Skip to main content

Showing 1–44 of 44 results for author: Islam, M N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08026  [pdf, other

    cs.LG

    ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis

    Authors: Mohammad Amaz Uddin, Muhammad Nazrul Islam, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker

    Abstract: SMS, or short messaging service, is a widely used and cost-effective communication medium that has sadly turned into a haven for unwanted messages, commonly known as SMS spam. With the rapid adoption of smartphones and Internet connectivity, SMS spam has emerged as a prevalent threat. Spammers have taken notice of the significance of SMS for mobile phone users. Consequently, with the emergence of… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. arXiv:2405.04824  [pdf

    cs.CR

    Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications

    Authors: Mohammad Ikbal Hossain, Shaharier Arafat Sumon, Habib Md. Hasan, Fatema Akter, Md Bahauddin Badhon, Mohammad Nahid Ul Islam

    Abstract: The Internet of Things (IoT) is expanding rapidly, which has created a need for sophisticated computational frameworks that can handle the data and security requirements inherent in modern IoT applications. However, traditional cloud computing frameworks have struggled with latency, scalability, and security vulnerabilities. Quantum-Edge Cloud Computing (QECC) is a new paradigm that effectively ad… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  3. arXiv:2311.02102  [pdf

    cs.AI

    Notion of Explainable Artificial Intelligence -- An Empirical Investigation from A Users Perspective

    Authors: AKM Bahalul Haque, A. K. M. Najmul Islam, Patrick Mikalef

    Abstract: The growing attention to artificial intelligence-based applications has led to research interest in explainability issues. This emerging research attention on explainable AI (XAI) advocates the need to investigate end user-centric explainable AI. Thus, this study aims to investigate usercentric explainable AI and considered recommendation systems as the study context. We conducted focus group inte… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: 26 Pages, 3 Figures, 1 Table , Accepted version for publication in European Conference on Information Systems (ECIS), 2023

  4. arXiv:2310.06848  [pdf, other

    cs.CV cs.AI cs.LG

    DeepTriNet: A Tri-Level Attention Based DeepLabv3+ Architecture for Semantic Segmentation of Satellite Images

    Authors: Tareque Bashar Ovi, Shakil Mosharrof, Nomaiya Bashree, Md Shofiqul Islam, Muhammad Nazrul Islam

    Abstract: The segmentation of satellite images is crucial in remote sensing applications. Existing methods face challenges in recognizing small-scale objects in satellite images for semantic segmentation primarily due to ignoring the low-level characteristics of the underlying network and due to containing distinct amounts of information by different feature maps. Thus, in this research, a tri-level attenti… ▽ More

    Submitted 5 September, 2023; originally announced October 2023.

    Comments: Keywords: Attention mechanism, Deep learning, Satellite image, DeepLabv3+, Segmentation

  5. arXiv:2305.03235  [pdf

    cs.ET

    Hardware in Loop Learning with Spin Stochastic Neurons

    Authors: A N M Nafiul Islam, Kezhou Yang, Amit K. Shukla, Pravin Khanal, Bowei Zhou, Wei-Gang Wang, Abhronil Sengupta

    Abstract: Despite the promise of superior efficiency and scalability, real-world deployment of emerging nanoelectronic platforms for brain-inspired computing have been limited thus far, primarily because of inter-device variations and intrinsic non-idealities. In this work, we demonstrate mitigating these issues by performing learning directly on practical devices through a hardware-in-loop approach, utiliz… ▽ More

    Submitted 21 March, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

  6. Algorithm for connectivity queries on real algebraic curves

    Authors: Md Nazrul Islam, Adrien Poteaux, Rémi Prébet

    Abstract: We consider the problem of answering connectivity queries on a real algebraic curve. The curve is given as the real trace of an algebraic curve, assumed to be in generic position, and being defined by some rational parametrizations. The query points are given by a zero-dimensional parametrization. We design an algorithm which counts the number of connected components of the real curve under study,… ▽ More

    Submitted 11 July, 2023; v1 submitted 22 February, 2023; originally announced February 2023.

