Skip to main content

Showing 1–50 of 54 results for author: Mohammed, N

.
  1. arXiv:2407.07926  [pdf, other

    cs.CR cs.LG

    Synthetic Data: Revisiting the Privacy-Utility Trade-off

    Authors: Fatima Jahan Sarmin, Atiquer Rahman Sarkar, Yang Wang, Noman Mohammed

    Abstract: Synthetic data has been considered a better privacy-preserving alternative to traditionally sanitized data across various applications. However, a recent article challenges this notion, stating that synthetic data does not provide a better trade-off between privacy and utility than traditional anonymization techniques, and that it leads to unpredictable utility loss and highly unpredictable privac… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

  2. arXiv:2405.15678  [pdf, other

    astro-ph.GA

    Faraday tomography with CHIME: the `tadpole' feature G137+7

    Authors: Nasser Mohammed, Anna Ordog, Rebecca A. Booth, Andrea Bracco, Jo-Anne C. Brown, Ettore Carretti, John M. Dickey, Simon Foreman, Mark Halpern, Marijke Haverkorn, Alex S. Hill, Joseph W Kania, Roland Kothes, T. L. Landecker, Joshua MacEachern, Kiyoshi W. Masui, Aimee Menard, Ryan R. Ransom, Wolfgang Reich, Patricia Reich, J. Richard Shaw, Seth R. Siegel, Mehrnoosh Tahani, Alec J. M. Thomson, Tristan Pinsonneault-Marotte , et al. (4 additional authors not shown)

    Abstract: A direct consequence of Faraday rotation is that the polarized radio sky does not resemble the total intensity sky at long wavelengths. We analyze G137+7, which is undetectable in total intensity but appears as a depolarization feature. We use the first polarization maps from the Canadian Hydrogen Intensity Map** Experiment. Our $400-729$ MHz bandwidth and angular resolution, $17'$ to $30'$, all… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: Resubmitted to ApJ after referee report

  3. arXiv:2404.18942  [pdf, other

    cs.CL cs.AI cs.LG cs.SI

    GuideWalk -- Heterogeneous Data Fusion for Enhanced Learning -- A Multiclass Document Classification Case

    Authors: Sarmad N. Mohammed, Semra Gündüç

    Abstract: One of the prime problems of computer science and machine learning is to extract information efficiently from large-scale, heterogeneous data. Text data, with its syntax, semantics, and even hidden information content, possesses an exceptional place among the data types in concern. The processing of the text data requires embedding, a method of translating the content of the text to numeric vector… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  4. arXiv:2404.01096  [pdf, other

    cs.SE cs.PL

    Enabling Memory Safety of C Programs using LLMs

    Authors: Nausheen Mohammed, Akash Lal, Aseem Rastogi, Subhajit Roy, Rahul Sharma

    Abstract: Memory safety violations in low-level code, written in languages like C, continues to remain one of the major sources of software vulnerabilities. One method of removing such violations by construction is to port C code to a safe C dialect. Such dialects rely on programmer-supplied annotations to guarantee safety with minimal runtime overhead. This porting, however, is a manual process that impose… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  5. arXiv:2402.00179  [pdf, other

    cs.CL

    De-identification is not always enough

    Authors: Atiquer Rahman Sarkar, Yao-Shun Chuang, Noman Mohammed, Xiaoqian Jiang

    Abstract: For sharing privacy-sensitive data, de-identification is commonly regarded as adequate for safeguarding privacy. Synthetic data is also being considered as a privacy-preserving alternative. Recent successes with numerical and tabular data generative models and the breakthroughs in large generative language models raise the question of whether synthetically generated clinical notes could be a viabl… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

  6. arXiv:2311.14012  [pdf, other

    cs.CV

    Shadow: A Novel Loss Function for Efficient Training in Siamese Networks

    Authors: Alif Elham Khan, Mohammad Junayed Hasan, Humayra Anjum, Nabeel Mohammed

    Abstract: Despite significant recent advances in similarity detection tasks, existing approaches pose substantial challenges under memory constraints. One of the primary reasons for this is the use of computationally expensive metric learning loss functions such as Triplet Loss in Siamese networks. In this paper, we present a novel loss function called Shadow Loss that compresses the dimensions of an embedd… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  7. arXiv:2311.03078  [pdf

    cs.CL

    BanLemma: A Word Formation Dependent Rule and Dictionary Based Bangla Lemmatizer

    Authors: Sadia Afrin, Md. Shahad Mahmud Chowdhury, Md. Ekramul Islam, Faisal Ahamed Khan, Labib Imam Chowdhury, MD. Motahar Mahtab, Nazifa Nuha Chowdhury, Massud Forkan, Neelima Kundu, Hakim Arif, Mohammad Mamun Or Rashid, Mohammad Ruhul Amin, Nabeel Mohammed

