Skip to main content

Showing 1–34 of 34 results for author: Alam, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07599  [pdf, other

    cs.CR cs.AI

    CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Le Nguyen, Nidhi Rastogi

    Abstract: Cyber threat intelligence (CTI) is crucial in today's cybersecurity landscape, providing essential insights to understand and mitigate the ever-evolving cyber threats. The recent rise of Large Language Models (LLMs) have shown potential in this domain, but concerns about their reliability, accuracy, and hallucinations persist. While existing benchmarks provide general evaluations of LLMs, there ar… ▽ More

    Submitted 24 June, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2405.20441  [pdf, other

    cs.CR cs.AI cs.HC

    SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory

    Authors: Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, Nidhi Rastogi

    Abstract: Large Language Models (LLMs) have demonstrated potential in cybersecurity applications but have also caused lower confidence due to problems like hallucinations and a lack of truthfulness. Existing benchmarks provide general evaluations but do not sufficiently address the practical and applied aspects of LLM performance in cybersecurity-specific tasks. To address this gap, we introduce the SECURE… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  3. arXiv:2405.13267  [pdf, other

    cs.CV

    FLARE up your data: Diffusion-based Augmentation Method in Astronomical Imaging

    Authors: Mohammed Talha Alam, Raza Imam, Mohsen Guizani, Fakhri Karray

    Abstract: The intersection of Astronomy and AI encounters significant challenges related to issues such as noisy backgrounds, lower resolution (LR), and the intricate process of filtering and archiving images from advanced telescopes like the James Webb. Given the dispersion of raw images in feature space, we have proposed a \textit{two-stage augmentation framework} entitled as \textbf{FLARE} based on \unde… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: 15 pages main paper (including references), 3 pages supplementary material. Our code and SpaceNet dataset is available at https://github.com/Razaimam45/PlanetX_Dxb

  4. arXiv:2404.10789  [pdf, other

    cs.CR cs.AI cs.LG

    PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis

    Authors: Dipkamal Bhusal, Md Tanvirul Alam, Monish K. Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi

    Abstract: Deep neural networks for classification are vulnerable to adversarial attacks, where small perturbations to input samples lead to incorrect predictions. This susceptibility, combined with the black-box nature of such networks, limits their adoption in critical applications like autonomous driving. Feature-attribution-based explanation methods provide relevance of input features for model predictio… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 9th IEEE European Symposium on Security and Privacy

  5. arXiv:2403.15143  [pdf, other

    cs.CV cs.AI

    Modular Deep Active Learning Framework for Image Annotation: A Technical Report for the Ophthalmo-AI Project

    Authors: Md Abdul Kadir, Hasan Md Tusfiqur Alam, Pascale Maul, Hans-Jürgen Profitlich, Moritz Wolf, Daniel Sonntag

    Abstract: Image annotation is one of the most essential tasks for guaranteeing proper treatment for patients and tracking progress over the course of therapy in the field of medical imaging and disease diagnosis. However, manually annotating a lot of 2D and 3D imaging data can be extremely tedious. Deep Learning (DL) based segmentation algorithms have completely transformed this process and made it possible… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: DFKI Technical Report

  6. arXiv:2401.12790  [pdf, other

    cs.LG

    MORPH: Towards Automated Concept Drift Adaptation for Malware Detection

    Authors: Md Tanvirul Alam, Romy Fieblinger, Ashim Mahara, Nidhi Rastogi

    Abstract: Concept drift is a significant challenge for malware detection, as the performance of trained machine learning models degrades over time, rendering them impractical. While prior research in malware concept drift adaptation has primarily focused on active learning, which involves selecting representative samples to update the model, self-training has emerged as a promising approach to mitigate conc… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  7. arXiv:2311.09607  [pdf, other

    eess.IV cs.CV

    Multi-Task Learning Approach for Unified Biometric Estimation from Fetal Ultrasound Anomaly Scans