    Comments: 10 pages, 2 figures

  7. Explainable Artificial Intelligence (XAI) from a user perspective- A synthesis of prior literature and problematizing avenues for future research

    Authors: AKM Bahalul Haque, A. K. M. Najmul Islam, Patrick Mikalef

    Abstract: The final search query for the Systematic Literature Review (SLR) was conducted on 15th July 2022. Initially, we extracted 1707 journal and conference articles from the Scopus and Web of Science databases. Inclusion and exclusion criteria were then applied, and 58 articles were selected for the SLR. The findings show four dimensions that shape the AI explanation, which are format (explanation repr… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Journal ref: Technological Forecasting and Social Change (Volume 186, Part A, January 2023, 122120)

  8. Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach

    Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman

    Abstract: Financial fraud cases are on the rise even with the current technological advancements. Due to the lack of inter-organization synergy and because of privacy concerns, authentic financial transaction data is rarely available. On the other hand, data-driven technologies like machine learning need authentic data to perform precisely in real-world systems. This study proposes a blockchain and smart co… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

  9. arXiv:2209.13685  [pdf, other

    cs.ET

    Hybrid Stochastic Synapses Enabled by Scaled Ferroelectric Field-effect Transistors

    Authors: A N M Nafiul Islam, Arnob Saha, Zhouhang Jiang, Kai Ni, Abhronil Sengupta

    Abstract: Achieving brain-like density and performance in neuromorphic computers necessitates scaling down the size of nanodevices emulating neuro-synaptic functionalities. However, scaling nanodevices results in reduction of programming resolution and emergence of stochastic non-idealities. While prior work has mainly focused on binary transitions, in this work we leverage the stochastic switching of a thr… ▽ More

    Submitted 10 March, 2023; v1 submitted 27 September, 2022; originally announced September 2022.

  10. arXiv:2209.07428  [pdf, other

    cs.NE

    Astromorphic Self-Repair of Neuromorphic Hardware Systems

    Authors: Zhuangyu Han, A N M Nafiul Islam, Abhronil Sengupta

    Abstract: While neuromorphic computing architectures based on Spiking Neural Networks (SNNs) are increasingly gaining interest as a pathway toward bio-plausible machine learning, attention is still focused on computational units like the neuron and synapse. Shifting from this neuro-synaptic perspective, this paper attempts to explore the self-repair role of glial cells, in particular, astrocytes. The work i… ▽ More

    Submitted 8 March, 2023; v1 submitted 15 September, 2022; originally announced September 2022.

  11. arXiv:2207.08857  [pdf, other

    cs.SE cs.AI cs.MA

    RESAM: Requirements Elicitation and Specification for Deep-Learning Anomaly Models with Applications to UAV Flight Controllers

    Authors: Md Nafee Al Islam, Yihong Ma, Pedro Alarcon Granadeno, Nitesh Chawla, Jane Cleland-Huang

    Abstract: CyberPhysical systems (CPS) must be closely monitored to identify and potentially mitigate emergent problems that arise during their routine operations. However, the multivariate time-series data which they typically produce can be complex to understand and analyze. While formal product documentation often provides example data plots with diagnostic suggestions, the sheer diversity of attributes,… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

  12. CurFi: An automated tool to find the best regression analysis model using curve fitting

    Authors: Ayon Roy, Tausif Al Zubayer, Nafisa Tabassum, Muhammad Nazrul Islam, Md. Abdus Sattar

    Abstract: Regression analysis is a well known quantitative research method that primarily explores the relationship between one or more independent variables and a dependent variable. Conducting regression analysis manually on large datasets with multiple independent variables can be tedious. An automated system for regression analysis will be of great help for researchers as well as non-expert users. Thus,… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

  13. Towards a GDPR-Compliant Blockchain-Based COVID Vaccination Passport

    Authors: AKM Bahalul Haque, Bilal Naqvi, A. K. M. Najmul Islam, Sami Hyrynsalmi

    Abstract: The COVID-19 pandemic has shaken the world and limited work/personal life activities. Besides the loss of human lives and agony faced by humankind, the pandemic has badly hit different sectors economically, including the travel industry. Special arrangements, including COVID test before departure and on arrival, and voluntary quarantine, were enforced to limit the risk of transmission. However, th… ▽ More

    Submitted 1 July, 2021; originally announced September 2021.

