Skip to main content

Showing 1–24 of 24 results for author: Rahman, M H

  1. arXiv:2407.07452  [pdf

    cs.RO cs.AI

    Missile detection and destruction robot using detection algorithm

    Authors: Md Kamrul Siam, Shafayet Ahmed, Md Habibur Rahman, Amir Hossain Mollah

    Abstract: This research is based on the present missile detection technologies in the world and the analysis of these technologies to find a cost effective solution to implement the system in Bangladesh. The paper will give an idea of the missile detection technologies using the electro-optical sensor and the pulse doppler radar. The system is made to detect the target missile. Automatic detection and destr… ▽ More

    Submitted 11 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: 67 pages

  2. arXiv:2404.02840  [pdf, ps, other

    cs.DC

    A Survey on Error-Bounded Lossy Compression for Scientific Datasets

    Authors: Sheng Di, Jinyang Liu, Kai Zhao, Xin Liang, Robert Underwood, Zhaorui Zhang, Milan Shah, Yafan Huang, Jiajun Huang, Xiaodong Yu, Congrong Ren, Hanqi Guo, Grant Wilkins, Dingwen Tao, Jiannan Tian, Sian Jin, Zizhe Jian, Daoce Wang, MD Hasanur Rahman, Boyuan Zhang, Jon C. Calhoun, Guanpeng Li, Kazutomo Yoshii, Khalid Ayed Alharthi, Franck Cappello

    Abstract: Error-bounded lossy compression has been effective in significantly reducing the data storage/transfer burden while preserving the reconstructed data fidelity very well. Many error-bounded lossy compressors have been developed for a wide range of parallel and distributed use cases for years. These lossy compressors are designed with distinct compression models and design principles, such that each… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: submitted to ACM Computing journal, requited to be 35 pages including references

  3. arXiv:2402.18443  [pdf, other

    cs.LG cs.AI

    LeMo-NADe: Multi-Parameter Neural Architecture Discovery with LLMs

    Authors: Md Hafizur Rahman, Prabuddha Chakraborty

    Abstract: Building efficient neural network architectures can be a time-consuming task requiring extensive expert knowledge. This task becomes particularly challenging for edge devices because one has to consider parameters such as power consumption during inferencing, model size, inferencing speed, and CO2 emissions. In this article, we introduce a novel framework designed to automatically discover new neu… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: 19 pages, 5 figures, 10 tables and 3 algorithms

  4. arXiv:2402.01689  [pdf

    cs.CY

    Predictive Health Analysis in Industry 5.0: A Scientometric and Systematic Review of Motion Capture in Construction

    Authors: Md Hadisur Rahman, Md Rabiul Hasan, Nahian Ismail Chowdhury, Md Asif Bin Syed, Mst Ummul Farah

    Abstract: In an era of rapid technological advancement, the rise of Industry 4.0 has prompted industries to pursue innovative improvements in their processes. As we advance towards Industry 5.0, which focuses more on collaboration between humans and intelligent systems, there is a growing requirement for better sensing technologies for healthcare and safety purposes. Consequently, Motion Capture (MoCap) sys… ▽ More

    Submitted 22 January, 2024; originally announced February 2024.

  5. arXiv:2401.01374  [pdf

    cs.CR

    Taxonomy for Cybersecurity Threat Attributes and Countermeasures in Smart Manufacturing Systems

    Authors: Md Habibor Rahman, Rocco Cassandro, Thorsten Wuest, Mohammed Shafae

    Abstract: An attack taxonomy offers a consistent and structured classification scheme to systematically understand, identify, and classify cybersecurity threat attributes. However, existing taxonomies only focus on a narrow range of attacks and limited threat attributes, lacking a comprehensive characterization of manufacturing cybersecurity threats. There is little to no focus on characterizing threat acto… ▽ More

    Submitted 29 December, 2023; originally announced January 2024.

    Comments: 25 pages, 10 figures, The article is currently under review

  6. arXiv:2311.03636  [pdf

    cs.HC cs.AI cs.LG

    Analysis of the User Perception of Chatbots in Education Using A Partial Least Squares Structural Equation Modeling Approach

    Authors: Md Rabiul Hasan, Nahian Ismail Chowdhury, Md Hadisur Rahman, Md Asif Bin Syed, JuHyeong Ryu

    Abstract: The integration of Artificial Intelligence (AI) into education is a recent development, with chatbots emerging as a noteworthy addition to this transformative landscape. As online learning platforms rapidly advance, students need to adapt swiftly to excel in this dynamic environment. Consequently, understanding the acceptance of chatbots, particularly those employing Large Language Model (LLM) suc… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: Chatbot, ChatGPT, Google BARD, Interactive AI, PLS-SEM, Technology Acceptance Model, Technology Readiness Index

