Skip to main content

Showing 1–19 of 19 results for author: Kabir, S

.
  1. arXiv:2406.12931  [pdf, other

    eess.AS cs.CL cs.SD

    Automatic Speech Recognition for Biomedical Data in Bengali Language

    Authors: Shariar Kabir, Nazmun Nahar, Shyamasree Saha, Mamunur Rashid

    Abstract: This paper presents the development of a prototype Automatic Speech Recognition (ASR) system specifically designed for Bengali biomedical data. Recent advancements in Bengali ASR are encouraging, but a lack of domain-specific data limits the creation of practical healthcare ASR models. This project bridges this gap by develo** an ASR system tailored for Bengali medical terms like symptoms, sever… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  2. Deep learning in computed tomography pulmonary angiography imaging: a dual-pronged approach for pulmonary embolism detection

    Authors: Fabiha Bushra, Muhammad E. H. Chowdhury, Rusab Sarmun, Saidul Kabir, Menatalla Said, Sohaib Bassam Zoghoul, Adam Mushtak, Israa Al-Hashimi, Abdulrahman Alqahtani, Anwarul Hasan

    Abstract: The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effective… ▽ More

    Submitted 5 January, 2024; v1 submitted 9 November, 2023; originally announced November 2023.

    Comments: Published in Expert Systems With Applications

    Journal ref: Expert Systems With Applications, Volume 245, 1 July 2024, 123029

  3. Is Stack Overflow Obsolete? An Empirical Study of the Characteristics of ChatGPT Answers to Stack Overflow Questions

    Authors: Samia Kabir, David N. Udo-Imeh, Bonan Kou, Tianyi Zhang

    Abstract: Q&A platforms have been crucial for the online help-seeking behavior of programmers. However, the recent popularity of ChatGPT is altering this trend. Despite this popularity, no comprehensive study has been conducted to evaluate the characteristics of ChatGPT's answers to programming questions. To bridge the gap, we conducted the first in-depth analysis of ChatGPT answers to 517 programming quest… ▽ More

    Submitted 7 February, 2024; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: This paper has been conditionally accepted for the CHI Conference on Human Factors in Computing Systems (CHI'24). The new version of this paper has been modified with updated discussions to address more stakeholders

  4. arXiv:2306.13899  [pdf, other

    cs.CL cs.AI

    Math Word Problem Solving by Generating Linguistic Variants of Problem Statements

    Authors: Syed Rifat Raiyan, Md. Nafis Faiyaz, Shah Md. Jawad Kabir, Mohsinul Kabir, Hasan Mahmud, Md Kamrul Hasan

    Abstract: The art of mathematical reasoning stands as a fundamental pillar of intellectual progress and is a central catalyst in cultivating human ingenuity. Researchers have recently published a plethora of works centered around the task of solving Math Word Problems (MWP) $-$ a crucial stride towards general AI. These existing models are susceptible to dependency on shallow heuristics and spurious correla… ▽ More

    Submitted 24 June, 2023; originally announced June 2023.

    Comments: Accepted in Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics: Student Research Workshop (ACL-SRW 2023), 17 pages, 2 figures, 7 tables

  5. arXiv:2211.13258  [pdf, other

    cs.AI cs.RO eess.SY

    Online Dynamic Reliability Evaluation of Wind Turbines based on Drone-assisted Monitoring

    Authors: Sohag Kabir, Koorosh Aslansefat, Prosanta Gope, Felician Campean, Yiannis Papadopoulos

    Abstract: The offshore wind energy is increasingly becoming an attractive source of energy due to having lower environmental impact. Effective operation and maintenance that ensures the maximum availability of the energy generation process using offshore facilities and minimal production cost are two key factors to improve the competitiveness of this energy source over other traditional sources of energy. C… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: A modified version of this work has been published in the 2022 International Conference on Computing, Electronics & Communications Engineering (iCCECE). This work is a draft author version

  6. All-electrical spin-to-charge conversion in sputtered Bi$_x$Se$_{1-x}$

    Authors: Won Young Choi, Isabel C. Arango, Van Tuong Pham, Diogo C. Vaz, Haozhe Yang, Inge Groen, Chia-Ching Lin, Emily S. Kabir, Kaan Oguz, Punyashloka Debashis, John J. Plombon, Hai Li, Dmitri E. Nikonov, Andrey Chuvilin, Luis E. Hueso, Ian A. Young, Fèlix Casanova

