Skip to main content

Showing 1–36 of 36 results for author: Hashem, M

.
  1. arXiv:2309.01771  [pdf, other

    cs.AR cs.LG

    ADC/DAC-Free Analog Acceleration of Deep Neural Networks with Frequency Transformation

    Authors: Nastaran Darabi, Maeesha Binte Hashem, Hongyi Pan, Ahmet Cetin, Wilfred Gomes, Amit Ranjan Trivedi

    Abstract: The edge processing of deep neural networks (DNNs) is becoming increasingly important due to its ability to extract valuable information directly at the data source to minimize latency and energy consumption. Frequency-domain model compression, such as with the Walsh-Hadamard transform (WHT), has been identified as an efficient alternative. However, the benefits of frequency-domain processing are… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  2. arXiv:2307.07631  [pdf, other

    cs.LG

    Towards Model-Size Agnostic, Compute-Free, Memorization-based Inference of Deep Learning

    Authors: Davide Giacomini, Maeesha Binte Hashem, Jeremiah Suarez, Swarup Bhunia, Amit Ranjan Trivedi

    Abstract: The rapid advancement of deep neural networks has significantly improved various tasks, such as image and speech recognition. However, as the complexity of these models increases, so does the computational cost and the number of parameters, making it difficult to deploy them on resource-constrained devices. This paper proposes a novel memorization-based inference (MBI) that is compute free and onl… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  3. arXiv:2307.03863  [pdf, other

    cs.AR cs.LG

    Memory-Immersed Collaborative Digitization for Area-Efficient Compute-in-Memory Deep Learning

    Authors: Shamma Nasrin, Maeesha Binte Hashem, Nastaran Darabi, Benjamin Parpillon, Farah Fahim, Wilfred Gomes, Amit Ranjan Trivedi

    Abstract: This work discusses memory-immersed collaborative digitization among compute-in-memory (CiM) arrays to minimize the area overheads of a conventional analog-to-digital converter (ADC) for deep learning inference. Thereby, using the proposed scheme, significantly more CiM arrays can be accommodated within limited footprint designs to improve parallelism and minimize external memory accesses. Under t… ▽ More

    Submitted 7 July, 2023; originally announced July 2023.

  4. arXiv:1804.02112  [pdf, other

    cs.DS

    Red-Black Trees with Constant Update Time

    Authors: Amr Elmasry, Mostafa Kahla, Fady Ahdy, Mahmoud Hashem

    Abstract: We show how a few modifications to the red-black trees allow for $O(1)$ worst-case update time (once the position of the inserted or deleted element is known). The resulting structure is based on relaxing some of the properties of the red-black trees while guaranteeing that the height remains logarithmic with respect to the number of nodes. Compared to the other search trees with constant update t… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  5. Securely Outsourcing Large Scale Eigen Value Problem to Public Cloud

    Authors: Jarin Firose Moon, Shamminuj Aktar, M. M. A. Hashem

    Abstract: Cloud computing enables clients with limited computational power to economically outsource their large scale computations to a public cloud with huge computational power. Cloud has the massive storage, computational power and software which can be used by clients for reducing their computational overhead and storage limitation. But in case of outsourcing, privacy of client's confidential data must… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

    Journal ref: Computer and Information Technology (ICCIT), 2015 18th International Conference on

  6. Android Assistant EyeMate for Blind and Blind Tracker

    Authors: Md. Siddiqur Rahman Tanveer, M. M. A. Hashem, Md. Kowsar Hossain

    Abstract: At present many blind assistive systems have been implemented but there is no such kind of good system to navigate a blind person and also to track the movement of a blind person and rescue him/her if he/she is lost. In this paper, we have presented a blind assistive and tracking embedded system. In this system the blind person is navigated through a spectacle interfaced with an android applicatio… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

    Comments: arXiv admin note: text overlap with arXiv:1611.09480 by other author

    Journal ref: 2015 18th International Conference on Computer and Information Technology (ICCIT)

  7. arXiv:1403.6260  [pdf

    cs.CV

    Capturing and Recognizing Objects Appearance Employing Eigenspace

    Authors: M. Ashrafuzzaman, M. M . Rahman, M. M. A. Hashem

    Abstract: This paper presents a method of capturing objects appearances from its environment and it also describes how to recognize unknown appearances creating an eigenspace. This representation and recognition can be done automatically taking objects various appearances by using robotic vision from a defined environment. This technique also allows extracting objects from some sort of complicated scenes. I… ▽ More

    Submitted 25 March, 2014; originally announced March 2014.