    Authors: Mohammad Areeb Qazi, Mohammed Talha Alam, Ibrahim Almakky, Werner Gerhard Diehl, Leanne Bricker, Mohammad Yaqub

    Abstract: Precise estimation of fetal biometry parameters from ultrasound images is vital for evaluating fetal growth, monitoring health, and identifying potential complications reliably. However, the automated computerized segmentation of the fetal head, abdomen, and femur from ultrasound images, along with the subsequent measurement of fetal biometrics, remains challenging. In this work, we propose a mult… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 10 Pages, 4 Figures, The 4th International Conference on Medical Imaging and Computer-Aided Diagnosis

  8. arXiv:2309.03748  [pdf, other

    cs.CL cs.AI cs.LG stat.ML

    Enhancing Pipeline-Based Conversational Agents with Large Language Models

    Authors: Mina Foosherian, Hendrik Purwins, Purna Rathnayake, Touhidul Alam, Rui Teimao, Klaus-Dieter Thoben

    Abstract: The latest advancements in AI and deep learning have led to a breakthrough in large language model (LLM)-based agents such as GPT-4. However, many commercial conversational agent development tools are pipeline-based and have limitations in holding a human-like conversation. This paper investigates the capabilities of LLMs to enhance pipeline-based conversational agents during two phases: 1) in the… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

    MSC Class: 68T50 ACM Class: I.2.7

  9. arXiv:2308.06821  [pdf, other

    cs.CV

    Optimizing Brain Tumor Classification: A Comprehensive Study on Transfer Learning and Imbalance Handling in Deep Learning Models

    Authors: Raza Imam, Mohammed Talha Alam

    Abstract: Deep learning has emerged as a prominent field in recent literature, showcasing the introduction of models that utilize transfer learning to achieve remarkable accuracies in the classification of brain tumor MRI images. However, the majority of these proposals primarily focus on balanced datasets, neglecting the inherent data imbalance present in real-world scenarios. Consequently, there is a pres… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: Our code is available at https://github.com/Razaimam45/AI701-Project-Transfer-Learning-approach-for-imbalance-classification-of-Brain-Tumor-MRI-

    Journal ref: E-pi UAI workshop (UAI 2023)

  10. arXiv:2307.10745  [pdf, other

    cs.CV

    EdgeAL: An Edge Estimation Based Active Learning Approach for OCT Segmentation

    Authors: Md Abdul Kadir, Hasan Md Tusfiqur Alam, Daniel Sonntag

    Abstract: Active learning algorithms have become increasingly popular for training models with limited data. However, selecting data for annotation remains a challenging problem due to the limited information available on unseen data. To address this issue, we propose EdgeAL, which utilizes the edge information of unseen images as {\it a priori} information for measuring uncertainty. The uncertainty is quan… ▽ More

    Submitted 25 July, 2023; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: This version of the contribution has been submitted in miccai2023

  11. Brain Tumor Synthetic Data Generation with Adaptive StyleGANs

    Authors: Usama Tariq, Rizwan Qureshi, Anas Zafar, Danyal Aftab, Jia Wu, Tanvir Alam, Zubair Shah, Hazrat Ali

    Abstract: Generative models have been very successful over the years and have received significant attention for synthetic data generation. As deep learning models are getting more and more complex, they require large amounts of data to perform accurately. In medical image analysis, such generative models play a crucial role as the available data is limited due to challenges related to data privacy, lack of… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

    Comments: Accepted in AICS conference

  12. arXiv:2211.01753  [pdf, other

    cs.CR cs.LG

    Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

    Abstract: Public and commercial organizations extensively share cyberthreat intelligence (CTI) to prepare systems to defend against existing and emerging cyberattacks. However, traditional CTI has primarily focused on tracking known threat indicators such as IP addresses and domain names, which may not provide long-term value in defending against evolving attacks. To address this challenge, we propose to us… ▽ More

    Submitted 11 July, 2023; v1 submitted 1 November, 2022; originally announced November 2022.

