Skip to main content

Showing 1–25 of 25 results for author: Bhuiyan, A

  1. arXiv:2407.04069  [pdf, other

    cs.CL cs.AI cs.LG

    A Systematic Survey and Critical Review on Evaluating Large Language Models: Challenges, Limitations, and Recommendations

    Authors: Md Tahmid Rahman Laskar, Sawsan Alqahtani, M Saiful Bari, Mizanur Rahman, Mohammad Abdullah Matin Khan, Haidar Khan, Israt Jahan, Amran Bhuiyan, Chee Wei Tan, Md Rizwan Parvez, Enamul Hoque, Shafiq Joty, Jimmy Huang

    Abstract: Large Language Models (LLMs) have recently gained significant attention due to their remarkable capabilities in performing diverse tasks across various domains. However, a thorough evaluation of these models is crucial before deploying them in real-world applications to ensure they produce reliable performance. Despite the well-established importance of evaluating LLMs in the community, the comple… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2404.10172  [pdf, other

    cs.CV

    Forensic Iris Image-Based Post-Mortem Interval Estimation

    Authors: Rasel Ahmed Bhuiyan, Adam Czajka

    Abstract: Post-mortem iris recognition is an emerging application of iris-based human identification in a forensic setup. One factor that may be useful in conditioning iris recognition methods is the tissue decomposition level, which is correlated with the post-mortem interval (PMI), i.g., the number of hours that have elapsed since death. PMI, however, is not always available, and its precise estimation re… ▽ More

    Submitted 28 April, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

  3. arXiv:2403.00784  [pdf, other

    cs.IR cs.AI cs.CL

    Utilizing BERT for Information Retrieval: Survey, Applications, Resources, and Challenges

    Authors: Jiajia Wang, Jimmy X. Huang, Xinhui Tu, Junmei Wang, Angela J. Huang, Md Tahmid Rahman Laskar, Amran Bhuiyan

    Abstract: Recent years have witnessed a substantial increase in the use of deep learning to solve various natural language processing (NLP) problems. Early deep learning models were constrained by their sequential or unidirectional nature, such that they struggled to capture the contextual relationships across text inputs. The introduction of bidirectional encoder representations from transformers (BERT) le… ▽ More

    Submitted 18 February, 2024; originally announced March 2024.

  4. arXiv:2402.07090  [pdf

    cs.NI cs.ET eess.SP

    Design of a W-band High-PAE Class A&AB Power Amplifier in 150nm GaAs Technology

    Authors: Jun Yan Leea, Duo Wu, Xuanrui Guoc, Mohammad Mahdi Ariannejad, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz

    Abstract: Nanometer scale power amplifiers (PA) at sub-THz suffer from severe parasitic effects that lead to experience limited maximum frequency and reduced power performance at the device transceiver front end. The integrated circuits researchers proposed different PA design architecture combinations at scaled down technologies to overcome these limitations. Although the designs meet the minimum requireme… ▽ More

    Submitted 10 February, 2024; originally announced February 2024.

    Journal ref: Transactions on Electrical and Electronic Materials (TEEM), Electronic ISSN: 2092-7592, Print ISSN: 1229-7607, 10th February 2024, Available: https://link.springer.com/article/10.1007/s42341-024-00513-8

  5. arXiv:2401.05434  [pdf

    eess.SP cs.AI cs.LG

    ECGformer: Leveraging transformer for ECG heartbeat arrhythmia classification

    Authors: Taymaz Akan, Sait Alp, Mohammad Alfrad Nobel Bhuiyan

    Abstract: An arrhythmia, also known as a dysrhythmia, refers to an irregular heartbeat. There are various types of arrhythmias that can originate from different areas of the heart, resulting in either a rapid, slow, or irregular heartbeat. An electrocardiogram (ECG) is a vital diagnostic tool used to detect heart irregularities and abnormalities, allowing experts to analyze the heart's electrical signals to… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

  6. Optimisation and Performance Computation of a Phase Frequency Detector Module for IoT Devices

    Authors: Md. Shahriar Khan Hemel, Mamun Bin Ibne Reaz, Sawal Hamid Bin Md Ali, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz

    Abstract: The Internet of Things (IoT) is pivotal in transforming the way we live and interact with our surroundings. To cope with the advancement in technologies, it is vital to acquire accuracy with the speed. A phase frequency detector (PFD) is a critical device to regulate and provide accurate frequency in IoT devices. Designing a PFD poses challenges in achieving precise phase detection, minimising dea… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

    Journal ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 13-21, Vol. 8, No. 1, 1st January 2024, Available: http://aetic.theiaer.org/archive/v8/v8n1/p1.html