    Abstract: One of the major obstacles to realizing spintronic devices such as MESO logic devices is the small signal magnitude used for magnetization readout, making it important to find materials with high spin-to-charge conversion efficiency. Although intermixing at the junction of two materials is a widely occurring phenomenon, its influence on material characterization and the estimation of spin-to-charg… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: Main text (18 pages, 3 figures, 2 tables) and supporting information (18 pages)

    Journal ref: Nano Lett. 22, 7992-7999 (2022)

  7. arXiv:2206.11993  [pdf, other

    cs.CL cs.AI cs.LG

    A Disability Lens towards Biases in GPT-3 Generated Open-Ended Languages

    Authors: Akhter Al Amin, Kazi Sinthia Kabir

    Abstract: Language models (LM) are becoming prevalent in many language-based application spaces globally. Although these LMs are improving our day-to-day interactions with digital products, concerns remain whether open-ended languages or text generated from these models reveal any biases toward a specific group of people, thereby risking the usability of a certain product. There is a need to identify whethe… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: 5 pages, 1 figure, 1 table, IJCAI 2022 Workshop on Diversity in Artificial Intelligence

  8. An End-to-End Authentication Mechanism for Wireless Body Area Networks

    Authors: Mosarrat Jahan, Fatema Tuz Zohra, Md. Kamal Parvez, Upama Kabir, Abdul Mohaimen Al Radi, Shaily Kabir

    Abstract: Wireless Body Area Network (WBAN) ensures high-quality healthcare services by endowing distant and continual monitoring of patients' health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the i… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

    Journal ref: Smart Health, 2023

  9. Towards Handling Uncertainty-at-Source in AI -- A Review and Next Steps for Interval Regression

    Authors: Shaily Kabir, Christian Wagner, Zack Ellerby

    Abstract: Most of statistics and AI draw insights through modelling discord or variance between sources of information (i.e., inter-source uncertainty). Increasingly, however, research is focusing upon uncertainty arising at the level of individual measurements (i.e., within- or intra-source), such as for a given sensor output or human response. Here, adopting intervals rather than numbers as the fundamenta… ▽ More

    Submitted 27 February, 2023; v1 submitted 15 April, 2021; originally announced April 2021.

  10. arXiv:2102.05896  [pdf

    eess.IV

    Weighted Contourlet Parametric (WCP) Feature Based Breast Tumor Classification from B-Mode Ultrasound Image

    Authors: Shahriar Mahmud Kabir, Md. Sayed Tanveer, ASM Shihavuddin, Mohammed Imamul Hassan Bhuiyan

    Abstract: Automated detection of breast tumor in early stages using B-Mode Ultrasound image is crucial for preventing widespread breast cancer specially among women. This paper is primarily focusing on the classification of breast tumors through statistical modelling such as Rician inverse Gaussian (RiIG) pdf of contourlet transformed B-Mode image of breast tumors which is not reported yet in other earlier… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

  11. arXiv:2006.11555  [pdf

    cs.LG eess.SP stat.ML

    A deep convolutional neural network model for rapid prediction of fluvial flood inundation

    Authors: Syed Kabir, Sandhya Patidar, Xilin Xia, Qiuhua Liang, Jeffrey Neal, Gareth Pender, .

    Abstract: Most of the two-dimensional (2D) hydraulic/hydrodynamic models are still computationally too demanding for real-time applications. In this paper, an innovative modelling approach based on a deep convolutional neural network (CNN) method is presented for rapid prediction of fluvial flood inundation. The CNN model is trained using outputs from a 2D hydraulic model (i.e. LISFLOOD-FP) to predict water… ▽ More

    Submitted 16 September, 2020; v1 submitted 20 June, 2020; originally announced June 2020.

