Skip to main content

Showing 1–40 of 40 results for author: Zaman, S

  1. arXiv:2407.01426  [pdf, other

    cs.CR cs.DC

    Maximizing Blockchain Performance: Mitigating Conflicting Transactions through Parallelism and Dependency Management

    Authors: Faisal Haque Bappy, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom, Tariqul Islam

    Abstract: While blockchains initially gained popularity in the realm of cryptocurrencies, their widespread adoption is expanding beyond conventional applications, driven by the imperative need for enhanced data security. Despite providing a secure network, blockchains come with certain tradeoffs, including high latency, lower throughput, and an increased number of transaction failures. A pivotal issue contr… ▽ More

    Submitted 2 July, 2024; v1 submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.13740  [pdf, other

    cond-mat.supr-con cond-mat.mes-hall cond-mat.str-el quant-ph

    Kinetic Inductance, Quantum Geometry, and Superconductivity in Magic-Angle Twisted Bilayer Graphene

    Authors: Miuko Tanaka, Joel Î-j. Wang, Thao H. Dinh, Daniel Rodan-Legrain, Sameia Zaman, Max Hays, Bharath Kannan, Aziza Almanakly, David K. Kim, Bethany M. Niedzielski, Kyle Serniak, Mollie E. Schwartz, Kenji Watanabe, Takashi Taniguchi, Jeffrey A. Grover, Terry P. Orlando, Simon Gustavsson, Pablo Jarillo-Herrero, William D. Oliver

    Abstract: The physics of superconductivity in magic-angle twisted bilayer graphene (MATBG) is a topic of keen interest in moiré systems research, and it may provide insight into the pairing mechanism of other strongly correlated materials such as high-$T_{\mathrm{c}}$ superconductors. Here, we use DC-transport and microwave circuit quantum electrodynamics (cQED) to measure directly the superfluid stiffness… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  3. arXiv:2405.11619  [pdf

    cs.LG cs.AI

    Novel Interpretable and Robust Web-based AI Platform for Phishing Email Detection

    Authors: Abdulla Al-Subaiey, Mohammed Al-Thani, Naser Abdullah Alam, Kaniz Fatema Antora, Amith Khandakar, SM Ashfaq Uz Zaman

    Abstract: Phishing emails continue to pose a significant threat, causing financial losses and security breaches. This study addresses limitations in existing research, such as reliance on proprietary datasets and lack of real-world application, by proposing a high-performance machine learning model for email classification. Utilizing a comprehensive and largest available public dataset, the model achieves a… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: 19 pages, 7 figures, dataset link: https://www.kaggle.com/datasets/naserabdullahalam/phishing-email-dataset/

  4. arXiv:2403.18976  [pdf, other

    cs.CL cs.AI

    "Sorry, Come Again?" Prompting -- Enhancing Comprehension and Diminishing Hallucination with [PAUSE]-injected Optimal Paraphrasing

    Authors: Vipula Rawte, S. M Towhidul Islam Tonmoy, S M Mehedi Zaman, Prachi Priya, Aman Chadha, Amit P. Sheth, Amitava Das

    Abstract: Hallucination has emerged as the most vulnerable aspect of contemporary Large Language Models (LLMs). In this paper, we introduce the Sorry, Come Again (SCA) prompting, aimed to avoid LLM hallucinations by enhancing comprehension through: (i) optimal paraphrasing and (ii) injecting [PAUSE] tokens to delay LLM generation. First, we provide an in-depth analysis of linguistic nuances: formality, read… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  5. arXiv:2401.08953  [pdf, other

    cs.CR cs.DS

    An Efficient and Scalable Auditing Scheme for Cloud Data Storage using an Enhanced B-tree

    Authors: Tariqul Islam, Faisal Haque Bappy, Md Nafis Ul Haque Shifat, Farhan Ahmad, Kamrul Hasan, Tarannum Shaila Zaman

    Abstract: An efficient, scalable, and provably secure dynamic auditing scheme is highly desirable in the cloud storage environment for verifying the integrity of the outsourced data. Most of the existing work on remote integrity checking focuses on static archival data and therefore cannot be applied to cases where dynamic data updates are more common. Additionally, existing auditing schemes suffer from per… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

  6. arXiv:2401.07872  [pdf, other

    cs.CL

    The What, Why, and How of Context Length Extension Techniques in Large Language Models -- A Detailed Survey

