Skip to main content

Showing 1–50 of 88 results for author: Islam, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19690  [pdf, other

    cs.CV cs.AI

    Deep Fusion Model for Brain Tumor Classification Using Fine-Grained Gradient Preservation

    Authors: Niful Islam, Mohaiminul Islam Bhuiyan, Jarin Tasnim Raya, Nur Shazwani Kamarudin, Khan Md Hasib, M. F. Mridha, Dewan Md. Farid

    Abstract: Brain tumors are one of the most common diseases that lead to early death if not diagnosed at an early stage. Traditional diagnostic approaches are extremely time-consuming and prone to errors. In this context, computer vision-based approaches have emerged as an effective tool for accurate brain tumor classification. While some of the existing solutions demonstrate noteworthy accuracy, the models… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

  2. arXiv:2406.17051  [pdf, other

    eess.IV cs.CV cs.LG

    Leveraging Knowledge Distillation for Lightweight Skin Cancer Classification: Balancing Accuracy and Computational Efficiency

    Authors: Niful Islam, Khan Md Hasib, Fahmida Akter Joti, Asif Karim, Sami Azam

    Abstract: Skin cancer is a major concern to public health, accounting for one-third of the reported cancers. If not detected early, the cancer has the potential for severe consequences. Recognizing the critical need for effective skin cancer classification, we address the limitations of existing models, which are often too large to deploy in areas with limited computational resources. In response, we presen… ▽ More

    Submitted 28 June, 2024; v1 submitted 24 June, 2024; originally announced June 2024.

  3. arXiv:2405.08026  [pdf, other

    cs.LG

    ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis

    Authors: Mohammad Amaz Uddin, Muhammad Nazrul Islam, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker

    Abstract: SMS, or short messaging service, is a widely used and cost-effective communication medium that has sadly turned into a haven for unwanted messages, commonly known as SMS spam. With the rapid adoption of smartphones and Internet connectivity, SMS spam has emerged as a prevalent threat. Spammers have taken notice of the significance of SMS for mobile phone users. Consequently, with the emergence of… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  4. arXiv:2405.04824  [pdf

    cs.CR

    Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications

    Authors: Mohammad Ikbal Hossain, Shaharier Arafat Sumon, Habib Md. Hasan, Fatema Akter, Md Bahauddin Badhon, Mohammad Nahid Ul Islam

    Abstract: The Internet of Things (IoT) is expanding rapidly, which has created a need for sophisticated computational frameworks that can handle the data and security requirements inherent in modern IoT applications. However, traditional cloud computing frameworks have struggled with latency, scalability, and security vulnerabilities. Quantum-Edge Cloud Computing (QECC) is a new paradigm that effectively ad… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  5. arXiv:2404.17937  [pdf, other

    cs.LG cs.AI

    DTization: A New Method for Supervised Feature Scaling

    Authors: Niful Islam

    Abstract: Artificial intelligence is currently a dominant force in sha** various aspects of the world. Machine learning is a sub-field in artificial intelligence. Feature scaling is one of the data pre-processing techniques that improves the performance of machine learning algorithms. The traditional feature scaling techniques are unsupervised where they do not have influence of the dependent variable in… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  6. arXiv:2402.04764  [pdf, other

    cs.LG

    Code as Reward: Empowering Reinforcement Learning with VLMs

    Authors: David Venuto, Sami Nur Islam, Martin Klissarov, Doina Precup, Sherry Yang, Ankit Anand

    Abstract: Pre-trained Vision-Language Models (VLMs) are able to understand visual concepts, describe and decompose complex tasks into sub-tasks, and provide feedback on task completion. In this paper, we aim to leverage these capabilities to support the training of reinforcement learning (RL) agents. In principle, VLMs are well suited for this purpose, as they can naturally analyze image-based observations… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  7. arXiv:2401.17574  [pdf, other

    cs.CL cs.LG

    Scavenging Hyena: Distilling Transformers into Long Convolution Models

    Authors: Tokiniaina Raharison Ralambomihanta, Shahrad Mohammadzadeh, Mohammad Sami Nur Islam, Wassim Jabbour, Laurence Liang

