Skip to main content

Showing 1–18 of 18 results for author: Alam, K

  1. arXiv:2406.19930  [pdf

    cs.RO cs.MA

    Exploring 6G Potential for Industrial Digital Twinning and Swarm Intelligence in Obstacle-Rich Environments

    Authors: Siyu Yuan, Khurshid Alam, Bin Han, Dennis Krummacker, Hans D. Schotten

    Abstract: With the advent of 6G technology, the demand for efficient and intelligent systems in industrial applications has surged, driving the need for advanced solutions in target localization. Utilizing swarm robots to locate unknown targets involves navigating increasingly complex environments. Digital Twinning (DT) offers a robust solution by creating a virtual replica of the physical world, which enha… ▽ More

    Submitted 2 July, 2024; v1 submitted 28 June, 2024; originally announced June 2024.

    Comments: Submitted to IEEE VTM

  2. arXiv:2405.03555  [pdf, other

    cs.NI

    A Comprehensive Overview and Survey of O-RAN: Exploring Slicing-aware Architecture, Deployment Options, and Use Cases

    Authors: Khurshid Alam, Mohammad Asif Habibi, Matthias Tammen, Dennis Krummacker, Walid Saad, Marco Di Renzo, Tommaso Melodia, Xavier Costa-Pérez, Mérouane Debbah, Ashutosh Dutta, Hans D. Schotten

    Abstract: Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhan… ▽ More

    Submitted 8 May, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

    Comments: 45 pages, 12 figures, 4 tables, submitted to the IEEE for possible publication

  3. arXiv:2311.12824  [pdf

    cs.NE cs.AI

    Comparative Analysis of Shear Strength Prediction Models for Reinforced Concrete Slab-Column Connections

    Authors: Sarmed Wahab, Nasim Shakouri Mahmoudabadi, Sarmad Waqas, Nouman Herl, Muhammad Iqbal, Khurshid Alam, Afaq Ahmad

    Abstract: This research aims at comparative analysis of shear strength prediction at slab-column connection, unifying machine learning, design codes and Finite Element Analysis. Current design codes (CDCs) of ACI 318-19 (ACI), Eurocode 2 (EC2), Compressive Force Path (CFP) method, Feed Forward Neural Network (FNN) based Artificial Neural Network (ANN), PSO-based FNN (PSOFNN), and BAT algorithm-based BATFNN… ▽ More

    Submitted 28 November, 2023; v1 submitted 29 September, 2023; originally announced November 2023.

    Comments: 34 Pages,25 Figures

  4. arXiv:2309.07291  [pdf

    cs.SE

    Reusability Challenges of Scientific Workflows: A Case Study for Galaxy

    Authors: Khairul Alam, Banani Roy, Alexander Serebrenik

    Abstract: Scientific workflow has become essential in software engineering because it provides a structured approach to designing, executing, and analyzing scientific experiments. Software developers and researchers have developed hundreds of scientific workflow management systems so scientists in various domains can benefit from them by automating repetitive tasks, enhancing collaboration, and ensuring the… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: Accepted in APSEC 2023

  5. arXiv:2304.13511  [pdf

    cs.CR

    A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption

    Authors: Md. Ahsan Habib, Kazi Md. Rokibul Alam, Yasuhiko Morimoto

    Abstract: Usually, a medical record (MR) contains the patients disease-oriented sensitive information. In addition, the MR needs to be shared among different bodies, e.g., diagnostic centres, hospitals, physicians, etc. Hence, retaining the privacy and integrity of MR is crucial. A blockchain based secure MR sharing system can manage these aspects properly. This paper proposes a blockchain based electronic… ▽ More

    Submitted 9 February, 2023; originally announced April 2023.