    Authors: Saurav Pawar, S. M Towhidul Islam Tonmoy, S M Mehedi Zaman, Vinija Jain, Aman Chadha, Amitava Das

    Abstract: The advent of Large Language Models (LLMs) represents a notable breakthrough in Natural Language Processing (NLP), contributing to substantial progress in both text comprehension and generation. However, amidst these advancements, it is noteworthy that LLMs often face a limitation in terms of context length extrapolation. Understanding and extending the context length for LLMs is crucial in enhanc… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  7. arXiv:2401.01313  [pdf, other

    cs.CL

    A Comprehensive Survey of Hallucination Mitigation Techniques in Large Language Models

    Authors: S. M Towhidul Islam Tonmoy, S M Mehedi Zaman, Vinija Jain, Anku Rani, Vipula Rawte, Aman Chadha, Amitava Das

    Abstract: As Large Language Models (LLMs) continue to advance in their ability to write human-like text, a key challenge remains around their tendency to hallucinate generating content that appears factual but is ungrounded. This issue of hallucination is arguably the biggest hindrance to safely deploying these powerful LLMs into real-world production systems that impact people's lives. The journey toward w… ▽ More

    Submitted 8 January, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

  8. arXiv:2312.09123  [pdf, other

    cs.DC cs.CR

    MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain

    Authors: Tariqul Islam, Faisal Haque Bappy, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom

    Abstract: The core of a blockchain network is its consensus algorithm. Starting with the Proof-of-Work, there have been various versions of consensus algorithms, such as Proof-of-Stake (PoS), Proof-of-Authority (PoA), and Practical Byzantine Fault Tolerance (PBFT). Each of these algorithms focuses on different aspects to ensure efficient and reliable processing of transactions. Blockchain operates in a dece… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  9. arXiv:2312.08309  [pdf, other

    cs.DC

    FASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication

    Authors: Sabbir Ahmed, Md Nahiduzzaman, Tariqul Islam, Faisal Haque Bappy, Tarannum Shaila Zaman, Raiful Hasan

    Abstract: With the surge in cloud storage adoption, enterprises face challenges managing data duplication and exponential data growth. Deduplication mitigates redundancy, yet maintaining redundancy ensures high availability, incurring storage costs. Balancing these aspects is a significant research concern. We propose FASTEN, a distributed cloud storage scheme ensuring efficiency, security, and high availab… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  10. arXiv:2312.08305  [pdf, other

    cs.DC

    ConChain: A Scheme for Contention-free and Attack Resilient BlockChain

    Authors: Faisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom

    Abstract: Although blockchains have become widely popular for their use in cryptocurrencies, they are now becoming pervasive as more traditional applications adopt blockchain to ensure data security. Despite being a secured network, blockchains have some tradeoffs such as high latency, low throughput, and transaction failures. One of the core problems behind these is improper management of "conflicting tran… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  11. arXiv:2311.06297  [pdf, other

    physics.chem-ph cs.LG

    STRIDE: Structure-guided Generation for Inverse Design of Molecules

    Authors: Shehtab Zaman, Denis Akhiyarov, Mauricio Araya-Polo, Kenneth Chiu

    Abstract: Machine learning and especially deep learning has had an increasing impact on molecule and materials design. In particular, given the growing access to an abundance of high-quality small molecule data for generative modeling for drug design, results for drug discovery have been promising. However, for many important classes of materials such as catalysts, antioxidants, and metal-organic frameworks… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  12. arXiv:2311.00330  [pdf, other

    cs.LG q-bio.QM

    Latent Space Inference For Spatial Transcriptomics

    Authors: J. Ding, S. N. Zaman, P. Y. Chen, D. Wang

    Abstract: In order to understand the complexities of cellular biology, researchers are interested in two important metrics: the genetic expression information of cells and their spatial coordinates within a tissue sample. However, state-of-the art methods, namely single-cell RNA sequencing and image based spatial transcriptomics can only recover a subset of this information, either full genetic expression w… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  13. arXiv:2311.00313  [pdf, other

    cs.RO

    Gaze-based Learning from Demonstration In Surgical Robotics

    Authors: A. E. Abdelaal, S. N. Zaman, P. Y Chen, T. Suzuki, J. Ingleton

    Abstract: Surgical robotics is a rising field in medical technology and advanced robotics. Robot assisted surgery, or robotic surgery, allows surgeons to perform complicated surgical tasks with more precision, automation, and flexibility than is possible for traditional surgical approaches. The main type of robot assisted surgery is minimally invasive surgery, which could be automated and result in a faster… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: 45 pages, Lots of Figures