    Abstract: The rapid evolution of Large Language Models (LLMs), epitomized by architectures like GPT-4, has reshaped the landscape of natural language processing. This paper introduces a pioneering approach to address the efficiency concerns associated with LLM pre-training, proposing the use of knowledge distillation for cross-architecture transfer. Leveraging insights from the efficient Hyena mechanism, ou… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: 9 pages, 2 figures

  8. arXiv:2401.12800  [pdf

    cs.NI cs.LG

    Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and their Enabling Semantic Applications

    Authors: Nazmul Islam, Seokjoo Shin

    Abstract: Deep Learning (DL) has enabled a paradigm shift in wireless communication system with data driven end-to-end (E2E) learning and optimization of the Physical Layer (PHY). By leveraging the representation learning of DL, E2E systems exhibit enhanced adaptability and performance in complex wireless environments, fulfilling the demands of 5G and beyond network systems and applications. The evolution o… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

  9. arXiv:2401.07035  [pdf, other

    cs.SE

    Causative Insights into Open Source Software Security using Large Language Code Embeddings and Semantic Vulnerability Graph

    Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manual, Murtuza Jadliwala, Peyman Najafirad

    Abstract: Open Source Software (OSS) security and resilience are worldwide phenomena hampering economic and technological innovation. OSS vulnerabilities can cause unauthorized access, data breaches, network disruptions, and privacy violations, rendering any benefits worthless. While recent deep-learning techniques have shown great promise in identifying and localizing vulnerabilities in source code, it is… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

  10. arXiv:2401.07031  [pdf, other

    cs.CR cs.AI cs.SE

    Code Security Vulnerability Repair Using Reinforcement Learning with Large Language Models

    Authors: Nafis Tanveer Islam, Mohammad Bahrami Karkevandi, Peyman Najafirad

    Abstract: With the recent advancement of Large Language Models (LLMs), generating functionally correct code has become less complicated for a wide array of developers. While using LLMs has sped up the functional development process, it poses a heavy risk to code security. Code generation with proper security measures using LLM is a significantly more challenging task than functional code generation. Securit… ▽ More

    Submitted 30 January, 2024; v1 submitted 13 January, 2024; originally announced January 2024.

  11. arXiv:2401.03374  [pdf, other

    cs.SE cs.AI

    LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward

    Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Mohammad Bahrami Karkevandi, Gonzalo De La Torre Parra, Elias Bou-Harb, Peyman Najafirad

    Abstract: In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot. These tools significantly improve developers' efficiency in functional code development. Nevertheless, it remains a notable concern that such tools are also responsible for creating insecure code, predominantly because… ▽ More

    Submitted 21 February, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

  12. EWasteNet: A Two-Stream Data Efficient Image Transformer Approach for E-Waste Classification

    Authors: Niful Islam, Md. Mehedi Hasan Jony, Emam Hasan, Sunny Sutradhar, Atikur Rahman, Md. Motaharul Islam

    Abstract: Improper disposal of e-waste poses global environmental and health risks, raising serious concerns. The accurate classification of e-waste images is critical for efficient management and recycling. In this paper, we have presented a comprehensive dataset comprised of eight different classes of images of electronic devices named the E-Waste Vision Dataset. We have also presented EWasteNet, a novel… ▽ More

    Submitted 28 September, 2023; originally announced November 2023.

    Comments: 6 pages

    Journal ref: 2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS), Penang, Malaysia, 2023, pp. 435-440

  13. arXiv:2311.02102  [pdf

    cs.AI

    Notion of Explainable Artificial Intelligence -- An Empirical Investigation from A Users Perspective

    Authors: AKM Bahalul Haque, A. K. M. Najmul Islam, Patrick Mikalef

    Abstract: The growing attention to artificial intelligence-based applications has led to research interest in explainability issues. This emerging research attention on explainable AI (XAI) advocates the need to investigate end user-centric explainable AI. Thus, this study aims to investigate usercentric explainable AI and considered recommendation systems as the study context. We conducted focus group inte… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: 26 Pages, 3 Figures, 1 Table , Accepted version for publication in European Conference on Information Systems (ECIS), 2023