    Comments: Applied Sciences , 2021

  14. arXiv:2109.02462  [pdf, other

    cs.IR cs.LG

    A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets

    Authors: Khandaker Tayef Shahriar, Iqbal H. Sarker, Muhammad Nazrul Islam, Mohammad Ali Moni

    Abstract: This paper formulates the problem of dynamically identifying key topics with proper labels from COVID-19 Tweets to provide an overview of wider public opinion. Nowadays, social media is one of the best ways to connect people through Internet technology, which is also considered an essential part of our daily lives. In late December 2019, an outbreak of the novel coronavirus, COVID-19 was reported,… ▽ More

    Submitted 13 August, 2021; originally announced September 2021.

  15. Intrinsic synaptic plasticity of ferroelectric field effect transistors for online learning

    Authors: Arnob Saha, A N M Nafiul Islam, Zijian Zhao, Shan Deng, Kai Ni, Abhronil Sengupta

    Abstract: Nanoelectronic devices emulating neuro-synaptic functionalities through their intrinsic physics at low operating energies is imperative toward the realization of brain-like neuromorphic computers. In this work, we leverage the non-linear voltage dependent partial polarization switching of a ferroelectric field effect transistor to mimic plasticity characteristics of biological synapses. We provide… ▽ More

    Submitted 16 September, 2021; v1 submitted 27 July, 2021; originally announced July 2021.

  16. Bangla Natural Language Processing: A Comprehensive Analysis of Classical, Machine Learning, and Deep Learning Based Methods

    Authors: Ovishake Sen, Mohtasim Fuad, MD. Nazrul Islam, Jakaria Rabbi, Mehedi Masud, MD. Kamrul Hasan, Md. Abdul Awal, Awal Ahmed Fime, Md. Tahmid Hasan Fuad, Delowar Sikder, MD. Akil Raihan Iftee

    Abstract: The Bangla language is the seventh most spoken language, with 265 million native and non-native speakers worldwide. However, English is the predominant language for online resources and technical knowledge, journals, and documentation. Consequently, many Bangla-speaking people, who have limited command of English, face hurdles to utilize English resources. To bridge the gap between limited support… ▽ More

    Submitted 9 April, 2022; v1 submitted 31 May, 2021; originally announced May 2021.

    Comments: Accedpted in IEEE Access and it has 46 pages. Link: https://ieeexplore.ieee.org/document/9751052 (Early Access - April 10, 2022)

  17. arXiv:2104.03366  [pdf, other

    cs.CR cs.CV

    An Object Detection based Solver for Google's Image reCAPTCHA v2

    Authors: Md Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md Nazmul Islam, Hui Cao, Xiali Hei

    Abstract: Previous work showed that reCAPTCHA v2's image challenges could be solved by automated programs armed with Deep Neural Network (DNN) image classifiers and vision APIs provided by off-the-shelf image recognition services. In response to emerging threats, Google has made significant updates to its image reCAPTCHA v2 challenges that can render the prior approaches ineffective to a great extent. In th… ▽ More

    Submitted 7 April, 2021; originally announced April 2021.

    Comments: Accepted at the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)

  18. arXiv:2103.15053  [pdf, other

    cs.SE cs.CV

    Adaptive Autonomy in Human-on-the-Loop Vision-Based Robotics Systems

    Authors: Sophia Abraham, Zachariah Carmichael, Sreya Banerjee, Rosaura VidalMata, Ankit Agrawal, Md Nafee Al Islam, Walter Scheirer, Jane Cleland-Huang

    Abstract: Computer vision approaches are widely used by autonomous robotic systems to sense the world around them and to guide their decision making as they perform diverse tasks such as collision avoidance, search and rescue, and object manipulation. High accuracy is critical, particularly for Human-on-the-loop (HoTL) systems where decisions are made autonomously by the system, and humans play only a super… ▽ More

    Submitted 28 March, 2021; originally announced March 2021.