    ACM Class: F.2.2; I.2.7

  14. arXiv:2310.05030  [pdf, other

    cs.CL cs.AI

    Counter Turing Test CT^2: AI-Generated Text Detection is Not as Easy as You May Think -- Introducing AI Detectability Index

    Authors: Megha Chakraborty, S. M Towhidul Islam Tonmoy, S M Mehedi Zaman, Krish Sharma, Niyar R Barman, Chandan Gupta, Shreya Gautam, Tanay Kumar, Vinija Jain, Aman Chadha, Amit P. Sheth, Amitava Das

    Abstract: With the rise of prolific ChatGPT, the risk and consequences of AI-generated text has increased alarmingly. To address the inevitable question of ownership attribution for AI-generated artifacts, the US Copyright Office released a statement stating that 'If a work's traditional elements of authorship were produced by a machine, the work lacks human authorship and the Office will not register it'.… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 October, 2023; originally announced October 2023.

    Comments: EMNLP 2023 Main

  15. arXiv:2309.11064  [pdf, other

    cs.AI

    Exploring the Relationship between LLM Hallucinations and Prompt Linguistic Nuances: Readability, Formality, and Concreteness

    Authors: Vipula Rawte, Prachi Priya, S. M Towhidul Islam Tonmoy, S M Mehedi Zaman, Amit Sheth, Amitava Das

    Abstract: As Large Language Models (LLMs) have advanced, they have brought forth new challenges, with one of the prominent issues being LLM hallucination. While various mitigation techniques are emerging to address hallucination, it is equally crucial to delve into its underlying causes. Consequently, in this preliminary exploratory investigation, we examine how linguistic factors in prompts, specifically r… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  16. arXiv:2309.06126  [pdf, other

    astro-ph.IM astro-ph.CO astro-ph.GA astro-ph.HE cs.CL cs.LG

    AstroLLaMA: Towards Specialized Foundation Models in Astronomy

    Authors: Tuan Dung Nguyen, Yuan-Sen Ting, Ioana Ciucă, Charlie O'Neill, Ze-Chang Sun, Maja Jabłońska, Sandor Kruk, Ernest Perkowski, Jack Miller, Jason Li, Josh Peek, Kartheik Iyer, Tomasz Różański, Pranav Khetarpal, Sharaf Zaman, David Brodrick, Sergio J. Rodríguez Méndez, Thang Bui, Alyssa Goodman, Alberto Accomazzi, Jill Naiman, Jesse Cranney, Kevin Schawinski, UniverseTBD

    Abstract: Large language models excel in many human-language tasks but often falter in highly specialized domains like scholarly astronomy. To bridge this gap, we introduce AstroLLaMA, a 7-billion-parameter model fine-tuned from LLaMA-2 using over 300,000 astronomy abstracts from arXiv. Optimized for traditional causal language modeling, AstroLLaMA achieves a 30% lower perplexity than Llama-2, showing marke… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: 6 pages, 3 figures, submitted to IJCNLP-AACL 2023. Comments are welcome. The model can be found on Hugging Face - https://huggingface.co/universeTBD/astrollama

  17. arXiv:2309.03395  [pdf, other

    cs.RO

    The Quiet Eye Phenomenon in Minimally Invasive Surgery

    Authors: Alaa Eldin Abdelaal, Rachelle Van Rumpt, Sayem Nazmuz Zaman, Irene Tong, Anthony Jarc, Gary L. Gallia, Masaru Ishii, Gregory D. Hager, Septimiu E. Salcudean

    Abstract: In this paper, we report our discovery of a gaze behavior called Quiet Eye (QE) in minimally invasive surgery. The QE behavior has been extensively studied in sports training and has been associated with higher level of expertise in multiple sports. We investigated the QE behavior in two independently collected data sets of surgeons performing tasks in a sinus surgery setting and a robotic surgery… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  18. arXiv:2308.06142  [pdf, other

    cs.CV cs.LG

    CompTLL-UNet: Compressed Domain Text-Line Localization in Challenging Handwritten Documents using Deep Feature Learning from JPEG Coefficients

