Skip to main content

Showing 1–42 of 42 results for author: Rahman, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.00010  [pdf, other

    cs.IR cs.CL

    EnterpriseEM: Fine-tuned Embeddings for Enterprise Semantic Search

    Authors: Kamalkumar Rathinasamy, Jayarama Nettar, Amit Kumar, Vishal Manchanda, Arun Vijayakumar, Ayush Kataria, Venkateshprasanna Manjunath, Chidambaram GS, Jaskirat Singh Sodhi, Shoeb Shaikh, Wasim Akhtar Khan, Prashant Singh, Tanishq Dattatray Ige, Vipin Tiwari, Rajab Ali Mondal, Harshini K, S Reka, Chetana Amancharla, Faiz ur Rahman, Harikrishnan P A, Indraneel Saha, Bhavya Tiwary, Navin Shankar Patel, Pradeep T S, Balaji A J , et al. (2 additional authors not shown)

    Abstract: Enterprises grapple with the significant challenge of managing proprietary unstructured data, hindering efficient information retrieval. This has led to the emergence of AI-driven information retrieval solutions, designed to adeptly extract relevant insights to address employee inquiries. These solutions often leverage pre-trained embedding models and generative models as foundational components.… ▽ More

    Submitted 18 May, 2024; originally announced June 2024.

    ACM Class: I.2.7

  2. arXiv:2405.11655  [pdf, other

    cs.CV cs.AI cs.RO

    Track Anything Rapter(TAR)

    Authors: Tharun V. Puthanveettil, Fnu Obaid ur Rahman

    Abstract: Object tracking is a fundamental task in computer vision with broad practical applications across various domains, including traffic monitoring, robotics, and autonomous vehicle tracking. In this project, we aim to develop a sophisticated aerial vehicle system known as Track Anything Rapter (TAR), designed to detect, segment, and track objects of interest based on user-provided multimodal queries,… ▽ More

    Submitted 29 May, 2024; v1 submitted 19 May, 2024; originally announced May 2024.

  3. arXiv:2402.05158  [pdf, other

    cs.CV cs.AI cs.LG

    Enhancement of Bengali OCR by Specialized Models and Advanced Techniques for Diverse Document Types

    Authors: AKM Shahariar Azad Rabby, Hasmot Ali, Md. Majedul Islam, Sheikh Abujar, Fuad Rahman

    Abstract: This research paper presents a unique Bengali OCR system with some capabilities. The system excels in reconstructing document layouts while preserving structure, alignment, and images. It incorporates advanced image and signature detection for accurate extraction. Specialized models for word segmentation cater to diverse document types, including computer-composed, letterpress, typewriter, and han… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: 8 pages, 7 figures, 4 table Link of the paper https://openaccess.thecvf.com/content/WACV2024W/WVLL/html/Rabby_Enhancement_of_Bengali_OCR_by_Specialized_Models_and_Advanced_Techniques_WACVW_2024_paper.html

    Journal ref: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) Workshops, 2024, pp. 1102-1109

  4. arXiv:2401.03575  [pdf, other

    cs.CV eess.IV

    Involution Fused ConvNet for Classifying Eye-Tracking Patterns of Children with Autism Spectrum Disorder

    Authors: Md. Farhadul Islam, Meem Arafat Manab, Joyanta Jyoti Mondal, Sarah Zabeen, Fardin Bin Rahman, Md. Zahidul Hasan, Farig Sadeque, Jannatun Noor

    Abstract: Autism Spectrum Disorder (ASD) is a complicated neurological condition which is challenging to diagnose. Numerous studies demonstrate that children diagnosed with autism struggle with maintaining attention spans and have less focused vision. The eye-tracking technology has drawn special attention in the context of ASD since anomalies in gaze have long been acknowledged as a defining feature of aut… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

    Comments: 17 pages, 13 figures, Submitted to Engineering Applications of Artificial Intelligence

  5. arXiv:2401.00237  [pdf, other

    cs.CV eess.IV

    A Novel Approach for Defect Detection of Wind Turbine Blade Using Virtual Reality and Deep Learning