  19. Recent Advances in Deep Learning Techniques for Face Recognition

    Authors: Md. Tahmid Hasan Fuad, Awal Ahmed Fime, Delowar Sikder, Md. Akil Raihan Iftee, Jakaria Rabbi, Mabrook S. Al-rakhami, Abdu Gumae, Ovishake Sen, Mohtasim Fuad, Md. Nazrul Islam

    Abstract: In recent years, researchers have proposed many deep learning (DL) methods for various tasks, and particularly face recognition (FR) made an enormous leap using these techniques. Deep FR systems benefit from the hierarchical architecture of the DL methods to learn discriminative face representation. Therefore, DL techniques significantly improve state-of-the-art performance on FR systems and encou… ▽ More

    Submitted 21 July, 2021; v1 submitted 18 March, 2021; originally announced March 2021.

    Comments: 32 pages and citation: M. T. H. Fuad et al., "Recent Advances in Deep Learning Techniques for Face Recognition," in IEEE Access, vol. 9, pp. 99112-99142, 2021, doi: 10.1109/ACCESS.2021.3096136

    Journal ref: in IEEE Access, vol. 9, pp. 99112-99142, 2021

  20. arXiv:2103.06400  [pdf, other

    cs.CR

    A Survey on Limitation, Security and Privacy Issues on Additive Manufacturing

    Authors: Md Nazmul Islam, Yazhou Tu, Md Imran Hossen, Shengmin Guo, Xiali Hei

    Abstract: Additive manufacturing (AM) is growing as fast as anyone can imagine, and it is now a multi-billion-dollar industry. AM becomes popular in a variety of sectors, such as automotive, aerospace, biomedical, and pharmaceutical, for producing parts/ components/ subsystems. However, current AM technologies can face vast risks of security issues and privacy loss. For the security of AM process, many rese… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 10 Pages

  21. toon2real: Translating Cartoon Images to Realistic Images

    Authors: K. M. Arefeen Sultan, Mohammad Imrul Jubair, MD. Nahidul Islam, Sayed Hossain Khan

    Abstract: In terms of Image-to-image translation, Generative Adversarial Networks (GANs) has achieved great success even when it is used in the unsupervised dataset. In this work, we aim to translate cartoon images to photo-realistic images using GAN. We apply several state-of-the-art models to perform this task; however, they fail to perform good quality translations. We observe that the shallow difference… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Comments: Accepted as a short paper at ICTAI 2020

  22. LULC classification by semantic segmentation of satellite images using FastFCN

    Authors: Md. Saif Hassan Onim, Aiman Rafeed Ehtesham, Amreen Anbar, A. K. M. Nazrul Islam, A. K. M. Mahbubur Rahman

    Abstract: This paper analyses how well a Fast Fully Convolutional Network (FastFCN) semantically segments satellite images and thus classifies Land Use/Land Cover(LULC) classes. Fast-FCN was used on Gaofen-2 Image Dataset (GID-2) to segment them in five different classes: BuiltUp, Meadow, Farmland, Water and Forest. The results showed better accuracy (0.93), precision (0.99), recall (0.98) and mean Intersec… ▽ More

    Submitted 3 December, 2020; v1 submitted 13 November, 2020; originally announced November 2020.

