Skip to main content

Showing 1–31 of 31 results for author: Khan, M F

.
  1. arXiv:2406.06500  [pdf, ps, other

    cs.AI cs.LG

    Adaptive Opponent Policy Detection in Multi-Agent MDPs: Real-Time Strategy Switch Identification Using Running Error Estimation

    Authors: Mohidul Haque Mridul, Mohammad Foysal Khan, Redwan Ahmed Rizvee, Md Mosaddek Khan

    Abstract: In Multi-agent Reinforcement Learning (MARL), accurately perceiving opponents' strategies is essential for both cooperative and adversarial contexts, particularly within dynamic environments. While Proximal Policy Optimization (PPO) and related algorithms such as Actor-Critic with Experience Replay (ACER), Trust Region Policy Optimization (TRPO), and Deep Deterministic Policy Gradient (DDPG) perfo… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2312.04695  [pdf

    econ.GN

    Foreign Capital and Economic Growth: Evidence from Bangladesh

    Authors: Ummya Salma, Md. Fazlul Huq Khan, Md. Masum Billah

    Abstract: This study aims to examine the relationship between Foreign Direct Investment (FDI), personal remittances received, and official development assistance (ODA) in the economic growth of Bangladesh. The study utilizes time series data on Bangladesh from 1976 to 2021. Additionally, this research contributes to the existing literature by introducing the Foreign Capital Depthless Index (FCDI) and explor… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  3. arXiv:2311.02640  [pdf, other

    cs.SE cs.AI

    Assessing the Promise and Pitfalls of ChatGPT for Automated Code Generation

    Authors: Muhammad Fawad Akbar Khan, Max Ramsdell, Erik Falor, Hamid Karimi

    Abstract: This paper presents a comprehensive evaluation of the code generation capabilities of ChatGPT, a prominent large language model, compared to human programmers. A novel dataset of 131 code-generation prompts across 5 categories was curated to enable robust analysis. Code solutions were generated by both ChatGPT and humans for all prompts, resulting in 262 code samples. A meticulous manual assessmen… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  4. arXiv:2310.12281  [pdf, other

    cs.LG cs.AI

    Enhancing the Performance of Automated Grade Prediction in MOOC using Graph Representation Learning

    Authors: Soheila Farokhi, Aswani Yaramala, Jiangtao Huang, Muhammad F. A. Khan, Xiaojun Qi, Hamid Karimi

    Abstract: In recent years, Massive Open Online Courses (MOOCs) have gained significant traction as a rapidly growing phenomenon in online learning. Unlike traditional classrooms, MOOCs offer a unique opportunity to cater to a diverse audience from different backgrounds and geographical locations. Renowned universities and MOOC-specific providers, such as Coursera, offer MOOC courses on various subjects. Aut… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  5. arXiv:2310.08415  [pdf

    econ.GN

    The Connection Between Political Stability and Inflation: Insights from Four South Asian Nations

    Authors: Ummya Salma, Md. Fazlul Huq Khan

    Abstract: This study explores the relationship between political stability and inflation in four South Asian countries, employing panel data spanning from 2001 to 2021. To analyze this relationship, the study utilizes the dynamic ordinary least square (DOLS) and fully modified ordinary least square (FMOLS) methods, which account for cross-sectional dependence and slope homogeneity in panel data analysis. Th… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  6. arXiv:2306.01164  [pdf, other

    cs.CL cs.SI

    Leveraging Natural Language Processing For Public Health Screening On YouTube: A COVID-19 Case Study

    Authors: Ahrar Bin Aslam, Zafi Sherhan Syed, Muhammad Faiz Khan, Asghar Baloch, Muhammad Shehram Shah Syed

    Abstract: Background: Social media platforms have become a viable source of medical information, with patients and healthcare professionals using them to share health-related information and track diseases. Similarly, YouTube, the largest video-sharing platform in the world contains vlogs where individuals talk about their illnesses. The aim of our study was to investigate the use of Natural Language Proces… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

  7. arXiv:2305.02229  [pdf

    econ.GN

    Macroeconomic factors and Stock exchange return: A Statistical Analysis

    Authors: Md. Fazlul Huq Khan, Md. Masum Billah

    Abstract: The purpose of this research is to examine the relationship between the Dhaka Stock exchange index return and macroeconomic variables such as exchange rate, inflation, money supply etc. The long-term relationship between macroeconomic variables and stock market returns has been analyzed by using the Johnson Cointegration test, Augmented Dicky Fuller (ADF) and Phillip Perron (PP) tests. The results… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