  7. arXiv:2312.04125  [pdf, other

    cs.CV

    Forensic Iris Image Synthesis

    Authors: Rasel Ahmed Bhuiyan, Adam Czajka

    Abstract: Post-mortem iris recognition is an emerging application of iris-based human identification in a forensic setup, able to correctly identify deceased subjects even three weeks post-mortem. This technique thus is considered as an important component of future forensic toolkits. The current advancements in this field are seriously slowed down by exceptionally difficult data collection, which can happe… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  8. arXiv:2305.18486  [pdf, other

    cs.CL cs.AI cs.LG

    A Systematic Study and Comprehensive Evaluation of ChatGPT on Benchmark Datasets

    Authors: Md Tahmid Rahman Laskar, M Saiful Bari, Mizanur Rahman, Md Amran Hossen Bhuiyan, Shafiq Joty, Jimmy Xiangji Huang

    Abstract: The development of large language models (LLMs) such as ChatGPT has brought a lot of attention recently. However, their evaluation in the benchmark academic datasets remains under-explored due to the difficulty of evaluating the generative outputs produced by this model against the ground truth. In this paper, we aim to present a thorough evaluation of ChatGPT's performance on diverse academic dat… ▽ More

    Submitted 5 July, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: Accepted by ACL 2023 Findings. The first three authors contributed equally

  9. arXiv:2205.10581  [pdf

    cs.LG eess.SP

    Evaluating Performance of Machine Learning Models for Diabetic Sensorimotor Polyneuropathy Severity Classification using Biomechanical Signals during Gait

    Authors: Fahmida Haque, Mamun Bin Ibne Reaz, Muhammad Enamul Hoque Chowdhury, Serkan Kiranyaz, Mohamed Abdelmoniem, Emadeddin Hussein, Mohammed Shaat, Sawal Hamid Md Ali, Ahmad Ashrif A Bakar, Geetika Srivastava, Mohammad Arif Sobhan Bhuiyan, Mohd Hadri Hafiz Mokhtar, Edi Kurniawan

    Abstract: Diabetic sensorimotor polyneuropathy (DSPN) is one of the prevalent forms of neuropathy affected by diabetic patients that involves alterations in biomechanical changes in human gait. In literature, for the last 50 years, researchers are trying to observe the biomechanical changes due to DSPN by studying muscle electromyography (EMG), and ground reaction forces (GRF). However, the literature is co… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

    Comments: 17 pages, 15 figures, 8 tables

  10. arXiv:2102.09342  [pdf, ps, other

    cs.CY cs.LG

    FedMood: Federated Learning on Mobile Health Data for Mood Detection

    Authors: Xiaohang Xu, Hao Peng, Lichao Sun, Md Zakirul Alam Bhuiyan, Lianzhong Liu, Lifang He

    Abstract: Depression is one of the most common mental illness problems, and the symptoms shown by patients are not consistent, making it difficult to diagnose in the process of clinical practice and pathological research. Although researchers hope that artificial intelligence can contribute to the diagnosis and treatment of depression, the traditional centralized machine learning needs to aggregate patient… ▽ More

    Submitted 20 May, 2021; v1 submitted 6 February, 2021; originally announced February 2021.

  11. arXiv:2101.06364  [pdf

    cs.CY cs.AI

    AR-based Modern Healthcare: A Review

    Authors: Jinat Ara, Hanif Bhuiyan, Yeasin Arafat Bhuiyan, Salma Begum Bhyan, Muhammad Ismail Bhuiyan

    Abstract: The recent advances of Augmented Reality (AR) in healthcare have shown that technology is a significant part of the current healthcare system. In recent days, augmented reality has proposed numerous smart applications in healthcare domain including wearable access, telemedicine, remote surgery, diagnosis of medical reports, emergency medicine, etc. The aim of the developed augmented healthcare app… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: 14 pages, 7 figures, and 2 tables

    ACM Class: A.1; H.4; I.2; J.3

  12. arXiv:2011.07262  [pdf, other

    cs.CR

    Modelling Attacks in Blockchain Systems using Petri Nets

    Authors: Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md Sadek Ferdous, Mohammad Jabed M. Chowdhury, Md Zakirul Alam Bhuiyan

    Abstract: Blockchain technology has evolved through many changes and modifications, such as smart-contracts since its inception in 2008. The popularity of a blockchain system is due to the fact that it offers a significant security advantage over other traditional systems. However, there have been many attacks in various blockchain systems, exploiting different vulnerabilities and bugs, which caused a signi… ▽ More

    Submitted 14 November, 2020; originally announced November 2020.