    Abstract: Lemmatization holds significance in both natural language processing (NLP) and linguistics, as it effectively decreases data density and aids in comprehending contextual meaning. However, due to the highly inflected nature and morphological richness, lemmatization in Bangla text poses a complex challenge. In this study, we propose linguistic rules for lemmatization and utilize a dictionary along w… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  8. arXiv:2310.12155  [pdf

    cs.NE

    Balancing exploration and exploitation phases in whale optimization algorithm: an insightful and empirical analysis

    Authors: Aram M. Ahmed, Tarik A. Rashid, Bryar A. Hassan, Jaffer Majidpour, Kaniaw A. Noori, Chnoor Maheadeen Rahman, Mohmad Hussein Abdalla, Shko M. Qader, Noor Tayfor, Naufel B Mohammed

    Abstract: Agents of any metaheuristic algorithms are moving in two modes, namely exploration and exploitation. Obtaining robust results in any algorithm is strongly dependent on how to balance between these two modes. Whale optimization algorithm as a robust and well recognized metaheuristic algorithm in the literature, has proposed a novel scheme to achieve this balance. It has also shown superior results… ▽ More

    Submitted 3 September, 2023; originally announced October 2023.

    Comments: 11 pages

  9. arXiv:2310.11657  [pdf, other

    cs.CV

    ChatGPT-guided Semantics for Zero-shot Learning

    Authors: Fahimul Hoque Shubho, Townim Faisal Chowdhury, Ali Cheraghian, Morteza Saberi, Nabeel Mohammed, Shafin Rahman

    Abstract: Zero-shot learning (ZSL) aims to classify objects that are not observed or seen during training. It relies on class semantic description to transfer knowledge from the seen classes to the unseen classes. Existing methods of obtaining class semantics include manual attributes or automatic word vectors from language models (like word2vec). We know attribute annotation is costly, whereas automatic wo… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: Accepted in International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2023

  10. arXiv:2310.03669  [pdf, other

    cs.CV

    LumiNet: The Bright Side of Perceptual Knowledge Distillation

    Authors: Md. Ismail Hossain, M M Lutfe Elahi, Sameera Ramasinghe, Ali Cheraghian, Fuad Rahman, Nabeel Mohammed, Shafin Rahman

    Abstract: In knowledge distillation literature, feature-based methods have dominated due to their ability to effectively tap into extensive teacher models. In contrast, logit-based approaches, which aim to distill `dark knowledge' from teachers, typically exhibit inferior performance compared to feature-based methods. To bridge this gap, we present LumiNet, a novel knowledge distillation algorithm designed… ▽ More

    Submitted 9 March, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

  11. arXiv:2308.10037  [pdf, other

    cs.LG

    High Performance Computing Applied to Logistic Regression: A CPU and GPU Implementation Comparison

    Authors: Nechba Mohammed, Mouhajir Mohamed, Sedjari Yassine

    Abstract: We present a versatile GPU-based parallel version of Logistic Regression (LR), aiming to address the increasing demand for faster algorithms in binary classification due to large data sets. Our implementation is a direct translation of the parallel Gradient Descent Logistic Regression algorithm proposed by X. Zou et al. [12]. Our experiments demonstrate that our GPU-based LR outperforms existing C… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

  12. CosSIF: Cosine similarity-based image filtering to overcome low inter-class variation in synthetic medical image datasets

    Authors: Mominul Islam, Hasib Zunair, Nabeel Mohammed

    Abstract: Crafting effective deep learning models for medical image analysis is a complex task, particularly in cases where the medical image dataset lacks significant inter-class variation. This challenge is further aggravated when employing such datasets to generate synthetic images using generative adversarial networks (GANs), as the output of GANs heavily relies on the input data. In this research, we p… ▽ More

    Submitted 15 October, 2023; v1 submitted 25 July, 2023; originally announced July 2023.

