Skip to main content

Showing 1–50 of 760 results for author: Rahman, M

  1. arXiv:2407.09187  [pdf

    cs.CL cs.AI

    Enhancing Depressive Post Detection in Bangla: A Comparative Study of TF-IDF, BERT and FastText Embeddings

    Authors: Saad Ahmed Sazan, Mahdi H. Miraz, A B M Muntasir Rahman

    Abstract: Due to massive adoption of social media, detection of users' depression through social media analytics bears significant importance, particularly for underrepresented languages, such as Bangla. This study introduces a well-grounded approach to identify depressive social media posts in Bangla, by employing advanced natural language processing techniques. The dataset used in this work, annotated by… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  2. arXiv:2407.07452  [pdf

    cs.RO cs.AI

    Missile detection and destruction robot using detection algorithm

    Authors: Md Kamrul Siam, Shafayet Ahmed, Md Habibur Rahman, Amir Hossain Mollah

    Abstract: This research is based on the present missile detection technologies in the world and the analysis of these technologies to find a cost effective solution to implement the system in Bangladesh. The paper will give an idea of the missile detection technologies using the electro-optical sensor and the pulse doppler radar. The system is made to detect the target missile. Automatic detection and destr… ▽ More

    Submitted 11 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: 67 pages

  3. arXiv:2407.05461  [pdf, other

    cs.AI

    CAV-AD: A Robust Framework for Detection of Anomalous Data and Malicious Sensors in CAV Networks

    Authors: Md Sazedur Rahman, Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong

    Abstract: The adoption of connected and automated vehicles (CAVs) has sparked considerable interest across diverse industries, including public transportation, underground mining, and agriculture sectors. However, CAVs' reliance on sensor readings makes them vulnerable to significant threats. Manipulating these readings can compromise CAV network security, posing serious risks for malicious activities. Alth… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  4. arXiv:2407.04831  [pdf, other

    cs.AI cs.SE

    Code Hallucination

    Authors: Mirza Masfiqur Rahman, Ashish Kundu

    Abstract: Generative models such as large language models are extensively used as code copilots and for whole program generation. However, the programs they generate often have questionable correctness, authenticity and reliability in terms of integration as they might not follow the user requirements, provide incorrect and/or nonsensical outputs, or even contain semantic/syntactic errors - overall known as… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  5. arXiv:2407.04069  [pdf, other

    cs.CL cs.AI cs.LG

    A Systematic Survey and Critical Review on Evaluating Large Language Models: Challenges, Limitations, and Recommendations

    Authors: Md Tahmid Rahman Laskar, Sawsan Alqahtani, M Saiful Bari, Mizanur Rahman, Mohammad Abdullah Matin Khan, Haidar Khan, Israt Jahan, Amran Bhuiyan, Chee Wei Tan, Md Rizwan Parvez, Enamul Hoque, Shafiq Joty, Jimmy Huang

    Abstract: Large Language Models (LLMs) have recently gained significant attention due to their remarkable capabilities in performing diverse tasks across various domains. However, a thorough evaluation of these models is crucial before deploying them in real-world applications to ensure they produce reliable performance. Despite the well-established importance of evaluating LLMs in the community, the comple… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  6. arXiv:2407.03486  [pdf, other

    cs.CV

    Celeb-FBI: A Benchmark Dataset on Human Full Body Images and Age, Gender, Height and Weight Estimation using Deep Learning Approach

    Authors: Pronay Debnath, Usafa Akther Rifa, Busra Kamal Rafa, Ali Haider Talukder Akib, Md. Aminur Rahman

    Abstract: The scarcity of comprehensive datasets in surveillance, identification, image retrieval systems, and healthcare poses a significant challenge for researchers in exploring new methodologies and advancing knowledge in these respective fields. Furthermore, the need for full-body image datasets with detailed attributes like height, weight, age, and gender is particularly significant in areas such as f… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: Accepted for publication in 3rd International Conference on Advanced Communication and Intelligent Systems

  7. arXiv:2407.01627  [pdf

    cs.IR

    Potential Renovation of Information Search Process with the Power of Large Language Model for Healthcare