  14. arXiv:2310.06848  [pdf, other

    cs.CV cs.AI cs.LG

    DeepTriNet: A Tri-Level Attention Based DeepLabv3+ Architecture for Semantic Segmentation of Satellite Images

    Authors: Tareque Bashar Ovi, Shakil Mosharrof, Nomaiya Bashree, Md Shofiqul Islam, Muhammad Nazrul Islam

    Abstract: The segmentation of satellite images is crucial in remote sensing applications. Existing methods face challenges in recognizing small-scale objects in satellite images for semantic segmentation primarily due to ignoring the low-level characteristics of the underlying network and due to containing distinct amounts of information by different feature maps. Thus, in this research, a tri-level attenti… ▽ More

    Submitted 5 September, 2023; originally announced October 2023.

    Comments: Keywords: Attention mechanism, Deep learning, Satellite image, DeepLabv3+, Segmentation

  15. arXiv:2307.01494  [pdf

    cs.LG cs.CR

    Review of Deep Learning-based Malware Detection for Android and Windows System

    Authors: Nazmul Islam, Seokjoo Shin

    Abstract: Differentiating malware is important to determine their behaviors and level of threat; as well as to devise defensive strategy against them. In response, various anti-malware systems have been developed to distinguish between different malwares. However, most of the recent malware families are Artificial Intelligence (AI) enable and can deceive traditional anti-malware systems using different obfu… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: Presented at the 33rd Joint Conference on Communications and Information (JCCI 2023)

  16. arXiv:2306.01761  [pdf, other

    cs.CL cs.AI cs.LG

    Distinguishing Human Generated Text From ChatGPT Generated Text Using Machine Learning

    Authors: Niful Islam, Debopom Sutradhar, Humaira Noor, Jarin Tasnim Raya, Monowara Tabassum Maisha, Dewan Md Farid

    Abstract: ChatGPT is a conversational artificial intelligence that is a member of the generative pre-trained transformer of the large language model family. This text generative model was fine-tuned by both supervised learning and reinforcement learning so that it can produce text documents that seem to be written by natural intelligence. Although there are numerous advantages of this generative model, it c… ▽ More

    Submitted 26 May, 2023; originally announced June 2023.

  17. arXiv:2305.03235  [pdf

    cs.ET

    Hardware in Loop Learning with Spin Stochastic Neurons

    Authors: A N M Nafiul Islam, Kezhou Yang, Amit K. Shukla, Pravin Khanal, Bowei Zhou, Wei-Gang Wang, Abhronil Sengupta

    Abstract: Despite the promise of superior efficiency and scalability, real-world deployment of emerging nanoelectronic platforms for brain-inspired computing have been limited thus far, primarily because of inter-device variations and intrinsic non-idealities. In this work, we demonstrate mitigating these issues by performing learning directly on practical devices through a hardware-in-loop approach, utiliz… ▽ More

    Submitted 21 March, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

  18. An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph

    Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad

    Abstract: Over the years, open-source software systems have become prey to threat actors. Even as open-source communities act quickly to patch the breach, code vulnerability screening should be an integral part of agile software development from the beginning. Unfortunately, current vulnerability screening techniques are ineffective at identifying novel vulnerabilities or providing developers with code vuln… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  19. arXiv:2304.03640  [pdf, other

    cs.CR cs.DC cs.LG

    FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: With the growing concern about the security and privacy of smart grid systems, cyberattacks on critical power grid components, such as state estimation, have proven to be one of the top-priority cyber-related issues and have received significant attention in recent years. However, cyberattack detection in smart grids now faces new challenges, including privacy preservation and decentralized power… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

  20. arXiv:2303.16956  [pdf, other

    cs.CR cs.DC cs.LG eess.SY

    FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseizadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: With growing security and privacy concerns in the Smart Grid domain, intrusion detection on critical energy infrastructure has become a high priority in recent years. To remedy the challenges of privacy preservation and decentralized power zones with strategic data owners, Federated Learning (FL) has contemporarily surfaced as a viable privacy-preserving alternative which enables collaborative tra… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: To appear in IEEE INFOCOM AidTSP 2023