    Comments: 18 pages, 20 figures

    Journal ref: Volume 172, April 2024, 108317

  13. SentiGOLD: A Large Bangla Gold Standard Multi-Domain Sentiment Analysis Dataset and its Evaluation

    Authors: Md. Ekramul Islam, Labib Chowdhury, Faisal Ahamed Khan, Shazzad Hossain, Sourave Hossain, Mohammad Mamun Or Rashid, Nabeel Mohammed, Mohammad Ruhul Amin

    Abstract: This study introduces SentiGOLD, a Bangla multi-domain sentiment analysis dataset. Comprising 70,000 samples, it was created from diverse sources and annotated by a gender-balanced team of linguists. SentiGOLD adheres to established linguistic conventions agreed upon by the Government of Bangladesh and a Bangla linguistics committee. Unlike English and other languages, Bangla lacks standard sentim… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Comments: Accepted in KDD 2023 Applied Data Science Track; 12 pages, 14 figures

  14. arXiv:2304.03682  [pdf, other

    cs.CL

    BenCoref: A Multi-Domain Dataset of Nominal Phrases and Pronominal Reference Annotations

    Authors: Shadman Rohan, Mojammel Hossain, Mohammad Mamun Or Rashid, Nabeel Mohammed

    Abstract: Coreference Resolution is a well studied problem in NLP. While widely studied for English and other resource-rich languages, research on coreference resolution in Bengali largely remains unexplored due to the absence of relevant datasets. Bengali, being a low-resource language, exhibits greater morphological richness compared to English. In this article, we introduce a new dataset, BenCoref, compr… ▽ More

    Submitted 3 July, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

  15. arXiv:2212.12770  [pdf, other

    cs.CV

    COLT: Cyclic Overlap** Lottery Tickets for Faster Pruning of Convolutional Neural Networks

    Authors: Md. Ismail Hossain, Mohammed Rakib, M. M. Lutfe Elahi, Nabeel Mohammed, Shafin Rahman

    Abstract: Pruning refers to the elimination of trivial weights from neural networks. The sub-networks within an overparameterized model produced after pruning are often called Lottery tickets. This research aims to generate winning lottery tickets from a set of lottery tickets that can achieve similar accuracy to the original unpruned network. We introduce a novel winning ticket called Cyclic Overlap** Lo… ▽ More

    Submitted 24 December, 2022; originally announced December 2022.

  16. arXiv:2212.12741  [pdf, other

    cs.CV cs.AI

    LMFLOSS: A Hybrid Loss For Imbalanced Medical Image Classification

    Authors: Abu Adnan Sadi, Labib Chowdhury, Nursrat Jahan, Mohammad Newaz Sharif Rafi, Radeya Chowdhury, Faisal Ahamed Khan, Nabeel Mohammed

    Abstract: Automatic medical image classification is a very important field where the use of AI has the potential to have a real social impact. However, there are still many challenges that act as obstacles to making practically effective solutions. One of those is the fact that most of the medical imaging datasets have a class imbalance problem. This leads to the fact that existing AI techniques, particular… ▽ More

    Submitted 24 December, 2022; originally announced December 2022.

  17. Knowledge Distillation approach towards Melanoma Detection

    Authors: Md. Shakib Khan, Kazi Nabiul Alam, Abdur Rab Dhruba, Hasib Zunair, Nabeel Mohammed

    Abstract: Melanoma is regarded as the most threatening among all skin cancers. There is a pressing need to build systems which can aid in the early detection of melanoma and enable timely treatment to patients. Recent methods are geared towards machine learning based systems where the task is posed as image recognition, tag dermoscopic images of skin lesions as melanoma or non-melanoma. Even though these me… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Journal ref: Computers in Biology and Medicine, Volume 146, July 2022, 105581

  18. arXiv:2210.04240  [pdf, other

    cs.CV

    Less is More: Facial Landmarks can Recognize a Spontaneous Smile

    Authors: Md. Tahrim Faroque, Yan Yang, Md Zakir Hossain, Sheikh Motahar Naim, Nabeel Mohammed, Shafin Rahman

    Abstract: Smile veracity classification is a task of interpreting social interactions. Broadly, it distinguishes between spontaneous and posed smiles. Previous approaches used hand-engineered features from facial landmarks or considered raw smile videos in an end-to-end manner to perform smile classification tasks. Feature-based methods require intervention from human experts on feature engineering and heav… ▽ More

    Submitted 9 October, 2022; originally announced October 2022.