  7. arXiv:2306.07997  [pdf

    cs.CR cs.LG cs.NI

    Machine Learning Approach on Multiclass Classification of Internet Firewall Log Files

    Authors: Md Habibur Rahman, Taminul Islam, Md Masum Rana, Rehnuma Tasnim, Tanzina Rahman Mona, Md. Mamun Sakib

    Abstract: Firewalls are critical components in securing communication networks by screening all incoming (and occasionally exiting) data packets. Filtering is carried out by comparing incoming data packets to a set of rules designed to prevent malicious code from entering the network. To regulate the flow of data packets entering and leaving a network, an Internet firewall keeps a track of all activity. Whi… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: Accepted and presented in International Conference on Computational Intelligence and Sustainable Engineering (CISES-2023), 2022, 7 pages, 13 figures

  8. arXiv:2302.09629  [pdf, other

    cs.CV cs.LG

    BiofilmScanner: A Computational Intelligence Approach to Obtain Bacterial Cell Morphological Attributes from Biofilm Image

    Authors: Md Hafizur Rahman, Md Ali Azam, Md Abir Hossen, Shankarachary Ragi, Venkataramana Gadhamshetty

    Abstract: Desulfovibrio alaskensis G20 (DA-G20) is utilized as a model for sulfate-reducing bacteria (SRB) that are associated with corrosion issues caused by microorganisms. SRB-based biofilms are thought to be responsible for the billion-dollar-per-year bio-corrosion of metal infrastructure. Understanding the extraction of the bacterial cells' shape and size properties in the SRB-biofilm at different grow… ▽ More

    Submitted 24 July, 2023; v1 submitted 19 February, 2023; originally announced February 2023.

    Comments: Submitted to Pattern Recognition

  9. arXiv:2301.07305  [pdf

    cs.CR eess.SY math.OC

    Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment

    Authors: Md Habibor Rahman, Erfan Yazdandoost Hamedani, Young-Jun Son, Mohammed Shafae

    Abstract: Identifying, analyzing, and evaluating cybersecurity risks are essential to assess the vulnerabilities of modern manufacturing infrastructures and to devise effective decision-making strategies to secure critical manufacturing against potential cyberattacks. In response, this work proposes a graph-theoretic approach for risk modeling and assessment to address the lack of quantitative cybersecurity… ▽ More

    Submitted 4 October, 2023; v1 submitted 17 January, 2023; originally announced January 2023.

    Comments: 25 pages, 10 figures

    Journal ref: Journal of Computing and Information Science in Engineering, 1-23 (2023)

  10. Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

    Authors: Md Habibor Rahman, Thorsten Wuest, Mohammed Shafae

    Abstract: A thorough and systematic understanding of different elements of cyberattacks is essential for developing the necessary tools to prevent, detect, diagnose, and mitigate cyberattacks in manufacturing systems. In response, researchers have proposed several attack taxonomies as methods for recognizing and categorizing various cyberattack attributes. However, those taxonomies cover selected attack att… ▽ More

    Submitted 21 March, 2023; v1 submitted 17 January, 2023; originally announced January 2023.

    Comments: 19 pages, 4 figures

    Journal ref: Journal of Manufacturing Systems, 2023, volume 68, pp 196-208

  11. arXiv:2209.07498  [pdf, other

    cs.SD

    Detecting Synthetic Speech Manipulation in Real Audio Recordings

    Authors: Md Hafizur Rahman, Martin Graciarena, Diego Castan, Chris Cobo-Kroenke, Mitchell McLaren, Aaron Lawson

    Abstract: Recent advances in artificial speech and audio technologies have improved the abilities of deep-fake operators to falsify media and spread malicious misinformation. Anyone with limited coding skills can use freely available speech synthesis tools to create convincing simulations of influential speakers' voices with the malicious intent to distort the original message. With the latest technology, m… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Submitted to IEEE International Workshop on Information Forensics and Security (WIFS)

  12. BSpell: A CNN-Blended BERT Based Bangla Spell Checker

    Authors: Chowdhury Rafeed Rahman, MD. Hasibur Rahman, Samiha Zakir, Mohammad Rafsan, Mohammed Eunus Ali

    Abstract: Bangla typing is mostly performed using English keyboard and can be highly erroneous due to the presence of compound and similarly pronounced letters. Spelling correction of a misspelled word requires understanding of word typing pattern as well as the context of the word usage. A specialized BERT model named BSpell has been proposed in this paper targeted towards word for word correction in sente… ▽ More

    Submitted 31 December, 2023; v1 submitted 20 August, 2022; originally announced August 2022.