  8. arXiv:2212.12763  [pdf, other

    physics.flu-dyn physics.bio-ph

    On Lagrangian Coherent Structures in Laparoscopy

    Authors: Sandeep Kumar, Caroline Crowley, Mohammad Faraz Khan, Miguel D. Bustamante, Ronan Cahill, Kevin Nolan

    Abstract: Laparoscopy is an electrosurgical medical operation often involving an application of high-frequency alternating current to remove undesired biological tissue from the insufflated abdomen accessible through inlet and outlets trocars. One of the main byproducts in this process are the gaseous particles, called surgical smoke, which is found hazardous for both the patient and the operating room staf… ▽ More

    Submitted 24 December, 2022; originally announced December 2022.

  9. arXiv:2211.02141  [pdf, other

    cs.CV

    Shapes2Toon: Generating Cartoon Characters from Simple Geometric Shapes

    Authors: Simanta Deb Turja, Mohammad Imrul Jubair, Md. Shafiur Rahman, Md. Hasib Al Zadid, Mohtasim Hossain Shovon, Md. Faraz Kabir Khan

    Abstract: Cartoons are an important part of our entertainment culture. Though drawing a cartoon is not for everyone, creating it using an arrangement of basic geometric primitives that approximates that character is a fairly frequent technique in art. The key motivation behind this technique is that human bodies - as well as cartoon figures - can be split down into various basic geometric primitives. Numero… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: Accepted as a full paper in AICCSA2022 (19th ACS/IEEE International Conference on Computer Systems and Applications)

  10. arXiv:2211.02138  [pdf, other

    cs.CV

    Book Cover Synthesis from the Summary

    Authors: Emdadul Haque, Md. Faraz Kabir Khan, Mohammad Imrul Jubair, Jarin Anjum, Abrar Zahir Niloy

    Abstract: The cover is the face of a book and is a point of attraction for the readers. Designing book covers is an essential task in the publishing industry. One of the main challenges in creating a book cover is representing the theme of the book's content in a single image. In this research, we explore ways to produce a book cover using artificial intelligence based on the fact that there exists a relati… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: Accepted as a full paper in AICCSA2022 (19th ACS/IEEE International Conference on Computer Systems and Applications)

  11. Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Authors: Muhammad Fahad Khan, Khalid Saleem, Mohammed Alotaibi, Mohammad Mazyad Hazzazi, Eid Rehman, Aaqif Afzaal Abbasi, Muhammad Asif Gondal

    Abstract: Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

    Comments: 15 pages, 3 figuers, Journal Paper

    Report number: https://www.techscience.com/cmc/v73n2/48337 MSC Class: 68P25 ACM Class: E.3

    Journal ref: Computers, Materials & Continua, 2022

  12. arXiv:2205.14462  [pdf, other

    cs.CL

    BAN-Cap: A Multi-Purpose English-Bangla Image Descriptions Dataset

    Authors: Mohammad Faiyaz Khan, S. M. Sadiq-Ur-Rahman Shifath, Md Saiful Islam

    Abstract: As computers have become efficient at understanding visual information and transforming it into a written representation, research interest in tasks like automatic image captioning has seen a significant leap over the last few years. While most of the research attention is given to the English language in a monolingual setting, resource-constrained languages like Bangla remain out of focus, predom… ▽ More

    Submitted 28 May, 2022; originally announced May 2022.

    Comments: Accepted in the 13th Edition of Language Resources and Evaluation Conference (LREC 2022)

  13. Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain

    Authors: Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla

    Abstract: The protection of confidential information is a global issue and block encryption algorithms are the most reliable option. The famous information theorist, Claude Shannon has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on Communication Theory of Secrecy Systems. block ciphers strictly follow the subst… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

    Comments: 17 pages, 5 figures, Journal

    MSC Class: 94-11 ACM Class: E.3

    Journal ref: Computational Intelligence and Neuroscience,2022

  14. arXiv:2112.13170  [pdf, other

    eess.SP cs.NI

    On the Feasibility of 4.9 GHz Public Safety Band as Spectrum Option for Internet of Vehicles

    Authors: Muhammad Faizan Rizwan Khan, Seungmo Kim

    Abstract: There is an unprecedented impetus on the advancement of internet of vehicles (IoV). The vehicle-to-everything (V2X) communication is well acknowledged as the key technology in constitution of the IoV. Nevertheless, the spectrum for V2X communication is undergoing a massive change in the United States: a majority of the bandwidth has been reallocated to Wi-Fi leaving even less than a half of the ba… ▽ More

    Submitted 24 December, 2021; originally announced December 2021.