  19. arXiv:2209.12650  [pdf, other

    cs.CL cs.AI eess.AS

    Bangla-Wave: Improving Bangla Automatic Speech Recognition Utilizing N-gram Language Models

    Authors: Mohammed Rakib, Md. Ismail Hossain, Nabeel Mohammed, Fuad Rahman

    Abstract: Although over 300M around the world speak Bangla, scant work has been done in improving Bangla voice-to-text transcription due to Bangla being a low-resource language. However, with the introduction of the Bengali Common Voice 9.0 speech dataset, Automatic Speech Recognition (ASR) models can now be significantly improved. With 399hrs of speech recordings, Bengali Common Voice is the largest and mo… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

  20. Integration of Reconfigurable Intelligent Surfaces in Dynamical Energy Analysis

    Authors: Sergio Terranova, Martin Richter, Neekar M Mohammed, Gabriele Gradoni, Gregor Tanner

    Abstract: Reconfigurable intelligent surfaces have been recently investigated for their potentials to offer significant performance improvements in the next generation wireless telecommunication systems (5G and beyond / 6G). Intelligent surfaces are programmed to control the electromagnetic propagation and obtain the desired wavefront by tuning the local reflection phase of unit elements. Predicting the ele… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Journal ref: 2022 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC), 2022, pp. 1-3

  21. Electromagnetic Illusion in Smart Environments

    Authors: Hamidreza Taghvaee, Mir Lodro, Neekar M Mohammed, Sergio Terranova, Sendy Phang, Martin Richter, Gabriele Gradoni

    Abstract: Metasurfaces can be designed to achieve prescribed functionality. Careful meta-atom design and arrangement achieve homogeneous and inhomogeneous layouts that can enable exceptional capabilities to manipulate incident waves. Inherently, the control of scattering waves is crucial in wireless communications and stealth technologies. Low-profile and light-weight coatings that offer comprehensive manip… ▽ More

    Submitted 10 September, 2022; originally announced September 2022.

    Journal ref: 2022 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC), 2022, pp. 1-4

  22. arXiv:2208.03712  [pdf, other

    cs.LG cs.AI cs.SI

    TPM: Transition Probability Matrix -- Graph Structural Feature based Embedding

    Authors: Sarmad N. Mohammed, Semra Gündüç

    Abstract: In this work, Transition Probability Matrix (TPM) is proposed as a new method for extracting the features of nodes in the graph. The proposed method uses random walks to capture the connectivity structure of a node's close neighborhood. The information obtained from random walks is converted to anonymous walks to extract the topological features of nodes. In the embedding process of nodes, anonymo… ▽ More

    Submitted 3 March, 2023; v1 submitted 7 August, 2022; originally announced August 2022.

  23. arXiv:2205.11420  [pdf

    cs.CV cs.AI

    LILA-BOTI : Leveraging Isolated Letter Accumulations By Ordering Teacher Insights for Bangla Handwriting Recognition

    Authors: Md. Ismail Hossain, Mohammed Rakib, Sabbir Mollah, Fuad Rahman, Nabeel Mohammed

    Abstract: Word-level handwritten optical character recognition (OCR) remains a challenge for morphologically rich languages like Bangla. The complexity arises from the existence of a large number of alphabets, the presence of several diacritic forms, and the appearance of complex conjuncts. The difficulty is exacerbated by the fact that some graphemes occur infrequently but remain indispensable, so addressi… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: Accepted in ICPR2022

  24. arXiv:2205.11367  [pdf, other

    cs.AI

    Rethinking Task-Incremental Learning Baselines

    Authors: Md Sazzad Hossain, Pritom Saha, Townim Faisal Chowdhury, Shafin Rahman, Fuad Rahman, Nabeel Mohammed

    Abstract: It is common to have continuous streams of new data that need to be introduced in the system in real-world applications. The model needs to learn newly added capabilities (future tasks) while retaining the old knowledge (past tasks). Incremental learning has recently become increasingly appealing for this problem. Task-incremental learning is a kind of incremental learning where task identity of n… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: Accepted in ICPR2022