    Journal ref: Association for Computational Linguistics, 2023

  13. arXiv:2110.13032  [pdf, other

    cs.CL

    Paradigm Shift in Language Modeling: Revisiting CNN for Modeling Sanskrit Originated Bengali and Hindi Language

    Authors: Chowdhury Rafeed Rahman, MD. Hasibur Rahman, Mohammad Rafsan, Samiha Zakir, Mohammed Eunus Ali, Rafsanjani Muhammod

    Abstract: Though there has been a large body of recent works in language modeling (LM) for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bengali and Hindi. We propose an end to end trainable memory efficient CNN architecture named CoCNN to handle specific characteristics such as high inflection, morphological richness, flexible word order a… ▽ More

    Submitted 4 November, 2021; v1 submitted 25 October, 2021; originally announced October 2021.

  14. Hybrid Ant Swarm-Based Data Clustering

    Authors: Md Ali Azam, Abir Hossen, Md Hafizur Rahman

    Abstract: Biologically inspired computing techniques are very effective and useful in many areas of research including data clustering. Ant clustering algorithm is a nature-inspired clustering technique which is extensively studied for over two decades. In this study, we extend the ant clustering algorithm (ACA) to a hybrid ant clustering algorithm (hACA). Specifically, we include a genetic algorithm in sta… ▽ More

    Submitted 11 July, 2021; originally announced July 2021.

    Comments: Conference

    Journal ref: 2021 IEEE World AI IoT Congress (AIIoT)

  15. Software Process Improvement Based on Defect Prevention Using Capability and Testing Model Integration in Extreme Programming

    Authors: Md. Habibur Rahman, Ziaur Rahman, Md. Al - Mustanjid, Muhammad Shahin Uddin, Mehedy Hasan Rafsan Jany

    Abstract: Nowadays, Software Process Improvement popularly known as SPI has been able to receive an immense concern in the continuous process to purify software quality. Several Agile methodologies previously have worked with Extreme programming (XP). Before improving the process, defect prevention (DP) is inevitable. In addition, DP largely depends on defect detection either found earlier in the design and… ▽ More

    Submitted 11 July, 2021; originally announced July 2021.

    Comments: 10 Pages, 4 Figures, 2 Tables

    ACM Class: D.2.5; D.2.3; D.2.4; D.2.11

    Journal ref: 2021 LNICST, ICONCS, volume 325, 270-279

  16. arXiv:2012.15408  [pdf

    cs.LG

    Gated Ensemble of Spatio-temporal Mixture of Experts for Multi-task Learning in Ride-hailing System

    Authors: M. H. Rahman, S. M. Rifaat, S. N. Sadeek, M. Abrar, D. Wang

    Abstract: Ride-hailing system requires efficient management of dynamic demand and supply to ensure optimal service delivery, pricing strategies, and operational efficiency. Designing spatio-temporal forecasting models separately in a task-wise and city-wise manner to forecast demand and supply-demand gap in a ride-hailing system poses a burden for the expanding transportation network companies. Therefore, a… ▽ More

    Submitted 11 July, 2024; v1 submitted 30 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: text overlap with arXiv:2012.08868

  17. Using Spatio-temporal Deep Learning for Forecasting Demand and Supply-demand Gap in Ride-hailing System with Anonymised Spatial Adjacency Information

    Authors: M. H. Rahman, S. M. Rifaat

    Abstract: To reduce passenger waiting time and driver search friction, ride-hailing companies need to accurately forecast spatio-temporal demand and supply-demand gap. However, due to spatio-temporal dependencies pertaining to demand and supply-demand gap in a ride-hailing system, making accurate forecasts for both demand and supply-demand gap is a difficult task. Furthermore, due to confidentiality and pri… ▽ More

    Submitted 30 November, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: text overlap with arXiv:2012.15408

    Journal ref: IET Intelligent Transport Systems (2021)

  18. arXiv:2011.11136  [pdf

    cs.LG

    Predictive process mining by network of classifiers and clusterers: the PEDF model

    Authors: Amir Mohammad Esmaieeli Sikaroudi, Md Habibor Rahman

    Abstract: In this research, a model is proposed to learn from event log and predict future events of a system. The proposed PEDF model learns based on events' sequences, durations, and extra features. The PEDF model is built by a network made of standard clusterers and classifiers, and it has high flexibility to update the model iteratively. The model requires to extract two sets of data from log files i.e.… ▽ More

    Submitted 22 November, 2020; originally announced November 2020.

