blocks place them across cluster distributed manner. Basically, have been designed such way that it works efficiently on homogeneous cluster. But this era networking, we cannot imagine having nodes only. So, there need can work both as well heterogeneous Thus,...

10.1109/icacci.2018.8554404 article EN 2018-09-01

Learning with reduced labeling standards, such as noisy label, partial and multiple label candidates, which we generically refer to \textit{imprecise} labels, is a commonplace challenge in machine learning tasks. Previous methods tend propose specific designs for every emerging imprecise configuration, usually unsustainable when configurations of imprecision coexist. In this paper, introduce (ILL), framework the unification various configurations. ILL leverages expectation-maximization (EM)...

10.48550/arxiv.2305.12715 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Abstract Digital oil fields have seen major advancements over the past ten years, with goal of integrating and optimizing loops production operation, optimization, well reservoir surveillance based on real-time data model-based workflow automation capabilities. This paper discusses how ADNOC onshore has successfully implemented digital field workflows in all its producing describes process migrating these to a data-driven platform for improved decision making. In existing workflows,...

10.2118/195014-ms article EN SPE Middle East Oil and Gas Show and Conference 2019-03-13

Suicide is one of the leading causes death in modern world. In this digital age, individuals are increasingly using social media to express themselves and often use these platforms suicidal intent. Various studies have inspected intent behavioral markers controlled environments but it still unexplored if such will generalize expressed on media. work, we set out study multimodal related when videos. We explore verbal, acoustic visual context identifying at higher risk attempt. Our analysis...

10.1145/3340555.3353718 article EN INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION 2019-10-14

Grounding navigational commands to linear temporal logic (LTL) leverages its unambiguous semantics for reasoning about long-horizon tasks and verifying the satisfaction of constraints. Existing approaches require training data from specific environment landmarks that will be used in natural language understand those environments. We propose Lang2LTL, a modular system software package large models (LLMs) ground LTL specifications environments without prior data. comprehensively evaluate...

10.48550/arxiv.2302.11649 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Low latency, real-time interaction, geographical distribution, heterogeneity, and wireless access are some characteristics required in the medical/healthcare system for providing better Quality of Services (QoS). This was satisfied by new emerging term Fog Computing. Internet Technology (IoT) technology brings many challenges along with facilities it provides. Initially, Cloud computing used to store data but due provocations an intermediate layer namely is introduced. joining between...

10.1109/icraecc43874.2019.8994985 article EN 2019-03-01

In any game, selection of best players in a team plays vital role overall performance. The sport is the key task to ensure good performance team. Players are selected based on different criteria. game cricket should consider parameters like own performance, ground condition, weather forecasting, opposition strength and weakness etc. Machine learning can play players’ prediction. uses historical data past individual predict Prediction player helps building process. Recently many researchers...

10.35940/ijeat.c6339.029320 article EN International Journal of Engineering and Advanced Technology 2020-02-28

Theoretical and experimental models have been considered for the prediction of path loss in systems mobile communications. This paper reviews Cost231-Walfisch-Ikegami model outdoor microcell environments. The proposed statistical aligns accordance to measured data, considering roof height, road width as normal random variables. characterization used is a linear curve, fitting variations. Five parameters are modelled statistically, with dependencies on height base station, distance from top...

10.1109/ams.2010.109 article EN 2010-01-01

Big Data Analytics demands huge processing power. Distributed computing seems to be a viable solution with the usage of commodity computers. But, big data optimally, on distributed systems poses number challenges, such as seamlessly integrating different resources systems. Hadoop provides this ease and hence is one most commonly used tools for data. it observed that performance compromised, when comes heterogeneous environment. This paper proposes Saksham: The block rearrangement algorithm...

10.1016/j.procs.2020.03.181 article EN Procedia Computer Science 2020-01-01

Defining sound and complete specifications for robots using formal languages is challenging, while learning directly from demonstrations can lead to over-constrained task policies. In this paper, we propose a Bayesian interactive robot training framework that allows the learn both provided by teacher, teacher's assessments of robot's executions. We also present an active approach -- inspired uncertainty sampling identify execution with most uncertain degree acceptability. Through simulated...