  13. arXiv:2208.08433  [pdf, other

    cs.CR cs.HC cs.LG eess.SP

    Label Flip** Data Poisoning Attack Against Wearable Human Activity Recognition System

    Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam

    Abstract: Human Activity Recognition (HAR) is a problem of interpreting sensor data to human movement using an efficient machine learning (ML) approach. The HAR systems rely on data from untrusted users, making them susceptible to data poisoning attacks. In a poisoning attack, attackers manipulate the sensor readings to contaminate the training set, misleading the HAR to produce erroneous outcomes. This pap… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: Submitted to IEEE SSCI 2022 Conference

  14. arXiv:2204.05754  [pdf, other

    cs.CR cs.LG

    CyNER: A Python Library for Cybersecurity Named Entity Recognition

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

    Abstract: Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format from heterogeneous sources on the Internet. We present CyNER, an open-source python library for cybersecurity named entity recognition (NER). CyNER combines transformer-based models for extracting cybersecurity-related entities, heuristics for extracting different indicators of compromise, and publicly avai… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  15. arXiv:2108.12828  [pdf, other

    cs.CV cs.CY cs.LG cs.SI

    MEDIC: A Multi-Task Learning Dataset for Disaster Image Classification

    Authors: Firoj Alam, Tanvirul Alam, Md. Arid Hasan, Abul Hasnat, Muhammad Imran, Ferda Ofli

    Abstract: Recent research in disaster informatics demonstrates a practical and important use case of artificial intelligence to save human lives and suffering during natural disasters based on social media contents (text and images). While notable progress has been made using texts, research on exploiting the images remains relatively under-explored. To advance image-based approaches, we propose MEDIC (Avai… ▽ More

    Submitted 8 June, 2022; v1 submitted 29 August, 2021; originally announced August 2021.

    Comments: Multi-task Learning, Social media images, Image Classification, Natural disasters, Crisis Informatics, Deep learning, Dataset

    MSC Class: 68T50 ACM Class: I.2.7

    Journal ref: Neural Computing and Applications 35, 2609-2632 (2023)

  16. arXiv:2107.03844  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    A Review of Bangla Natural Language Processing Tasks and the Utility of Transformer Models

    Authors: Firoj Alam, Arid Hasan, Tanvirul Alam, Akib Khan, Janntatul Tajrin, Naira Khan, Shammur Absar Chowdhury

    Abstract: Bangla -- ranked as the 6th most widely spoken language across the world (https://www.ethnologue.com/guides/ethnologue200), with 230 million native speakers -- is still considered as a low-resource language in the natural language processing (NLP) community. With three decades of research, Bangla NLP (BNLP) is still lagging behind mainly due to the scarcity of resources and the challenges that com… ▽ More

    Submitted 25 July, 2021; v1 submitted 8 July, 2021; originally announced July 2021.

    Comments: Under Review, Bangla language processing, text classification, sequence tagging, datasets, benchmarks, transformer models

    MSC Class: 68T50 ACM Class: I.2.7

  17. arXiv:2104.09632  [pdf

    cs.IR

    Searching for Scientific Evidence in a Pandemic: An Overview of TREC-COVID

    Authors: Kirk Roberts, Tasmeer Alam, Steven Bedrick, Dina Demner-Fushman, Kyle Lo, Ian Soboroff, Ellen Voorhees, Lucy Lu Wang, William R Hersh

    Abstract: We present an overview of the TREC-COVID Challenge, an information retrieval (IR) shared task to evaluate search on scientific literature related to COVID-19. The goals of TREC-COVID include the construction of a pandemic search test collection and the evaluation of IR methods for COVID-19. The challenge was conducted over five rounds from April to July, 2020, with participation from 92 unique tea… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