  15. arXiv:2107.14297  [pdf, other

    cs.CY cs.SI physics.soc-ph

    Mobilkit: A Python Toolkit for Urban Resilience and Disaster Risk Management Analytics using High Frequency Human Mobility Data

    Authors: Enrico Ubaldi, Takahiro Yabe, Nicholas K. W. Jones, Maham Faisal Khan, Satish V. Ukkusuri, Riccardo Di Clemente, Emanuele Strano

    Abstract: Increasingly available high-frequency location datasets derived from smartphones provide unprecedented insight into trajectories of human mobility. These datasets can play a significant and growing role in informing preparedness and response to natural disasters. However, limited tools exist to enable rapid analytics using mobility data, and tend not to be tailored specifically for disaster risk m… ▽ More

    Submitted 16 September, 2021; v1 submitted 29 July, 2021; originally announced July 2021.

    Comments: 3 pages, 1 figure, KDD KDD Workshop on Data-driven Humanitarian Map**, 27th ACM SIGKDD Conference

    ACM Class: J.2

    Journal ref: Journal of Open Source Software, 9(95), 5201, 2024

  16. arXiv:2107.13590  [pdf, other

    physics.soc-ph

    Location Data Reveals Disproportionate Disaster Impact Amongst the Poor: A Case Study of the 2017 Puebla Earthquake Using Mobilkit

    Authors: Takahiro Yabe, Nicholas K W Jones, Nancy Lozano-Gracia, Maham Faisal Khan, Satish V. Ukkusuri, Samuel Fraiberger, Aleister Montfort

    Abstract: Location data obtained from smartphones is increasingly finding use cases in disaster risk management. Where traditionally, CDR has provided the predominant digital footprint for human mobility, GPS data now has immense potential in terms of improved spatiotemporal accuracy, volume, availability, and accessibility. GPS data has already proven invaluable in a range of pre- and post-disaster use cas… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: Accepted in ACM KDD Workshop on Data-Driven Humanitarian Map** 2021

  17. arXiv:2102.07192  [pdf, other

    cs.CV

    Improved Bengali Image Captioning via deep convolutional neural network based encoder-decoder model

    Authors: Mohammad Faiyaz Khan, S. M. Sadiq-Ur-Rahman Shifath, Md. Saiful Islam

    Abstract: Image Captioning is an arduous task of producing syntactically and semantically correct textual descriptions of an image in natural language with context related to the image. Existing notable pieces of research in Bengali Image Captioning (BIC) are based on encoder-decoder architecture. This paper presents an end-to-end image captioning system utilizing a multimodal architecture by combining a on… ▽ More

    Submitted 14 February, 2021; originally announced February 2021.

    Comments: Accepted in "IJCACI 2020: International Joint Conference on Advances in Computational Intelligence"

  18. arXiv:2101.12027  [pdf, other

    cs.CL

    A transformer based approach for fighting COVID-19 fake news

    Authors: S. M. Sadiq-Ur-Rahman Shifath, Mohammad Faiyaz Khan, Md. Saiful Islam

    Abstract: The rapid outbreak of COVID-19 has caused humanity to come to a stand-still and brought with it a plethora of other problems. COVID-19 is the first pandemic in history when humanity is the most technologically advanced and relies heavily on social media platforms for connectivity and other benefits. Unfortunately, fake news and misinformation regarding this virus is also available to people and ca… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

  19. arXiv:2006.15195  [pdf, other

    physics.soc-ph cs.CY

    Uncovering socioeconomic gaps in mobility reduction during the COVID-19 pandemic using location data

    Authors: Samuel P. Fraiberger, Pablo Astudillo, Lorenzo Candeago, Alex Chunet, Nicholas K. W. Jones, Maham Faisal Khan, Bruno Lepri, Nancy Lozano Gracia, Lorenzo Lucchini, Emanuele Massaro, Aleister Montfort

    Abstract: Using smartphone location data from Colombia, Mexico, and Indonesia, we investigate how non-pharmaceutical policy interventions intended to mitigate the spread of the COVID-19 pandemic impact human mobility. In all three countries, we find that following the implementation of mobility restriction measures, human movement decreased substantially. Importantly, we also uncover large and persistent di… ▽ More

    Submitted 27 July, 2020; v1 submitted 26 June, 2020; originally announced June 2020.