    Authors: Forhan Bin Emdad, Mohammad Ishtiaque Rahman

    Abstract: This paper explores the development of the Six Stages of Information Search Model and its enhancement through the application of the Large Language Model (LLM) powered Information Search Processes (ISP) in healthcare. The Six Stages Model, a foundational framework in information science, outlines the sequential phases individuals undergo during information seeking: initiation, selection, explorati… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  8. arXiv:2406.10708  [pdf, other

    cs.CV cs.DB eess.SP

    MMVR: Millimeter-wave Multi-View Radar Dataset and Benchmark for Indoor Perception

    Authors: M. Mahbubur Rahman, Ryoma Yataka, Sorachi Kato, Pu Perry Wang, Peizhao Li, Adriano Cardace, Petros Boufounos

    Abstract: Compared with an extensive list of automotive radar datasets that support autonomous driving, indoor radar datasets are scarce at a smaller scale in the format of low-resolution radar point clouds and usually under an open-space single-room setting. In this paper, we scale up indoor radar data collection using multi-view high-resolution radar heatmap in a multi-day, multi-room, and multi-subject s… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

    Comments: 26 pages, 25 figures, 9 tables

  9. arXiv:2406.10688  [pdf

    physics.optics cs.LG cs.NE eess.IV physics.app-ph

    Integration of Programmable Diffraction with Digital Neural Networks

    Authors: Md Sadman Sakib Rahman, Aydogan Ozcan

    Abstract: Optical imaging and sensing systems based on diffractive elements have seen massive advances over the last several decades. Earlier generations of diffractive optical processors were, in general, designed to deliver information to an independent system that was separately optimized, primarily driven by human vision or perception. With the recent advances in deep learning and digital neural network… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

    Comments: 30 Pages, 6 Figures

  10. arXiv:2406.09155  [pdf, other

    cs.CL cs.AI cs.CV cs.LG

    DefAn: Definitive Answer Dataset for LLMs Hallucination Evaluation

    Authors: A B M Ashikur Rahman, Saeed Anwar, Muhammad Usman, Ajmal Mian

    Abstract: Large Language Models (LLMs) have demonstrated remarkable capabilities, revolutionizing the integration of AI in daily life applications. However, they are prone to hallucinations, generating claims that contradict established facts, deviating from prompts, and producing inconsistent responses when the same prompt is presented multiple times. Addressing these issues is challenging due to the lack… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  11. arXiv:2406.08534  [pdf, ps, other

    cs.NE cs.AI

    Optimizing Container Loading and Unloading through Dual-Cycling and Dockyard Rehandle Reduction Using a Hybrid Genetic Algorithm

    Authors: Md. Mahfuzur Rahman, Md Abrar Jahin, Md. Saiful Islam, M. F. Mridha

    Abstract: This paper addresses the optimization of container unloading and loading operations at ports, integrating quay-crane dual-cycling with dockyard rehandle minimization. We present a unified model encompassing both operations: ship container unloading and loading by quay crane, and the other is reducing dockyard rehandles while loading the ship. We recognize that optimizing one aspect in isolation ca… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  12. arXiv:2406.07710  [pdf, other

    cs.CV

    Vehicle Speed Detection System Utilizing YOLOv8: Enhancing Road Safety and Traffic Management for Metropolitan Areas

    Authors: SM Shaqib, Alaya Parvin Alo, Shahriar Sultan Ramit, Afraz Ul Haque Rupak, Sadman Sadik Khan, Mr. Md. Sadekur Rahman

    Abstract: In order to ensure traffic safety through a reduction in fatalities and accidents, vehicle speed detection is essential. Relentless driving practices are discouraged by the enforcement of speed restrictions, which are made possible by accurate monitoring of vehicle speeds. Road accidents remain one of the leading causes of death in Bangladesh. The Bangladesh Passenger Welfare Association stated in… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  13. arXiv:2406.05912  [pdf

    cs.CV cs.AI

    BD-SAT: High-resolution Land Use Land Cover Dataset & Benchmark Results for Developing Division: Dhaka, BD

    Authors: Ovi Paul, Abu Bakar Siddik Nayem, Anis Sarker, Amin Ahsan Ali, M Ashraful Amin, AKM Mahbubur Rahman

    Abstract: Land Use Land Cover (LULC) analysis on satellite images using deep learning-based methods is significantly helpful in understanding the geography, socio-economic conditions, poverty levels, and urban sprawl in developing countries. Recent works involve segmentation with LULC classes such as farmland, built-up areas, forests, meadows, water bodies, etc. Training deep learning methods on satellite i… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: 26 pages, 15 figures and 12 tables