  19. arXiv:2003.03484  [pdf

    cs.CL

    Synthetic Error Dataset Generation Mimicking Bengali Writing Pattern

    Authors: Md. Habibur Rahman Sifat, Chowdhury Rafeed Rahman, Mohammad Rafsan, Md. Hasibur Rahman

    Abstract: While writing Bengali using English keyboard, users often make spelling mistakes. The accuracy of any Bengali spell checker or paragraph correction module largely depends on the kind of error dataset it is based on. Manual generation of such error dataset is a cumbersome process. In this research, We present an algorithm for automatic misspelled Bengali word generation from correct word through an… ▽ More

    Submitted 21 May, 2020; v1 submitted 6 March, 2020; originally announced March 2020.

  20. arXiv:1912.00127  [pdf, other

    cs.CL cs.IR cs.LG stat.ML

    A Hybrid Approach Towards Two Stage Bengali Question Classification Utilizing Smart Data Balancing Technique

    Authors: Md. Hasibur Rahman, Chowdhury Rafeed Rahman, Ruhul Amin, Md. Habibur Rahman Sifat, Afra Anika

    Abstract: Question classification (QC) is the primary step of the Question Answering (QA) system. Question Classification (QC) system classifies the questions in particular classes so that Question Answering (QA) System can provide correct answers for the questions. Our system categorizes the factoid type questions asked in natural language after extracting features of the questions. We present a two stage… ▽ More

    Submitted 2 March, 2020; v1 submitted 29 November, 2019; originally announced December 2019.

  21. arXiv:1911.03059  [pdf, other

    cs.CL

    A Comprehensive Comparison of Machine Learning Based Methods Used in Bengali Question Classification

    Authors: Afra Anika, Md. Hasibur Rahman, Salekul Islam, Abu Shafin Mohammad Mahdee Jameel, Chowdhury Rafeed Rahman

    Abstract: QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and computational complexity) among some machine learning based approaches used in QC for… ▽ More

    Submitted 19 November, 2019; v1 submitted 8 November, 2019; originally announced November 2019.

  22. arXiv:1910.11916  [pdf, other

    cs.NI

    Minus HELLO: HELLO Devoid Protocols for Energy Preservation in Mobile Ad Hoc Networks

    Authors: Anuradha Banerjee, Abu Sufian, Paramartha Dutta, M M Hafizur Rahman

    Abstract: In mobile ad-hoc networks, nodes have to transmit HELLO or Route Maintenance messages at regular intervals, and all nodes residing within its radio range, reply with an acknowledgment message informing their node identifier, current location, and radio-range. Regular transmitting these messages consume a significant amount of battery power in nodes, especially when the set of down-link neighbors d… ▽ More

    Submitted 8 September, 2020; v1 submitted 25 October, 2019; originally announced October 2019.

    Comments: 33 pages, 20 figures, pre-print of under review manuscript

  23. BDNet: Bengali Handwritten Numeral Digit Recognition based on Densely connected Convolutional Neural Networks

    Authors: A. Sufian, Anirudha Ghosh, Avijit Naskar, Farhana Sultana, Jaya Sil, M M Hafizur Rahman

    Abstract: Images of handwritten digits are different from natural images as the orientation of a digit, as well as similarity of features of different digits, makes confusion. On the other hand, deep convolutional neural networks are achieving huge success in computer vision problems, especially in image classification. BDNet is a densely connected deep convolutional neural network model used to classify (r… ▽ More

    Submitted 12 March, 2020; v1 submitted 9 June, 2019; originally announced June 2019.

    Comments: 23 pages, 11 figures, 7 tables, Accepted Manuscript. Journal of King Saud University - Computer and Information Sciences (2019)

    Journal ref: Journal of King Saud University - Computer and Information Sciences, Elsevier, Online, 2020

  24. arXiv:1405.2417  [pdf

    cs.NI

    Impact of Two Realistic Mobility Models for Vehicular Safety Applications

    Authors: Md Habibur Rahman, Mohammad Nasiruddin

    Abstract: Vehicular safety applications intended for VANETs. It can be separated by inter-vehicle communication. It is needed for a vehicle can travel safety with high velocity and must interconnect quickly dependably. In this work, examined the impact of the IDM-IM and IDM-LC mobility model on AODV, AOMDV, DSDV and OLSR routing protocol using Nakagami propagation model and IEEE 802.11p MAC protocol in a pa… ▽ More

    Submitted 10 May, 2014; originally announced May 2014.

    Comments: 6 pages, 9 figures, ICIEV 2014

    MSC Class: 68Uxx ACM Class: C.2.6

    Journal ref: 3rd International Conference on Informatics, Electronics & Vision (ICIEV 2014)