10.48550/arxiv.2003.02232 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Coptis chinensis, Andrographis paniculata, Isatis Radix, Lonicera japonica Thunb, andSenecionis Scandentis are traditional Chinese medicine (TCM) widely used in China and eastern Asia for treatment of warm diseases, including infectious diseases. They are main ingredients many popular TCM formulas This study is to evaluate the antibacterial activity of C. chinensis, A. paniculata, I. indigotica, L. and S. scandentis, as well as containing these medicinal herbs. Those are commonly plants from...

10.5897/jmpr11.1165 article EN Journal of Medicinal Plants Research 2012-01-16

We live in the digital era where paying by credit card has become an essential part of our life. With increasing demand for cards, it also a challenge to maintain integrity users. Credit fraud is malignant activity that causes financial loss costs consumers as well banks. Nowadays, fraudsters use distinct methods commit fraud. To identify fraud, important understand type and past transaction history. solve card-related issues there should be system detection can detect activities before they...

10.1109/icdabi53623.2021.9655848 article EN 2021 International Conference on Data Analytics for Business and Industry (ICDABI) 2021-10-25

Recent advancements in large language models (LLMs) have enabled a new research domain, LLM agents, for solving robotics and planning tasks by leveraging the world knowledge general reasoning abilities of LLMs obtained during pretraining. However, while considerable effort has been made to teach robot "dos," "don'ts" received relatively less attention. We argue that, any practical usage, it is as crucial "don'ts": conveying explicit instructions about prohibited actions, assessing robot's...

10.48550/arxiv.2309.09919 preprint EN other-oa arXiv (Cornell University) 2023-01-01

It has been shown that Large Language Model (LLM) alignments can be circumvented by appending specially crafted attack suffixes with harmful queries to elicit responses. To conduct attacks against private target models whose characterization is unknown, public used as proxies fashion the attack, successful being transferred from models. The success rate of depends on how closely proxy model approximates model. We hypothesize for transferrable, it sufficient if approximate in neighborhood...

10.48550/arxiv.2310.04445 preprint EN cc-by arXiv (Cornell University) 2023-01-01

In the era of Big-Data and IoT devices, it is important to use, efficient lightweight cryptographic algorithms for security reasons. No algorithm satisfies all our needs. It analyze performance algorithms. Here in this paper, we have selected most frequently used on platforms. To check performance, simulated MATLAB also tested same Arduino UNO. common hardware software platform. a voice recognition application, which devices. Performance has been measured using key parameters like length...

10.1109/iccsdet.2018.8821126 article EN 2018-12-01

Learning from demonstration (LfD) has succeeded in tasks featuring a long time horizon. However, when the problem complexity also includes human-in-the-loop perturbations, state-of-the-art approaches do not guarantee successful reproduction of task. In this work, we identify roots challenge as failure learned continuous policy to satisfy discrete plan implicit demonstration. By utilizing modes (rather than subgoals) abstraction and motion policies with both mode invariance goal reachability...

10.48550/arxiv.2206.04632 preprint EN cc-by-nc-nd arXiv (Cornell University) 2022-01-01

With advancement in technology, the needs for high performance computing are increasing tremendously. Cluster has developed due to availability of cost effective processors and speed networks. The long-term trend High requires number nodes parallel platforms. This however entails a higher failure probability. Message Passing Paradigm (MPI) is currently programming paradigm communication library most commonly used on MPI applications may get stopped at any time unpredictable failures during...

10.1109/3pgcic.2011.77 article EN 2011-10-01

A BSTRACT Introduction: Alteration in the various markers is seen diabetic nephropathy (DN). In current research, four different were evaluated and examined for their diagnostic value nephropathic type 2 diabetes patients. Methods: prospective clinical trial was piloted with male subjects nephropathy. The followed up 9 months. Thirty recruited as mellitus patients without controls. interventional groups grouped again microalbuminuria, normoalbuminuria, hyperfiltration. All of them underwent...

10.4103/jpbs.jpbs_494_23 article EN cc-by-nc-sa Journal of Pharmacy And Bioallied Sciences 2024-02-01
Coming Soon ...