  21. Algorithm for connectivity queries on real algebraic curves

    Authors: Md Nazrul Islam, Adrien Poteaux, Rémi Prébet

    Abstract: We consider the problem of answering connectivity queries on a real algebraic curve. The curve is given as the real trace of an algebraic curve, assumed to be in generic position, and being defined by some rational parametrizations. The query points are given by a zero-dimensional parametrization. We design an algorithm which counts the number of connected components of the real curve under study,… ▽ More

    Submitted 11 July, 2023; v1 submitted 22 February, 2023; originally announced February 2023.

    Comments: 10 pages, 2 figures

  22. Explainable Artificial Intelligence (XAI) from a user perspective- A synthesis of prior literature and problematizing avenues for future research

    Authors: AKM Bahalul Haque, A. K. M. Najmul Islam, Patrick Mikalef

    Abstract: The final search query for the Systematic Literature Review (SLR) was conducted on 15th July 2022. Initially, we extracted 1707 journal and conference articles from the Scopus and Web of Science databases. Inclusion and exclusion criteria were then applied, and 58 articles were selected for the SLR. The findings show four dimensions that shape the AI explanation, which are format (explanation repr… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Journal ref: Technological Forecasting and Social Change (Volume 186, Part A, January 2023, 122120)

  23. Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach

    Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman

    Abstract: Financial fraud cases are on the rise even with the current technological advancements. Due to the lack of inter-organization synergy and because of privacy concerns, authentic financial transaction data is rarely available. On the other hand, data-driven technologies like machine learning need authentic data to perform precisely in real-world systems. This study proposes a blockchain and smart co… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

  24. arXiv:2209.14547  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    A Secure Federated Learning Framework for Residential Short Term Load Forecasting

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: Smart meter measurements, though critical for accurate demand forecasting, face several drawbacks including consumers' privacy, data breach issues, to name a few. Recent literature has explored Federated Learning (FL) as a promising privacy-preserving machine learning alternative which enables collaborative learning of a model without exposing private raw data for short term load forecasting. Desp… ▽ More

    Submitted 28 March, 2023; v1 submitted 29 September, 2022; originally announced September 2022.

  25. arXiv:2209.13685  [pdf, other

    cs.ET

    Hybrid Stochastic Synapses Enabled by Scaled Ferroelectric Field-effect Transistors

    Authors: A N M Nafiul Islam, Arnob Saha, Zhouhang Jiang, Kai Ni, Abhronil Sengupta

    Abstract: Achieving brain-like density and performance in neuromorphic computers necessitates scaling down the size of nanodevices emulating neuro-synaptic functionalities. However, scaling nanodevices results in reduction of programming resolution and emergence of stochastic non-idealities. While prior work has mainly focused on binary transitions, in this work we leverage the stochastic switching of a thr… ▽ More

    Submitted 10 March, 2023; v1 submitted 27 September, 2022; originally announced September 2022.

  26. arXiv:2209.07428  [pdf, other

    cs.NE

    Astromorphic Self-Repair of Neuromorphic Hardware Systems

    Authors: Zhuangyu Han, A N M Nafiul Islam, Abhronil Sengupta

    Abstract: While neuromorphic computing architectures based on Spiking Neural Networks (SNNs) are increasingly gaining interest as a pathway toward bio-plausible machine learning, attention is still focused on computational units like the neuron and synapse. Shifting from this neuro-synaptic perspective, this paper attempts to explore the self-repair role of glial cells, in particular, astrocytes. The work i… ▽ More

    Submitted 8 March, 2023; v1 submitted 15 September, 2022; originally announced September 2022.