    Comments: Accepted for publication at the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020)

  13. arXiv:2009.06047  [pdf

    cs.CY eess.SY

    Multi-Objective Optimization for Sustainable Closed-Loop Supply Chain Network Under Demand Uncertainty: A Genetic Algorithm

    Authors: Ahmad Sobhan Abir, Ishtiaq Ahmed Bhuiyan, Mohammad Arani, Md Mashum Billal

    Abstract: Supply chain management has been concentrated on productive ways to manage flows through a sophisticated vendor, manufacturer, and consumer networks for decades. Recently, energy and material rates have been greatly consumed to improve the sector, making sustainable development the core problem for advanced and developing countries. A new approach of supply chain management is proposed to maintain… ▽ More

    Submitted 9 October, 2020; v1 submitted 13 September, 2020; originally announced September 2020.

    Comments: The current version of the paper has been accepted by the International Conference on Data Analytics for Business and Industry. http://data20.uob.edu.bh/

  14. arXiv:2008.03788  [pdf, other

    cs.CV

    A Flow-Guided Mutual Attention Network for Video-Based Person Re-Identification

    Authors: Madhu Kiran, Amran Bhuiyan, Louis-Antoine Blais-Morin, Mehrsan Javan, Ismail Ben Ayed, Eric Granger

    Abstract: Person Re-Identification (ReID) is a challenging problem in many video analytics and surveillance applications, where a person's identity must be associated across a distributed non-overlapping network of cameras. Video-based person ReID has recently gained much interest because it allows capturing discriminant spatio-temporal information from video clips that is unavailable for image-based ReID.… ▽ More

    Submitted 4 October, 2020; v1 submitted 9 August, 2020; originally announced August 2020.

  15. Unsupervised Domain Adaptation in the Dissimilarity Space for Person Re-identification

    Authors: Djebril Mekhazni, Amran Bhuiyan, George Ekladious, Eric Granger

    Abstract: Person re-identification (ReID) remains a challenging task in many real-word video analytics and surveillance applications, even though state-of-the-art accuracy has improved considerably with the advent of deep learning (DL) models trained on large image datasets. Given the shift in distributions that typically occurs between video data captured from the source and target domains, and absence of… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: 14 pages (16 pages with references), 7 figures, conference ECCV

    MSC Class: I.4.8

  16. arXiv:2006.15275  [pdf, other

    cs.CR cs.SE

    XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices

    Authors: Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman

    Abstract: Kubernetes is an open-source software for automating management of computerized services. Organizations, such as IBM, Capital One and Adidas use Kubernetes to deploy and manage their containers, and have reported benefits related to deployment frequency. Despite reported benefits, Kubernetes deployments are susceptible to security vulnerabilities, such as those that occurred at Tesla in 2018. A sy… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Keywords: containers, devops, devsecops, grey literature, kubernetes, practices, review, security, systematization of knowledge

    ACM Class: D.2

  17. Database Optimization to Recommend Software Developers using Canonical Order Tree

    Authors: T. M. Amir-Ul-Haque Bhuiyan, Mehedi Hasan Talukdar, Ziaur Rahman, Dr. Mohammad Motiur Rahman

    Abstract: Recently frequent and sequential pattern mining algorithms have been widely used in the field of software engineering to mine various source code or specification patterns. In practice software evolves from one version to another is needed for providing extra facilities to user. This kind of task is challenging in this domain since the database is usually updated in all kinds of manners such as in… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 4 Pages 8 Figures 7 Tables

    ACM Class: D.1.1

    Journal ref: 2015 International Conference on Advances in Electrical Engineering (ICAEE), Dhaka, 2015, pp. 157-160

  18. arXiv:2004.00427  [pdf, other

    cs.AI

    A Semi-Dynamic Bus Routing Infrastructure based on MBTA Bus Data

    Authors: Movses Musaelian, Anane Boateng, Md Zakirul Alam Bhuiyan

    Abstract: Transportation is quickly evolving in the emerging smart city ecosystem with personalized ride sharing services quickly advancing. Yet, the public bus infrastructure has been slow to respond to these trends. With our research, we propose a semi-dynamic bus routing framework that is data-driven and responsive to relevant parameters in bus transport. We use newly published bus event data from a bus… ▽ More

    Submitted 29 March, 2020; originally announced April 2020.

    Comments: 22 pages, 9 figures

  19. arXiv:1910.02450  [pdf

    cs.LG stat.ML

    Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling

    Authors: Hekai Zhang, Jibing Gong, Zhiyong Teng, Dan Wang, Hongfei Wang, Linfeng Du, Zakirul Alam Bhuiyan

    Abstract: User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based privacy attribute information has a wide range of applications in personalized services, user behavior analysis and other aspects. this paper advances the HetPathMine model and puts forwa… ▽ More

    Submitted 6 October, 2019; originally announced October 2019.