  25. arXiv:2205.03545  [pdf, ps, other

    math-ph

    Inverse Laplace transform based on Widder's method for Tsallis exponential

    Authors: S. S. Naina Mohammed, K. Jeevanandham, A. Basherrudin Mahmud Ahmed, Md. Manirul Ali, R. Chandrashekar

    Abstract: A generalization of the Laplace transform based on the generalized Tsallis $q$-exponential is given in the present work for a new type of kernel. We also define the inverse transform for this generalized transform based on the complex integration method. We prove identities corresponding to the Laplace transform and inverse transform like the $q$-convolution theorem, the action of generalized deri… ▽ More

    Submitted 11 May, 2022; v1 submitted 7 May, 2022; originally announced May 2022.

    Comments: 20 pages

  26. arXiv:2204.11024  [pdf, other

    cs.CV

    VISTA: Vision Transformer enhanced by U-Net and Image Colorfulness Frame Filtration for Automatic Retail Checkout

    Authors: Md. Istiak Hossain Shihab, Nazia Tasnim, Hasib Zunair, Labiba Kanij Rupty, Nabeel Mohammed

    Abstract: Multi-class product counting and recognition identifies product items from images or videos for automated retail checkout. The task is challenging due to the real-world scenario of occlusions where product items overlap, fast movement in the conveyor belt, large similarity in overall appearance of the items being scanned, novel products, and the negative impact of misidentifying items. Further, th… ▽ More

    Submitted 23 April, 2022; originally announced April 2022.

    Comments: accepted at AI City Challenge workshop - CVPR 2022

  27. Quantum coherence dynamics of displaced squeezed thermal state in a Non-Markovian environment

    Authors: Md. Manirul Ali, R. Chandrashekar, S. S. Naina Mohammed

    Abstract: The dynamical behavior of quantum coherence of a displaced squeezed thermal state in contact with an external bath is discussed in the present work. We use a Fano-Anderson type of Hamiltonian to model the environment and solve the quantum Langevin equation. From the solution of the quantum Langevin equation we obtain the Green's functions which are used to calculate the expectation value of the qu… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 20 pages

    Journal ref: Quantum Inf Process 21, 193 (2022)

  28. arXiv:2201.11319  [pdf, other

    cs.CV cs.AI

    Dynamic Rectification Knowledge Distillation

    Authors: Fahad Rahman Amik, Ahnaf Ismat Tasin, Silvia Ahmed, M. M. Lutfe Elahi, Nabeel Mohammed

    Abstract: Knowledge Distillation is a technique which aims to utilize dark knowledge to compress and transfer information from a vast, well-trained neural network (teacher model) to a smaller, less capable neural network (student model) with improved inference efficiency. This approach of distilling knowledge has gained popularity as a result of the prohibitively complicated nature of such cumbersome models… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  29. arXiv:2110.13627  [pdf, other

    cs.SI cs.AI cs.LG

    Degree-Based Random Walk Approach for Graph Embedding

    Authors: Sarmad N. Mohammed, Semra Gündüç

    Abstract: Graph embedding, representing local and global neighborhood information by numerical vectors, is a crucial part of the mathematical modeling of a wide range of real-world systems. Among the embedding algorithms, random walk-based algorithms have proven to be very successful. These algorithms collect information by creating numerous random walks with a redefined number of steps. Creating random wal… ▽ More

    Submitted 5 July, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

  30. Deployment of Polar Codes for Mission-Critical Machine-Type Communication Over Wireless Networks

    Authors: Najib Ahmed Mohammed, Ali Mohammed Mansoor, Rodina Binti Ahmad, Saaidal Razalli Bin Azzuhri

    Abstract: Mission critical Machine-type Communication, also referred to as Ultra-reliable Low Latency Communication is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected devices. While the reduction in PHY layer overhead and improvement in channel coding techniques are pivotal in reducing… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: Cited under CMC journal and paper id: 20462

    Journal ref: CMC-Computers, Materials & Continua, 2022

  31. arXiv:2109.14046  [pdf, other

    stat.ML cs.LG

    Federated Learning Algorithms for Generalized Mixed-effects Model (GLMM) on Horizontally Partitioned Data from Distributed Sources

    Authors: Wentao Li, Jiayi Tong, Md. Monowar Anjum, Noman Mohammed, Yong Chen, Xiaoqian Jiang

    Abstract: Objectives: This paper develops two algorithms to achieve federated generalized linear mixed effect models (GLMM), and compares the developed model's outcomes with each other, as well as that from the standard R package (`lme4'). Methods: The log-likelihood function of GLMM is approximated by two numerical methods (Laplace approximation and Gaussian Hermite approximation), which supports federat… ▽ More

    Submitted 7 June, 2022; v1 submitted 28 September, 2021; originally announced September 2021.