    Authors: Bulla Rajesh, Sk Mahafuz Zaman, Mohammed Javed, P. Nagabhushan

    Abstract: Automatic localization of text-lines in handwritten documents is still an open and challenging research problem. Various writing issues such as uneven spacing between the lines, oscillating and touching text, and the presence of skew become much more challenging when the case of complex handwritten document images are considered for segmentation directly in their respective compressed representati… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

    Comments: Accepted in 7th Asian Conference on Pattern Recognition (ACPR 2023), 5-8 November 2023, Kitakyushu, Japan

  19. arXiv:2308.04453  [pdf, other

    cs.CR

    Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control

    Authors: Faisal Haque Bappy, Saklain Zaman, Tariqul Islam, Redwan Ahmed Rizvee, Joon S. Park, Kamrul Hasan

    Abstract: Although wide-scale integration of cloud services with myriad applications increases quality of services (QoS) for enterprise users, verifying the existence and manipulation of stored cloud information remains an open research problem. Decentralized blockchain-based solutions are becoming more appealing for cloud auditing environments because of the immutable nature of blockchain. However, the dec… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  20. arXiv:2308.02358  [pdf, other

    cs.DC

    A Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User Behaviors

    Authors: Faisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Raiful Hasan, Carlos Caicedo

    Abstract: Large-scale cloud data centers have gained popularity due to their high availability, rapid elasticity, scalability, and low cost. However, current data centers continue to have high failure rates due to the lack of proper resource utilization and early failure detection. To maximize resource efficiency and reduce failure rates in large-scale cloud data centers, it is crucial to understand the wor… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  21. arXiv:2306.01894  [pdf

    eess.SP

    Atmospheric Influence on the Path Loss at High Frequencies for Deployment of 5G Cellular Communication Networks

    Authors: Rashed Hasan Ratul, S M Mehedi Zaman, Hasib Arman Chowdhury, Md. Zayed Hassan Sagor, Mohammad Tawhid Kawser, Mirza Muntasir Nishat

    Abstract: Over the past few decades, the development of cellular communication technology has spanned several generations in order to add sophisticated features in the updated versions. Moreover, different high-frequency bands are considered for advanced cellular generations. The presence of updated generations like 4G and 5G is driven by the rising demand for a greater data rate and a better experience for… ▽ More

    Submitted 27 July, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: Accepted for presentation at THE 14th INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT)

  22. arXiv:2304.05885  [pdf, ps, other

    eess.IV

    Automatic Aortic Valve Pathology Detection from 3-Chamber Cine MRI with Spatio-Temporal Attention Maps

    Authors: Y. On, K. Vimalesvaran, C. Galazis, S. Zaman, J. Howard, N. Linton, N. Peters, G. Cole, A. A. Bharath, M. Varela

    Abstract: The assessment of aortic valve pathology using magnetic resonance imaging (MRI) typically relies on blood velocity estimates acquired using phase contrast (PC) MRI. However, abnormalities in blood flow through the aortic valve often manifest by the dephasing of blood signal in gated balanced steady-state free precession (bSSFP) scans (Cine MRI). We propose a 3D classification neural network (NN) t… ▽ More

    Submitted 14 April, 2023; v1 submitted 12 April, 2023; originally announced April 2023.

    Comments: 10 pages

  23. arXiv:2212.01274  [pdf

    cs.CR cs.LG

    OOG- Optuna Optimized GAN Sampling Technique for Tabular Imbalanced Malware Data

    Authors: S. M Towhidul Islam Tonmoy, S. M Mehedi Zaman

    Abstract: Cyberspace occupies a large portion of people's life in the age of modern technology, and while there are those who utilize it for good, there are also those who do not. Malware is an application whose construction was not motivated by a benign goal and it can harm, steal, or even alter personal information and secure applications and software. Thus, there are numerous techniques to avoid malware,… ▽ More

    Submitted 25 November, 2022; originally announced December 2022.