    Comments: 45 pages, 14 figures, 7 tables

    Journal ref: J. Hydrol. 125481 (2020)

  12. arXiv:1911.03368  [pdf

    cond-mat.mtrl-sci

    Oxygen Reduction Reaction and X-ray Photoelectron Spectroscopy of Sputtered Fe-N-C Films

    Authors: Yun Xu, Michael J. Dzara, Sadia Kabir, Svitlana Pylypenko, Kenneth Neyerlin, Andriy Zakutayev

    Abstract: Electrocatalysts for the oxygen reduction reaction (ORR) based on complexes of iron and nitrogen in a carbon matrix (Fe-N-C) are a promising alternative to platinum group metal (PGM) based catalysts in polymer electrolyte membrane (PEM) fuel cells. Further improvements of Fe-N-C catalysts would benefit from model thin film studies of activity and stability of catalytic sites, but synthesis of Fe-N… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  13. arXiv:1703.02641  [pdf, other

    stat.ML cs.LG

    Don't Fear the Bit Flips: Optimized Coding Strategies for Binary Classification

    Authors: Frederic Sala, Shahroze Kabir, Guy Van den Broeck, Lara Dolecek

    Abstract: After being trained, classifiers must often operate on data that has been corrupted by noise. In this paper, we consider the impact of such noise on the features of binary classifiers. Inspired by tools for classifier robustness, we introduce the same classification probability (SCP) to measure the resulting distortion on the classifier outputs. We introduce a low-complexity estimate of the SCP ba… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: 11 pages, 4 figures

  14. arXiv:1209.1678  [pdf

    cs.CR

    Policy based intrusion detection and response system in hierarchical WSN architecture

    Authors: Mohammad Saiful Islam Mamun, A. F. M Sultanul Kabir, Md. Sakhawat Hossen, Md. Razib Hayat Khan

    Abstract: In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose… ▽ More

    Submitted 7 September, 2012; originally announced September 2012.

    Comments: 5 pages, IEEE International Conference on Wireless Communication,Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless Vitae'09, May 17-20, 2009. Aalborg, Denmark. ISBN 978-1-4244-4067-2

  15. Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information

    Authors: A. F. M. Sultanul Kabir, Mohammad Saiful Islam Mamun

    Abstract: A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 15 pages, International Journal of Computer Applications (IJCA) (0975 - 8887) Volume 15- No.1, February 2011

    Journal ref: International Journal of Computer Applications 15(1):11-25, February 2011. Published by Foundation of Computer Science

  16. Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    Authors: Mohammad Saiful Islam Mamun, A. F. M. Sultanul Kabir

    Abstract: In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion preven… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other authors

  17. arXiv:1208.3769  [pdf

    cs.NI

    WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure

    Authors: A. F. M Sultanul Kabir, Md. Razib Hayat Khan, Abul Ahsan Md. Mahmudul Haque, Mohammad Saiful Islam Mamun

    Abstract: This paper presents a description of the existing wireless technology Wi-Fi and WiMAX, and try to compare Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16), with respect to which technology provides a better solution to build a wireless access infrastructure. Each technology is evaluated based on some key characteristics. This paper concludes with a statement of, which technology will be the best and mo… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 6 pages,2 figures, Conference: ICLAN'2007, IEEE France

    ACM Class: C.2.1

  18. arXiv:1002.4830   

    cs.OH

    Nonlinear System Identification and Behavioral Modeling

    Authors: Kazi Mohammed Saidul Huq, Md. Taslim Arefin, A. F. M. Sultanul Kabir

    Abstract: This paper has been withdrawn by the author

    Submitted 19 April, 2010; v1 submitted 25 February, 2010; originally announced February 2010.

    Comments: This paper has been withdrawn by the author

    Journal ref: K. M. S. Huq, M. T. Arefin and A. F. M. S. Kabir, "Nonlinear System Identification and Behavioral Modeling", Journal of Telecommunications, Volume 1, Issue 1, pp94-98, February 2010

  19. arXiv:1002.1146  [pdf

    cs.NI

    Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches

    Authors: Md. Sakhawat Hossen, A. F. M. Sultanul Kabir, Razib Hayat Khan, Abdullah Azfar

    Abstract: The increasing role of home automation in routine life and the rising demand for sensor networks enhanced wireless personal area networks (WPANs) development, pervasiveness of wireless & wired network, and research. Soon arose the need of implementing the Internet Protocol in these devices in order to WPAN standards, raising the way for questions on how to provide seamless communication between… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php