    Comments: 19 pages, 5 figures, submitted to Journal of Biomedical Informatics

  32. Curricular SincNet: Towards Robust Deep Speaker Recognition by Emphasizing Hard Samples in Latent Space

    Authors: Labib Chowdhury, Mustafa Kamal, Najia Hasan, Nabeel Mohammed

    Abstract: Deep learning models have become an increasingly preferred option for biometric recognition systems, such as speaker recognition. SincNet, a deep neural network architecture, gained popularity in speaker recognition tasks due to its parameterized sinc functions that allow it to work directly on the speech signal. The original SincNet architecture uses the softmax loss, which may not be the most su… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

    Comments: Accepted at 20th International Conference of the Biometrics Special Interest Group (BIOSIG 2021)

  33. arXiv:2108.07971  [pdf, other

    cs.CL cs.CR cs.LG

    De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective

    Authors: Md Monowar Anjum, Noman Mohammed, Xiaoqian Jiang

    Abstract: In this work, we propose a novel problem formulation for de-identification of unstructured clinical text. We formulate the de-identification problem as a sequence to sequence learning problem instead of a token classification problem. Our approach is inspired by the recent state-of -the-art performance of sequence to sequence learning models for named entity recognition. Early experimentation of o… ▽ More

    Submitted 10 September, 2021; v1 submitted 18 August, 2021; originally announced August 2021.

    Comments: Accepted in Poster Track for ACM CCS 2021

  34. arXiv:2107.00548  [pdf

    stat.AP stat.CO

    Comparison of forecasting of the risk of coronavirus (COVID 19) in high quality and low quality healthcare systems, using ANN models

    Authors: Aseel Sameer Mohamed, Nooriya A. Mohammed

    Abstract: COVID 19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so hel** in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts a… ▽ More

    Submitted 16 July, 2021; v1 submitted 1 July, 2021; originally announced July 2021.

  35. arXiv:2105.12810  [pdf, other

    cs.CV cs.LG

    ViPTT-Net: Video pretraining of spatio-temporal model for tuberculosis type classification from chest CT scans

    Authors: Hasib Zunair, Aimon Rahman, Nabeel Mohammed

    Abstract: Pretraining has sparked groundswell of interest in deep learning workflows to learn from limited data and improve generalization. While this is common for 2D image classification tasks, its application to 3D medical imaging tasks like chest CT interpretation is limited. We explore the idea of whether pretraining a model on realistic videos could improve performance rather than training the model f… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

    Comments: Under review at CLEF 2021. 10 pages

  36. arXiv:2103.05639  [pdf

    cs.CL cs.AI

    An Amharic News Text classification Dataset

    Authors: Israel Abebe Azime, Nebil Mohammed

    Abstract: In NLP, text classification is one of the primary problems we try to solve and its uses in language analyses are indisputable. The lack of labeled training data made it harder to do these tasks in low resource languages like Amharic. The task of collecting, labeling, annotating, and making valuable this kind of data will encourage junior researchers, schools, and machine learning practitioners to… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

  37. arXiv:2102.05003  [pdf, ps, other

    q-fin.RM

    Can a regulatory risk measure induce profit-maximizing risk capital allocations? The case of Conditional Tail Expectation

    Authors: Nawaf Mohammed, Edward Furman, Jianxi Su

    Abstract: Risk capital allocations (RCAs) are an important tool in quantitative risk management, where they are utilized to, e.g., gauge the profitability of distinct business units, determine the price of a new product, and conduct the marginal economic capital analysis. Nevertheless, the notion of RCA has been living in the shadow of another, closely related notion, of risk measure (RM) in the sense that… ▽ More