    Comments: Accepted for publication at 2022 IEEE International Conference on Big Data (IEEE BigData 2022)

  24. arXiv:2211.08506  [pdf, other

    cs.CE cs.LG

    ParticleGrid: Enabling Deep Learning using 3D Representation of Materials

    Authors: Shehtab Zaman, Ethan Ferguson, Cecile Pereira, Denis Akhiyarov, Mauricio Araya-Polo, Kenneth Chiu

    Abstract: From AlexNet to Inception, autoencoders to diffusion models, the development of novel and powerful deep learning models and learning algorithms has proceeded at breakneck speeds. In part, we believe that rapid iteration of model architecture and learning techniques by a large community of researchers over a common representation of the underlying entities has resulted in transferable deep learning… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: Published in the 2022 IEEE 18th International Conference on eScience (eScience)

  25. Few-shot Generation of Personalized Neural Surrogates for Cardiac Simulation via Bayesian Meta-Learning

    Authors: Xiajun Jiang, Zhiyuan Li, Ryan Missel, Md Shakil Zaman, Brian Zenger, Wilson W. Good, Rob S. MacLeod, John L. Sapp, Linwei Wang

    Abstract: Clinical adoption of personalized virtual heart simulations faces challenges in model personalization and expensive computation. While an ideal solution is an efficient neural surrogate that at the same time is personalized to an individual subject, the state-of-the-art is either concerned with personalizing an expensive simulation model, or learning an efficient yet generic surrogate. This paper… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

    Journal ref: International Conference on Medical Image Computing and Computer-Assisted Intervention, vol 13438, 2022, pp. 46-56

  26. arXiv:2209.15293  [pdf

    q-fin.GN cs.CL cs.LG

    A Survey: Credit Sentiment Score Prediction

    Authors: A. N. M. Sajedul Alam, Junaid Bin Kibria, Arnob Kumar Dey, Zawad Alam, Shifat Zaman, Motahar Mahtab, Mohammed Julfikar Ali Mahbub, Annajiat Alim Rasel

    Abstract: Manual approvals are still used by banks and other NGOs to approve loans. It takes time and is prone to mistakes because it is controlled by a bank employee. Several fields of machine learning mining technologies have been utilized to enhance various areas of credit rating forecast. A major goal of this research is to look at current sentiment analysis techniques that are being used to generate cr… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: 16 pages, 3 figures, 3 tables

  27. arXiv:2110.06851  [pdf, other

    cs.LG

    Fast Posterior Estimation of Cardiac Electrophysiological Model Parameters via Bayesian Active Learning

    Authors: Md Shakil Zaman, Jwala Dhamala, Pradeep Bajracharya, John L. Sapp, B. Milan Horacek, Katherine C. Wu, Natalia A. Trayanova, Linwei Wang

    Abstract: Probabilistic estimation of cardiac electrophysiological model parameters serves an important step towards model personalization and uncertain quantification. The expensive computation associated with these model simulations, however, makes direct Markov Chain Monte Carlo (MCMC) sampling of the posterior probability density function (pdf) of model parameters computationally intensive. Approximated… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  28. arXiv:2108.13367  [pdf

    cs.LG cs.AI q-bio.BM stat.ML

    Survival Prediction of Heart Failure Patients using Stacked Ensemble Machine Learning Algorithm

    Authors: S. M Mehedi Zaman, Wasay Mahmood Qureshi, Md. Mohsin Sarker Raihan, Ocean Monjur, Abdullah Bin Shams

    Abstract: Cardiovascular disease, especially heart failure is one of the major health hazard issues of our time and is a leading cause of death worldwide. Advancement in data mining techniques using machine learning (ML) models is paving promising prediction approaches. Data mining is the process of converting massive volumes of raw data created by the healthcare institutions into meaningful information tha… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: This article has been submitted for publication in Biomedical Physics & Engineering Express

  29. Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms

    Authors: Arafat Rahman, Muhammad E. H. Chowdhury, Amith Khandakar, Serkan Kiranyaz, Kh Shahriya Zaman, Mamun Bin Ibne Reaz, Mohammad Tariqul Islam, Muhammad Abdul Kadir

    Abstract: With the rapid advancement of technology, different biometric user authentication, and identification systems are emerging. Traditional biometric systems like face, fingerprint, and iris recognition, keystroke dynamics, etc. are prone to cyber-attacks and suffer from different disadvantages. Electroencephalography (EEG) based authentication has shown promise in overcoming these limitations. Howeve… ▽ More

    Submitted 25 June, 2021; v1 submitted 10 March, 2021; originally announced March 2021.

