Skip to main content

Showing 1–19 of 19 results for author: Hassan, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02344  [pdf, other

    cs.CR cs.CV

    Generative AI-Based Effective Malware Detection for Embedded Computing Systems

    Authors: Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: One of the pivotal security threats for the embedded computing systems is malicious software a.k.a malware. With efficiency and efficacy, Machine Learning (ML) has been widely adopted for malware detection in recent times. Despite being efficient, the existing techniques require a tremendous number of benign and malware samples for training and modeling an efficient malware detector. Furthermore,… ▽ More

    Submitted 12 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  2. arXiv:2403.20084  [pdf

    cs.CL

    IPA Transcription of Bengali Texts

    Authors: Kanij Fatema, Fazle Dawood Haider, Nirzona Ferdousi Turpa, Tanveer Azmal, Sourav Ahmed, Navid Hasan, Mohammad Akhlaqur Rahman, Biplab Kumar Sarkar, Afrar Jahin, Md. Rezuwan Hassan, Md Foriduzzaman Zihad, Rubayet Sabbir Faruque, Asif Sushmit, Mashrur Imtiaz, Farig Sadeque, Syed Shahrier Rahman

    Abstract: The International Phonetic Alphabet (IPA) serves to systematize phonemes in language, enabling precise textual representation of pronunciation. In Bengali phonology and phonetics, ongoing scholarly deliberations persist concerning the IPA standard and core Bengali phonemes. This work examines prior research, identifies current and potential issues, and suggests a framework for a Bengali IPA standa… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  3. arXiv:2401.01481  [pdf, other

    cs.RO cs.MA

    Optimizing UAV-UGV Coalition Operations: A Hybrid Clustering and Multi-Agent Reinforcement Learning Approach for Path Planning in Obstructed Environment

    Authors: Shamyo Brotee, Farhan Kabir, Md. Abdur Razzaque, Palash Roy, Md. Mamun-Or-Rashid, Md. Rafiul Hassan, Mohammad Mehedi Hassan

    Abstract: One of the most critical applications undertaken by coalitions of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) is reaching predefined targets by following the most time-efficient routes while avoiding collisions. Unfortunately, UAVs are hampered by limited battery life, and UGVs face challenges in reachability due to obstacles and elevation variations. Existing literature pr… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  4. arXiv:2311.16277  [pdf, other

    cs.LG cs.AI

    A Graph Neural Network-Based QUBO-Formulated Hamiltonian-Inspired Loss Function for Combinatorial Optimization using Reinforcement Learning

    Authors: Redwan Ahmed Rizvee, Raheeb Hassan, Md. Mosaddek Khan

    Abstract: Quadratic Unconstrained Binary Optimization (QUBO) is a generic technique to model various NP-hard Combinatorial Optimization problems (CO) in the form of binary variables. Ising Hamiltonian is used to model the energy function of a system. QUBO to Ising Hamiltonian is regarded as a technique to solve various canonical optimization problems through quantum optimization algorithms. Recently, PI-GNN… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  5. arXiv:2310.14348  [pdf, other

    cs.MA stat.ML

    DePAint: A Decentralized Safe Multi-Agent Reinforcement Learning Algorithm considering Peak and Average Constraints

    Authors: Raheeb Hassan, K. M. Shadman Wadith, Md. Mamun or Rashid, Md. Mosaddek Khan

    Abstract: The domain of safe multi-agent reinforcement learning (MARL), despite its potential applications in areas ranging from drone delivery and vehicle automation to the development of zero-energy communities, remains relatively unexplored. The primary challenge involves training agents to learn optimal policies that maximize rewards while adhering to stringent safety constraints, all without the oversi… ▽ More

    Submitted 3 April, 2024; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: accepted for publication in Springer Applied Intelligence Journal

  6. arXiv:2308.06549  [pdf, other

    cs.HC cs.LG

    Human Behavior-based Personalized Meal Recommendation and Menu Planning Social System

    Authors: Tanvir Islam, Anika Rahman Joyita, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Md. Rafiul Hassan, Raffaele Gravina

    Abstract: The traditional dietary recommendation systems are basically nutrition or health-aware where the human feelings on food are ignored. Human affects vary when it comes to food cravings, and not all foods are appealing in all moods. A questionnaire-based and preference-aware meal recommendation system can be a solution. However, automated recognition of social affects on different foods and planning… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