    Submitted 26 August, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

  38. arXiv:2012.10534  [pdf, other

    cs.CR

    PAARS: Privacy Aware Access Regulation System

    Authors: Md. Monowar Anjum, Noman Mohammed

    Abstract: During pandemics, health officials usually recommend access monitoring and regulation protocols/systems in places that are major activity centres. As organizations adhere to those recommendations, they often fail to implement proper privacy requirements to prevent privacy loss of the users of those protocols or systems. This is a very timely issue as health authorities across the world are increas… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

    Comments: Published in 11th IEEE UEMCON 2020, NY, USA

  39. arXiv:2007.13224  [pdf, other

    eess.IV cs.CV

    Uniformizing Techniques to Process CT scans with 3D CNNs for Tuberculosis Prediction

    Authors: Hasib Zunair, Aimon Rahman, Nabeel Mohammed, Joseph Paul Cohen

    Abstract: A common approach to medical image analysis on volumetric data uses deep 2D convolutional neural networks (CNNs). This is largely attributed to the challenges imposed by the nature of the 3D data: variable volume size, GPU exhaustion during optimization. However, dealing with the individual slices independently in 2D CNNs deliberately discards the depth information which results in poor performanc… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: Accepted for publication at the MICCAI 2020 International Workshop on PRedictive Intelligence In MEdicine (PRIME)

  40. arXiv:2005.01945  [pdf, other

    cs.CR cs.DC cs.PF

    CPU and GPU Accelerated Fully Homomorphic Encryption

    Authors: Toufique Morshed, Md Momin Al Aziz, Noman Mohammed

    Abstract: Fully Homomorphic Encryption (FHE) is one of the most promising technologies for privacy protection as it allows an arbitrary number of function computations over encrypted data. However, the computational cost of these FHE systems limits their widespread applications. In this paper, our objective is to improve the performance of FHE schemes by designing efficient parallel frameworks. In particula… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: Accepted in IEEE HOST'20

  41. arXiv:1810.01459  [pdf, other

    astro-ph.EP

    Regolith behavior under asteroid-level gravity conditions: low-velocity impact experiments

    Authors: Julie Brisset, Joshua E. Colwell, Adrienne Dove, Sumayya Abukhalil, Christopher Cox, Nadia Mohammed

    Abstract: The dusty regolith covering the surfaces of asteroids and planetary satellites differs in size, shape, and composition from terrestrial soil particles and is subject to very different environmental conditions. Experimental studies of the response of planetary regolith in the relevant environmental conditions are thus necessary to facilitate future Solar System exploration activities. We combined t… ▽ More

    Submitted 2 October, 2018; originally announced October 2018.

  42. arXiv:1809.00339  [pdf, other

    cs.CL cs.CV

    Chittron: An Automatic Bangla Image Captioning System

    Authors: Motiur Rahman, Nabeel Mohammed, Nafees Mansoor, Sifat Momen

    Abstract: Automatic image caption generation aims to produce an accurate description of an image in natural language automatically. However, Bangla, the fifth most widely spoken language in the world, is lagging considerably in the research and development of such domain. Besides, while there are many established data sets to related to image annotation in English, no such resource exists for Bangla yet. He… ▽ More

    Submitted 2 September, 2018; originally announced September 2018.

  43. arXiv:1703.10661  [pdf, other

    cs.CL

    BanglaLekha-Isolated: A Comprehensive Bangla Handwritten Character Dataset

    Authors: Mithun Biswas, Rafiqul Islam, Gautam Kumar Shom, Md Shopon, Nabeel Mohammed, Sifat Momen, Md Anowarul Abedin

    Abstract: Bangla handwriting recognition is becoming a very important issue nowadays. It is potentially a very important task specially for Bangla speaking population of Bangladesh and West Bengal. By kee** that in our mind we are introducing a comprehensive Bangla handwritten character dataset named BanglaLekha-Isolated. This dataset contains Bangla handwritten numerals, basic characters and compound cha… ▽ More

    Submitted 22 February, 2017; originally announced March 2017.