    Authors: Md Fazle Rabbi, Solayman Hossain Emon, Ehtesham Mahmud Nishat, Tzu-Liang, Tseng, Atira Ferdoushi, Chun-Che Huang, Md Fashiar Rahman

    Abstract: Wind turbines are subjected to continuous rotational stresses and unusual external forces such as storms, lightning, strikes by flying objects, etc., which may cause defects in turbine blades. Hence, it requires a periodical inspection to ensure proper functionality and avoid catastrophic failure. The task of inspection is challenging due to the remote location and inconvenient reachability by hum… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

  6. arXiv:2401.00175  [pdf, other

    cs.CR

    Addressing Trust Challenges in Blockchain Oracles Using Asymmetric Byzantine Quorums

    Authors: Fahad Rahman, Chafiq Titouna, Farid Nait-Abdesselam

    Abstract: Distributed Computing in Blockchain Technology (BCT) hinges on a trust assumption among independent nodes. Without a third-party interface or what is known as a Blockchain Oracle, it can not interact with the external world. This Oracle plays a crucial role by feeding extrinsic data into the Blockchain, ensuring that Smart Contracts operate accurately in real time. The Oracle problem arises from t… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

    Comments: 12 pages, 16 figures

  7. arXiv:2310.18363  [pdf, other

    cs.CL cs.HC cs.LG

    A Contextualized Real-Time Multimodal Emotion Recognition for Conversational Agents using Graph Convolutional Networks in Reinforcement Learning

    Authors: Fathima Abdul Rahman, Guang Lu

    Abstract: Owing to the recent developments in Generative Artificial Intelligence (GenAI) and Large Language Models (LLM), conversational agents are becoming increasingly popular and accepted. They provide a human touch by interacting in ways familiar to us and by providing support as virtual companions. Therefore, it is important to understand the user's emotions in order to respond considerately. Compared… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 5 pages (4 main + 1 reference), 2 figures. Submitted to IEEE FG2024

    ACM Class: I.2.10

  8. arXiv:2310.03669  [pdf, other

    cs.CV

    LumiNet: The Bright Side of Perceptual Knowledge Distillation

    Authors: Md. Ismail Hossain, M M Lutfe Elahi, Sameera Ramasinghe, Ali Cheraghian, Fuad Rahman, Nabeel Mohammed, Shafin Rahman

    Abstract: In knowledge distillation literature, feature-based methods have dominated due to their ability to effectively tap into extensive teacher models. In contrast, logit-based approaches, which aim to distill `dark knowledge' from teachers, typically exhibit inferior performance compared to feature-based methods. To bridge this gap, we present LumiNet, a novel knowledge distillation algorithm designed… ▽ More

    Submitted 9 March, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

  9. arXiv:2309.11077  [pdf, other

    cs.CV cs.AI cs.LG

    Weak Supervision for Label Efficient Visual Bug Detection

    Authors: Farrukh Rahman

    Abstract: As video games evolve into expansive, detailed worlds, visual quality becomes essential, yet increasingly challenging. Traditional testing methods, limited by resources, face difficulties in addressing the plethora of potential bugs. Machine learning offers scalable solutions; however, heavy reliance on large labeled datasets remains a constraint. Addressing this challenge, we propose a novel meth… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: Accepted to BMVC 2023: Workshop on Computer Vision for Games and Games for Computer Vision (CVG). 9 pages

    ACM Class: I.2.10

  10. arXiv:2307.04771  [pdf, other

    eess.IV cs.CV

    Invariant Scattering Transform for Medical Imaging

    Authors: Nafisa Labiba Ishrat Huda, Angona Biswas, MD Abdullah Al Nasim, Md. Fahim Rahman, Shoaib Ahmed

    Abstract: Invariant scattering transform introduces new area of research that merges the signal processing with deep learning for computer vision. Nowadays, Deep Learning algorithms are able to solve a variety of problems in medical sector. Medical images are used to detect diseases brain cancer or tumor, Alzheimer's disease, breast cancer, Parkinson's disease and many others. During pandemic back in 2020,… ▽ More

    Submitted 7 July, 2023; originally announced July 2023.