    Comments: 16 pages, 11 Figures, 7 tables

    Journal ref: IEEE Access ( Volume: 9), 94625 - 94643, 2021

  30. arXiv:2103.01322  [pdf, ps, other

    cs.CR

    Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare

    Authors: Shakila Zaman, Muhammad R. A. Khandaker, Risala T. Khan, Faisal Tariq, Kai-Kit Wong

    Abstract: The Internet-of-Things (IoT) is an emerging and cognitive technology which connects a massive number of smart physical devices with virtual objects operating in diverse platforms through the internet. IoT is increasingly being implemented in distributed settings, making footprints in almost every sector of our life. Unfortunately, for healthcare systems, the entities connected to the IoT networks… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Comments: Submitted to IEEE

  31. arXiv:2010.15908  [pdf, other

    cs.LG cond-mat.mtrl-sci

    Graph Neural Network for Metal Organic Framework Potential Energy Approximation

    Authors: Shehtab Zaman, Christopher Owen, Kenneth Chiu, Michael Lawler

    Abstract: Metal-organic frameworks (MOFs) are nanoporous compounds composed of metal ions and organic linkers. MOFs play an important role in industrial applications such as gas separation, gas purification, and electrolytic catalysis. Important MOF properties such as potential energy are currently computed via techniques such as density functional theory (DFT). Although DFT provides accurate results, it is… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: Accepted for presentation at the Machine Learning for Molecules Workshop at NeurIPS 2020

  32. A Case Study to Identify the Hindrances to Widespread Adoption of Electric Vehicles in Qatar

    Authors: Amith Khandakar, Annaufal Rizqullah, Anas Ashraf Abdou Berbar, Mohammad Rafi Ahmed, Atif Iqbal, Muhammad E. H. Chowdhury, S. M. Ashfaq Uz Zaman

    Abstract: The adoption of electric vehicles (EVs) have proven to be a crucial factor to decreasing the emission of greenhouse gases (GHG) into the atmosphere. However, there are various hurdles that impede people from purchasing EVs. For example, long charging time, short driving range, cost and insufficient charging infrastructures available, etc. This article reports the public perception of EV-adoption u… ▽ More

    Submitted 27 June, 2020; originally announced June 2020.

    Comments: 22 pages, 5 Figures, 5 tables

    Journal ref: Energies 2020, 13(15), 3994

  33. arXiv:1906.04286  [pdf

    physics.comp-ph cs.PF stat.ML

    Towards Run Time Estimation of the Gaussian Chemistry Code for SEAGrid Science Gateway

    Authors: Angel Beltre, Shehtab Zaman, Kenneth Chiu, Sudhakar Pamidighantam, Xingye Qiao, Madhusudhan Govindaraju

    Abstract: Accurate estimation of the run time of computational codes has a number of significant advantages for scientific computing. It is required information for optimal resource allocation, improving turnaround times and utilization of science gateways. Furthermore, it allows users to better plan and schedule their research, streamlining workflows and improving the overall productivity of cyberinfrastru… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

    Comments: 8 pages, 4 Figures, conference

    Report number: 126

    Journal ref: ACM, PEARC 2019

  34. arXiv:1904.12271  [pdf, other

    cs.CV eess.IV

    X-Ray Image Compression Using Convolutional Recurrent Neural Networks

    Authors: Asif Shahriyar Sushmit, Shakib Uz Zaman, Ahmed Imtiaz Humayun, Taufiq Hasan, Mohammed Imamul Hassan Bhuiyan

    Abstract: In the advent of a digital health revolution, vast amounts of clinical data are being generated, stored and processed on a daily basis. This has made the storage and retrieval of large volumes of health-care data, especially, high-resolution medical images, particularly challenging. Effective image compression for medical images thus plays a vital role in today's healthcare information system, par… ▽ More

    Submitted 9 May, 2019; v1 submitted 28 April, 2019; originally announced April 2019.

    Comments: 4 pages, 2 figures, IEEE BHI 2019

  35. arXiv:1904.04275  [pdf, other

    cond-mat.stat-mech cond-mat.dis-nn quant-ph

    Real-Space Visualization of Quantum Phase Transition by Network Topology

    Authors: Shehtab Zaman, Wei-Cheng Lee

    Abstract: We demonstrate that with appropriate quantum correlation function, a real-space network model can be constructed to study the phase transitions in quantum systems. For the three-dimensional bosonic system, the single-particle density matrix is adopted to construct the adjacency matrix. We show that the Bose-Einstein condensate transition can be interpreted as the transition into a small-world netw… ▽ More

    Submitted 11 July, 2019; v1 submitted 8 April, 2019; originally announced April 2019.