    Comments: 10 pages,3 figures,International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications

  20. arXiv:1907.02547  [pdf, other

    cs.CV cs.LG

    Exploiting Prunability for Person Re-Identification

    Authors: Hugo Masson, Amran Bhuiyan, Le Thanh Nguyen-Meidine, Mehrsan Javan, Parthipan Siva, Ismail Ben Ayed, Eric Granger

    Abstract: Recent years have witnessed a substantial increase in the deep learning (DL)architectures proposed for visual recognition tasks like person re-identification,where individuals must be recognized over multiple distributed cameras. Althoughthese architectures have greatly improved the state-of-the-art accuracy, thecomputational complexity of the CNNs commonly used for feature extractionremains an is… ▽ More

    Submitted 14 April, 2021; v1 submitted 4 July, 2019; originally announced July 2019.

    Comments: Accepted for EURASIP Journal on Image and Video Processing

  21. arXiv:1905.01987   

    cs.IR cs.CL

    Disease Identification From Unstructured User Input

    Authors: Fahim Faisal, Shafkat Ahmed Bhuiyan, Dr. Abu Raihan Mostofa Kamal

    Abstract: A method to identify probable diseases from the unstructured textual input (eg, health forum posts) by incorporating a lexicographic and semantic feature based two-phase text classification module and a symptom-disease correlation-based similarity measurement module. One notable aspect of my approach was to develop a competent algorithm to extract all inherent features from the data source to make… ▽ More

    Submitted 10 May, 2019; v1 submitted 1 May, 2019; originally announced May 2019.

    Comments: This was an undergraduate research. The hypotheses it proposes is based on a small number of samples and thus, can not be declared significant. To declare it significant, a large number of sample testing is needed. After that, it can be put through

  22. arXiv:1810.11641  [pdf, other

    cs.CV eess.IV

    Cross-Modal Distillation for RGB-Depth Person Re-Identification

    Authors: Frank Hafner, Amran Bhuiyan, Julian F. P. Kooij, Eric Granger

    Abstract: Person re-identification is a key challenge for surveillance across multiple sensors. Prompted by the advent of powerful deep learning models for visual recognition, and inexpensive RGB-D cameras and sensor-rich mobile robotic platforms, e.g. self-driving vehicles, we investigate the relatively unexplored problem of cross-modal re-identification of persons between RGB (color) and depth images. The… ▽ More

    Submitted 12 February, 2022; v1 submitted 27 October, 2018; originally announced October 2018.

    Journal ref: Computer Vision and Image Understanding, 103352 (2022)

  23. arXiv:1706.03112  [pdf, other

    cs.CV

    Unsupervised Adaptive Re-identification in Open World Dynamic Camera Networks

    Authors: Rameswar Panda, Amran Bhuiyan, Vittorio Murino, Amit K. Roy-Chowdhury

    Abstract: Person re-identification is an open and challenging problem in computer vision. Existing approaches have concentrated on either designing the best feature representation or learning optimal matching metrics in a static setting where the number of cameras are fixed in a network. Most approaches have neglected the dynamic and open world nature of the re-identification problem, where a new camera may… ▽ More

    Submitted 9 June, 2017; originally announced June 2017.

    Comments: CVPR 2017 Spotlight

  24. arXiv:1509.06065  [pdf, ps, other

    cs.DC eess.SY

    Dependable Structural Helath Monitoring Using Wireless Sensor Networks

    Authors: Md Zakirul Alam Bhuiyan, G. Wang, J. Wu, J. Cao

    Abstract: As an alternative to current wired-based networks, wireless sensor networks (WSNs) are becoming an increasingly compelling platform for engineering structural health monitoring (SHM) due to relatively low-cost, easy installation, and so forth. However, there is still an unaddressed challenge: the application-specific dependability in terms of sensor fault detection and tolerance. The dependability… ▽ More

    Submitted 20 September, 2015; originally announced September 2015.

    Comments: 46 pages, 22 figures

    ACM Class: C.2; C.2.1; D.4.5; C.2.4

  25. arXiv:1307.5894  [pdf, ps, other

    cs.DB cs.DC

    MIRAGE: An Iterative MapReduce based FrequentSubgraph Mining Algorithm

    Authors: Mansurul A Bhuiyan, Mohammad Al Hasan

    Abstract: Frequent subgraph mining (FSM) is an important task for exploratory data analysis on graph data. Over the years, many algorithms have been proposed to solve this task. These algorithms assume that the data structure of the mining task is small enough to fit in the main memory of a computer. However, as the real-world graph data grows, both in size and quantity, such an assumption does not hold any… ▽ More

    Submitted 22 July, 2013; originally announced July 2013.