  14. arXiv:2406.05151  [pdf

    cs.CR

    CredSec: A Blockchain-based Secure Credential Management System for University Adoption

    Authors: Md. Ahsan Habib, Md. Mostafijur Rahman, Nieb Hasan Neom

    Abstract: University education play a critical role in shaping intellectual and professional development of the individuals and contribute significantly to the advancement of knowledge and society. Generally, university authority has a direct control of students result making and stores the credential in their local dedicated server. So, there is chance to alter the credential and also have a very high poss… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 10 pages, 7 figures, 3 tables

  15. arXiv:2406.04220  [pdf, other

    cs.CL cs.AI

    BEADs: Bias Evaluation Across Domains

    Authors: Shaina Raza, Mizanur Rahman, Michael R. Zhang

    Abstract: Recent improvements in large language models (LLMs) have significantly enhanced natural language processing (NLP) applications. However, these models can also inherit and perpetuate biases from their training data. Addressing this issue is crucial, yet many existing datasets do not offer evaluation across diverse NLP tasks. To tackle this, we introduce the Bias Evaluations Across Domains (BEADs) d… ▽ More

    Submitted 7 June, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

    Comments: under review

  16. arXiv:2406.00367  [pdf, other

    cs.CL cs.AI cs.CE

    RoBERTa-BiLSTM: A Context-Aware Hybrid Model for Sentiment Analysis

    Authors: Md. Mostafizer Rahman, Ariful Islam Shiplu, Yutaka Watanobe, Md. Ashad Alam

    Abstract: Effectively analyzing the comments to uncover latent intentions holds immense value in making strategic decisions across various domains. However, several challenges hinder the process of sentiment analysis including the lexical diversity exhibited in comments, the presence of long dependencies within the text, encountering unknown symbols and words, and dealing with imbalanced datasets. Moreover,… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  17. arXiv:2405.16740  [pdf, other

    cs.CV

    PP-SAM: Perturbed Prompts for Robust Adaptation of Segment Anything Model for Polyp Segmentation

    Authors: Md Mostafijur Rahman, Mustafa Munir, Debesh Jha, Ulas Bagci, Radu Marculescu

    Abstract: The Segment Anything Model (SAM), originally designed for general-purpose segmentation tasks, has been used recently for polyp segmentation. Nonetheless, fine-tuning SAM with data from new imaging centers or clinics poses significant challenges. This is because this necessitates the creation of an expensive and time-intensive annotated dataset, along with the potential for variability in user prom… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: 7 pages, 9 figures, Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops

  18. arXiv:2405.15026  [pdf, other

    cs.MM cs.CY

    Enhancing Student Feedback Using Predictive Models in Visual Literacy Courses

    Authors: Alon Friedman, Kevin Hawley, Paul Rosen, Md Dilshadur Rahman

    Abstract: Peer review is a popular feedback mechanism in higher education that actively engages students and provides researchers with a means to assess student engagement. However, there is little empirical support for the durability of peer review, particularly when using data predictive modeling to analyze student comments. This study uses Naïve Bayes modeling to analyze peer review data obtained from an… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 8 pages, 6 figures, IEEE EDUCON 2024 conference

  19. arXiv:2405.12550  [pdf, other

    cs.CR

    Blockchain-based AI Methods for Managing Industrial IoT: Recent Developments, Integration Challenges and Opportunities

    Authors: Anichur Rahman, Dipanjali Kundu, Tanoy Debnath, Muaz Rahman, Airin Afroj Aishi, Jahidul Islam

    Abstract: Currently, Blockchain (BC), Artificial Intelligence (AI), and smart Industrial Internet of Things (IIoT) are not only leading promising technologies in the world, but also these technologies facilitate the current society to develop the standard of living and make it easier for users. However, these technologies have been applied in various domains for different purposes. Then, these are successfu… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  20. arXiv:2405.11188  [pdf, other

    cs.LG

    Wind Power Prediction across Different Locations using Deep Domain Adaptive Learning

    Authors: Md Saiful Islam Sajol, Md Shazid Islam, A S M Jahid Hasan, Md Saydur Rahman, Jubair Yusuf

    Abstract: Accurate prediction of wind power is essential for the grid integration of this intermittent renewable source and aiding grid planners in forecasting available wind capacity. Spatial differences lead to discrepancies in climatological data distributions between two geographically dispersed regions, consequently making the prediction task more difficult. Thus, a prediction model that learns from th… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