  18. arXiv:2104.04184  [pdf, other

    cs.CV cs.CY cs.LG cs.SI

    Robust Training of Social Media Image Classification Models for Rapid Disaster Response

    Authors: Firoj Alam, Tanvirul Alam, Muhammad Imran, Ferda Ofli

    Abstract: Images shared on social media help crisis managers gain situational awareness and assess incurred damages, among other response tasks. As the volume and velocity of such content are typically high, real-time image classification has become an urgent need for a faster disaster response. Recent advances in computer vision and deep neural networks have enabled the development of models for real-time… ▽ More

    Submitted 19 July, 2021; v1 submitted 9 April, 2021; originally announced April 2021.

    Comments: Social media images, Image Classification, Natural disasters, Crisis Informatics, Deep learning. Extended version of arXiv:2011.08916. arXiv admin note: substantial text overlap with arXiv:2011.08916

    MSC Class: 68T50 ACM Class: I.2.7

  19. arXiv:2102.04844  [pdf

    cs.SE

    Contact Tracing Apps for COVID-19: Access Permission and User Adoption

    Authors: Amal Awadalla Ali, Asma Hamid ElFadl, Maha Fawzy Abujazar, Sarah Aziz, Alaa Abd-Alrazaq, Zubair Shah, Samir Brahim Belhaouari, Mowafa Househ, Tanvir Alam

    Abstract: Contact tracing apps are powerful software tools that can help control the spread of COVID-19. In this article, we evaluated 53 COVID-19 contact tracing apps found on the Google Play Store in terms of their usage, rating, access permission, and user privacy. For each app included in the study, we identified the country of origin, number of downloads, and access permissions to further understand th… ▽ More

    Submitted 6 February, 2021; originally announced February 2021.

    Comments: Contact Tracing Apps for COVID-19

  20. arXiv:2102.02009  [pdf

    cs.AI

    Social Network Analysis of Hadith Narrators from Sahih Bukhari

    Authors: Tanvir Alam, Jens Schneider

    Abstract: The ahadith, prophetic traditions for the Muslims around the world, are narrations originating from the sayings and the deeds of Prophet Muhammad (pbuh). They are considered one of the fundamental sources of Islamic legislation along with the Quran. The list of persons involved in the narration of each hadith is carefully scrutinized by scholars studying the hadith, with respect to their reputatio… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: Social Network Analysis of Hadith Narrators from Sahih Bukhari

  21. arXiv:2011.08916  [pdf, other

    cs.CV cs.AI

    Deep Learning Benchmarks and Datasets for Social Media Image Classification for Disaster Response

    Authors: Firoj Alam, Ferda Ofli, Muhammad Imran, Tanvirul Alam, Umair Qazi

    Abstract: During a disaster event, images shared on social media helps crisis managers gain situational awareness and assess incurred damages, among other response tasks. Recent advances in computer vision and deep neural networks have enabled the development of models for real-time image classification for a number of tasks, including detecting crisis incidents, filtering irrelevant images, classifying ima… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

  22. arXiv:2011.04446  [pdf

    cs.CL cs.LG

    Bangla Text Classification using Transformers

    Authors: Tanvirul Alam, Akib Khan, Firoj Alam

    Abstract: Text classification has been one of the earliest problems in NLP. Over time the scope of application areas has broadened and the difficulty of dealing with new areas (e.g., noisy social media content) has increased. The problem-solving strategy switched from classical machine learning to deep learning algorithms. One of the recent deep neural network architecture is the Transformer. Models designe… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

  23. arXiv:2007.12673  [pdf

    cs.OH

    Genetic Algorithm: Reviews, Implementations, and Applications

    Authors: Tanweer Alam, Shamimul Qamar, Amit Dixit, Mohamed Benaida

    Abstract: Nowadays genetic algorithm (GA) is greatly used in engineering pedagogy as an adaptive technique to learn and solve complex problems and issues. It is a meta-heuristic approach that is used to solve hybrid computation challenges. GA utilizes selection, crossover, and mutation operators to effectively manage the searching system strategy. This algorithm is derived from natural selection and genetic… ▽ More

    Submitted 5 June, 2020; originally announced July 2020.