  23. A review on the mobile applications developed for COVID-19: An exploratory analysis

    Authors: Muhammad Nazrul Islam, Iyolita Islam, Kazi MD. Munim, A. K. M. Najmul Islam

    Abstract: The objective of this research is to explore the existing mobile applications developed for the COVID-19 pandemic. To obtain this research objective, firstly the related applications were selected through the systematic search technique in the popular application stores. Secondly, data related to the app objectives, functionalities provided by the app, user ratings, and user reviews were extracted… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 11 pages, 3 figures, 4 tables

    Journal ref: IEEE Access (Volume: 8) 2020 145601 - 145610

  24. arXiv:2008.07449  [pdf, other

    cs.LG cs.AI cs.CY

    A Survey on the Use of AI and ML for Fighting the COVID-19 Pandemic

    Authors: Muhammad Nazrul Islam, Toki Tahmid Inan, Suzzana Rafi, Syeda Sabrina Akter, Iqbal H. Sarker, A. K. M. Najmul Islam

    Abstract: Artificial intelligence (AI) and machine learning (ML) have made a paradigm shift in health care which, eventually can be used for decision support and forecasting by exploring the medical data. Recent studies showed that AI and ML can be used to fight against the COVID-19 pandemic. Therefore, the objective of this review study is to summarize the recent AI and ML based studies that have focused t… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: 10 pages, 6 figures, 5 tables

  25. A Systematic Review of the Digital Interventions for Fighting COVID-19: The Bangladesh Perspective

    Authors: Muhammad Nazrul Islam, A. K. M. Najmul Islam

    Abstract: The objective of this paper is to synthesize the digital interventions initiatives to fight against COVID-19 in Bangladesh and compare with other countries. In order to obtain our research objective, we conducted a systematic review of the online content. We first reviewed the digital interventions that have been used to fight against COVID-19 across the globe. We then reviewed the initiatives tha… ▽ More

    Submitted 28 June, 2020; originally announced June 2020.

    Comments: 10 pages, 4 figures, 1 table

    Journal ref: IEEE Access, Vol. 8, page: 114078 - 114087, 2020

  26. arXiv:2004.09888  [pdf

    cs.CY cs.SE

    ICT Intervention in the Containment of the Pandemic Spread of COVID-19: An Exploratory Study

    Authors: Akib Zaman, Muhammad Nazrul Islam, Tarannum Zaki, Mohammad Sajjad Hossain

    Abstract: The objective of this article is to explore the Information and Communication Technology (ICT) interventions and its strengths, weaknesses, opportunities and threats for the containment of the pandemic spread of novel Coronavirus. The research adopted a qualitative research approach, while the study data were collected through online content review and Focus Group Discussion (FGD). Starting with a… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: 16 pages, 7 figures

  27. Why do People Share Misinformation during the COVID-19 Pandemic?

    Authors: Samuli Laato, A. K. M. Najmul Islam, Muhammad Nazrul Islam, Eoin Whelan

    Abstract: The World Health Organization have emphasised that misinformation - spreading rapidly through social media - poses a serious threat to the COVID-19 response. Drawing from theories of health perception and cognitive load, we develop and test a research model hypothesizing why people share unverified COVID-19 information through social media. Our findings suggest a person's trust in online informati… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Journal ref: European Journal of Information Systems (2020)

  28. A Critical Review of Concepts, Benefits, and Pitfalls of Blockchain Technology Using Concept Map

    Authors: Iyolita Islam, Kazi Md. Munim, Shahrima Jannat Oishwee, A. K. M. Najmul Islam, Muhammad Nazrul Islam

    Abstract: Blockchain is relatively a new area of research. However, a surge of research studies on the blockchain has taken place in recent years. These research studies have mostly focused on designing and develo** conceptual frameworks to build more reliable, transparent and efficient digital systems. While blockchain brings a wide variety of benefits, it also imposes certain challenges. Therefore, the… ▽ More

    Submitted 27 April, 2020; v1 submitted 18 April, 2020; originally announced April 2020.