  21. arXiv:2405.06880  [pdf, other

    eess.IV cs.CV

    EMCAD: Efficient Multi-scale Convolutional Attention Decoding for Medical Image Segmentation

    Authors: Md Mostafijur Rahman, Mustafa Munir, Radu Marculescu

    Abstract: An efficient and effective decoding mechanism is crucial in medical image segmentation, especially in scenarios with limited computational resources. However, these decoding mechanisms usually come with high computational costs. To address this concern, we introduce EMCAD, a new efficient multi-scale convolutional attention decoder, designed to optimize both performance and computational efficienc… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 14 pages, 5 figures, 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

  22. arXiv:2405.06849  [pdf, other

    cs.CV cs.AI cs.LG

    GreedyViG: Dynamic Axial Graph Construction for Efficient Vision GNNs

    Authors: Mustafa Munir, William Avery, Md Mostafijur Rahman, Radu Marculescu

    Abstract: Vision graph neural networks (ViG) offer a new avenue for exploration in computer vision. A major bottleneck in ViGs is the inefficient k-nearest neighbor (KNN) operation used for graph construction. To solve this issue, we propose a new method for designing ViGs, Dynamic Axial Graph Construction (DAGC), which is more efficient than KNN as it limits the number of considered graph connections made… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

  23. arXiv:2405.06242  [pdf, other

    cs.CR cs.IR

    Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study

    Authors: Md Sadik Awal, Buddhipriya Gayanath, Md Tauhidur Rahman

    Abstract: In recent times, impedance side-channel analysis has emerged as a potent strategy for adversaries seeking to extract sensitive information from computing systems. It leverages variations in the intrinsic impedance of a chip's internal structure across different logic states. In this study, we conduct a comparative analysis between the newly explored impedance side channel and the well-established… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  24. arXiv:2405.06166  [pdf, other

    eess.IV cs.CV

    MDNet: Multi-Decoder Network for Abdominal CT Organs Segmentation

    Authors: Debesh Jha, Nikhil Kumar Tomar, Koushik Biswas, Gorkem Durak, Matthew Antalek, Zheyuan Zhang, Bin Wang, Md Mostafijur Rahman, Hongyi Pan, Alpay Medetalibeyoglu, Yury Velichko, Daniela Ladner, Amir Borhani, Ulas Bagci

    Abstract: Accurate segmentation of organs from abdominal CT scans is essential for clinical applications such as diagnosis, treatment planning, and patient monitoring. To handle challenges of heterogeneity in organ shapes, sizes, and complex anatomical relationships, we propose a \textbf{\textit{\ac{MDNet}}}, an encoder-decoder network that uses the pre-trained \textit{MiT-B2} as the encoder and multiple di… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  25. arXiv:2405.06126  [pdf, other

    quant-ph cs.CR cs.NI

    Quantum Secure Anonymous Communication Networks

    Authors: Mohammad Saidur Rahman, Stephen DiAdamo, Miralem Mehic, Charles Fleming

    Abstract: Anonymous communication networks (ACNs) enable Internet browsing in a way that prevents the accessed content from being traced back to the user. This allows a high level of privacy, protecting individuals from being tracked by advertisers or governments, for example. The Tor network, a prominent example of such a network, uses a layered encryption scheme to encapsulate data packets, using Tor node… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: Accepted for publication in QCNC2024

  26. arXiv:2405.05562  [pdf, other

    cs.IR

    Review-based Recommender Systems: A Survey of Approaches, Challenges and Future Perspectives

    Authors: Emrul Hasan, Mizanur Rahman, Chen Ding, Jimmy Xiangji Huang, Shaina Raza

    Abstract: Recommender systems play a pivotal role in helping users navigate an overwhelming selection of products and services. On online platforms, users have the opportunity to share feedback in various modes, including numerical ratings, textual reviews, and likes/dislikes. Traditional recommendation systems rely on users explicit ratings or implicit interactions (e.g. likes, clicks, shares, saves) to le… ▽ More

    Submitted 11 May, 2024; v1 submitted 9 May, 2024; originally announced May 2024.