  27. arXiv:2207.08857  [pdf, other

    cs.SE cs.AI cs.MA

    RESAM: Requirements Elicitation and Specification for Deep-Learning Anomaly Models with Applications to UAV Flight Controllers

    Authors: Md Nafee Al Islam, Yihong Ma, Pedro Alarcon Granadeno, Nitesh Chawla, Jane Cleland-Huang

    Abstract: CyberPhysical systems (CPS) must be closely monitored to identify and potentially mitigate emergent problems that arise during their routine operations. However, the multivariate time-series data which they typically produce can be complex to understand and analyze. While formal product documentation often provides example data plots with diagnostic suggestions, the sheer diversity of attributes,… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

  28. arXiv:2206.12615  [pdf

    cs.NI cs.PF

    Effects of MAC Parameters on the Performance of IEEE 802.11 DCF in NS-3

    Authors: Md. Abubakar Siddik, Jakia Akter Nitu, Natasha Islam, Most. Anju Ara Hasi, Jannatun Ferdous, Md. Mizanur Rahman, Md. Nahid Sultan

    Abstract: This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost… ▽ More

    Submitted 25 June, 2022; originally announced June 2022.

    Comments: 20 pages

  29. CurFi: An automated tool to find the best regression analysis model using curve fitting

    Authors: Ayon Roy, Tausif Al Zubayer, Nafisa Tabassum, Muhammad Nazrul Islam, Md. Abdus Sattar

    Abstract: Regression analysis is a well known quantitative research method that primarily explores the relationship between one or more independent variables and a dependent variable. Conducting regression analysis manually on large datasets with multiple independent variables can be tedious. An automated system for regression analysis will be of great help for researchers as well as non-expert users. Thus,… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

  30. arXiv:2203.11379  [pdf, other

    cs.LG

    A Bayesian Deep Learning Technique for Multi-Step Ahead Solar Generation Forecasting

    Authors: Devinder Kaur, Shama Naz Islam, Md. Apel Mahmud

    Abstract: In this paper, we propose an improved Bayesian bidirectional long-short term memory (BiLSTM) neural networks for multi-step ahead (MSA) solar generation forecasting. The proposed technique applies alpha-beta divergence for a more appropriate consideration of outliers in the solar generation data and resulting variability of the weight parameter distribution in the neural network. The proposed meth… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

  31. FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: As Smart Meters are collecting and transmitting household energy consumption data to Retail Energy Providers (REP), the main challenge is to ensure the effective use of fine-grained consumer data while ensuring data privacy. In this manuscript, we tackle this challenge for energy load consumption forecasting in regards to REPs which is essential to energy demand management, load switching and infr… ▽ More

    Submitted 28 March, 2023; v1 submitted 28 February, 2022; originally announced March 2022.

    Comments: Appeared at 14th IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC 2022)

  32. arXiv:2111.14251  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    False Data Injection Threats in Active Distribution Systems: A Comprehensive Survey

    Authors: Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

    Abstract: With the proliferation of smart devices and revolutions in communications, electrical distribution systems are gradually shifting from passive, manually-operated and inflexible ones, to a massively interconnected cyber-physical smart grid to address the energy challenges of the future. However, the integration of several cutting-edge technologies has introduced several security and privacy vulnera… ▽ More

    Submitted 29 September, 2022; v1 submitted 28 November, 2021; originally announced November 2021.

  33. Towards a GDPR-Compliant Blockchain-Based COVID Vaccination Passport

    Authors: AKM Bahalul Haque, Bilal Naqvi, A. K. M. Najmul Islam, Sami Hyrynsalmi

    Abstract: The COVID-19 pandemic has shaken the world and limited work/personal life activities. Besides the loss of human lives and agony faced by humankind, the pandemic has badly hit different sectors economically, including the travel industry. Special arrangements, including COVID test before departure and on arrival, and voluntary quarantine, were enforced to limit the risk of transmission. However, th… ▽ More

    Submitted 1 July, 2021; originally announced September 2021.

    Comments: Applied Sciences , 2021

  34. arXiv:2109.07029  [pdf, other

    eess.IV cs.CV

    Seeking an Optimal Approach for Computer-Aided Pulmonary Embolism Detection

    Authors: Nahid Ul Islam, Shiv Gehlot, Zongwei Zhou, Michael B Gotway, Jianming Liang

    Abstract: Pulmonary embolism (PE) represents a thrombus ("blood clot"), usually originating from a lower extremity vein, that travels to the blood vessels in the lung, causing vascular obstruction and in some patients, death. This disorder is commonly diagnosed using CT pulmonary angiography (CTPA). Deep learning holds great promise for the computer-aided CTPA diagnosis (CAD) of PE. However, numerous compet… ▽ More

    Submitted 14 September, 2021; originally announced September 2021.