    Comments: 11 pages, 8 figures and 1 table

  11. arXiv:2209.12650  [pdf, other

    cs.CL cs.AI eess.AS

    Bangla-Wave: Improving Bangla Automatic Speech Recognition Utilizing N-gram Language Models

    Authors: Mohammed Rakib, Md. Ismail Hossain, Nabeel Mohammed, Fuad Rahman

    Abstract: Although over 300M around the world speak Bangla, scant work has been done in improving Bangla voice-to-text transcription due to Bangla being a low-resource language. However, with the introduction of the Bengali Common Voice 9.0 speech dataset, Automatic Speech Recognition (ASR) models can now be significantly improved. With 399hrs of speech recordings, Bengali Common Voice is the largest and mo… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

  12. arXiv:2209.10785  [pdf, other

    cs.DC cs.AI cs.CV cs.DB

    Deep Lake: a Lakehouse for Deep Learning

    Authors: Sasun Hambardzumyan, Abhinav Tuli, Levon Ghukasyan, Fariz Rahman, Hrant Topchyan, David Isayan, Mark McQuade, Mikayel Harutyunyan, Tatevik Hakobyan, Ivo Stranic, Davit Buniatyan

    Abstract: Traditional data lakes provide critical data infrastructure for analytical workloads by enabling time travel, running SQL queries, ingesting data with ACID transactions, and visualizing petabyte-scale datasets on cloud storage. They allow organizations to break down data silos, unlock data-driven decision-making, improve operational efficiency, and reduce costs. However, as deep learning usage inc… ▽ More

    Submitted 13 December, 2022; v1 submitted 22 September, 2022; originally announced September 2022.

  13. arXiv:2209.07474  [pdf, other

    cs.CV cs.LG

    On the Surprising Effectiveness of Transformers in Low-Labeled Video Recognition

    Authors: Farrukh Rahman, Ömer Mubarek, Zsolt Kira

    Abstract: Recently vision transformers have been shown to be competitive with convolution-based methods (CNNs) broadly across multiple vision tasks. The less restrictive inductive bias of transformers endows greater representational capacity in comparison with CNNs. However, in the image classification setting this flexibility comes with a trade-off with respect to sample efficiency, where transformers requ… ▽ More

    Submitted 25 October, 2022; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: Accepted to NeurIPS 2022 Workshop on Vision Transformers: Theory and applications (VTTA)

    ACM Class: I.2.10

  14. arXiv:2205.11420  [pdf

    cs.CV cs.AI

    LILA-BOTI : Leveraging Isolated Letter Accumulations By Ordering Teacher Insights for Bangla Handwriting Recognition

    Authors: Md. Ismail Hossain, Mohammed Rakib, Sabbir Mollah, Fuad Rahman, Nabeel Mohammed

    Abstract: Word-level handwritten optical character recognition (OCR) remains a challenge for morphologically rich languages like Bangla. The complexity arises from the existence of a large number of alphabets, the presence of several diacritic forms, and the appearance of complex conjuncts. The difficulty is exacerbated by the fact that some graphemes occur infrequently but remain indispensable, so addressi… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: Accepted in ICPR2022

  15. arXiv:2205.11367  [pdf, other

    cs.AI

    Rethinking Task-Incremental Learning Baselines

    Authors: Md Sazzad Hossain, Pritom Saha, Townim Faisal Chowdhury, Shafin Rahman, Fuad Rahman, Nabeel Mohammed

    Abstract: It is common to have continuous streams of new data that need to be introduced in the system in real-world applications. The model needs to learn newly added capabilities (future tasks) while retaining the old knowledge (past tasks). Incremental learning has recently become increasingly appealing for this problem. Task-incremental learning is a kind of incremental learning where task identity of n… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: Accepted in ICPR2022

  16. arXiv:2205.10962  [pdf, other

    cs.CR

    Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications

    Authors: Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Navid Asadizanjani, Farimah Farahmandi, Mark Tehranipoor, Fahim Rahman

    Abstract: The expansive globalization of the semiconductor supply chain has introduced numerous untrusted entities into different stages of a device's lifecycle. To make matters worse, the increase complexity in the design as well as aggressive time to market requirements of the newer generation of integrated circuits can lead either designers to unintentionally introduce security vulnerabilities or verific… ▽ More

    Submitted 24 May, 2022; v1 submitted 22 May, 2022; originally announced May 2022.