    Comments: to appear in KDD 2020, Workshop on Humanitarian Map**

  20. arXiv:1902.06692  [pdf

    cs.SI cs.DL

    Analysis of Coauthorship Network in Political Science using Centrality Measures

    Authors: Adeel Ahmed, Muhammad Fahad Khan, Muhammad Usman, Khalid Saleem

    Abstract: In recent era, networks of data are growing massively and forming a shape of complex structure. Data scientists try to analyze different complex networks and utilize these networks to understand the complex structure of a network in a meaningful way. There is a need to detect and identify such a complex network in order to know how these networks provide communication means while using the complex… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

    Comments: 16 pages

  21. arXiv:1806.02872  [pdf

    cond-mat.mtrl-sci

    Idiosyncratic Approach to Visualize Degradation of Black Phosphorus

    Authors: Bilal Abbas Naqvi, Muhammad Arslan Shehzad, Janghwan Cha, Kyung Ah Min, M. Farooq Khan, Sajjad Hussain, Seo Yongho, Suklyun Hong, Eom Jonghwa, Jung Jongwan

    Abstract: Black Phosphorus (BP) is an excellent material for post graphene era due to its layer dependent band gap, high mobility and high Ion/Ioff. However, its poor stability in ambient poses a great challenge in its practical and long-term usage. Optical visualization of oxidized BP is the key and foremost step for its successful passivation from the ambience. Here, we have done a systematic study of the… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Report number: 12966

    Journal ref: https://www.nature.com/articles/s41598-018-31067-4 2018

  22. arXiv:1806.00531  [pdf

    cond-mat.soft physics.optics

    Dynamics of liquid crystal on hexagonal lattice

    Authors: Muhammad Arslan Shehzad, Junsu Lee, Sang Hoon Park, Imtisal Akhtar, Muhammad Farooq Khan, Sajjad Hussain, Jonghwa Eom, Jongwan Jung, Gunn Kim, Chanyong Hwang, Yongho Seo

    Abstract: Nematic liquid crystal (LC) molecules adsorbed on two dimensional materials are aligned along the crystal directions of the hexagonal lattice. It was demonstrated that short electric pulses can reorient the aligned LC molecules in the preferred armchair direction of hexagonal boron nitride (h-BN). Several states with a variety of colors were obtained by changing the direction and strength of the e… ▽ More

    Submitted 1 June, 2018; originally announced June 2018.

    Report number: 2DM-103030.R3

    Journal ref: http://iopscience.iop.org/article/10.1088/2053-1583/aad85e

  23. Steganography between Silence Intervals of Audio in Video Content Using Chaotic Maps

    Authors: Muhammad Fahad Khan, Faisal Baig, Saira Beg

    Abstract: Steganography is the art of hiding data, in such a way that it is undetectable under traffic-pattern analysis and the data hidden is only known to the receiver and the sender. In this paper new method of text steganography over the silence interval of audio in a video file, is presented. In the proposed method first the audio signal is extracted from the video. After doing audio enhancement, the d… ▽ More

    Submitted 14 October, 2016; originally announced October 2016.

    Comments: 11 pages, 3 figures

    MSC Class: 94B35 ACM Class: C.2

    Journal ref: Khan, Muhammad Fahad, Faisal Baig, and Saira Beg. "Steganography between silence intervals of audio in video content using chaotic maps." Circuits, Systems, and Signal Processing 33.12 (2014): 3901-3919

  24. Text writing in the air

    Authors: Saira Beg, M. Fahad Khan, Faisal Baig

    Abstract: This paper presents a real time video based pointing method which allows sketching and writing of English text over air in front of mobile camera. Proposed method have two main tasks: first it track the colored finger tip in the video frames and then apply English OCR over plotted images in order to recognize the written characters. Moreover, proposed method provides a natural human-system interac… ▽ More

    Submitted 27 April, 2016; originally announced April 2016.

    Comments: 19 pages, 19 figures,2 tables. see http://www.tandfonline.com/doi/abs/10.1080/15980316.2013.860928?journalCode=tjid20

    MSC Class: 68T10 ACM Class: C.3

  25. Compress Voice Transference over low Signal Strength in Satellite Communication

    Authors: Saira Beg, M. Fahad Khan, Faisal Baig

    Abstract: This paper presents the comparison of compression algorithms for voice transferring method over SMS in satellite communication. Voice transferring method over SMS is useful in situations when signal strength is low and due to poor signal strength voice call connection is not possible to initiate or signal dropped during voice call. This method has one serious flaw that it produces large number of… ▽ More

    Submitted 26 April, 2016; originally announced April 2016.