    Journal ref: Procs. Of the 5th International Conference on Computer & Information Technology (ICCIT 2002), pp. 434-436, Dhaka, Bangladesh, December 27-28, (2002)

  8. arXiv:1305.0922  [pdf

    cs.NE cs.LG

    On Comparison between Evolutionary Programming Network-based Learning and Novel Evolution Strategy Algorithm-based Learning

    Authors: M. A. Khayer Azad, Md. Shafiqul Islam, M. M. A. Hashem

    Abstract: This paper presents two different evolutionary systems - Evolutionary Programming Network (EPNet) and Novel Evolutions Strategy (NES) Algorithm. EPNet does both training and architecture evolution simultaneously, whereas NES does a fixed network and only trains the network. Five mutation operators proposed in EPNet to reflect the emphasis on evolving ANNs behaviors. Close behavioral links between… ▽ More

    Submitted 4 May, 2013; originally announced May 2013.

    Journal ref: Procs. of the 3rd International Conference on Electrical, Electronics and Computer Engineering (ICEECE 2003), pp. 213-218, Dhaka, Bangladesh, December 22-24, (2003)

  9. On Integrating Fuzzy Knowledge Using a Novel Evolutionary Algorithm

    Authors: Nafisa Afrin Chowdhury, Murshida Khatun, M. M. A. Hashem

    Abstract: Fuzzy systems may be considered as knowledge-based systems that incorporates human knowledge into their knowledge base through fuzzy rules and fuzzy membership functions. The intent of this study is to present a fuzzy knowledge integration framework using a Novel Evolutionary Strategy (NES), which can simultaneously integrate multiple fuzzy rule sets and their membership function sets. The propose… ▽ More

    Submitted 27 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the IEEE 10th International Conference on Computer & Information Technology (ICCIT 2007), pp. 38-43, Dhaka, Bangladesh, December 27-29, (2007)

  10. arXiv:1304.6809  [pdf

    cs.DC cs.CR

    A New Trusted and E-Commerce Architecture for Cloud Computing

    Authors: Kawser Wazed Nafi, Tonny Shekha Kar, Amjad Hossain, M. M. A Hashem

    Abstract: Cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. Presently, different types of internet based systems are running in Cloud Computing environment. E-commerce is one of them. Present models are not secured enough for executi… ▽ More

    Submitted 25 April, 2013; originally announced April 2013.

    Comments: Accepted for publication in the Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013). arXiv admin note: substantial text overlap with arXiv:1304.4028

    Journal ref: Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013)

  11. A Fuzzy Logic Based Certain Trust Model for E-Commerce

    Authors: Kawser Wazed Nafi, Tonny Shekha Kar, Amjad Hossain, M. M. A Hashem

    Abstract: Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. There are many successful E-commerce organizations presently run in the whole world, but E-commerce has not reached its full potential. The main reason behind this is lack of Trust of people in e-commerce. Again, proper models are still absent for calculating trust of different… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: Accepted for the Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013)

    Journal ref: Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013)

  12. arXiv:1304.3792  [pdf

    cs.NE

    Solving Linear Equations Using a Jacobi Based Time-Variant Adaptive Hybrid Evolutionary Algorithm

    Authors: A. R. M. Jalal Uddin Jamali, M. M. A. Hashem, Md. Bazlar Rahman

    Abstract: Large set of linear equations, especially for sparse and structured coefficient (matrix) equations, solutions using classical methods become arduous. And evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of classical methods (Jacobi method and Gauss-Seidel method) with evolutionary computation techniques have successfully bee… ▽ More

    Submitted 13 April, 2013; originally announced April 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1304.3200, arXiv:1304.2097