    Comments: The first two authors contributed equally

  27. arXiv:2404.19708  [pdf, other

    cs.LG cs.AI cs.CL cs.HC

    Harmonic LLMs are Trustworthy

    Authors: Nicholas S. Kersting, Mohammad Rahman, Suchismitha Vedala, Yang Wang

    Abstract: We introduce an intuitive method to test the robustness (stability and explainability) of any black-box LLM in real-time, based upon the local deviation from harmoniticity, denoted as $γ$. To the best of our knowledge this is the first completely model-agnostic and unsupervised method of measuring the robustness of any given response from an LLM, based upon the model itself conforming to a purely… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: 15 pages, 4 figures, 14 tables

  28. arXiv:2404.15829  [pdf

    physics.acc-ph cs.LG

    Accelerating Cavity Fault Prediction Using Deep Learning at Jefferson Laboratory

    Authors: Monibor Rahman, Adam Carpenter, Khan Iftekharuddin, Chris Tennant

    Abstract: Accelerating cavities are an integral part of the Continuous Electron Beam Accelerator Facility (CEBAF) at Jefferson Laboratory. When any of the over 400 cavities in CEBAF experiences a fault, it disrupts beam delivery to experimental user halls. In this study, we propose the use of a deep learning model to predict slowly developing cavity faults. By utilizing pre-fault signals, we train a LSTM-CN… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: 18 pages, 9 figures

    Report number: JLAB-ACP-24-4013

  29. arXiv:2404.15451  [pdf, other

    cs.CV

    CFPFormer: Feature-pyramid like Transformer Decoder for Segmentation and Detection

    Authors: Hongyi Cai, Mohammad Mahdinur Rahman, Jingyu Wu, Yulun Deng

    Abstract: Feature pyramids have been widely adopted in convolutional neural networks (CNNs) and transformers for tasks like medical image segmentation and object detection. However, the currently existing models generally focus on the Encoder-side Transformer to extract features, from which decoder improvement can bring further potential with well-designed architecture. We propose CFPFormer, a novel decoder… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  30. arXiv:2404.12258  [pdf, ps, other

    cs.CV

    DeepLocalization: Using change point detection for Temporal Action Localization

    Authors: Mohammed Shaiqur Rahman, Ibne Farabi Shihab, Lynna Chu, Anuj Sharma

    Abstract: In this study, we introduce DeepLocalization, an innovative framework devised for the real-time localization of actions tailored explicitly for monitoring driver behavior. Utilizing the power of advanced deep learning methodologies, our objective is to tackle the critical issue of distracted driving-a significant factor contributing to road accidents. Our strategy employs a dual approach: leveragi… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  31. arXiv:2404.09432  [pdf, other

    cs.CV cs.AI cs.LG

    The 8th AI City Challenge

    Authors: Shuo Wang, David C. Anastasiu, Zheng Tang, Ming-Ching Chang, Yue Yao, Liang Zheng, Mohammed Shaiqur Rahman, Meenakshi S. Arya, Anuj Sharma, Pranamesh Chakraborty, Sanjita Prajapati, Quan Kong, Norimasa Kobori, Munkhjargal Gochoo, Munkh-Erdene Otgonbold, Fady Alnajjar, Ganzorig Batnasan, Ping-Yang Chen, Jun-Wei Hsieh, Xunlei Wu, Sameer Satish Pusegaonkar, Yizhou Wang, Sujit Biswas, Rama Chellappa

    Abstract: The eighth AI City Challenge highlighted the convergence of computer vision and artificial intelligence in areas like retail, warehouse settings, and Intelligent Traffic Systems (ITS), presenting significant research opportunities. The 2024 edition featured five tracks, attracting unprecedented interest from 726 teams in 47 countries and regions. Track 1 dealt with multi-target multi-camera (MTMC)… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    Comments: Summary of the 8th AI City Challenge Workshop in conjunction with CVPR 2024

  32. arXiv:2404.07831  [pdf

    cs.CR

    Protected QR Code-based Anti-counterfeit System for Pharmaceutical Manufacturing

    Authors: Md Masruk Aulia, Nitol Saha, Md. Mostafizur Rahman

    Abstract: The pharmaceutical manufacturing faces critical challenges due to the global threat of counterfeit drugs. This paper proposes a new approach of protected QR codes to secure unique product information for safeguarding the pharmaceutical supply chain. The proposed solution integrates secure QR code generation and encrypted data transmission to establish a comprehensive anti-counterfeit ecosystem. Th… ▽ More