    Comments: 11 pages, 8 figures, International Journal

    MSC Class: 68Wxx ACM Class: H.2

    Journal ref: International Journal of System of Systems Engineering 4.2 (2013): 174-186

  26. arXiv:1310.2268  [pdf, ps, other

    math.CO

    Self-Similar Graphs

    Authors: Kiran B. Chilakamarri, M. F. Khan, C. E. Larson, C. J. Tymczak

    Abstract: For any graph $G$ on $n$ vertices and for any {\em symmetric} subgraph $J$ of $K_{n,n}$, we construct an infinite sequence of graphs based on the pair $(G,J)$. The First graph in the sequence is $G$, then at each stage replacing every vertex of the previous graph by a copy of $G$ and every edge of the previous graph by a copy of $J$ the new graph is constructed. We call these graphs {\em self-simi… ▽ More

    Submitted 8 October, 2013; originally announced October 2013.

    Comments: 13 pages, 1 table

  27. Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech Recognition

    Authors: Md. Ali Hossain, Md. Mijanur Rahman, Uzzal Kumar Prodhan, Md. Farukuzzaman Khan

    Abstract: This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back pr… ▽ More

    Submitted 17 August, 2013; originally announced August 2013.

    Comments: 9 pages, 3 figures, 1 table

    Journal ref: International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013

  28. Controlling Home Appliances Remotely through Voice Command

    Authors: Faisal Baig, Saira Beg, Muhammad Fahad Khan

    Abstract: Controlling appliances is a main part of automation. The main object of Home automation is to provide a wireless communication link of home appliances to the remote user. The main objective of this work is to make such a system which controls the home appliances remotely. This paper discusses two methods of controlling home appliances one is via voice to text SMS and other is to use the mobile as… ▽ More

    Submitted 8 December, 2012; originally announced December 2012.

    Comments: 4 pages, 4, figures, International Journal of Computer Applications

  29. arXiv:1205.4361  [pdf

    cs.NI cs.MM cs.SD

    Transference & Retrieval of Pulse-code modulation Audio over Short Messaging Service

    Authors: Muhammad Fahad Khan, Saira Beg

    Abstract: The paper presents the method of transferring PCM (Pulse-Code Modulation) based audio messages through SMS (Short Message Service) over GSM (Global System for Mobile Communications) network. As SMS is text based service, and could not send voice. Our method enables voice transferring through SMS, by converting PCM audio into characters. Than Huffman coding compression technique is applied in order… ▽ More

    Submitted 19 May, 2012; originally announced May 2012.

    Comments: 3,3, International Journal of Computer Applications (0975 - 8887),Volume 32- No.10, October 2011

    Journal ref: International Journal of Computer Applications ,Volume 32-- No.10, October 2011

  30. arXiv:1201.1383  [pdf

    cs.MM

    Stereo image Transference & Retrieval over SMS

    Authors: Muhammad Fahad Khan, Saira Beg

    Abstract: Paper presents the way of transferring stereo images using SMS over GSM network. Generally, Stereo image is composed of two stereoscopic images in such way that gives three dimensional affect when viewed. GSM have two short messaging services, which can transfer images and sounds etc. Such services are known as; MMS (Multimedia Messaging Service) and EMS (Extended Messaging Service). EMS can send… ▽ More

    Submitted 6 January, 2012; originally announced January 2012.

    Comments: 3 pages,3 figuers,Journal

    Journal ref: JOURNAL OF COMPUTING, VOLUME 3, ISSUE 7, JULY 2011, ISSN 2151-9617 WWW.JOURNALOFCOMPUTING.ORG

  31. arXiv:1112.5679  [pdf

    cs.NI

    Transferring Voice using SMS over GSM Network

    Authors: Muhammad Fahad Khan, Saira Beg

    Abstract: The paper presents a methodology of transmitting voice in SMS (Short Message Service) over GSM network. Usually SMS contents are text based and limited to 140 bytes. It supports national and international roaming, but also supported by other telecommunication such as TDMA (Time Division Multiple Access), CDMA (Code Division Multiple Access) as well. It can sent/ receive simultaneously with other s… ▽ More

    Submitted 23 December, 2011; originally announced December 2011.

    Comments: 3 pages, 3 figures, 1 Table, International Journal, http://www.journalofcomputing.org/volume-3-issue-4-april-2011

    Journal ref: International journal of computing ISSN 2151-9617 Volume 3, Issue 4, April 2011