    Journal ref: Procs. of the 7th International Conference on Computer & Information Technology (ICCIT 2004), pp. 688-693, Dhaka, Bangladesh, December 26-28, (2004)

  13. arXiv:1304.3763  [pdf

    cs.AI cs.DS cs.NE

    An Improved ACS Algorithm for the Solutions of Larger TSP Problems

    Authors: Md. Rakib Hassan, Md. Kamrul Hasan, M. M. A. Hashem

    Abstract: Solving large traveling salesman problem (TSP) in an efficient way is a challenging area for the researchers of computer science. This paper presents a modified version of the ant colony system (ACS) algorithm called Red-Black Ant Colony System (RB-ACS) for the solutions of TSP which is the most prominent member of the combinatorial optimization problem. RB-ACS uses the concept of ant colony syste… ▽ More

    Submitted 12 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 3rd International Conference on Electrical, Electronics and Computer Engineering (ICEECE 2003), pp. 201-206, Dhaka, Bangladesh, December 22-24, (2003)

  14. arXiv:1304.3200  [pdf

    cs.NE math.NA

    An Approach to Solve Linear Equations Using a Time-Variant Adaptation Based Hybrid Evolutionary Algorithm

    Authors: A. R. M. Jalal Uddin Jamali, M. M. A. Hashem, Md. Bazlar Rahman

    Abstract: For small number of equations, systems of linear (and sometimes nonlinear) equations can be solved by simple classical techniques. However, for large number of systems of linear (or nonlinear) equations, solutions using classical method become arduous. On the other hand evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of evo… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: arXiv admin note: text overlap with arXiv:1304.2097

    Journal ref: Jahangirnagar University Journal of Science, Bangladesh, Vol. 27, pp. 277-289, (2004)

  15. arXiv:1304.3183  [pdf

    cs.NI

    Characterization of Downlink Transmit Power Control during Soft Handover in WCDMA Systems

    Authors: Palash Gupta, Hussain Mohammed, M. M. A. Hashem

    Abstract: This paper presents the characterization of power control in WCDMA systems. We know that CDMA is an interference limited system. It is shown that the unbalance scheme is reliable and successful for both 2-way and 3-way soft handover. Unbalance scheme minimizes interference and speed up the soft handover algorithm to support more users quickly. Furthermore it requires minimum time to make decision… ▽ More

    Submitted 10 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 9th International Conference on Computer and Information Technology (ICCIT 2006), pp. 448-452, Dhaka, Bangladesh, December 21-23, (2006)

  16. arXiv:1304.2867  [pdf

    cs.NI cs.DB

    Guidelines to the Problem of Location Management and Database Architecture for the Next Generation Mobile Networks

    Authors: Md. Mamun Ali Sarker, Md. Ashraf Hossain Khan, M. M. A. Hashem

    Abstract: In near future, anticipated large number of mobile users may introduce very large centralized databases and increase end-to-end delays in location registration and call delivery on HLR-VLR database and will become infeasible. After observing several problems we propose some guidelines. Multitree distributed database, high throughput index structure, memory oriented database organization are used.… ▽ More

    Submitted 10 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the International Conference on Computer and Communication Engineering (ICCCE 06), Vol. II, pp. 761-766, Kuala Lumpur, Malaysia, May 9-11, (2006)

  17. arXiv:1304.2545  [pdf

    cs.NE math.NA

    For Solving Linear Equations Recombination is a Needless Operation in Time-Variant Adaptive Hybrid Algorithms

    Authors: A. R. M. Jalal Uddin Jamali, Mohammad Arif Hossain, G. M. Moniruzzaman, M. M. A. Hashem

    Abstract: Recently hybrid evolutionary computation (EC) techniques are successfully implemented for solving large sets of linear equations. All the recently developed hybrid evolutionary algorithms, for solving linear equations, contain both the recombination and the mutation operations. In this paper, two modified hybrid evolutionary algorithms contained time-variant adaptive evolutionary technique are pro… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 8th International Conference on Computer & Information Technology (ICCIT 2005), pp. 23-28, Dhaka, Bangladesh, December 28-30, (2005)