    Comments: 37 pages including citations, 14 figures, first edit contained minor repositioning of some of the images

  17. arXiv:2204.07909  [pdf, other

    cs.CR

    Quantifiable Assurance: From IPs to Platforms

    Authors: Bulbul Ahmed, Md Kawser Bepary, Nitin Pundir, Mike Borza, Oleg Raikhman, Amit Garg, Dale Donchin, Adam Cron, Mohamed A Abdel-moneum, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor

    Abstract: Hardware vulnerabilities are generally considered more difficult to fix than software ones because they are persistent after fabrication. Thus, it is crucial to assess the security and fix the vulnerabilities at earlier design phases, such as Register Transfer Level (RTL) and gate level. The focus of the existing security assessment techniques is mainly twofold. First, they check the security of I… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

  18. arXiv:2203.15783  [pdf

    cs.HC cs.AI

    A Systematic Review on Interactive Virtual Reality Laboratory

    Authors: Fozlur Rahman, Marium Sana Mim, Feekra Baset Baishakhi, Mahmudul Hasan, Md. Kishor Morol

    Abstract: Virtual Reality has become a significant element of education throughout the years. To understand the quality and advantages of these techniques, it is important to understand how they were developed and evaluated. Since COVID-19, the education system has drastically changed a lot. It has shifted from being in a classroom with a whiteboard and projectors to having your own room in front of your la… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

    Comments: 10 pages, 7 figures, 7 tables

  19. arXiv:2202.06128  [pdf, other

    eess.SP cs.AI cs.HC cs.RO

    Grasp-and-Lift Detection from EEG Signal Using Convolutional Neural Network

    Authors: Md. Kamrul Hasan, Sifat Redwan Wahid, Faria Rahman, Shanjida Khan Maliha, Sauda Binte Rahman

    Abstract: People undergoing neuromuscular dysfunctions and amputated limbs require automatic prosthetic appliances. In develo** such prostheses, the precise detection of brain motor actions is imperative for the Grasp-and-Lift (GAL) tasks. Because of the low-cost and non-invasive essence of Electroencephalography (EEG), it is widely preferred for detecting motor actions during the controls of prosthetic t… ▽ More

    Submitted 12 February, 2022; originally announced February 2022.

    Comments: Accepted in https://icaeee2022.com/

  20. arXiv:2202.00454  [pdf, other

    cs.CL cs.AI cs.DB

    TableQuery: Querying tabular data with natural language

    Authors: Abhijith Neil Abraham, Fariz Rahman, Damanpreet Kaur

    Abstract: This paper presents TableQuery, a novel tool for querying tabular data using deep learning models pre-trained to answer questions on free text. Existing deep learning methods for question answering on tabular data have various limitations, such as having to feed the entire table as input into a neural network model, making them unsuitable for most real-world applications. Since real-world data mig… ▽ More

    Submitted 27 January, 2022; originally announced February 2022.

    Comments: 11 pages, 1 figures

  21. arXiv:2201.00779  [pdf, ps, other

    eess.SP cs.AR cs.NI

    Handover Experiments with UAVs: Software Radio Tools and Experimental Research Platform

    Authors: Keith Powell, Andrew Yingst, Talha Faizur Rahman, Vuk Marojevic

    Abstract: Mobility management is the key feature of cellular networks. When integrating unmanned aerial vehicles (UAVs) into cellular networks, their cell association needs to be carefully managed for coexistence with other cellular users. UAVs move in three dimensions and may traverse several cells on their flight path, and so may be subject to several handovers. In order to enable research on mobility man… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: This article has been accepted for publication in WiNTECH'21