    Comments: 9 pages, 3 figures, 6 tables

    Journal ref: IEEE Access, vol. 8, pp. 68333-68341, 2020

  29. Investigating usability of mobile health applications in Bangladesh

    Authors: Muhammad Nazrul Islam, Md. Mahboob Karim, Toki Tahmid Inan, A. K. M. Najmul Islam

    Abstract: Background: Lack of usability can be a major barrier for the rapid adoption of mobile services. Therefore, the purpose of this paper is to investigate the usability of Mobile Health applications in Bangladesh. Method: We followed a 3-stage approach in our research. First, we conducted a keyword-based application search in the popular app stores. We followed the affinity diagram approach and clus… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: 13 pages, 4 figures

    Journal ref: BMC Medical Informatics and Decision Making, (2020) 20:19

  30. arXiv:1909.01228  [pdf, other

    cs.CV cs.LG eess.IV

    A CNN-based approach to classify cricket bowlers based on their bowling actions

    Authors: Md Nafee Al Islam, Tanzil Bin Hassan, Siamul Karim Khan

    Abstract: With the advances in hardware technologies and deep learning techniques, it has become feasible to apply these techniques in diverse fields. Convolutional Neural Network (CNN), an architecture from the field of deep learning, has revolutionized Computer Vision. Sports is one of the avenues in which the use of computer vision is thriving. Cricket is a complex game consisting of different types of s… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

    Comments: 5 pages, 7 figures, The paper is under review in "IEEE International Conference on Robotics, Automation, Artificial-Intelligence and Internet-of-Things, 2019"

  31. arXiv:1909.00823  [pdf, other

    cs.CV cs.LG

    HishabNet: Detection, Localization and Calculation of Handwritten Bengali Mathematical Expressions

    Authors: Md Nafee Al Islam, Siamul Karim Khan

    Abstract: Recently, recognition of handwritten Bengali letters and digits have captured a lot of attention among the researchers of the AI community. In this work, we propose a Convolutional Neural Network (CNN) based object detection model which can recognize and evaluate handwritten Bengali mathematical expressions. This method is able to detect multiple Bengali digits and operators and locate their posit… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.

    Comments: 6 pages, 5 figures, This paper is under review in "22nd International Conference on Computer and Information Technology (ICCIT), 2019"

  32. Characterizing QoS Parameters and Application of Soft-QoS Scheme for 3G Wireless Networks

    Authors: Mostafa Zaman Chowdhury, Mohd. Noor Islam, Young Min Seo, Young Ki Lee, Sang Bum Kang, Sun Woong Choi, Yeong Min Jang

    Abstract: In wireless communication systems, Quality of Service (QoS) is one of the most important issues from both the users and operators point of view. All the parameters related to QoS are not same important for all users and applications. The satisfaction level of different users also does not depend on same QoS parameters. In this paper, we discuss the QoS parameters and then propose a priority order… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

    Comments: International Conference on Advanced Communication Technology (ICACT), Feb. 2008, Korea, pp. 60-94

  33. arXiv:1804.00312  [pdf, ps, other

    cs.IT

    Investigation of Performance in Integrated Access and Backhaul Networks

    Authors: Muhammad Nazmul Islam, Navid Abedini, Georg Hampel, Sundar Subramanian, Junyi Li

    Abstract: Wireless backhaul allows densification of mobile networks without incurring additional fiber deployment cost. This, in turn, leads to high spatial reuse, which is a significant tool to meet increasing wireless demand in 5G networks. Integrated access and backhaul (IAB), where access and backhaul network share the same standard wireless technology (e.g. 5G new radio (NR) standard), allows interoper… ▽ More

    Submitted 1 April, 2018; originally announced April 2018.

    Comments: Accepted in Infocom 2018 Workshop (mmSys 2018)

  34. Rate Optimal design of a Wireless Backhaul Network using TV White Space

    Authors: Ratnesh Kumbhkar, Muhammad Nazmul Islam, Narayan B. Mandayam, Ivan Seskar

    Abstract: The penetration of wireless broadband services in remote areas has primarily been limited due to the lack of economic incentives that service providers encounter in sparsely populated areas. Besides, wireless backhaul links like satellite and microwave are either expensive or require strict line of sight communication making them unattractive. TV white space channels with their desirable radio pro… ▽ More

    Submitted 5 May, 2015; v1 submitted 5 September, 2014; originally announced September 2014.