    Comments: 6 pages, 3 tables, 8 figures, ICCIT 2022

  6. IoT-Based Water Quality Assessment System for Industrial Waste WaterHealthcare Perspective

    Authors: Abdur Rab Dhruba, Kazi Nabiul Alam, Md. Shakib Khan, Sananda Saha, Mohammad Monirujjaman Khan, Mohammed Baz, Mehedi Masud, Mohammed A. AlZain

    Abstract: The environment, especially water, gets polluted due to industrialization and urbanization. Pollution due to industrialization and urbanization has harmful effects on both the environment and the lives on Earth. This polluted water can cause food poisoning, diarrhea, short-term gastrointestinal problems, respiratory diseases, skin problems, and other serious health complications. In a developing c… ▽ More

    Submitted 26 March, 2023; originally announced April 2023.

  7. arXiv:2210.10975  [pdf, other

    eess.IV cs.CV

    Improving Segmentation of Breast Ultrasound Images: Semi Automatic Two Pointers Histogram Splitting Technique

    Authors: Rasheed Abid, S. Kaisar Alam

    Abstract: Automatically segmenting lesion area in breast ultrasound (BUS) images is a challenging one due to its noise, speckle and artifacts. Edge-map of BUS images also does not help because in most cases the edge-map gives no information whatsoever. Almost all segmentation technique takes the edge-map of the image as its first step, though there are a few algorithms that try to avoid edge-maps as well. I… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

  8. Knowledge Distillation approach towards Melanoma Detection

    Authors: Md. Shakib Khan, Kazi Nabiul Alam, Abdur Rab Dhruba, Hasib Zunair, Nabeel Mohammed

    Abstract: Melanoma is regarded as the most threatening among all skin cancers. There is a pressing need to build systems which can aid in the early detection of melanoma and enable timely treatment to patients. Recent methods are geared towards machine learning based systems where the task is posed as image recognition, tag dermoscopic images of skin lesions as melanoma or non-melanoma. Even though these me… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Journal ref: Computers in Biology and Medicine, Volume 146, July 2022, 105581

  9. Deep Learning-Based Sentiment Analysis of COVID-19 Vaccination Responses from Twitter Data

    Authors: Kazi Nabiul Alam, Md Shakib Khan, Abdur Rab Dhruba, Mohammad Monirujjaman Khan, Jehad F. Al-Amri, Mehedi Masud, Majdi Rawashdeh

    Abstract: This COVID-19 pandemic is so dreadful that it leads to severe anxiety, phobias, and complicated feelings or emotions. Even after vaccination against Coronavirus has been initiated, people feelings have become more diverse and complex, and our goal is to understand and unravel their sentiments in this research using some Deep Learning techniques. Social media is currently the best way to express fe… ▽ More

    Submitted 26 August, 2022; originally announced September 2022.

  10. Development of an IoT-Based Sleep Apnea Monitoring System for Healthcare Applications

    Authors: Abdur Rab Dhruba, Kazi Nabiul Alam, Md Shakib Khan, Sami Bourouis, Mohammad Monirujjaman Khan

    Abstract: Sleep is an essential and vital element of a person life and health that helps to refresh and recharge the mind and body of a person. The quality of sleep is very important in every person lifestyle, removing various diseases. Bad sleep is a big problem for a lot of people for a very long time. People suffering from various diseases are dealing with various sleeping disorders, commonly known as sl… ▽ More

    Submitted 26 August, 2022; originally announced September 2022.

  11. arXiv:2105.02051  [pdf

    cs.NI eess.SP

    Leveraging Machine Learning for Industrial Wireless Communications

    Authors: Ilaria Malanchini, Patrick Agostini, Khurshid Alam, Michael Baumgart, Martin Kasparick, Qi Liao, Fabian Lipp, Nikolaj Marchenko, Nicola Michailow, Rastin Pries, Hans Schotten, Slawomir Stanczak, Stanislaw Strzyz

    Abstract: Two main trends characterize today's communication landscape and are finding their way into industrial facilities: the rollout of 5G with its distinct support for vertical industries and the increasing success of machine learning (ML). The combination of those two technologies open the doors to many exciting industrial applications and its impact is expected to rapidly increase in the coming years… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

  12. arXiv:2009.03518  [pdf, other

    cs.CR cs.DC eess.SY

    SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications

    Authors: A K M Mubashwir Alam, Sagar Sharma, Keke Chen

    Abstract: Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. However, the access patterns of SGX-based programs can still be observed by adversaries, which may leak important information for successful attacks. Researchers have been experimenting with Oblivious RAM (ORAM) to address t… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: To appear in Privacy Enhancing Technologies Symposium, 2021