    Journal ref: IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS. 2022

  7. arXiv:2307.10510  [pdf, other

    cs.CC

    The Complexity of $(P_k, P_\ell)$-Arrowing

    Authors: Zohair Raza Hassan, Edith Hemaspaandra, Stanisław Radziszowski

    Abstract: For fixed nonnegative integers $k$ and $\ell$, the $(P_k, P_\ell)$-Arrowing problem asks whether a given graph, $G$, has a red/blue coloring of $E(G)$ such that there are no red copies of $P_k$ and no blue copies of $P_\ell$. The problem is trivial when $\max(k,\ell) \leq 3$, but has been shown to be coNP-complete when $k = \ell = 4$. In this work, we show that the problem remains coNP-complete fo… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: Accepted to FCT 2023

  8. arXiv:2303.10796  [pdf, other

    eess.IV cs.CV

    Uncertainty Driven Bottleneck Attention U-net for Organ at Risk Segmentation

    Authors: Abdullah Nazib, Riad Hassan, Zahidul Islam, Clinton Fookes

    Abstract: Organ at risk (OAR) segmentation in computed tomography (CT) imagery is a difficult task for automated segmentation methods and can be crucial for downstream radiation treatment planning. U-net has become a de-facto standard for medical image segmentation and is frequently used as a common baseline in medical image segmentation tasks. In this paper, we propose a multiple decoder U-net architecture… ▽ More

    Submitted 26 February, 2024; v1 submitted 19 March, 2023; originally announced March 2023.

    Comments: Accepted

    Journal ref: ISBI(2024)

  9. A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking

    Authors: Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: Logic obfuscation is introduced as a pivotal defense against multiple hardware threats on Integrated Circuits (ICs), including reverse engineering (RE) and intellectual property (IP) theft. The effectiveness of logic obfuscation is challenged by the recently introduced Boolean satisfiability (SAT) attack and its variants. A plethora of countermeasures has also been proposed to thwart the SAT attac… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Early Access ) 2021 1-1

  10. arXiv:2203.08760  [pdf

    eess.SY cs.MA

    Incorporating Multi-Agent Systems Technology in Power and Energy Systems of Bangladesh: A Feasibility Study

    Authors: Syed Redwan Md Hassan, Nazmul Hasan, Mohammad Ali Siddique, K. M Solaiman Fahim, Rummana Rahman, Lamia Iftekhar

    Abstract: The power sector of Bangladesh is presently experiencing essential changes as demand for power services is increasing with rising population and economic development. With a gradual shift from a rigidly centralized structure to a more decentralized and fluid setup, fundamentally because of the enormous advancement of distributed renewable energy sources, the future power system of the nation requi… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  11. arXiv:2109.01494  [pdf, other

    cs.LG cs.AI cs.DS

    Computing Graph Descriptors on Edge Streams

    Authors: Zohair Raza Hassan, Sarwan Ali, Imdadullah Khan, Mudassir Shabbir, Waseem Abbas

    Abstract: Feature extraction is an essential task in graph analytics. These feature vectors, called graph descriptors, are used in downstream vector-space-based graph analysis models. This idea has proved fruitful in the past, with spectral-based graph descriptors providing state-of-the-art classification accuracy. However, known algorithms to compute meaningful descriptors do not scale to large graphs sinc… ▽ More

    Submitted 8 April, 2023; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Extension of work accepted to PAKDD 2020. Accepted to ACM TKDD in 2023

  12. arXiv:2009.02945  [pdf, other

    cs.CC

    A Simpler NP-Hardness Proof for Familial Graph Compression

    Authors: Ammar Ahmed, Zohair Raza Hassan, Mudassir Shabbir

    Abstract: This document presents a simpler proof showcasing the NP-hardness of Familial Graph Compression.

    Submitted 7 September, 2020; originally announced September 2020.

  13. 6RLR-ABC: 6LoWPAN Routing Protocol With Local Repair Using Bio Inspired Artificial Bee Colony

    Authors: Nurul Halimatul Asmak Ismail, Samer A. B. Awwad, Rosilah Hassan

    Abstract: In recent years, Micro-Electro-Mechanical System (MEMS) has successfully enabled the development of IPv6 over Low power Wireless Personal Area Network (6LoWPAN). This network is equipped with low-cost, low-power, lightweight and varied functions devices. These devices are capable of amassing, storing, processing environmental information and conversing with neighbouring sensors. These requisites p… ▽ More

    Submitted 5 June, 2020; originally announced June 2020.

