Skip to main content

Showing 1–12 of 12 results for author: Chowdhury, M A

.
  1. arXiv:2406.12309  [pdf, ps, other

    eess.SY

    Adaptive Safe Reinforcement Learning-Enabled Optimization of Battery Fast-Charging Protocols

    Authors: Myisha A. Chowdhury, Saif S. S. Al-Wahaibi, Qiugang Lu

    Abstract: Optimizing charging protocols is critical for reducing battery charging time and decelerating battery degradation in applications such as electric vehicles. Recently, reinforcement learning (RL) methods have been adopted for such purposes. However, RL-based methods may not ensure system (safety) constraints, which can cause irreversible damages to batteries and reduce their lifetime. To this end,… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2406.01318  [pdf, ps, other

    gr-qc astro-ph.IM physics.space-ph

    Advancements in Glitch Subtraction Systems for Enhancing Gravitational Wave Data Analysis: A Brief Review

    Authors: Mohammad Abu Thaher Chowdhury

    Abstract: Glitches are transitory noise artifacts that degrade the detection sensitivity and accuracy of interferometric observatories such as LIGO and Virgo in gravitational wave astronomy. Reliable glitch subtraction techniques are essential for separating genuine gravitational wave signals from background noise and improving the accuracy of astrophysical investigations. This review study summarizes the m… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 8 pages

  3. arXiv:2405.12197  [pdf

    cs.CR

    Automated Hardware Logic Obfuscation Framework Using GPT

    Authors: Banafsheh Saber Latibari, Sujan Ghimire, Muhtasim Alam Chowdhury, Najmeh Nazari, Kevin Immanuel Gubbi, Houman Homayoun, Avesta Sasan, Soheil Salehi

    Abstract: Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process. The proposed framework accepts hardware design netlists and key… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  4. arXiv:2404.03606  [pdf, other

    cs.SD cs.AI cs.IR eess.AS

    Analyzing Musical Characteristics of National Anthems in Relation to Global Indices

    Authors: S M Rakib Hasan, Aakar Dhakal, Ms. Ayesha Siddiqua, Mohammad Mominur Rahman, Md Maidul Islam, Mohammed Arfat Raihan Chowdhury, S M Masfequier Rahman Swapno, SM Nuruzzaman Nobel

    Abstract: Music plays a huge part in sha** peoples' psychology and behavioral patterns. This paper investigates the connection between national anthems and different global indices with computational music analysis and statistical correlation analysis. We analyze national anthem musical data to determine whether certain musical characteristics are associated with peace, happiness, suicide rate, crime rate… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  5. arXiv:2312.13530  [pdf, other

    cs.CR cs.AI cs.LG

    HW-V2W-Map: Hardware Vulnerability to Weakness Map** Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

    Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi

    Abstract: The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is stil… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: 22 pages, 10 pages appendix, 10 figures, Submitted to ACM TODAES

  6. arXiv:2301.02398  [pdf, ps, other

    gr-qc astro-ph.IM

    Glitch subtraction from gravitational wave data using adaptive spline fitting

    Authors: Soumya D. Mohanty, Mohammad A. T. Chowdhury

    Abstract: Transient signals of instrumental and environmental origins ("glitches") in gravitational wave data elevate the false alarm rate of searches for astrophysical signals and reduce their sensitivity. Glitches that directly overlap astrophysical signals hinder their detection and worsen parameter estimation errors. As the fraction of data occupied by detectable astrophysical signals will be higher in… ▽ More

    Submitted 29 March, 2023; v1 submitted 6 January, 2023; originally announced January 2023.

    Comments: 17 pages, 7 figures, revised version (new figure added)

  7. arXiv:2210.02381  [pdf, other

    eess.SY

    A Novel Entropy-Maximizing TD3-based Reinforcement Learning for Automatic PID Tuning

    Authors: Myisha A. Chowdhury, Qiugang Lu

    Abstract: Proportional-integral-derivative (PID) controllers have been widely used in the process industry. However, the satisfactory control performance of a PID controller depends strongly on the tuning parameters. Conventional PID tuning methods require extensive knowledge of the system model, which is not always known especially in the case of complex dynamical systems. In contrast, reinforcement learni… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: 6 pages, 7 figures

  8. arXiv:2204.05929  [pdf, other

    cs.SE

    A Machine Learning Approach to Determine the Semantic Versioning Type of npm Packages Releases

    Authors: Rabe Abdalkareem, Md Atique Reza Chowdhury, Emad Shihab

    Abstract: Semantic versioning policy is widely used to indicate the level of changes in a package release. Unfortunately, there are many cases where developers do not respect the semantic versioning policy, leading to the breakage of dependent applications. To reduce such cases, we proposed using machine learning (ML) techniques to effectively predict the new release type, i.e., patch, minor, major, in orde… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: 19 pages, 2 figures, Journal

  9. arXiv:2112.15187  [pdf, other

    eess.SY

    Stability-Preserving Automatic Tuning of PID Control with Reinforcement Learning

    Authors: Ayub I. Lakhani, Myisha A. Chowdhury, Qiugang Lu

    Abstract: PID control has been the dominant control strategy in the process industry due to its simplicity in design and effectiveness in controlling a wide range of processes. However, traditional methods on PID tuning often require extensive domain knowledge and field experience. To address the issue, this work proposes an automatic PID tuning framework based on reinforcement learning (RL), particularly t… ▽ More

    Submitted 11 February, 2022; v1 submitted 30 December, 2021; originally announced December 2021.

    Comments: 9 figures, 3 table, 18 pages

  10. arXiv:2101.09541  [pdf, ps, other

    math.OC

    A Multiobjective Mathematical Model of Reverse Logistics for Inventory Management with Environmental Impacts: An Application in Industry

    Authors: M. Forkan. M. M. Rizvi, M. A. M. Chowdhury

    Abstract: We propose new mathematical models of inventory management in a reverse logistics system. The proposed models extend the model introduced by Nahmias and Rivera with the assumption that the demand for newly produced and repaired (remanufacturing) items are not the same. We derive two mathematical models and formulate unconstrained and constrained optimization problems to optimize the holding cost.… ▽ More

    Submitted 23 January, 2021; originally announced January 2021.

    Comments: Submitted

  11. Centralities for Networks with Consumable Resources

    Authors: Hayato Ushijima-Mwesigwa, Zadid Khan, Mashrur A. Chowdhury, Ilya Safro

    Abstract: Identification of influential nodes is an important step in understanding and controlling the dynamics of information, traffic and spreading processes in networks. As a result, a number of centrality measures have been proposed and used across different application domains. At the heart of many of these measures, lies an assumption describing the manner in which traffic (of information, social act… ▽ More

    Submitted 2 March, 2019; originally announced March 2019.

    Journal ref: Net Sci 7 (2019) 376-401

  12. arXiv:1704.01022  [pdf, ps, other

    math.OC

    Optimal Installation for Electric Vehicle Wireless Charging Lanes

    Authors: Hayato Ushijima-Mwesigwa, MD Zadid Khan, Mashrur A Chowdhury, Ilya Safro

    Abstract: Range anxiety, the persistent worry about not having enough battery power to complete a trip, remains one of the major obstacles to widespread electric-vehicle adoption. As cities look to attract more users to adopt electric vehicles, the emergence of wireless in-motion car charging technology presents itself as a solution to range anxiety. For a limited budget, cities could face the decision prob… ▽ More

    Submitted 12 August, 2018; v1 submitted 2 April, 2017; originally announced April 2017.