    Journal ref: International Journal of Engineering Pedagogy (iJEP), 2020

  24. arXiv:2006.03596  [pdf

    cs.CR

    Blockchain, Fog and IoT Integrated Framework: Review, Architecture and Evaluation

    Authors: Tanweer Alam, Mohamed Benaida

    Abstract: In the next-generation computing, the role of cloud, internet, and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store and process big data in the cloud. The fogging acts as an interface betw… ▽ More

    Submitted 5 June, 2020; originally announced June 2020.

    Journal ref: Technology Reports of Kansai University, Vol 62(2), 2020

  25. arXiv:2005.05954  [pdf

    cs.IR cs.CL cs.DL cs.LG q-bio.QM

    COVID-19Base: A knowledgebase to explore biomedical entities related to COVID-19

    Authors: Junaed Younus Khan, Md. Tawkat Islam Khondaker, Iram Tazim Hoque, Hamada Al-Absi, Mohammad Saifur Rahman, Tanvir Alam, M. Sohel Rahman

    Abstract: We are presenting COVID-19Base, a knowledgebase highlighting the biomedical entities related to COVID-19 disease based on literature mining. To develop COVID-19Base, we mine the information from publicly available scientific literature and related public resources. We considered seven topic-specific dictionaries, including human genes, human miRNAs, human lncRNAs, diseases, Protein Databank, drugs… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: 10 pages, 3 figures

    Journal ref: JMIR Med Inform 2020;8(11):e21648

  26. arXiv:2005.04474  [pdf, other

    cs.IR

    TREC-COVID: Constructing a Pandemic Information Retrieval Test Collection

    Authors: Ellen Voorhees, Tasmeer Alam, Steven Bedrick, Dina Demner-Fushman, William R Hersh, Kyle Lo, Kirk Roberts, Ian Soboroff, Lucy Lu Wang

    Abstract: TREC-COVID is a community evaluation designed to build a test collection that captures the information needs of biomedical researchers using the scientific literature during a pandemic. One of the key characteristics of pandemic search is the accelerated rate of change: the topics of interest evolve as the pandemic progresses and the scientific literature in the area explodes. The COVID-19 pandemi… ▽ More

    Submitted 9 May, 2020; originally announced May 2020.

    Comments: 10 pages, 5 figures. TREC-COVID web site: http://ir.nist.gov/covidSubmit/ Will also appear in June 2020 issue of ACM SIGIR Forum

    ACM Class: H.3.0

  27. arXiv:2002.03009  [pdf

    eess.SP cs.LG physics.chem-ph

    Blind Source Separation for NMR Spectra with Negative Intensity

    Authors: Ryan J. McCarty, Nimish Ronghe, Mandy Woo, Todd M. Alam

    Abstract: NMR spectral datasets, especially in systems with limited samples, can be difficult to interpret if they contain multiple chemical components (phases, polymorphs, molecules, crystals, glasses, etc...) and the possibility of overlap** resonances. In this paper, we benchmark several blind source separation techniques for analysis of NMR spectral datasets containing negative intensity. For benchmar… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

    Comments: 28 pages, 6 figures, 5 tables

    MSC Class: 62H25 ACM Class: J.2

  28. arXiv:1911.09581  [pdf, ps, other

    cs.RO

    Feedback Motion Planning for Long-Range Autonomous Underwater Vehicles

    Authors: Opeyemi S. Orioke, Tauhidul Alam, Joseph Quinn, Ramneek Kaur, Wesam H. Alsabban, Leonardo Bobadilla, Ryan N. Smith