  13. Controlling the Outbreak of COVID-19: A Noncooperative Game Perspective

    Authors: Anupam Kumar Bairagi, Mehedi Masud, Do Hyeon Kim, Md. Shirajum Munir, Abdullah Al Nahid, Sarder Fakhrul Abedin, Kazi Masudul Alam, Sujit Biswas, Sultan S Alshamrani, Zhu Han, Choong Seon Hong

    Abstract: COVID-19 is a global epidemic. Till now, there is no remedy for this epidemic. However, isolation and social distancing are seemed to be effective preventive measures to control this pandemic. Therefore, in this paper, an optimization problem is formulated that accommodates both isolation and social distancing features of the individuals. To promote social distancing, we solve the formulated probl… ▽ More

    Submitted 26 November, 2020; v1 submitted 27 July, 2020; originally announced July 2020.

    Comments: Accepted article by IEEE Access. DOI: 10.1109/ACCESS.2020.3040821

  14. Putting Things in Context: Securing Industrial Authentication with Context Information

    Authors: Simon Duque Anton, Daniel Fraunholz, Christoph Lipps, Khurshid Alam, Hans Dieter Schotten

    Abstract: The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while pr… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: This is the preprint of a work published in the Intl. Journal on Cyber Situational Awareness (IJCSA)

  15. arXiv:1807.03909  [pdf

    cs.SD cs.AI cs.LG stat.ML

    Emotion Recognition from Speech based on Relevant Feature and Majority Voting

    Authors: Md. Kamruzzaman Sarker, Kazi Md. Rokibul Alam, Md. Arifuzzaman

    Abstract: This paper proposes an approach to detect emotion from human speech employing majority voting technique over several machine learning techniques. The contribution of this work is in two folds: firstly it selects those features of speech which is most promising for classification and secondly it uses the majority voting technique that selects the exact class of emotion. Here, majority voting techni… ▽ More

    Submitted 10 July, 2018; originally announced July 2018.

    Journal ref: International Conference on Informatics, Electronics & Vision (ICIEV) (2014) 1-5

  16. arXiv:1606.03542  [pdf

    cs.CY

    Does Broadband Connectivity and Social networking sites build and maintain social capital in rural communities?

    Authors: Sanjib Tiwari, Michael Lane, Khorshed Alam

    Abstract: Broadband internet access is a major enabling technology for building social capital (SC) by better connecting rural and regional communities which are often geographically dispersed both locally nationally and internationally. The main objectives of this paper were determine to what extent Social Networking Sites (SNS) can build SC for households in a rural and regional context of rural household… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/224

  17. arXiv:1606.03513  [pdf

    cs.CY

    The challenges and opportunities of delivering wireless high speed broadband services in Rural and Remote Australia: A Case Study of Western Downs Region (WDR)

    Authors: Sanjib Tiwari, Michael Lane, Khorshed Alam

    Abstract: This paper critically assesses wireless broadband internet infrastructure, in the rural and remote communities of WDR in terms of supply, demand and utilisation. Only 8 of 20 towns have ADSL/ADSL2+, and only 3 towns have 4G mobile network coverage. Conversely all of the towns have 2G/3G mobile network coverage but have problems with speed, reliability of service and capacity to handle data traffic… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/205

  18. An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets

    Authors: Shinsuke Tamura, Hazim A. Haddad, Nazmul Islam, Kazi Md. Rokibul Alam

    Abstract: Simplified verifiable re-encryption mix-net (SVRM) is revised and a scheme for e-voting systems is developed based on it. The developed scheme enables e-voting systems to satisfy all essential requirements of elections. Namely, they satisfy requirements about privacy, verifiability, fairness and robustness. It also successfully protects voters from coercers except cases where the coercers force vo… ▽ More

    Submitted 17 December, 2015; originally announced December 2015.

    Journal ref: Information Security and Computer Fraud 3 (2015) 32-38