    Submitted 6 May, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

  33. arXiv:2404.03606  [pdf, other

    cs.SD cs.AI cs.IR eess.AS

    Analyzing Musical Characteristics of National Anthems in Relation to Global Indices

    Authors: S M Rakib Hasan, Aakar Dhakal, Ms. Ayesha Siddiqua, Mohammad Mominur Rahman, Md Maidul Islam, Mohammed Arfat Raihan Chowdhury, S M Masfequier Rahman Swapno, SM Nuruzzaman Nobel

    Abstract: Music plays a huge part in shaping peoples' psychology and behavioral patterns. This paper investigates the connection between national anthems and different global indices with computational music analysis and statistical correlation analysis. We analyze national anthem musical data to determine whether certain musical characteristics are associated with peace, happiness, suicide rate, crime rate… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  34. arXiv:2404.02840  [pdf, ps, other

    cs.DC

    A Survey on Error-Bounded Lossy Compression for Scientific Datasets

    Authors: Sheng Di, Jinyang Liu, Kai Zhao, Xin Liang, Robert Underwood, Zhaorui Zhang, Milan Shah, Yafan Huang, Jiajun Huang, Xiaodong Yu, Congrong Ren, Hanqi Guo, Grant Wilkins, Dingwen Tao, Jiannan Tian, Sian Jin, Zizhe Jian, Daoce Wang, MD Hasanur Rahman, Boyuan Zhang, Jon C. Calhoun, Guanpeng Li, Kazutomo Yoshii, Khalid Ayed Alharthi, Franck Cappello

    Abstract: Error-bounded lossy compression has been effective in significantly reducing the data storage/transfer burden while preserving the reconstructed data fidelity very well. Many error-bounded lossy compressors have been developed for a wide range of parallel and distributed use cases for years. These lossy compressors are designed with distinct compression models and design principles, such that each… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: submitted to ACM Computing journal, requited to be 35 pages including references

  35. arXiv:2404.01501  [pdf, other

    cs.CV cs.LG

    MosquitoFusion: A Multiclass Dataset for Real-Time Detection of Mosquitoes, Swarms, and Breeding Sites Using Deep Learning

    Authors: Md. Faiyaz Abdullah Sayeedi, Fahim Hafiz, Md Ashiqur Rahman

    Abstract: In this paper, we present an integrated approach to real-time mosquito detection using our multiclass dataset (MosquitoFusion) containing 1204 diverse images and leverage cutting-edge technologies, specifically computer vision, to automate the identification of Mosquitoes, Swarms, and Breeding Sites. The pre-trained YOLOv8 model, trained on this dataset, achieved a mean Average Precision (mAP@50)… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  36. arXiv:2404.01347  [pdf, other

    cs.DB

    Mining Sequential Patterns in Uncertain Databases Using Hierarchical Index Structure

    Authors: Kashob Kumar Roy, Md Hasibul Haque Moon, Md Mahmudur Rahman, Chowdhury Farhan Ahmed, Carson K. Leung

    Abstract: In this uncertain world, data uncertainty is inherent in many applications and its importance is growing drastically due to the rapid development of modern technologies. Nowadays, researchers have paid more attention to mine patterns in uncertain databases. A few recent works attempt to mine frequent uncertain sequential patterns. Despite their success, they are incompetent to reduce the number of… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted at PAKDD 2021. arXiv admin note: text overlap with arXiv:2404.00746

  37. arXiv:2404.00746  [pdf, other

    cs.DB cs.AI

    Mining Weighted Sequential Patterns in Incremental Uncertain Databases

    Authors: Kashob Kumar Roy, Md Hasibul Haque Moon, Md Mahmudur Rahman, Chowdhury Farhan Ahmed, Carson Kai-Sang Leung

    Abstract: Due to the rapid development of science and technology, the importance of imprecise, noisy, and uncertain data is increasing at an exponential rate. Thus, mining patterns in uncertain databases have drawn the attention of researchers. Moreover, frequent sequences of items from these databases need to be discovered for meaningful knowledge with great impact. In many real cases, weights of items and… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted to Information Science journal

    Journal ref: Information Sciences 582 (2022): 865-896

  38. arXiv:2403.20084  [pdf

    cs.CL

    IPA Transcription of Bengali Texts

    Authors: Kanij Fatema, Fazle Dawood Haider, Nirzona Ferdousi Turpa, Tanveer Azmal, Sourav Ahmed, Navid Hasan, Mohammad Akhlaqur Rahman, Biplab Kumar Sarkar, Afrar Jahin, Md. Rezuwan Hassan, Md Foriduzzaman Zihad, Rubayet Sabbir Faruque, Asif Sushmit, Mashrur Imtiaz, Farig Sadeque, Syed Shahrier Rahman