  22. IndoNLI: A Natural Language Inference Dataset for Indonesian

    Authors: Rahmad Mahendra, Alham Fikri Aji, Samuel Louvan, Fahrurrozi Rahman, Clara Vania

    Abstract: We present IndoNLI, the first human-elicited NLI dataset for Indonesian. We adapt the data collection protocol for MNLI and collect nearly 18K sentence pairs annotated by crowd workers and experts. The expert-annotated data is used exclusively as a test set. It is designed to provide a challenging test-bed for Indonesian NLI by explicitly incorporating various linguistic phenomena such as numerica… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

    Comments: Accepted at EMNLP 2021 main conference

    Journal ref: https://aclanthology.org/2021.emnlp-main.821/

  23. arXiv:2106.02494  [pdf, other

    cs.CR cs.AI

    Network and Physical Layer Attacks and countermeasures to AI-Enabled 6G O-RAN

    Authors: Talha F. Rahman, Aly Sabri Abdalla, Keith Powell, Walaa AlQwider, Vuk Marojevic

    Abstract: Artificial intelligence (AI) will play an increasing role in cellular network deployment, configuration and management. This paper examines the security implications of AI-driven 6G radio access networks (RANs). While the expected timeline for 6G standardization is still several years out, pre-standardization efforts related to 6G security are already ongoing and will benefit from fundamental and… ▽ More

    Submitted 2 September, 2022; v1 submitted 1 June, 2021; originally announced June 2021.

  24. arXiv:2106.00829  [pdf, other

    cs.CL

    ConvoSumm: Conversation Summarization Benchmark and Improved Abstractive Summarization with Argument Mining

    Authors: Alexander R. Fabbri, Faiaz Rahman, Imad Rizvi, Borui Wang, Haoran Li, Yashar Mehdad, Dragomir Radev

    Abstract: While online conversations can cover a vast amount of information in many different formats, abstractive text summarization has primarily focused on modeling solely news articles. This research gap is due, in part, to the lack of standardized datasets for summarizing online discussions. To address this gap, we design annotation protocols motivated by an issues--viewpoints--assertions framework to… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: ACL 2021

  25. arXiv:2012.04775  [pdf, other

    eess.SP cs.ET

    UAVs with Reconfigurable Intelligent Surfaces: Applications, Challenges, and Opportunities

    Authors: Aly Sabri Abdalla, Talha Faizur Rahman, Vuk Marojevic

    Abstract: A reconfigurable intelligent surface (RIS) is a metamaterial that can be integrated into walls and influence the propagation of electromagnetic waves. This, typically passive radio frequency (RF) technology is emerging for indoor and outdoor use with the potential of making wireless communications more reliable in increasingly challenging radio environments. This paper goes one step further and in… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

  26. arXiv:2011.12248  [pdf, other

    cs.CR

    RanStop: A Hardware-assisted Runtime Crypto-Ransomware Detection Technique

    Authors: Nitin Pundir, Mark Tehranipoor, Fahim Rahman

    Abstract: Among many prevailing malware, crypto-ransomware poses a significant threat as it financially extorts affected users by creating denial of access via unauthorized encryption of their documents as well as holding their documents hostage and financially extorting them. This results in millions of dollars of annual losses worldwide. Multiple variants of ransomware are growing in number with capabilit… ▽ More

    Submitted 24 November, 2020; originally announced November 2020.

  27. A Large Multi-Target Dataset of Common Bengali Handwritten Graphemes

    Authors: Samiul Alam, Tahsin Reasat, Asif Shahriyar Sushmit, Sadi Mohammad Siddiquee, Fuad Rahman, Mahady Hasan, Ahmed Imtiaz Humayun

    Abstract: Latin has historically led the state-of-the-art in handwritten optical character recognition (OCR) research. Adapting existing systems from Latin to alpha-syllabary languages is particularly challenging due to a sharp contrast between their orthographies. The segmentation of graphical constituents corresponding to characters becomes significantly hard due to a cursive writing system and frequent u… ▽ More

    Submitted 13 January, 2021; v1 submitted 30 September, 2020; originally announced October 2020.