  35. arXiv:2109.02462  [pdf, other

    cs.IR cs.LG

    A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets

    Authors: Khandaker Tayef Shahriar, Iqbal H. Sarker, Muhammad Nazrul Islam, Mohammad Ali Moni

    Abstract: This paper formulates the problem of dynamically identifying key topics with proper labels from COVID-19 Tweets to provide an overview of wider public opinion. Nowadays, social media is one of the best ways to connect people through Internet technology, which is also considered an essential part of our daily lives. In late December 2019, an outbreak of the novel coronavirus, COVID-19 was reported,… ▽ More

    Submitted 13 August, 2021; originally announced September 2021.

  36. Intrinsic synaptic plasticity of ferroelectric field effect transistors for online learning

    Authors: Arnob Saha, A N M Nafiul Islam, Zijian Zhao, Shan Deng, Kai Ni, Abhronil Sengupta

    Abstract: Nanoelectronic devices emulating neuro-synaptic functionalities through their intrinsic physics at low operating energies is imperative toward the realization of brain-like neuromorphic computers. In this work, we leverage the non-linear voltage dependent partial polarization switching of a ferroelectric field effect transistor to mimic plasticity characteristics of biological synapses. We provide… ▽ More

    Submitted 16 September, 2021; v1 submitted 27 July, 2021; originally announced July 2021.

  37. Bangla Natural Language Processing: A Comprehensive Analysis of Classical, Machine Learning, and Deep Learning Based Methods

    Authors: Ovishake Sen, Mohtasim Fuad, MD. Nazrul Islam, Jakaria Rabbi, Mehedi Masud, MD. Kamrul Hasan, Md. Abdul Awal, Awal Ahmed Fime, Md. Tahmid Hasan Fuad, Delowar Sikder, MD. Akil Raihan Iftee

    Abstract: The Bangla language is the seventh most spoken language, with 265 million native and non-native speakers worldwide. However, English is the predominant language for online resources and technical knowledge, journals, and documentation. Consequently, many Bangla-speaking people, who have limited command of English, face hurdles to utilize English resources. To bridge the gap between limited support… ▽ More

    Submitted 9 April, 2022; v1 submitted 31 May, 2021; originally announced May 2021.

    Comments: Accedpted in IEEE Access and it has 46 pages. Link: https://ieeexplore.ieee.org/document/9751052 (Early Access - April 10, 2022)

  38. arXiv:2104.03366  [pdf, other

    cs.CR cs.CV

    An Object Detection based Solver for Google's Image reCAPTCHA v2

    Authors: Md Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md Nazmul Islam, Hui Cao, Xiali Hei

    Abstract: Previous work showed that reCAPTCHA v2's image challenges could be solved by automated programs armed with Deep Neural Network (DNN) image classifiers and vision APIs provided by off-the-shelf image recognition services. In response to emerging threats, Google has made significant updates to its image reCAPTCHA v2 challenges that can render the prior approaches ineffective to a great extent. In th… ▽ More

    Submitted 7 April, 2021; originally announced April 2021.

    Comments: Accepted at the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)

  39. GDPR Compliant Blockchains-A Systematic Literature Review

    Authors: AKM Bahalul Haque, AKM Najmul Islam, Sami Hyrynsalmi, Bilal Naqvi, Kari Smolander

    Abstract: Although blockchain-based digital services promise trust, accountability, and transparency, multiple paradoxes between blockchains and GDPR have been highlighted in the recent literature. Some of the recent literature also proposed possible solutions to these paradoxes. This article aims to conduct a systematic literature review on GDPR compliant blockchains and synthesize the findings. In particu… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