    Abstract: The International Phonetic Alphabet (IPA) serves to systematize phonemes in language, enabling precise textual representation of pronunciation. In Bengali phonology and phonetics, ongoing scholarly deliberations persist concerning the IPA standard and core Bengali phonemes. This work examines prior research, identifies current and potential issues, and suggests a framework for a Bengali IPA standa… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  39. arXiv:2403.18597  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Heterogeneous Peridynamic Neural Operators: Discover Biotissue Constitutive Law and Microstructure From Digital Image Correlation Measurements

    Authors: Siavash Jafarzadeh, Stewart Silling, Lu Zhang, Colton Ross, Chung-Hao Lee, S. M. Rakibur Rahman, Shuodao Wang, Yue Yu

    Abstract: Human tissues are highly organized structures with specific collagen fiber arrangements varying from point to point. The effects of such heterogeneity play an important role for tissue function, and hence it is of critical to discover and understand the distribution of such fiber orientations from experimental measurements, such as the digital image correlation data. To this end, we introduce the… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  40. arXiv:2403.17218  [pdf, other

    cs.SE cs.CR cs.LG

    A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection

    Authors: Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Earl T. Barr, Wei Le

    Abstract: Large Language Models (LLMs) have demonstrated great potential for code generation and other software engineering tasks. Vulnerability detection is of crucial importance to maintaining the security, integrity, and trustworthiness of software systems. Precise vulnerability detection requires reasoning about the code, making it a good case study for exploring the limits of LLMs' reasoning capabiliti… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  41. arXiv:2403.14038  [pdf, other

    cs.SI cs.HC

    PureConnect: A Localized Social Media System to Increase Awareness and Connectedness in Environmental Justice Communities

    Authors: Omar Hammad, Md Rezwanur Rahman, Gopala Krishna Vasanth Kanugo, Nicholas Clements, Shelly Miller, Shivakant Mishra, Esther Sullivan

    Abstract: Frequent disruptions like highway constructions are common now-a-days, often impacting environmental justice communities (communities with low socio-economic status with disproportionately high and adverse human health and environmental effects) that live nearby. Based on our interactions via focus groups with the members of four environmental justice communities impacted by a major highway constr… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Submitted in COMPSAC 2024

  42. arXiv:2403.12553  [pdf, other

    cs.LG

    Pretraining Codomain Attention Neural Operators for Solving Multiphysics PDEs

    Authors: Md Ashiqur Rahman, Robert Joseph George, Mogab Elleithy, Daniel Leibovici, Zongyi Li, Boris Bonev, Colin White, Julius Berner, Raymond A. Yeh, Jean Kossaifi, Kamyar Azizzadenesheli, Anima Anandkumar

    Abstract: Existing neural operator architectures face challenges when solving multiphysics problems with coupled partial differential equations (PDEs), due to complex geometries, interactions between physical variables, and the lack of large amounts of high-resolution training data. To address these issues, we propose Codomain Attention Neural Operator (CoDA-NO), which tokenizes functions along the codomain… ▽ More

    Submitted 5 April, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

  43. arXiv:2403.09858  [pdf, other

    cs.CL

    FakeWatch: A Framework for Detecting Fake News to Ensure Credible Elections

    Authors: Shaina Raza, Tahniat Khan, Veronica Chatrath, Drai Paulen-Patterson, Mizanur Rahman, Oluwanifemi Bamgbose

    Abstract: In today's technologically driven world, the rapid spread of fake news, particularly during critical events like elections, poses a growing threat to the integrity of information. To tackle this challenge head-on, we introduce FakeWatch, a comprehensive framework carefully designed to detect fake news. Leveraging a newly curated dataset of North American election-related news articles, we construc… ▽ More

    Submitted 4 May, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2312.03730

  44. arXiv:2403.08403  [pdf, other

    cs.LG

    FSDR: A Novel Deep Learning-based Feature Selection Algorithm for Pseudo Time-Series Data using Discrete Relaxation