  35. arXiv:1409.1606  [pdf, other

    cs.NI cs.IT

    Power Optimal Non-contiguous Spectrum Access in Multi Front End Radio Enabled Point-to-Point Link

    Authors: Muhammad Nazmul Islam, Narayan B. Mandayam, Sastry Kompella, Ivan Seskar

    Abstract: Non-contiguous spectrum chunks allow wireless links to flexibly access a wide amount of bandwidth. Multi- Channel Multi-Radio (MC-MR) and Non-Contiguous Orthogonal Frequency Division Multiplexing (NC-OFDM) are the two commercially viable strategies to access non-contiguous spectrum chunks. MC-MR accesses multiple non-contiguous chunks by activating multiple front ends which, in turn, increases the… ▽ More

    Submitted 4 September, 2014; originally announced September 2014.

    Comments: 5 pages, 3 figure. To be submitted to IEEE Communication Letters

  36. arXiv:1404.2656  [pdf, other

    cs.IT cs.NI

    Wireless Backhaul Node Placement for Small Cell Networks

    Authors: Muhammad Nazmul Islam, Ashwin Sampath, Atul Maharshi, Ozge Koymen, Narayan B. Mandayam

    Abstract: Small cells have been proposed as a vehicle for wireless networks to keep up with surging demand. Small cells come with a significant challenge of providing backhaul to transport data to(from) a gateway node in the core network. Fiber based backhaul offers the high rates needed to meet this requirement, but is costly and time-consuming to deploy, when not readily available. Wireless backhaul is an… ▽ More

    Submitted 9 April, 2014; originally announced April 2014.

    Comments: Invited paper at Conference on Information Science & Systems (CISS) 2014

  37. arXiv:1309.0861  [pdf, other

    cs.NI cs.IT

    System Power Minimization to Access Non-Contiguous Spectrum in Cognitive Radio Networks

    Authors: Muhammad Nazmul Islam, Narayan B. Mandayam, Sastry Kompella, Ivan Seskar

    Abstract: Wireless transmission using non-contiguous chunks of spectrum is becoming increasingly important due to a variety of scenarios such as: secondary users avoiding incumbent users in TV white space; anticipated spectrum sharing between commercial and military systems; and spectrum sharing among uncoordinated interferers in unlicensed bands. Multi-Channel Multi-Radio (MCMR) platforms and Non-Contiguou… ▽ More

    Submitted 14 February, 2016; v1 submitted 3 September, 2013; originally announced September 2013.

    Comments: Submitted to IEEE Transactions on Cognitive Communications and Networking

  38. arXiv:1304.2112  [pdf

    cs.NI cs.DS

    A Probabilistic Algorithm for Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

    Authors: Md. Nazrul Islam, M. M. A. Hashem, A. M. Moshiur Rahman

    Abstract: In a wired network, a packet can be transmitted to a specified destination only, no broadcasting required. But in ad hoc wireless network a packet transmitted by a node can reach all neighbors due to broadcasting. This broadcasting introduces unnecessary retransmissions of same message. Therefore, the total number of transmissions (forward nodes) is generally used as the cost criterion for broadca… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 8th International Conference on Computer & Information Technology (ICCIT 2005), pp. 752-757, Dhaka, Bangladesh, December 28-30, (2005)

  39. A Wireless Channel Sounding System for Rapid Propagation Measurements

    Authors: Muhammad Nazmul Islam, Byoung-Jo J. Kim, Paul Henry, Eric Rozner

    Abstract: Wireless systems are getting deployed in many new environments with different antenna heights, frequency bands and multipath conditions. This has led to an increasing demand for more channel measurements to understand wireless propagation in specific environments and assist deployment engineering. We design and implement a rapid wireless channel sounding system, using the Universal Software Radio… ▽ More

    Submitted 21 November, 2012; originally announced November 2012.

    Comments: Submitted to ICC 2013 (2012 AT\&T Intellectual Property. All rights reserved.)