    Abstract: Ocean ecosystems have spatiotemporal variability and dynamic complexity that require a long-term deployment of an autonomous underwater vehicle for data collection. A new long-range autonomous underwater vehicle called Tethys is adapted to study different oceanic phenomena. Additionally, an ocean environment has external forces and moments along with changing water currents which are generally not… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

    Comments: IEEE/MTS OCEANS-Marseille 2019

  29. arXiv:1906.08554  [pdf

    cs.NI

    Tactile Internet and its Contribution in the Development of Smart Cities

    Authors: Tanweer Alam

    Abstract: The Tactile Internet (TI) is an emerging technology next to the Internet of Things (IoT). It is a revolution to develop the smart cities, communities and cultures in the future. This technology will allow the real-time interaction between human and machines as well as machine-to-machine with the 1ms challenge to achieve in round trip latency. The term TI is defined by International Telecommunicati… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: 8 Pages

  30. arXiv:1904.00226  [pdf

    cs.NI

    IoT-Fog: A Communication Framework using Blockchain in the Internet of Things

    Authors: Tanweer Alam

    Abstract: In big cloud structures or large data structures, fog computing could be interpreted, referring critically to the growing issues and problems in accessing the information among the Internet of things (IoT) devices. Fog computing can be used to compute, store, control and connect smart devices to each other. IoT is an architecture of uniquely identified interrelated physical things, these physical… ▽ More

    Submitted 3 June, 2020; v1 submitted 30 March, 2019; originally announced April 2019.

    Journal ref: International Journal of Recent Technology and Engineering (IJRTE). Vol. 7(6), 2019

  31. Blockchain and its Role in the Internet of Things (IoT)

    Authors: Tanweer Alam

    Abstract: Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked to its previous blocks. Every block has the cryptographic hash code, previous block hash, and its data. The transactions in BC are the basic units that are used to… ▽ More

    Submitted 5 June, 2020; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 7 Pages

    Journal ref: International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 151-157, 2019

  32. arXiv:1902.09744  [pdf

    cs.NI

    Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart Devices

    Authors: Tanweer Alam

    Abstract: The smart devices are extremely useful devices that are making our lives easier than before. A smart device is facilitated us to establish a connection with another smart device in a wireless network with a decentralized approach. The mobile ad hoc network (MANET) is a novel methodology that discovers neighborhood devices and establishes connection among them without centralized infrastructure. Cl… ▽ More

    Submitted 5 June, 2020; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 8 Pages

    Journal ref: International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017

  33. The Role of Cloud-MANET Framework in the Internet of Things (IoT)

    Authors: Tanweer Alam, Mohamed Benaida

    Abstract: In the next generation of computing, Mobile ad-hoc network (MANET) will play a very important role in the Internet of Things (IoT). The MANET is a kind of wireless networks that are self-organizing and auto connected in a decentralized system. Every device in MANET can be moved freely from one location to another in any direction. They can create a network with their neighbors smart devices and fo… ▽ More

    Submitted 5 June, 2020; v1 submitted 25 February, 2019; originally announced February 2019.

    Comments: arXiv admin note: text overlap with arXiv:1902.09744

    Journal ref: International Journal of Online Engineering (iJOE). ISSN: 2626-8493, Vol 14, No 12 (2018)

  34. arXiv:1808.05164  [pdf, ps, other

    cs.RO

    An Underactuated Vehicle Localization Method in Marine Environments

    Authors: Tauhidul Alam, Gregory Murad Reis, Leonardo Bobadilla, Ryan N. Smith

    Abstract: The underactuated vehicles are apposite for the long-term deployment and data collection in spatiotemporally varying marine environments. However, these vehicles need to estimate their positions (states) with intrinsic sensing in their long-term trajectories. In previous studies, autonomous underwater vehicles have commonly used vision and range sensors for autonomous state estimation. Inspired by… ▽ More

    Submitted 15 August, 2018; originally announced August 2018.

    Comments: IEEE/MTS OCEANS-Charleston 2018