  18. A New Distributed Evolutionary Computation Technique for Multi-Objective Optimization

    Authors: Md. Asadul Islam, G. M. Mashrur-E-Elahi, M. M. A. Hashem

    Abstract: Now-a-days, it is important to find out solutions of Multi-Objective Optimization Problems (MOPs). Evolutionary Strategy helps to solve such real world problems efficiently and quickly. But sequential Evolutionary Algorithms (EAs) require an enormous computation power to solve such problems and it takes much time to solve large problems. To enhance the performance for solving this type of problems… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the IEEE International Conference on Computer and Communication Engineering (ICCCE10), pp. 31-36, Kuala Lumpur, Malaysia, May 11-13, (2010)

  19. arXiv:1304.2538  [pdf

    cs.AI cs.IR

    On Appropriate Selection of Fuzzy Aggregation Operators in Medical Decision Support System

    Authors: K. M. Motahar Hossain, Zahir Raihan, M. M. A. Hashem

    Abstract: The Decision Support System (DSS) contains more than one antecedent and the degrees of strength of the antecedents need to be combined to determine the overall strength of the rule consequent. The membership values of the linguistic variables in Fuzzy have to be combined using an aggregation operator. But it is not feasible to predefine the form of aggregation operators in decision making. Instead… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 8th International Conference on Computer & Information Technology (ICCIT 2005), pp. 563-568, Dhaka, Bangladesh, December 28-30, (2005)

  20. Corpus-based Web Document Summarization using Statistical and Linguistic Approach

    Authors: Rushdi Shams, M. M. A. Hashem, Afrina Hossain, Suraiya Rumana Akter, Monika Gope

    Abstract: Single document summarization generates summary by extracting the representative sentences from the document. In this paper, we presented a novel technique for summarization of domain-specific text from a single web document that uses statistical and linguistic analysis on the text in a reference corpus and the web document. The proposed summarizer uses the combinational function of Sentence Weigh… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the IEEE International Conference on Computer and Communication Engineering (ICCCE10), pp. 115-120, Kuala Lumpur, Malaysia, May 11-13, (2010)

  21. Design and Development of a Heart Rate Measuring Device using Fingertip

    Authors: M. M. A. Hashem, Rushdi Shams, Md. Abdul Kader, Md. Abu Sayed

    Abstract: In this paper, we presented the design and development of a new integrated device for measuring heart rate using fingertip to improve estimating the heart rate. As heart related diseases are increasing day by day, the need for an accurate and affordable heart rate measuring device or heart monitor is essential to ensure quality of health. However, most heart rate measuring tools and environments a… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the IEEE International Conference on Computer and Communication Engineering (ICCCE10), pp. 197-201, Kuala Lumpur, Malaysia, May 11-13, (2010)

  22. arXiv:1304.2467  [pdf

    cs.NE

    Evolutionary Design of Digital Circuits Using Genetic Programming

    Authors: S. M. Ashik Eftekhar, Sk. Mahbub Habib, M. M. A. Hashem

    Abstract: For simple digital circuits, conventional method of designing circuits can easily be applied. But for complex digital circuits, the conventional method of designing circuits is not fruitfully applicable because it is time-consuming. On the contrary, Genetic Programming is used mostly for automatic program generation. The modern approach for designing Arithmetic circuits, commonly digital circuits,… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 3rd International Conference on Electrical, Electronics and Computer Engineering (ICEECE 2003), pp. 231-236, Dhaka, Bangladesh, December 22-24, (2003)

  23. arXiv:1304.2112  [pdf

    cs.NI cs.DS

    A Probabilistic Algorithm for Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

    Authors: Md. Nazrul Islam, M. M. A. Hashem, A. M. Moshiur Rahman

    Abstract: In a wired network, a packet can be transmitted to a specified destination only, no broadcasting required. But in ad hoc wireless network a packet transmitted by a node can reach all neighbors due to broadcasting. This broadcasting introduces unnecessary retransmissions of same message. Therefore, the total number of transmissions (forward nodes) is generally used as the cost criterion for broadca… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 8th International Conference on Computer & Information Technology (ICCIT 2005), pp. 752-757, Dhaka, Bangladesh, December 28-30, (2005)