    Authors: Mohammad Rahman, Manzur Murshed, Shyh Wei Teng, Manoranjan Paul

    Abstract: Conventional feature selection algorithms applied to Pseudo Time-Series (PTS) data, which consists of observations arranged in sequential order without adhering to a conventional temporal dimension, often exhibit impractical computational complexities with high dimensional data. To address this challenge, we introduce a Deep Learning (DL)-based feature selection algorithm: Feature Selection throug… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  45. arXiv:2403.06438  [pdf, other

    cs.IT eess.SP

    Unification of Secret Key Generation and Wiretap Channel Transmission

    Authors: Yingbo Hua, Md Saydur Rahman

    Abstract: This paper presents further insights into a recently developed round-trip communication scheme called ``Secret-message Transmission by Echoing Encrypted Probes (STEEP)''. A legitimate wireless channel between a multi-antenna user (Alice) and a single-antenna user (Bob) in the presence of a multi-antenna eavesdropper (Eve) is focused on. STEEP does not require full-duplex, channel reciprocity or Ev… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: This paper has been accepted for presentation at IEEE ICC 2024

  46. arXiv:2403.04311  [pdf, other

    cs.AI cs.CL cs.DC cs.IR

    ALTO: An Efficient Network Orchestrator for Compound AI Systems

    Authors: Keshav Santhanam, Deepti Raghavan, Muhammad Shahir Rahman, Thejas Venkatesh, Neha Kunjal, Pratiksha Thaker, Philip Levis, Matei Zaharia

    Abstract: We present ALTO, a network orchestrator for efficiently serving compound AI systems such as pipelines of language models. ALTO achieves high throughput and low latency by taking advantage of an optimization opportunity specific to generative language models: streaming intermediate outputs. As language models produce outputs token by token, ALTO exposes opportunities to stream intermediate outputs… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

  47. arXiv:2403.02286  [pdf, other

    cs.DB

    Stage: Query Execution Time Prediction in Amazon Redshift

    Authors: Ziniu Wu, Ryan Marcus, Zhengchun Liu, Parimarjan Negi, Vikram Nathan, Pascal Pfeil, Gaurav Saxena, Mohammad Rahman, Balakrishnan Narayanaswamy, Tim Kraska

    Abstract: Query performance (e.g., execution time) prediction is a critical component of modern DBMSes. As a pioneering cloud data warehouse, Amazon Redshift relies on an accurate execution time prediction for many downstream tasks, ranging from high-level optimizations, such as automatically creating materialized views, to low-level tasks on the critical path of query execution, such as admission, scheduli… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 15 pages

  48. arXiv:2402.18443  [pdf, other

    cs.LG cs.AI

    LeMo-NADe: Multi-Parameter Neural Architecture Discovery with LLMs

    Authors: Md Hafizur Rahman, Prabuddha Chakraborty

    Abstract: Building efficient neural network architectures can be a time-consuming task requiring extensive expert knowledge. This task becomes particularly challenging for edge devices because one has to consider parameters such as power consumption during inferencing, model size, inferencing speed, and CO2 emissions. In this article, we introduce a novel framework designed to automatically discover new neu… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: 19 pages, 5 figures, 10 tables and 3 algorithms

  49. Smishing Dataset I: Phishing SMS Dataset from Smishtank.com

    Authors: Daniel Timko, Muhammad Lutfor Rahman

    Abstract: While smishing (SMS Phishing) attacks have risen to become one of the most common types of social engineering attacks, there is a lack of relevant smishing datasets. One of the biggest challenges in the domain of smishing prevention is the availability of fresh smishing datasets. Additionally, as time persists, smishing campaigns are shut down and the crucial information related to the attack are… ▽ More

    Submitted 28 April, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  50. arXiv:2402.14565  [pdf, other

    eess.SP cs.HC

    Non-Contact Acquisition of PPG Signal using Chest Movement-Modulated Radio Signals

    Authors: Israel Jesus Santos Filho, Muhammad Mahboob Ur Rahman, Taous-Meriem Laleg-Kirati, Tareq Al-Naffouri

    Abstract: We present for the first time a novel method that utilizes the chest movement-modulated radio signals for non-contact acquisition of the photoplethysmography (PPG) signal. Under the proposed method, a software-defined radio (SDR) exposes the chest of a subject sitting nearby to an orthogonal frequency division multiplexing signal with 64 sub-carriers at a center frequency 5.24 GHz, while another S… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: 5 pages, 5 figures, under review with a conference