    Comments: Bangla Handwriting Dataset, OCR

  44. arXiv:1703.02577  [pdf, other

    cs.CR

    SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption

    Authors: Md Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Feng Chen, Shuang Wang, Xiaoqian Jiang

    Abstract: Recent studies demonstrate that effective healthcare can benefit from using the human genomic information. For instance, analysis of tumor genomes has revealed 140 genes whose mutations contribute to cancer. As a result, many institutions are using statistical analysis of genomic data, which are mostly based on genome-wide association studies (GWAS). GWAS analyze genome sequence variations in orde… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: Hybrid Cryptosystem using SGX and Homomorphic Encryption

  45. arXiv:1703.01534  [pdf, other

    cs.CR

    Secure Count Query on Encrypted Genomic Data

    Authors: Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, Noman Mohammed

    Abstract: Capturing the vast amount of meaningful information encoded in the human genome is a fascinating research problem. The outcome of these researches have significant influences in a number of health related fields --- personalized medicine, paternity testing and disease susceptibility testing are a few to be named. To facilitate these types of large scale biomedical research projects, it oftentimes… ▽ More

    Submitted 4 March, 2017; originally announced March 2017.

    Comments: 19 pages, 7 figures, 3rd International Workshop on Genome Privacy and Security (GenoPri'16)

  46. arXiv:1610.00369  [pdf

    cs.CL cs.IR cs.LG cs.NE

    Sentiment Analysis on Bangla and Romanized Bangla Text (BRBT) using Deep Recurrent models

    Authors: A. Hassan, M. R. Amin, N. Mohammed, A. K. A. Azad

    Abstract: Sentiment Analysis (SA) is an action research area in the digital age. With rapid and constant growth of online social media sites and services, and the increasing amount of textual data such as - statuses, comments, reviews etc. available in them, application of automatic SA is on the rise. However, most of the research works on SA in natural language processing (NLP) are based on English languag… ▽ More

    Submitted 23 November, 2016; v1 submitted 2 October, 2016; originally announced October 2016.

  47. arXiv:1512.07158  [pdf, ps, other

    cs.LG cs.CR

    Feature Selection for Classification under Anonymity Constraint

    Authors: Baichuan Zhang, Noman Mohammed, Vachik Dave, Mohammad Al Hasan

    Abstract: Over the last decade, proliferation of various online platforms and their increasing adoption by billions of users have heightened the privacy risk of a user enormously. In fact, security researchers have shown that sparse microdata containing information about online activities of a user although anonymous, can still be used to disclose the identity of the user by cross-referencing the data with… ▽ More

    Submitted 5 February, 2017; v1 submitted 22 December, 2015; originally announced December 2015.

    Comments: Transactions on Data Privacy 2017

  48. A class of energy based ensembles in Tsallis statistics

    Authors: R. Chandrashekar, S. S. Naina Mohammed

    Abstract: A comprehensive investigation is carried out on the class of energy based ensembles. The eight ensembles are divided into two main classes. In the isothermal class of ensembles the individual members are at the same temperature. A unified framework is evolved to describe the four isothermal ensembles. Such a description is provided both in the second and the third constraint formalisms. The isothe… ▽ More

    Submitted 7 February, 2011; originally announced February 2011.

  49. arXiv:0908.0081  [pdf, ps, other

    cond-mat.stat-mech

    Nonextensive statistics of relativistic ideal gas

    Authors: R. Chakrabarti, R. Chandrashekar, S. S. Naina Mohammed

    Abstract: We obtain the specific heat in the third constraint scenario for a canonical ensemble of a nonextensive extreme relativistic ideal gas in a closed form. The canonical ensemble of N particles in D dimensions is well-defined for the choice of the deformation parameter in the range 0 < q < 1 + 1 / DN. For a relativistic ideal gas with particles of arbitrary mass a perturbative scheme in the nonexte… ▽ More

    Submitted 1 August, 2009; originally announced August 2009.

  50. arXiv:0906.3771  [pdf

    cs.NI

    High Transmission Bit Rate of A thermal Arrayed Waveguide Grating (AWG) Module in Passive Optical Networks

    Authors: Abd El Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Gaber E. S. M. El Abyad, Abd El Fattah A. Saad

    Abstract: In the present paper, high transmission bit rate of a thermal arrayed waveguide grating (AWG) which is composed of lithium niobate (LiNbO3)/polymethyl metha acrylate (PMMA) hybrid materials on a silicon substrate in Passive Optical Networks (PONs) has parametrically analyzed and investigated over wide range of the affecting parameters. We have theoretically investigated the temperature dependent… ▽ More

    Submitted 19 June, 2009; originally announced June 2009.

    Comments: 9 pages, International Journal of Computer Science and Information Security

    Journal ref: IJCSIS, May 2009, Vol. 1