    Comments: 15 pages, 12 figures, 6 Tables, Submitted to CVPR-21

  28. arXiv:2007.02871  [pdf, other

    cs.CL

    DART: Open-Domain Structured Data Record to Text Generation

    Authors: Linyong Nan, Dragomir Radev, Rui Zhang, Amrit Rau, Abhinand Sivaprasad, Chiachun Hsieh, Xiangru Tang, Aadit Vyas, Neha Verma, Pranav Krishna, Yangxiaokang Liu, Nadia Irwanto, Jessica Pan, Faiaz Rahman, Ahmad Zaidi, Mutethia Mutuma, Yasin Tarabar, Ankit Gupta, Tao Yu, Yi Chern Tan, Xi Victoria Lin, Caiming Xiong, Richard Socher, Nazneen Fatema Rajani

    Abstract: We present DART, an open domain structured DAta Record to Text generation dataset with over 82k instances (DARTs). Data-to-Text annotations can be a costly process, especially when dealing with tables which are the major source of structured data and contain nontrivial structures. To this end, we propose a procedure of extracting semantic triples from tables that encodes their structures by exploi… ▽ More

    Submitted 12 April, 2021; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: NAACL 2021

  29. arXiv:2004.07384  [pdf, other

    cs.LG eess.IV q-bio.QM stat.ML

    Topological Descriptors for Parkinson's Disease Classification and Regression Analysis

    Authors: Afra Nawar, Farhan Rahman, Narayanan Krishnamurthi, Anirudh Som, Pavan Turaga

    Abstract: At present, the vast majority of human subjects with neurological disease are still diagnosed through in-person assessments and qualitative analysis of patient data. In this paper, we propose to use Topological Data Analysis (TDA) together with machine learning tools to automate the process of Parkinson's disease classification and severity assessment. An automated, stable, and accurate method to… ▽ More

    Submitted 6 May, 2020; v1 submitted 15 April, 2020; originally announced April 2020.

    Comments: Accepted in the 42nd Annual International Conferences of the IEEE Engineering in Medicine and Biology Society (EMBC 2020)

  30. arXiv:1905.04762  [pdf, other

    cs.RO

    Real-Time Kinodynamic Motion Planning for Omnidirectional Mobile Robot Soccer using Rapidly-Exploring Random Tree in Dynamic Environment with Moving Obstacles

    Authors: Fahri Ali Rahman, Igi Ardiyanto, Adha Imam Cahyadi

    Abstract: RoboCup Middle Size League (RoboCup MSL) provides a standardized testbed for research on mobile robot navigation, multi-robot cooperation, communication and integration via robot soccer competition in which the environment is highly dynamic and adversarial. One of important research topic in such area is kinodynamic motion planning that plan the trajectory of the robot while avoiding obstacles and… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

  31. A Comparative Analysis of the Cyber Security Strategy of Bangladesh

    Authors: Kaushik Sarker, Hasibur Rahman, Khandaker Farzana Rahman, Md. Shohel Arman, Saikat Biswas, Touhid Bhuiyan

    Abstract: Technology is an endless evolving expression in modern era, which increased security concerns and pushed us to create cyber environment. A National Cyber Security Strategy (NCSS) of a country reflects the state of that country's cyber strength which represents the aim and vision of the cyber security of a country. Formerly, researchers have worked on NCSS by comparing NCSS between different nation… ▽ More

    Submitted 1 May, 2019; originally announced May 2019.

  32. arXiv:1902.03346  [pdf, other

    cs.CV

    Challenges in Partially-Automated Roadway Feature Map** Using Mobile Laser Scanning and Vehicle Trajectory Data

    Authors: Mohammad Billah, Farzana Rahman, Arash Maskooki, Michael Todd, Matthew Barth, Jay A. Farrell

    Abstract: Connected vehicle and driver's assistance applications are greatly facilitated by Enhanced Digital Maps (EDMs) that represent roadway features (e.g., lane edges or centerlines, stop bars). Due to the large number of signalized intersections and miles of roadway, manual development of EDMs on a global basis is not feasible. Mobile Terrestrial Laser Scanning (MTLS) is the preferred data acquisition… ▽ More

    Submitted 8 February, 2019; originally announced February 2019.

