Skip to main content

Showing 1–5 of 5 results for author: Nasir, B

.
  1. arXiv:2304.04839  [pdf

    cs.LG cs.CY

    MHfit: Mobile Health Data for Predicting Athletics Fitness Using Machine Learning

    Authors: Jonayet Miah, Muntasir Mamun, Md Minhazur Rahman, Md Ishtyaq Mahmud, Sabbir Ahmed, Md Hasan Bin Nasir

    Abstract: Mobile phones and other electronic gadgets or devices have aided in collecting data without the need for data entry. This paper will specifically focus on Mobile health data. Mobile health data use mobile devices to gather clinical health data and track patient vitals in real-time. Our study is aimed to give decisions for small or big sports teams on whether one athlete good fit or not for a parti… ▽ More

    Submitted 26 April, 2023; v1 submitted 10 April, 2023; originally announced April 2023.

    Comments: 6, Accepted by 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)

  2. arXiv:1707.05272  [pdf, other

    cs.SE

    Learn More, Pay Less! Lessons Learned from Applying the Wizard-of-Oz Technique for Exploring Mobile App Requirements

    Authors: Zahra Shakeri Hossein Abad, Shane D. V. Sims, Abdullah Cheema, Montasir B. Nasir, Payal Harisinghani

    Abstract: Mobile apps have exploded in popularity, encouraging developers to provide content to the massive user base of the main app stores. Although there exist automated techniques that can classify user comments into various topics with high levels of precision, recent studies have shown that the top apps in the app stores do not have customer ratings that directly correlate with the app's success. This… ▽ More

    Submitted 17 July, 2017; originally announced July 2017.

    Comments: 8 pages, IEEE International Requirements Engineering Conference Workshops (REW'17)

  3. High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain

    Authors: Debayan Das, Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen

    Abstract: With the advancement of technology in the last few decades, leading to the widespread availability of miniaturized sensors and internet-connected things (IoT), security of electronic devices has become a top priority. Side-channel attack (SCA) is one of the prominent methods to break the security of an encryption system by exploiting the information leaked from the physical devices. Correlational… ▽ More

    Submitted 8 May, 2017; v1 submitted 30 March, 2017; originally announced March 2017.

    Comments: IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2017

  4. arXiv:1702.02676  [pdf, other

    cs.NE cs.AI cs.LG

    Energy Saving Additive Neural Network

    Authors: Arman Afrasiyabi, Ozan Yildiz, Baris Nasir, Fatos T. Yarman Vural, A. Enis Cetin

    Abstract: In recent years, machine learning techniques based on neural networks for mobile computing become increasingly popular. Classical multi-layer neural networks require matrix multiplications at each stage. Multiplication operation is not an energy efficient operation and consequently it drains the battery of the mobile device. In this paper, we propose a new energy efficient neural network with the… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: 8 pages (double column), 2 figures, 1 table

  5. arXiv:1501.00579  [pdf

    cs.AR

    A Model Study of an All-Digital, Discrete-Time and Embedded Linear Regulator

    Authors: Saad Bin Nasir, Arijit Raychowdhury

    Abstract: With an increasing number of power-states, finer- grained power management and larger dynamic ranges of digital circuits, the integration of compact, scalable linear-regulators embedded deep within logic blocks has become important. While analog linear-regulators have traditionally been used in digital ICs, the need for digitally implementable designs that can be synthesized and embedded in digita… ▽ More

    Submitted 3 January, 2015; originally announced January 2015.

    Comments: Submitted