    Comments: Accepted for Publication in IEEE Access

    Journal ref: IEEE Access , 2021

  40. arXiv:2103.15053  [pdf, other

    cs.SE cs.CV

    Adaptive Autonomy in Human-on-the-Loop Vision-Based Robotics Systems

    Authors: Sophia Abraham, Zachariah Carmichael, Sreya Banerjee, Rosaura VidalMata, Ankit Agrawal, Md Nafee Al Islam, Walter Scheirer, Jane Cleland-Huang

    Abstract: Computer vision approaches are widely used by autonomous robotic systems to sense the world around them and to guide their decision making as they perform diverse tasks such as collision avoidance, search and rescue, and object manipulation. High accuracy is critical, particularly for Human-on-the-loop (HoTL) systems where decisions are made autonomously by the system, and humans play only a super… ▽ More

    Submitted 28 March, 2021; originally announced March 2021.

  41. arXiv:2103.12969  [pdf, other

    cs.LG eess.SP

    A VAE-Bayesian Deep Learning Scheme for Solar Generation Forecasting based on Dimensionality Reduction

    Authors: Devinder Kaur, Shama Naz Islam, Md. Apel Mahmud, Md. Enamul Haque, Adnan Anwar

    Abstract: The advancement of distributed generation technologies in modern power systems has led to a widespread integration of renewable power generation at customer side. However, the intermittent nature of renewable energy poses new challenges to the network operational planning with underlying uncertainties. This paper proposes a novel Bayesian probabilistic technique for forecasting renewable solar gen… ▽ More

    Submitted 26 January, 2023; v1 submitted 23 March, 2021; originally announced March 2021.

    Comments: 12 pages, 7 figures

  42. Recent Advances in Deep Learning Techniques for Face Recognition

    Authors: Md. Tahmid Hasan Fuad, Awal Ahmed Fime, Delowar Sikder, Md. Akil Raihan Iftee, Jakaria Rabbi, Mabrook S. Al-rakhami, Abdu Gumae, Ovishake Sen, Mohtasim Fuad, Md. Nazrul Islam

    Abstract: In recent years, researchers have proposed many deep learning (DL) methods for various tasks, and particularly face recognition (FR) made an enormous leap using these techniques. Deep FR systems benefit from the hierarchical architecture of the DL methods to learn discriminative face representation. Therefore, DL techniques significantly improve state-of-the-art performance on FR systems and encou… ▽ More

    Submitted 21 July, 2021; v1 submitted 18 March, 2021; originally announced March 2021.

    Comments: 32 pages and citation: M. T. H. Fuad et al., "Recent Advances in Deep Learning Techniques for Face Recognition," in IEEE Access, vol. 9, pp. 99112-99142, 2021, doi: 10.1109/ACCESS.2021.3096136

    Journal ref: in IEEE Access, vol. 9, pp. 99112-99142, 2021

  43. arXiv:2103.06400  [pdf, other

    cs.CR

    A Survey on Limitation, Security and Privacy Issues on Additive Manufacturing

    Authors: Md Nazmul Islam, Yazhou Tu, Md Imran Hossen, Shengmin Guo, Xiali Hei

    Abstract: Additive manufacturing (AM) is growing as fast as anyone can imagine, and it is now a multi-billion-dollar industry. AM becomes popular in a variety of sectors, such as automotive, aerospace, biomedical, and pharmaceutical, for producing parts/ components/ subsystems. However, current AM technologies can face vast risks of security issues and privacy loss. For the security of AM process, many rese… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 10 Pages

  44. toon2real: Translating Cartoon Images to Realistic Images

    Authors: K. M. Arefeen Sultan, Mohammad Imrul Jubair, MD. Nahidul Islam, Sayed Hossain Khan

    Abstract: In terms of Image-to-image translation, Generative Adversarial Networks (GANs) has achieved great success even when it is used in the unsupervised dataset. In this work, we aim to translate cartoon images to photo-realistic images using GAN. We apply several state-of-the-art models to perform this task; however, they fail to perform good quality translations. We observe that the shallow difference… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Comments: Accepted as a short paper at ICTAI 2020

  45. arXiv:2011.12598  [pdf, other

    cs.LG

    Energy Forecasting in Smart Grid Systems: A Review of the State-of-the-art Techniques

    Authors: Devinder Kaur, Shama Naz Islam, Md. Apel Mahmud, Md. Enamul Haque, ZhaoYang Dong

    Abstract: Energy forecasting has a vital role to play in smart grid (SG) systems involving various applications such as demand-side management, load shedding, and optimum dispatch. Managing efficient forecasting while ensuring the least possible prediction error is one of the main challenges posed in the grid today, considering the uncertainty and granularity in SG data. This paper presents a comprehensive… ▽ More

    Submitted 23 May, 2022; v1 submitted 25 November, 2020; originally announced November 2020.

