Skip to main content

Showing 1–10 of 10 results for author: Ali, M H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08344  [pdf, other

    cs.CV

    Blind Image Deblurring using FFT-ReLU with Deep Learning Pipeline Integration

    Authors: Abdul Mohaimen Al Radi, Prothito Shovon Majumder, Syed Mumtahin Mahmud, Mahdi Mohd Hossain Noki, Md. Haider Ali, Md. Mosaddek Khan

    Abstract: Blind image deblurring is the process of deriving a sharp image and a blur kernel from a blurred image. Blurry images are typically modeled as the convolution of a sharp image with a blur kernel, necessitating the estimation of the unknown blur kernel to perform blind image deblurring effectively. Existing approaches primarily focus on domain-specific features of images, such as salient edges, dar… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: 20 pages, 13 figures

  2. arXiv:2312.09162  [pdf, other

    cs.CC cs.AI

    Approximation Algorithms for Preference Aggregation Using CP-Nets

    Authors: Abu Mohammmad Hammad Ali, Boting Yang, Sandra Zilles

    Abstract: This paper studies the design and analysis of approximation algorithms for aggregating preferences over combinatorial domains, represented using Conditional Preference Networks (CP-nets). Its focus is on aggregating preferences over so-called \emph{swaps}, for which optimal solutions in general are already known to be of exponential size. We first analyze a trivial 2-approximation algorithm that s… ▽ More

    Submitted 15 December, 2023; v1 submitted 14 December, 2023; originally announced December 2023.

    Comments: 11 pages, main body and appendix. Full version of a paper accepted at the 38th Annual AAAI Conference on Artificial Intelligence

  3. arXiv:2304.06020  [pdf, other

    cs.CV

    VidStyleODE: Disentangled Video Editing via StyleGAN and NeuralODEs

    Authors: Moayed Haji Ali, Andrew Bond, Tolga Birdal, Duygu Ceylan, Levent Karacan, Erkut Erdem, Aykut Erdem

    Abstract: We propose $\textbf{VidStyleODE}$, a spatiotemporally continuous disentangled $\textbf{Vid}$eo representation based upon $\textbf{Style}$GAN and Neural-$\textbf{ODE}$s. Effective traversal of the latent space learned by Generative Adversarial Networks (GANs) has been the basis for recent breakthroughs in image editing. However, the applicability of such advancements to the video domain has been hi… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Journal ref: ICCV 2023

  4. arXiv:2303.09063  [pdf, other

    cs.CV cs.LG

    Plant Disease Detection using Region-Based Convolutional Neural Network

    Authors: Hasin Rehana, Muhammad Ibrahim, Md. Haider Ali

    Abstract: Agriculture plays an important role in the food and economy of Bangladesh. The rapid growth of population over the years also has increased the demand for food production. One of the major reasons behind low crop production is numerous bacteria, virus and fungal plant diseases. Early detection of plant diseases and proper usage of pesticides and fertilizers are vital for preventing the diseases an… ▽ More

    Submitted 12 September, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 23 pages

  5. arXiv:2207.10807  [pdf

    cs.LG eess.SP

    A Machine Learning Approach for Driver Identification Based on CAN-BUS Sensor Data

    Authors: Md. Abbas Ali Khan, Mphammad Hanif Ali, AKM Fazlul Haque, Md. Tarek Habib

    Abstract: Driver identification is a momentous field of modern decorated vehicles in the controller area network (CAN-BUS) perspective. Many conventional systems are used to identify the driver. One step ahead, most of the researchers use sensor data of CAN-BUS but there are some difficulties because of the variation of the protocol of different models of vehicle. Our aim is to identify the driver through s… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  6. arXiv:2109.10763  [pdf

    cs.CR eess.SY

    A Deep Learning Perspective on Connected Automated Vehicle (CAV) Cybersecurity and Threat Intelligence

    Authors: Manoj Basnet, Mohd. Hasan Ali

    Abstract: The automation and connectivity of CAV inherit most of the cyber-physical vulnerabilities of incumbent technologies such as evolving network architectures, wireless communications, and AI-based automation. This book chapter entails the cyber-physical vulnerabilities and risks that originated in IT, OT, and the physical domains of the CAV ecosystem, eclectic threat landscapes, and threat intelligen… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: Book chapter

  7. arXiv:2105.00852  [pdf

    cs.DC cs.RO

    Real-time Autonomous Robot for Object Tracking using Vision System

    Authors: Qazwan Abdullah, Nor Shahida Mohd Shah, Mahathir Mohamad, Muaammar Hadi Kuzman Ali, Nabil Farah, Adeb Salh, Maged Aboali, Mahmod Abd Hakim Mohamad, Abdu Saif

    Abstract: Researchers and robotic development groups have recently started paying special attention to autonomous mobile robot navigation in indoor environments using vision sensors. The required data is provided for robot navigation and object detection using a camera as a sensor. The aim of the project is to construct a mobile robot that has integrated vision system capability used by a webcam to locate,… ▽ More

    Submitted 26 April, 2021; originally announced May 2021.

    Journal ref: www.solidstatetechnology.us Solid State Technology Volume: 63 Issue: 6 Publication Year: 2020

  8. arXiv:2104.07409  [pdf

    eess.SY cs.LG

    Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station

    Authors: Manoj Basnet, Subash Poudyal, Mohd. Hasan Ali, Dipankar Dasgupta

    Abstract: The Supervisory control and data acquisition (SCADA) systems have been continuously leveraging the evolution of network architecture, communication protocols, next-generation communication techniques (5G, 6G, Wi-Fi 6), and the internet of things (IoT). However, SCADA system has become the most profitable and alluring target for ransomware attackers. This paper proposes the deep learning-based nove… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: conference

  9. arXiv:1405.3195  [pdf

    cs.CV

    An Intelligent Pixel Replication Technique by Binary Decomposition for Digital Image Zooming

    Authors: Kaeser M Sabrin, M Haider Ali

    Abstract: Image zooming is the process of enlarging the spatial resolution of a given digital image. We present a novel technique that intelligently modifies the classical pixel replication method for zooming. Our method decomposes a given image into layer of binary images, interpolates them by magnifying the binary patterns preserving their geometric shape and finally aggregates them all to obtain the zoom… ▽ More

    Submitted 13 May, 2014; originally announced May 2014.

    Journal ref: Proceedings of the 26th Image and Vision Computing New Zealand Conference (IVCNZ 2011), P.Delmas, B.Wuensche, J. James, Eds., 29 Nov - 1 Dec 2011, Auckland, New Zealand, IVCNZ, pp. 547 - 552, 2011

  10. arXiv:1008.3346  [pdf

    cs.CV

    A Miniature-Based Image Retrieval System

    Authors: Md. Saiful Islam, Md. Haider Ali

    Abstract: Due to the rapid development of World Wide Web (WWW) and imaging technology, more and more images are available in the Internet and stored in databases. Searching the related images by the querying image is becoming tedious and difficult. Most of the images on the web are compressed by methods based on discrete cosine transform (DCT) including Joint Photographic Experts Group(JPEG) and H.261. This… ▽ More

    Submitted 19 August, 2010; originally announced August 2010.

    Comments: 9 pages, 4 figures, 4 tables

    Journal ref: Dhaka University Journal of Science,Vol. 57, No. 2, pp. 187-191, July 2009