    Comments: 7 pages, 6 figures

    Journal ref: Phys. Rev. E 100, 012304 (2019)

  36. arXiv:1903.09483  [pdf, other

    hep-ex physics.ins-det

    First Results from the AMoRE-Pilot neutrinoless double beta decay experiment

    Authors: V. Alenkov, H. W. Bae, J. Beyer, R. S. Boiko, K. Boonin, O. Buzanov, N. Chanthima, M. K. Cheoun, D. M. Chernyak, J. S. Choe, S. Choi, F. A. Danevich, M. Djamal, D. Drung, C. Enss, A. Fleischmann, A. M. Gangapshev, L. Gastaldo, Yu. M. Gavriljuk, A. M. Gezhaev, V. D. Grigoryeva, V. I. Gurentsov, O. Gylova, C. Ha, D. H. Ha , et al. (84 additional authors not shown)

    Abstract: The Advanced Molybdenum-based Rare process Experiment (AMoRE) aims to search for neutrinoless double beta decay (0$νββ$) of $^{100}$Mo with $\sim$100 kg of $^{100}$Mo-enriched molybdenum embedded in cryogenic detectors with a dual heat and light readout. At the current, pilot stage of the AMoRE project we employ six calcium molybdate crystals with a total mass of 1.9 kg, produced from $^{48}$Ca-de… ▽ More

    Submitted 7 May, 2019; v1 submitted 22 March, 2019; originally announced March 2019.

  37. arXiv:1712.09582  [pdf, ps, other

    physics.plasm-ph

    Dust-acoustic rogue waves in an opposite polarity dusty plasma featuring non-extensive statistics

    Authors: D. M. S. Zaman, A. Mannan, A. A. Mamun

    Abstract: Modulational instability (MI) of dust acoustic waves (DAWs), which propagates in an opposite polarity dusty plasma system, containing inertial warm negatively and positively charged dust particles as well as non-extensive q-distributed elec- trons and ions, has been theoretically investigated. The nonlinear Schrodinger (NLS) equation is derived by employing the reductive perturbation method. The… ▽ More

    Submitted 27 December, 2017; originally announced December 2017.

    Comments: 13 pages; 8 figures

  38. Nucleus-acoustic solitons in self-gravitating magnetized quantum plasmas

    Authors: D. M. S. Zaman, M. Amina, A. A. Mamun

    Abstract: The basic properties of the nucleus-acoustic (NA) solitary waves (SWs) are investigated in a super-dense self-gravitating magnetized quantum plasma (SDSGMQP) system in the presence of an external magnetic field, whose constituents are the non-degenerate light (heavy) nuclei, and non/ultra-relativistically degenerate electrons. The Korteweg-de Vries (KdV) equation has been derived by employing the… ▽ More

    Submitted 7 October, 2017; originally announced October 2017.

    Comments: 8 figures

    Journal ref: J. Phys. Soc. Jpn. 87, 034502 (2018)

  39. arXiv:1208.5740  [pdf

    cs.CR

    A Review Study of NIST Statistical Test Suite: Development of an indigenous Computer Package

    Authors: J K M Sadique Uz Zaman, Ranjan Ghosh

    Abstract: A review study of NIST Statistical Test Suite is undertaken with a motivation to understand all its test algorithms and to write their C codes independently without looking at various sites mentioned in the NIST document. All the codes are tested with the test data given in the NIST document and excellent agreements have been found. The codes have been put together in a package executable in MS Wi… ▽ More

    Submitted 28 August, 2012; originally announced August 2012.

    Comments: 24 pages, 5 figures, 1 table

  40. arXiv:1205.1737  [pdf

    cs.AR

    A simple 1-byte 1-clock RC4 design and its efficient implementation in FPGA coprocessor for secured ethernet communication

    Authors: Rourab Paul, Sangeet Saha, Jkm Sadique Uz Zaman, Suman Das, Amlan Chakrabarti, Ranjan Ghosh

    Abstract: In the field of cryptography till date the 1-byte in 1-clock is the best known RC4 hardware design [1], while the 1-byte in 3clocks is the best known implementation [2,3]. The design algorithm in [1] considers two consecutive bytes together and processes them in 2 clocks. The design of 1-byte in 3-clocks is too much modular and clock hungry. In this paper considering the RC4 algorithm, as it is, a… ▽ More

    Submitted 27 July, 2012; v1 submitted 8 May, 2012; originally announced May 2012.

    Comments: Proceedings of National Workshop on Cryptology 2012 Organized by CRSI(http://crsind.com/),INDIA Held at VIT,INDIA (06.08.12 - 08.08.12)