    Comments: 6 pages, 5 figures

  33. arXiv:1810.04452  [pdf, other

    cs.CV

    AI Learns to Recognize Bengali Handwritten Digits: Bengali.AI Computer Vision Challenge 2018

    Authors: Sharif Amit Kamran, Ahmed Imtiaz Humayun, Samiul Alam, Rashed Mohammad Doha, Manash Kumar Mandal, Tahsin Reasat, Fuad Rahman

    Abstract: Solving problems with Artificial intelligence in a competitive manner has long been absent in Bangladesh and Bengali-speaking community. On the other hand, there has not been a well structured database for Bengali Handwritten digits for mass public use. To bring out the best minds working in machine learning and use their expertise to create a model which can easily recognize Bengali Handwritten d… ▽ More

    Submitted 10 October, 2018; originally announced October 2018.

    Comments: 5 pages, 3 figures

  34. arXiv:1809.01625  [pdf, ps, other

    stat.ML cs.LG q-bio.GN

    Gene Shaving using influence function of a kernel method

    Authors: Md. Ashad Alam, Mohammad Shahjama, Md. Ferdush Rahman

    Abstract: Identifying significant subsets of the genes, gene shaving is an essential and challenging issue for biomedical research for a huge number of genes and the complex nature of biological networks,. Since positive definite kernel based methods on genomic information can improve the prediction of diseases, in this paper we proposed a new method, "kernel gene shaving (kernel canonical correlation analy… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

    Comments: 14 pages, 6 figures, submitted to ICCIT2018, Bangladesh

  35. arXiv:1703.00080  [pdf, other

    cs.DB

    Efficient Computation of Subspace Skyline over Categorical Domains

    Authors: Md Farhadur Rahman, Abolfazl Asudeh, Nick Koudas, Gautam Das

    Abstract: Platforms such as AirBnB, Zillow, Yelp, and related sites have transformed the way we search for accommodation, restaurants, etc. The underlying datasets in such applications have numerous attributes that are mostly Boolean or Categorical. Discovering the skyline of such datasets over a subset of attributes would identify entries that stand out while enabling numerous applications. There are only… ▽ More

    Submitted 30 May, 2017; v1 submitted 28 February, 2017; originally announced March 2017.

  36. arXiv:1602.03730  [pdf, other

    cs.DB

    HDBSCAN: Density based Clustering over Location Based Services

    Authors: Md Farhadur Rahman, Weimo Liu, Saad Bin Suhaim, Saravanan Thirumuruganathan, Nan Zhang, Gautam Das

    Abstract: Location Based Services (LBS) have become extremely popular and used by millions of users. Popular LBS run the entire gamut from map** services (such as Google Maps) to restaurants (such as Yelp) and real-estate (such as Redfin). The public query interfaces of LBS can be abstractly modeled as a kNN interface over a database of two dimensional points: given an arbitrary query point, the system re… ▽ More

    Submitted 16 February, 2016; v1 submitted 11 February, 2016; originally announced February 2016.

  37. arXiv:1505.02441  [pdf, other

    cs.DB

    Aggregate Estimations over Location Based Services

    Authors: Weimo Liu, Md Farhadur Rahman, Saravanan Thirumuruganathan, Nan Zhang, Gautam Das

    Abstract: Location based services (LBS) have become very popular in recent years. They range from map services (e.g., Google Maps) that store geographic locations of points of interests, to online social networks (e.g., WeChat, Sina Weibo, FourSquare) that leverage user geographic locations to enable various recommendation functions. The public query interfaces of these services may be abstractly modeled as… ▽ More

    Submitted 13 May, 2015; v1 submitted 10 May, 2015; originally announced May 2015.

