Skip to main content

Showing 1–3 of 3 results for author: Hasan, S M R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.03606  [pdf, other

    cs.SD cs.AI cs.IR eess.AS

    Analyzing Musical Characteristics of National Anthems in Relation to Global Indices

    Authors: S M Rakib Hasan, Aakar Dhakal, Ms. Ayesha Siddiqua, Mohammad Mominur Rahman, Md Maidul Islam, Mohammed Arfat Raihan Chowdhury, S M Masfequier Rahman Swapno, SM Nuruzzaman Nobel

    Abstract: Music plays a huge part in sha** peoples' psychology and behavioral patterns. This paper investigates the connection between national anthems and different global indices with computational music analysis and statistical correlation analysis. We analyze national anthem musical data to determine whether certain musical characteristics are associated with peace, happiness, suicide rate, crime rate… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  2. arXiv:2404.02375  [pdf, other

    cs.CL

    Optical Text Recognition in Nepali and Bengali: A Transformer-based Approach

    Authors: S M Rakib Hasan, Aakar Dhakal, Md Humaion Kabir Mehedi, Annajiat Alim Rasel

    Abstract: Efforts on the research and development of OCR systems for Low-Resource Languages are relatively new. Low-resource languages have little training data available for training Machine Translation systems or other systems. Even though a vast amount of text has been digitized and made available on the internet the text is still in PDF and Image format, which are not instantly accessible. This paper di… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: Accepted and Presented at ICAECC 2023, Bengaluru, India

  3. arXiv:2404.02372  [pdf, other

    cs.CR cs.CL cs.LG

    Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis

    Authors: S M Rakib Hasan, Aakar Dhakal

    Abstract: In the era of the internet and smart devices, the detection of malware has become crucial for system security. Malware authors increasingly employ obfuscation techniques to evade advanced security solutions, making it challenging to detect and eliminate threats. Obfuscated malware, adept at hiding itself, poses a significant risk to various platforms, including computers, mobile devices, and IoT d… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: Accepted and Presented at IEEE-ICTP2023, Dhaka, Bangladesh