    Journal ref: IEEE International Conference on Communications 2013, page 5720-5725

  40. Implementation of Distributed Time Exchange Based Cooperative Forwarding

    Authors: Muhammad Nazmul Islam, Shantharam Balasubramanian, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella

    Abstract: In this paper, we design and implement time exchange (TE) based cooperative forwarding where nodes use transmission time slots as incentives for relaying. We focus on distributed joint time slot exchange and relay selection in the sum goodput maximization of the overall network. We formulate the design objective as a mixed integer nonlinear programming (MINLP) problem and provide a polynomial time… ▽ More

    Submitted 19 October, 2012; originally announced October 2012.

    Comments: Accepted in 2012 Military Communications Conference

    Journal ref: Military Communications Conference 2012 (Page 1-6)

  41. arXiv:1210.5297  [pdf, ps, other

    cs.IT

    Adaptive Differential Feedback in Time-Varying Multiuser MIMO Channels

    Authors: Muhammad Nazmul Islam, Raviraj Adve

    Abstract: In the context of a time-varying multiuser multiple-input-multiple-output (MIMO) system, we design recursive least squares based adaptive predictors and differential quantizers to minimize the sum mean squared error of the overall system. Using the fact that the scalar entries of the left singular matrix of a Gaussian MIMO channel becomes almost Gaussian distributed even for a small number of tran… ▽ More

    Submitted 18 October, 2012; originally announced October 2012.

    Comments: IEEE 22nd International Conference on Personal, Indoor and Mobile Radio Communications (2011)

    Journal ref: IEEE 22nd International Conference on Personal, Indoor and Mobile Radio Communications (2011), page 2055-2059

  42. arXiv:1112.5767  [pdf, other

    cs.IT

    Optimal Resource Allocation and Relay Selection in Bandwidth Exchange Based Cooperative Forwarding

    Authors: Muhammad Nazmul Islam, Narayan Mandayam, Sastry Kompella

    Abstract: In this paper, we investigate joint optimal relay selection and resource allocation under bandwidth exchange (BE) enabled incentivized cooperative forwarding in wireless networks. We consider an autonomous network where N nodes transmit data in the uplink to an access point (AP) / base station (BS). We consider the scenario where each node gets an initial amount (equal, optimal based on direct pat… ▽ More

    Submitted 13 October, 2012; v1 submitted 24 December, 2011; originally announced December 2011.

    Comments: 8 pages, 7 figures

    Journal ref: Proceedings of WiOpt 2012 (Page 192-199)

  43. arXiv:1111.6695  [pdf, ps, other

    cs.IT

    Optimal Shape-Gain Quantization for Multiuser MIMO Systems with Linear Precoding

    Authors: Muhammad Nazmul Islam, Raviraj Adve, Behrouz Khoshnevis

    Abstract: This paper studies the optimal bit allocation for shape-gain vector quantization of wireless channels in multiuser (MU) multiple-input multiple-output (MIMO) downlink systems based on linear precoding. Our design minimizes the mean squared-error between the original and quantized channels through optimal bit allocation across shape (direction) and gain (magnitude) for a fixed feedback overhead per… ▽ More

    Submitted 29 November, 2011; originally announced November 2011.

    Comments: Submitted to IEEE Transactions on Wireless Communications

  44. arXiv:1001.2307  [pdf, ps, other

    cs.IT

    Tranceiver Design using Linear Precoding in a Multiuser MIMO System with Limited Feedback

    Authors: Muhammad Nazmul Islam, Raviraj Adve

    Abstract: We investigate quantization and feedback of channel state information in a multiuser (MU) multiple input multiple output (MIMO) system. Each user may receive multiple data streams. Our design minimizes the sum mean squared error (SMSE) while accounting for the imperfections in channel state information (CSI) at the transmitter. This paper makes three contributions: first, we provide an end-to-en… ▽ More

    Submitted 14 January, 2010; originally announced January 2010.

    Comments: Submitted to IET Journals in Communications

    Journal ref: IET Journals in Communications, Vol: 5, Issue: 1, Page: 27-38, Jan 2011