Skip to main content

Showing 1–5 of 5 results for author: Hasib, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16917  [pdf, other

    cs.LG cs.AI cs.CV

    Grad Queue : A probabilistic framework to reinforce sparse gradients

    Authors: Irfan Mohammad Al Hasib

    Abstract: Informative gradients are often lost in large batch updates. We propose a robust mechanism to reinforce the sparse components within a random batch of data points. A finite queue of online gradients is used to determine their expected instantaneous statistics. We propose a function to measure the scarcity of incoming gradients using these statistics and establish the theoretical ground of this mec… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: 15 pages, 6 figures

  2. arXiv:2309.13310  [pdf, other

    cs.LG

    An Interpretable Systematic Review of Machine Learning Models for Predictive Maintenance of Aircraft Engine

    Authors: Abdullah Al Hasib, Ashikur Rahman, Mahpara Khabir, Md. Tanvir Rouf Shawon

    Abstract: This paper presents an interpretable review of various machine learning and deep learning models to predict the maintenance of aircraft engine to avoid any kind of disaster. One of the advantages of the strategy is that it can work with modest datasets. In this study, sensor data is utilized to predict aircraft engine failure within a predetermined number of cycles using LSTM, Bi-LSTM, RNN, Bi-RNN… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

  3. Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach

    Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman

    Abstract: Financial fraud cases are on the rise even with the current technological advancements. Due to the lack of inter-organization synergy and because of privacy concerns, authentic financial transaction data is rarely available. On the other hand, data-driven technologies like machine learning need authentic data to perform precisely in real-world systems. This study proposes a blockchain and smart co… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

  4. arXiv:2208.06827  [pdf

    cs.CV

    BDSL 49: A Comprehensive Dataset of Bangla Sign Language

    Authors: Ayman Hasib, Saqib Sizan Khan, Jannatul Ferdous Eva, Mst. Nipa Khatun, Ashraful Haque, Nishat Shahrin, Rashik Rahman, Hasan Murad, Md. Rajibul Islam, Molla Rashied Hussein

    Abstract: Language is a method by which individuals express their thoughts. Each language has its own set of alphabetic and numeric characters. People can communicate with one another through either oral or written communication. However, each language has a sign language counterpart. Individuals who are deaf and/or mute communicate through sign language. The Bangla language also has a sign language, which… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

    Comments: 16 pages; 6 figures; Submitted to Data in Brief, a multidisciplinary, open-access and peer-reviewed journal for reviewing

  5. arXiv:1002.1160  [pdf

    cs.CR

    Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    Authors: Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Morshed

    Abstract: The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. Howe… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 2, January 2010, http://ijcsi.org/articles/Towards-Public-Key-Infrastructure-less-authentication-in-Session-Initiation-Protocol.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 2, January 2010, http://ijcsi.org/articles/Towards-Public-Key-Infrastructure-less-authentication-in-Session-Initiation-Protocol.php