  24. arXiv:1304.2110  [pdf

    cs.DS cs.AR

    An Improved GEF Fast Addition Algorithm

    Authors: Md. Mizanur Rahman, Md. Shahadat Hossain, Md. Rakib Hasan, M. M. A. Hashem

    Abstract: In this paper, an improved GEF fast addition algorithm is proposed. The proposed algorithm reduces time and memory space. In this algorithm, carry is calculated on the basis of arrival timing of the operand's bits without overhead of sorting. Intermediate terms are generated from the most significant bit and the carry is generated from the least significant bit using the functions of efficient ope… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 3rd International Conference on Electrical and Computer Engineering (ICECE 2004), pp. 613-616, Dhaka, Bangladesh, December 28-30, (2004)

  25. arXiv:1304.2109  [pdf

    cs.CV

    Automatic Fingerprint Recognition Using Minutiae Matching Technique for the Large Fingerprint Database

    Authors: S. M. Mohsen, S. M. Zamshed Farhan, M. M. A. Hashem

    Abstract: Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification system. Because minutiae matching are certainly the most well-known and widely used method for fingerprint matching, minutiae are local discontinuities in the fingerprint pattern. In this paper a fingerprint matching algorithm is proposed using some specific feature of the minutia… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 3rd International Conference on Electrical and Computer Engineering (ICECE 2004), pp. 116-119, Dhaka, Bangladesh, December 28-30, (2004)

  26. arXiv:1304.2097  [pdf

    cs.NE math.NA

    Solving Linear Equations by Classical Jacobi-SR Based Hybrid Evolutionary Algorithm with Uniform Adaptation Technique

    Authors: R. M. Jalal Uddin Jamali, M. M. A. Hashem, M. Mahfuz Hasan, Md. Bazlar Rahman

    Abstract: Solving a set of simultaneous linear equations is probably the most important topic in numerical methods. For solving linear equations, iterative methods are preferred over the direct methods especially when the coefficient matrix is sparse. The rate of convergence of iteration method is increased by using Successive Relaxation (SR) technique. But SR technique is very much sensitive to relaxation… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    Comments: 14 Pages, 5 Figures and 7 Tables

    Journal ref: Journal of Engineering Science, Vol. 1, No. 2, pp. 11-24, [ISSN: 2075-4914](2010)

  27. Development of a Device for Remote Monitoring of Heart Rate and Body Temperature

    Authors: Mohammad Ashekur Rahman, Atanu Barai, Md. Asadul Islam, M. M. A Hashem

    Abstract: We present a new integrated, portable device to provide a convenient solution for remote monitoring heart rate at the fingertip and body temperature using Ethernet technology and widely spreading internet. Now a days, heart related disease is rising. Most of the times in these cases, patients may not realize their actual conditions and even it is a common fact that there are no doctors by their si… ▽ More

    Submitted 31 March, 2013; originally announced April 2013.

    Journal ref: Procs. of the IEEE 2012 15th International Conference on Computer & Information Technology (ICCIT 2012), pp.411-416, Chittagong, Bangladesh, December 22-24, (2012)

  28. A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory with Arithmetic Crossover

    Authors: Md. Amjad Hossain, Md. Kawser Hossain, M. M. A. Hashem

    Abstract: This paper proposes a generalized Hybrid Real-coded Quantum Evolutionary Algorithm (HRCQEA) for optimizing complex functions as well as combinatorial optimization. The main idea of HRCQEA is to devise a new technique for mutation and crossover operators. Using the evolutionary equation of PSO a Single-Multiple gene Mutation (SMM) is designed and the concept of Arithmetic Crossover (AC) is used in… ▽ More

    Submitted 5 March, 2013; originally announced March 2013.