  38. arXiv:1411.1455  [pdf, other

    cs.DB

    Rank-Based Inference over Web Databases

    Authors: Md Farhadur Rahman, Weimo Liu, Saravanan Thirumuruganathan, Nan Zhang, Gautam Das

    Abstract: In recent years, there has been much research in Ranked Retrieval model in structured databases, especially those in web databases. With this model, a search query returns top-k tuples according to not just exact matches of selection conditions, but a suitable ranking function. This paper studies a novel problem on the privacy implications of database ranking. The motivation is a novel yet serious… ▽ More

    Submitted 5 April, 2015; v1 submitted 5 November, 2014; originally announced November 2014.

  39. Analyzing an Analytical Solution Model for Simultaneous Mobility

    Authors: Md. Ibrahim Chowdhury, Mohammad Iqbal, Naznin Sultana, Faisal Rahman

    Abstract: Current mobility models for simultaneous mobility have their convolution in designing simultaneous movement where mobile nodes (MNs) travel randomly from the two adjacent cells at the same time and also have their complexity in the measurement of the occurrences of simultaneous handover. Simultaneous mobility problem incurs when two of the MNs start handover approximately at the same time. As Simu… ▽ More

    Submitted 9 January, 2014; originally announced January 2014.

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, December 2013, pp 111-124

  40. arXiv:1009.4318  [pdf

    cs.NE

    Performance Analysis of Estimation of Distribution Algorithm and Genetic Algorithm in Zone Routing Protocol

    Authors: Mst. Farhana Rahman, S. M. Masud Karim, Kazi Shah Nawaz Ripon, Md. Iqbal Hossain Suvo

    Abstract: In this paper, Estimation of Distribution Algorithm (EDA) is used for Zone Routing Protocol (ZRP) in Mobile Ad-hoc Network (MANET) instead of Genetic Algorithm (GA). It is an evolutionary approach, and used when the network size grows and the search space increases. When the destination is outside the zone, EDA is applied to find the route with minimum cost and time. The implementation of proposed… ▽ More

    Submitted 22 September, 2010; originally announced September 2010.

    Comments: 5 pages, 5 figures, International Journal of Computer Science and Information Security (IJCSIS), ISSN: 1947-5500, Vol. 8, No. 5, pp. 203-207, August 2010, Pittsburgh, USA

  41. arXiv:0909.2363  [pdf

    cs.SD

    Improvement of Text Dependent Speaker Identification System Using Neuro-Genetic Hybrid Algorithm in Office Environmental Conditions

    Authors: Md. Rabiul Islam, Md. Fayzur Rahman

    Abstract: In this paper, an improved strategy for automated text dependent speaker identification system has been proposed in noisy environment. The identification process incorporates the Neuro- Genetic hybrid algorithm with cepstral based features. To remove the background noise from the source utterance, wiener filter has been used. Different speech pre-processing techniques such as start-end point det… ▽ More

    Submitted 12 September, 2009; originally announced September 2009.

    Comments: International Journal of Computer Science Issues (IJCSI), Volume 1, pp42-48, August 2009

    Journal ref: R. Islam and F. Rahman," International Journal of Computer Science Issues (IJCSI), Volume 1, pp42-48,August 2009"

  42. arXiv:0909.0599  [pdf

    cs.SD cs.NE

    Codebook Design Method for Noise Robust Speaker Identification based on Genetic Algorithm

    Authors: Md. Rabiul Islam, Md. Fayzur Rahman

    Abstract: In this paper, a novel method of designing a codebook for noise robust speaker identification purpose utilizing Genetic Algorithm has been proposed. Wiener filter has been used to remove the background noises from the source speech utterances. Speech features have been extracted using standard speech parameterization method such as LPC, LPCC, RCC, MFCC, (delta)MFCC and (delta)(delta) MFCC. For e… ▽ More

    Submitted 3 September, 2009; originally announced September 2009.

    Comments: 5 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,http://sites.google.com/site/ijcsis/

    Report number: ISSn 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA