SHEIKH I AHAMED - Academia.edu (original) (raw)
Papers by SHEIKH I AHAMED
Ubiquitous Comp. and …, 2007
According to a recent survey, in 2005, 500+ million people used handheld devices (PDA, cell phone... more According to a recent survey, in 2005, 500+ million people used handheld devices (PDA, cell phone, etc.) worldwide, while this number was 200+ million in 1999[33]. Hence, this increase can play a vital role for pervasive computing. The goal of pervasive computing is ...
INFORMATION- …, 2005
Sheikh I. Ahamed*, Moushumi Sharmin*, Shameem Ahmed*, Michael J. Havice** and Suresh Anamanamuri*... more Sheikh I. Ahamed*, Moushumi Sharmin*, Shameem Ahmed*, Michael J. Havice** and Suresh Anamanamuri* ... *Department of Mathematics, Statistics, and Computer Science Marquette University, Milwaukee, Wisconsin, USA E-mail:{ iq,msharmin,sahmed02 sanamana ...
Concepts, Methodologies, Tools, and Applications, 2008
Designing mHealth applications for mental health interventions has largely focused on education a... more Designing mHealth applications for mental health interventions has largely focused on education and patient self-management. Next generation applications must take on more complex tasks, including sensor-based detection of crisis events, search for individualized early warning signs, and support for crisis intervention. This project examines approaches to integrating multiple worn sensors to detect mental health crisis events in US military veterans. Our work has highlighted several practical and theoretical problems with applying technology to evaluation crises in human system, which are often subtle and difficult to detect, as compared to technological or natural crisis events. Humans often do not recognize when they are in crisis and under-report crises to prevent reputational damage. The current project explores preliminary use of the E4 Empatica wristband to characterize acute aggression using a combination of veteran self-report data on anger, professional actors simulating aggressive events, and preliminary efforts to discriminate between crisis data and early warning sign data.
Community Engagement & Healthcare Systems Proceedings of the 16th ISCRAM Conference, 2019
Several attempts have been made at creating mobile solutions for patients with mental disorders. ... more Several attempts have been made at creating mobile solutions for patients with mental disorders. A preemptive approach would definitely outdo a reactive one. This project seeks to ensure better crisis detection, by assigning patients (veterans) to caregivers (mentors). This is called the mentor-mentee approach. Enhanced with the use of mobile technology, veterans can stay connected in their daily lives to mentors, who have gone through the same traumatic experiences and have overcome them. A mobile application for communication between veterans and their mentors has been developed, which helps mentors get constant feedback from their mentees about their state of well-being. However, being able to make good deductions from the data given as feedback is of great importance. Under-representing or over-representing the data could be dangerously misleading. This paper
Veterans often face great difficulties during the community and family reintegration after milita... more Veterans often face great difficulties during the community and family reintegration after military deployment. Mental health problems resulting from war related traumatic experiences often make social readjustment very difficult. Many research suggests that peer-mentorship can be very effective for mental-health problems and Dryhootch (DH), a community organization led by veterans, has implemented a veteran peer mentor program. The primary objective of the DH program is to provide peer-mentor support to veterans going through social readjustment. In this paper we propose to expand DH's paper based peer-mentor program with a mobile-based system, iPeer. The proposed expansion improves the efficiency of the current DH approach by augmenting the existing social process with mobile technologies used extensively by younger veterans returning from Afghanistan and Iraq. We provide a description of the evolution of this mobile-based peer-mentor support tool through collaborative design research. We also present our initial usability findings in order to demonstrate the improved efficiency offered by the augmented technology.
30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006
... in this environment are: business process design, architecture development, knowledge of lead... more ... in this environment are: business process design, architecture development, knowledge of leading edge technology, requirements analysis, project management, compliance monitoring ... and they need to become good at them to become successful in this world of globalization. ...
2015 IEEE 39th Annual Computer Software and Applications Conference, 2015
Timely and accurate information about patients' symptoms is important for clinical decisi... more Timely and accurate information about patients' symptoms is important for clinical decision making such as adjustment of medication. Due to the limitations of self-reported symptom such as pain, we investigated whether facial images can be used for detecting pain level accurately using existing algorithms and infrastructure for cancer patients. For low cost and better pain management solution, we present a smart phone based system for pain expression recognition from facial images. To the best of our knowledge, this is the first study for mobile based chronic pain intensity detection. The proposed algorithms classify faces, represented as a weighted combination of Eigenfaces, using an angular distance, and support vector machines (SVMs). A pain score was assigned to each image by the subject. The study was done in two phases. In the first phase, data were collected as a part of a six month long longitudinal study in Bangladesh. In the second phase, pain images were collected for a cross-sectional study in three different countries: Bangladesh, Nepal and the United States. The study shows that a personalized model for pain assessment performs better for automatic pain assessment and the training set should contain varying levels of pain representing the application scenario.
First International Conference on Availability, Reliability and Security (ARES'06), 2006
Page 1. A Dependable Device Discovery Approach for Pervasive Computing Middleware Sheikh I Ahamed... more Page 1. A Dependable Device Discovery Approach for Pervasive Computing Middleware Sheikh I Ahamed1, Mohammad Zulkernine2, and Suresh Anamanamuri3 1, 3Dept. of Math., Stat. & CS, Marquette University, Milwaukee ...
2013 IEEE 37th Annual Computer Software and Applications Conference, 2013
Proceedings of the 41st ACM technical symposium on Computer science education - SIGCSE '10, 2010
2012 IEEE International Conference on Emerging Signal Processing Applications, 2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010
Parallel Processing Workshops, 2006. …, 2006
... this synthesized information to the task issuer (ie PDA, Laptop, Cell Phone, etc.) is ... for... more ... this synthesized information to the task issuer (ie PDA, Laptop, Cell Phone, etc.) is ... for WSNs that is implemented entirely in TinyOS. Agilla is a Mobile Agent based ... Considering future deployment of sensor networks for sensitive applications, we should start thinking seriously ...
2007 International Conference on Wireless Communications, Networking and Mobile Computing, 2007
Page 1. A Trust Framework for Pervasive Computing Environments Steven T. Wolfe and Sheikh I. Aham... more Page 1. A Trust Framework for Pervasive Computing Environments Steven T. Wolfe and Sheikh I. Ahamed Marquette University Wisconsin 53233, USA {swolfe, iq}@mscs.mu.edu ... Abdul-Rahman and Hailes [6] provided a detailed explanation of trust for their model. ...
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., 2004
Towards Framework Selection Criteria and Suitability for an Application Framework Sheikh I. Ahame... more Towards Framework Selection Criteria and Suitability for an Application Framework Sheikh I. Ahamed, Alex Pezewski and Al Pezewski Marquette University Milwaukee, WI 53201, USA iq@mscs.mu.edu ... http://www.artima.com/intv/adapt4.html, March 31, 2003. [5] Eden, Anthony. ...
2006 International Conference on Parallel Processing Workshops (ICPPW'06), 2006
Lecture Notes in Computer Science, 2014
2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Recent advances in mobile handheld devices have facilitated the ubiquitous availability of locati... more Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always been vulnerable to numerous privacy threats. The more we aim at safe usage of location based services, the more we feel the necessity of a secure location privacy system. Most of the existing systems adopt the mechanism
Ubiquitous Comp. and …, 2007
According to a recent survey, in 2005, 500+ million people used handheld devices (PDA, cell phone... more According to a recent survey, in 2005, 500+ million people used handheld devices (PDA, cell phone, etc.) worldwide, while this number was 200+ million in 1999[33]. Hence, this increase can play a vital role for pervasive computing. The goal of pervasive computing is ...
INFORMATION- …, 2005
Sheikh I. Ahamed*, Moushumi Sharmin*, Shameem Ahmed*, Michael J. Havice** and Suresh Anamanamuri*... more Sheikh I. Ahamed*, Moushumi Sharmin*, Shameem Ahmed*, Michael J. Havice** and Suresh Anamanamuri* ... *Department of Mathematics, Statistics, and Computer Science Marquette University, Milwaukee, Wisconsin, USA E-mail:{ iq,msharmin,sahmed02 sanamana ...
Concepts, Methodologies, Tools, and Applications, 2008
Designing mHealth applications for mental health interventions has largely focused on education a... more Designing mHealth applications for mental health interventions has largely focused on education and patient self-management. Next generation applications must take on more complex tasks, including sensor-based detection of crisis events, search for individualized early warning signs, and support for crisis intervention. This project examines approaches to integrating multiple worn sensors to detect mental health crisis events in US military veterans. Our work has highlighted several practical and theoretical problems with applying technology to evaluation crises in human system, which are often subtle and difficult to detect, as compared to technological or natural crisis events. Humans often do not recognize when they are in crisis and under-report crises to prevent reputational damage. The current project explores preliminary use of the E4 Empatica wristband to characterize acute aggression using a combination of veteran self-report data on anger, professional actors simulating aggressive events, and preliminary efforts to discriminate between crisis data and early warning sign data.