    Comments: http://airccse.org/journal/jcsit/0810ijcsit15.pdf

    Journal ref: International Journal of Computers Science and Information Technology (IJCSIT), Vol. 2, No. 4, pp.172-187, (2010)

  29. arXiv:1303.0598  [pdf

    cs.DC cs.CR

    A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture

    Authors: Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, M. M. A. Hashem

    Abstract: The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures se… ▽ More

    Submitted 3 March, 2013; originally announced March 2013.

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No. 10, pp. 181-186, [ISSN: 2156-5570] (2012)

  30. arXiv:1303.0464  [pdf

    cs.NI

    On Performance Analysis of AMBR Protocol in Mobile Ad Hoc Networks

    Authors: Tanay Dey, M. M. A. Hashem, Subroto Kumar Mondal

    Abstract: Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Anal… ▽ More

    Submitted 3 March, 2013; originally announced March 2013.

    Journal ref: IIUM Engineering Journal, Vol 11, No.2, pp.240-254, [ISSN: 1511-788X] (2010)

  31. Distributed Evolutionary Computation: A New Technique for Solving Large Number of Equations

    Authors: Moslema Jahan, M. M. A. Hashem, Gazi Abdullah Shahriar

    Abstract: Evolutionary computation techniques have mostly been used to solve various optimization and learning problems successfully. Evolutionary algorithm is more effective to gain optimal solution(s) to solve complex problems than traditional methods. In case of problems with large set of parameters, evolutionary computation technique incurs a huge computational burden for a single processing unit. Takin… ▽ More

    Submitted 3 March, 2013; originally announced March 2013.

    Journal ref: International Journal of Parallel and Distributed Systems (IJPDS), Vol. 2, No.6, pp.31-49,(2011)

  32. arXiv:1303.0459  [pdf

    cs.CR

    An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory

    Authors: Kawser Wazed Nafi, Tonny Shekha kar, Amjad Hossain, M. M. A Hashem

    Abstract: Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. Certain Trust Model depends on some certain values given by experts and developers. Here, main parameters for calculating trust are certainty and average rating. In this paper we have proposed an Extension of Certain Trust Model, mainly the representation portion based on probab… ▽ More

    Submitted 3 March, 2013; originally announced March 2013.

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No. 12, pp. 164-173, [ISSN: 2156-5570] (2012)

  33. arXiv:1204.2242  [pdf

    cs.NI

    Performance Enhancement of Ad Hoc Networks with Janitor Based Routing

    Authors: Isnain Siddique, Rushdi Shams, M. M. A. Hashem

    Abstract: We propose and analyze a new on the fly strategy that discovers, repairs and maintains routes in hierarchical and distributed fashion called Janitor Based Routing (JBR). The main motivation behind our JBR protocol is to decrease flooding and routing overhead and increase efficiencies in packet movement. An analytical model for the proposed JBR is presented and detailed simulation is used to observ… ▽ More

    Submitted 10 April, 2012; originally announced April 2012.

    Journal ref: 1st IEEE International Conference on Computer and Communication Engineering (ICCCE2006)

  34. Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Authors: Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem

    Abstract: Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low c… ▽ More

    Submitted 25 May, 2010; originally announced May 2010.

    Comments: 11 Pages, IJNSA

    Journal ref: International Journal of Network Security & Its Applications 2.2 (2010) 27-37

  35. arXiv:1004.1237   

    cs.CR

    Lightweight Distance bound Protocol for Low Cost RFID Tags

    Authors: Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem

    Abstract: Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a prom… ▽ More

    Submitted 7 May, 2010; v1 submitted 7 April, 2010; originally announced April 2010.

    Comments: Results in paper questionable. Article withdrawn by authors.

    Journal ref: IJCSIS, Vol. 7 No. 3, March 2010

  36. arXiv:1002.2222  [pdf

    cs.DC cs.DS

    An innovative platform to improve the performance of exact string matching algorithms

    Authors: Mosleh M. Abu Alhaj, M. Halaiyqah, Muhannad A. Abu Hashem, Adnan A. Hnaif, O. Abouabdalla, Ahmed M. Manasrah

    Abstract: Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform… ▽ More

    Submitted 11 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 280-283, January 2010, USA