  46. LULC classification by semantic segmentation of satellite images using FastFCN

    Authors: Md. Saif Hassan Onim, Aiman Rafeed Ehtesham, Amreen Anbar, A. K. M. Nazrul Islam, A. K. M. Mahbubur Rahman

    Abstract: This paper analyses how well a Fast Fully Convolutional Network (FastFCN) semantically segments satellite images and thus classifies Land Use/Land Cover(LULC) classes. Fast-FCN was used on Gaofen-2 Image Dataset (GID-2) to segment them in five different classes: BuiltUp, Meadow, Farmland, Water and Forest. The results showed better accuracy (0.93), precision (0.99), recall (0.98) and mean Intersec… ▽ More

    Submitted 3 December, 2020; v1 submitted 13 November, 2020; originally announced November 2020.

  47. arXiv:2009.03473  [pdf, other

    cs.NE

    On the Self-Repair Role of Astrocytes in STDP Enabled Unsupervised SNNs

    Authors: Mehul Rastogi, Sen Lu, Nafiul Islam, Abhronil Sengupta

    Abstract: Neuromorphic computing is emerging to be a disruptive computational paradigm that attempts to emulate various facets of the underlying structure and functionalities of the brain in the algorithm and hardware design of next-generation machine learning platforms. This work goes beyond the focus of current neuromorphic computing architectures on computational models for neuron and synapse to examine… ▽ More

    Submitted 16 November, 2020; v1 submitted 7 September, 2020; originally announced September 2020.

  48. A review on the mobile applications developed for COVID-19: An exploratory analysis

    Authors: Muhammad Nazrul Islam, Iyolita Islam, Kazi MD. Munim, A. K. M. Najmul Islam

    Abstract: The objective of this research is to explore the existing mobile applications developed for the COVID-19 pandemic. To obtain this research objective, firstly the related applications were selected through the systematic search technique in the popular application stores. Secondly, data related to the app objectives, functionalities provided by the app, user ratings, and user reviews were extracted… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 11 pages, 3 figures, 4 tables

    Journal ref: IEEE Access (Volume: 8) 2020 145601 - 145610

  49. arXiv:2008.07449  [pdf, other

    cs.LG cs.AI cs.CY

    A Survey on the Use of AI and ML for Fighting the COVID-19 Pandemic

    Authors: Muhammad Nazrul Islam, Toki Tahmid Inan, Suzzana Rafi, Syeda Sabrina Akter, Iqbal H. Sarker, A. K. M. Najmul Islam

    Abstract: Artificial intelligence (AI) and machine learning (ML) have made a paradigm shift in health care which, eventually can be used for decision support and forecasting by exploring the medical data. Recent studies showed that AI and ML can be used to fight against the COVID-19 pandemic. Therefore, the objective of this review study is to summarize the recent AI and ML based studies that have focused t… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: 10 pages, 6 figures, 5 tables

  50. A Systematic Review of the Digital Interventions for Fighting COVID-19: The Bangladesh Perspective

    Authors: Muhammad Nazrul Islam, A. K. M. Najmul Islam

    Abstract: The objective of this paper is to synthesize the digital interventions initiatives to fight against COVID-19 in Bangladesh and compare with other countries. In order to obtain our research objective, we conducted a systematic review of the online content. We first reviewed the digital interventions that have been used to fight against COVID-19 across the globe. We then reviewed the initiatives tha… ▽ More

    Submitted 28 June, 2020; originally announced June 2020.

    Comments: 10 pages, 4 figures, 1 table

    Journal ref: IEEE Access, Vol. 8, page: 114078 - 114087, 2020