    Comments: 19 pages, 12 figures

  14. arXiv:2001.10301  [pdf, other

    cs.DB

    Estimating Descriptors for Large Graphs

    Authors: Zohair Raza Hassan, Mudassir Shabbir, Imdadullah Khan, Waseem Abbas

    Abstract: Embedding networks into a fixed dimensional feature space, while preserving its essential structural properties is a fundamental task in graph analytics. These feature vectors (graph descriptors) are used to measure the pairwise similarity between graphs. This enables applying data mining algorithms (e.g classification, clustering, or anomaly detection) on graph-structured data which have numerous… ▽ More

    Submitted 19 February, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Comments: Accepted to PAKDD 2020

  15. Comparison of Different Control Theories on a Two Wheeled Self Balancing Robot

    Authors: MD Muhaimin Rahman, SM Hasanur Rashi, KM Rafidh Hassan, M. M. Hossain

    Abstract: . This paper is aimed to discuss and compare three of the most famous Control Theories on a Two wheeled Self Balancing Robot Simulation using Robot Operating System (ROS) and Gazebo. Two Wheeled Self Balancing Robots are one of the most fascinating applications of Inverted Pendulum System. In this paper, PID, LQR and Fuzzy logic controllers are discussed . Also,0 the modeling and algorithms of the… ▽ More

    Submitted 22 July, 2018; originally announced July 2018.

    Comments: International Conference on Mechanical Engineering,2017, BUET, Dhaka

    Journal ref: Comparison of different control theories on a two wheeled self balancing robot %D 2018 %J AIP Conference Proceedings %P 060005 %V 1980 %N 1 %R 10.1063/1.5044373

  16. arXiv:1304.3763  [pdf

    cs.AI cs.DS cs.NE

    An Improved ACS Algorithm for the Solutions of Larger TSP Problems

    Authors: Md. Rakib Hassan, Md. Kamrul Hasan, M. M. A. Hashem

    Abstract: Solving large traveling salesman problem (TSP) in an efficient way is a challenging area for the researchers of computer science. This paper presents a modified version of the ant colony system (ACS) algorithm called Red-Black Ant Colony System (RB-ACS) for the solutions of TSP which is the most prominent member of the combinatorial optimization problem. RB-ACS uses the concept of ant colony syste… ▽ More

    Submitted 12 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 3rd International Conference on Electrical, Electronics and Computer Engineering (ICEECE 2003), pp. 201-206, Dhaka, Bangladesh, December 22-24, (2003)

  17. arXiv:1005.0595  [pdf

    cs.SE

    Software Design Document, Testing, and Deployment and Configuration Management of the UUIS - a Team 1 COMP5541-W10 Project Approach

    Authors: Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan

    Abstract: The document presents a detailed description of the designs for the implementation of the Unified University Inventory System for the Imaginary University of Arctica. The document, through numerous diagrams and UI samples, gives the structure of the system and the functions of its modules. It also gives test cases and reports that support the system's architecture and design.

    Submitted 4 May, 2010; originally announced May 2010.

    Comments: The document has 67 figures and 24 tables in about 136 pages, including the test documents and configuration details as supplements

    ACM Class: D.2; K.6; H.5.2

  18. arXiv:1005.0330  [pdf, other

    cs.SE

    Software Requirements Specification of the IUfA's UUIS -- a Team 1 COMP5541-W10 Project Approach

    Authors: Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan

    Abstract: Unified University Inventory System (UUIS), is an inventory system created for the Imaginary University of Arctica (IUfA) to facilitate its inventory management, of all the faculties in one system. Team 1 elucidates the functions of the system and the characteristics of the users who have access to these functions. It shows the access restrictions to different functionalities of the system provide… ▽ More

    Submitted 3 May, 2010; originally announced May 2010.

    Comments: The 75 page-document has 16 figures, some of which show the link between users and their functions, and more than 30 use cases described.

    ACM Class: D.2; K.6; H.5.2

  19. arXiv:1001.1967  [pdf

    cs.NI

    Architecture of Network Management Tools for Heterogeneous System

    Authors: Rosilah Hassan, Rozilawati Razali, Shima Mohseni, Ola Mohamad, Zahian Ismail

    Abstract: Managing heterogeneous network systems is a difficult task because each of these networks has its own curious management system. These networks usually are constructed on independent management protocols which are not compatible with each other. This results in the coexistence of many management systems with different managing functions and services across enterprises. Incompatibility of differe… ▽ More

    Submitted 12 January, 2010; originally announced January 2010.

    Comments: 10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 031-040, December 2009, USA