Community Engagement & Healthcare Systems Proceedings of the 16th ISCRAM Conference, 2019
Several attempts have been made at creating mobile solutions for patients with mental disorders. ... more Several attempts have been made at creating mobile solutions for patients with mental disorders. A preemptive approach would definitely outdo a reactive one. This project seeks to ensure better crisis detection, by assigning patients (veterans) to caregivers (mentors). This is called the mentor-mentee approach. Enhanced with the use of mobile technology, veterans can stay connected in their daily lives to mentors, who have gone through the same traumatic experiences and have overcome them. A mobile application for communication between veterans and their mentors has been developed, which helps mentors get constant feedback from their mentees about their state of well-being. However, being able to make good deductions from the data given as feedback is of great importance. Under-representing or over-representing the data could be dangerously misleading. This paper
Veterans often face great difficulties during the community and family reintegration after milita... more Veterans often face great difficulties during the community and family reintegration after military deployment. Mental health problems resulting from war related traumatic experiences often make social readjustment very difficult. Many research suggests that peer-mentorship can be very effective for mental-health problems and Dryhootch (DH), a community organization led by veterans, has implemented a veteran peer mentor program. The primary objective of the DH program is to provide peer-mentor support to veterans going through social readjustment. In this paper we propose to expand DH's paper based peer-mentor program with a mobile-based system, iPeer. The proposed expansion improves the efficiency of the current DH approach by augmenting the existing social process with mobile technologies used extensively by younger veterans returning from Afghanistan and Iraq. We provide a description of the evolution of this mobile-based peer-mentor support tool through collaborative design research. We also present our initial usability findings in order to demonstrate the improved efficiency offered by the augmented technology.
30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006
... in this environment are: business process design, architecture development, knowledge of lead... more ... in this environment are: business process design, architecture development, knowledge of leading edge technology, requirements analysis, project management, compliance monitoring ... and they need to become good at them to become successful in this world of globalization. ...
2015 IEEE 39th Annual Computer Software and Applications Conference, 2015
Timely and accurate information about patients' symptoms is important for clinical decisi... more Timely and accurate information about patients' symptoms is important for clinical decision making such as adjustment of medication. Due to the limitations of self-reported symptom such as pain, we investigated whether facial images can be used for detecting pain level accurately using existing algorithms and infrastructure for cancer patients. For low cost and better pain management solution, we present a smart phone based system for pain expression recognition from facial images. To the best of our knowledge, this is the first study for mobile based chronic pain intensity detection. The proposed algorithms classify faces, represented as a weighted combination of Eigenfaces, using an angular distance, and support vector machines (SVMs). A pain score was assigned to each image by the subject. The study was done in two phases. In the first phase, data were collected as a part of a six month long longitudinal study in Bangladesh. In the second phase, pain images were collected for a cross-sectional study in three different countries: Bangladesh, Nepal and the United States. The study shows that a personalized model for pain assessment performs better for automatic pain assessment and the training set should contain varying levels of pain representing the application scenario.
First International Conference on Availability, Reliability and Security (ARES'06), 2006
Page 1. A Dependable Device Discovery Approach for Pervasive Computing Middleware Sheikh I Ahamed... more Page 1. A Dependable Device Discovery Approach for Pervasive Computing Middleware Sheikh I Ahamed1, Mohammad Zulkernine2, and Suresh Anamanamuri3 1, 3Dept. of Math., Stat. & CS, Marquette University, Milwaukee ...
2013 IEEE 37th Annual Computer Software and Applications Conference, 2013
Proceedings of the 41st ACM technical symposium on Computer science education - SIGCSE '10, 2010
2012 IEEE International Conference on Emerging Signal Processing Applications, 2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010
Parallel Processing Workshops, 2006. …, 2006
... this synthesized information to the task issuer (ie PDA, Laptop, Cell Phone, etc.) is ... for... more ... this synthesized information to the task issuer (ie PDA, Laptop, Cell Phone, etc.) is ... for WSNs that is implemented entirely in TinyOS. Agilla is a Mobile Agent based ... Considering future deployment of sensor networks for sensitive applications, we should start thinking seriously ...
2007 International Conference on Wireless Communications, Networking and Mobile Computing, 2007
Page 1. A Trust Framework for Pervasive Computing Environments Steven T. Wolfe and Sheikh I. Aham... more Page 1. A Trust Framework for Pervasive Computing Environments Steven T. Wolfe and Sheikh I. Ahamed Marquette University Wisconsin 53233, USA {swolfe, iq}@mscs.mu.edu ... Abdul-Rahman and Hailes [6] provided a detailed explanation of trust for their model. ...
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., 2004
Towards Framework Selection Criteria and Suitability for an Application Framework Sheikh I. Ahame... more Towards Framework Selection Criteria and Suitability for an Application Framework Sheikh I. Ahamed, Alex Pezewski and Al Pezewski Marquette University Milwaukee, WI 53201, USA iq@mscs.mu.edu ... http://www.artima.com/intv/adapt4.html, March 31, 2003. [5] Eden, Anthony. ...
2006 International Conference on Parallel Processing Workshops (ICPPW'06), 2006
Lecture Notes in Computer Science, 2014
2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Recent advances in mobile handheld devices have facilitated the ubiquitous availability of locati... more Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always been vulnerable to numerous privacy threats. The more we aim at safe usage of location based services, the more we feel the necessity of a secure location privacy system. Most of the existing systems adopt the mechanism