Skip to main content

Showing 1–29 of 29 results for author: Rana, M

Searching in archive cs. Search in all archives.
.
  1. The Impact of Machine Learning on Society: An Analysis of Current Trends and Future Implications

    Authors: Md Kamrul Hossain Siam, Manidipa Bhattacharjee, Shakik Mahmud, Md. Saem Sarkar, Md. Masud Rana

    Abstract: The Machine learning (ML) is a rapidly evolving field of technology that has the potential to greatly impact society in a variety of ways. However, there are also concerns about the potential negative effects of ML on society, such as job displacement and privacy issues. This research aimed to conduct a comprehensive analysis of the current and future impact of ML on society. The research included… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: 12 pages

  2. arXiv:2402.10005  [pdf, other

    cs.SD cs.AI cs.LG eess.AS

    ML-ASPA: A Contemplation of Machine Learning-based Acoustic Signal Processing Analysis for Sounds, & Strains Emerging Technology

    Authors: Ratul Ali, Aktarul Islam, Md. Shohel Rana, Saila Nasrin, Sohel Afzal Shajol, Professor Dr. A. H. M. Saifullah Sadi

    Abstract: Acoustic data serves as a fundamental cornerstone in advancing scientific and engineering understanding across diverse disciplines, spanning biology, communications, and ocean and Earth science. This inquiry meticulously explores recent advancements and transformative potential within the domain of acoustics, specifically focusing on machine learning (ML) and deep learning. ML, comprising an exten… ▽ More

    Submitted 17 December, 2023; originally announced February 2024.

    Comments: 7 pages, 5 figures, Article

    MSC Class: 68Qxx; 68Uxx; 68Vxx; 68Wxx; 68Txx; 68-XX ACM Class: J.7; D.2; G.4

  3. arXiv:2306.07997  [pdf

    cs.CR cs.LG cs.NI

    Machine Learning Approach on Multiclass Classification of Internet Firewall Log Files

    Authors: Md Habibur Rahman, Taminul Islam, Md Masum Rana, Rehnuma Tasnim, Tanzina Rahman Mona, Md. Mamun Sakib

    Abstract: Firewalls are critical components in securing communication networks by screening all incoming (and occasionally exiting) data packets. Filtering is carried out by comparing incoming data packets to a set of rules designed to prevent malicious code from entering the network. To regulate the flow of data packets entering and leaving a network, an Internet firewall keeps a track of all activity. Whi… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: Accepted and presented in International Conference on Computational Intelligence and Sustainable Engineering (CISES-2023), 2022, 7 pages, 13 figures

  4. arXiv:2301.06194  [pdf, ps, other

    q-bio.BM cs.LG

    Geometric Graph Learning with Extended Atom-Types Features for Protein-Ligand Binding Affinity Prediction

    Authors: Md Masud Rana, Duc Duy Nguyen

    Abstract: Understanding and accurately predicting protein-ligand binding affinity are essential in the drug design and discovery process. At present, machine learning-based methodologies are gaining popularity as a means of predicting binding affinity due to their efficiency and accuracy, as well as the increasing availability of structural and binding affinity data for protein-ligand complexes. In biomolec… ▽ More

    Submitted 15 January, 2023; originally announced January 2023.

  5. arXiv:2301.03134  [pdf

    cs.LG cs.AI eess.SP

    A Semi-supervised Approach for Activity Recognition from Indoor Trajectory Data

    Authors: Mashud Rana, Ashfaqur Rahman, Daniel Smith

    Abstract: The increasingly wide usage of location aware sensors has made it possible to collect large volume of trajectory data in diverse application domains. Machine learning allows to study the activities or behaviours of moving objects (e.g., people, vehicles, robot) using such trajectory data with rich spatiotemporal information to facilitate informed strategic and operational decision making. In this… ▽ More

    Submitted 10 January, 2023; v1 submitted 8 January, 2023; originally announced January 2023.

  6. arXiv:2211.02263  [pdf, other

    cs.LG cs.AI

    Impact Learning: A Learning Method from Features Impact and Competition

    Authors: Nusrat Jahan Prottasha, Saydul Akbar Murad, Abu Jafar Md Muzahid, Masud Rana, Md Kowsher, Apurba Adhikary, Sujit Biswas, Anupam Kumar Bairagi

    Abstract: Machine learning is the study of computer algorithms that can automatically improve based on data and experience. Machine learning algorithms build a model from sample data, called training data, to make predictions or judgments without being explicitly programmed to do so. A variety of wellknown machine learning algorithms have been developed for use in the field of computer science to analyze da… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

  7. arXiv:2210.01344  [pdf, other

    cs.AI

    Movement Analytics: Current Status, Application to Manufacturing, and Future Prospects from an AI Perspective

    Authors: Peter Baumgartner, Daniel Smith, Mashud Rana, Reena Kapoor, Elena Tartaglia, Andreas Schutt, Ashfaqur Rahman, John Taylor, Simon Dunstall

    Abstract: Data-driven decision making is becoming an integral part of manufacturing companies. Data is collected and commonly used to improve efficiency and produce high quality items for the customers. IoT-based and other forms of object tracking are an emerging tool for collecting movement data of objects/entities (e.g. human workers, moving vehicles, trolleys etc.) over space and time. Movement data can… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

  8. Solar Power Time Series Forecasting Utilising Wavelet Coefficients

    Authors: Sarah Almaghrabi, Mashud Rana, Margaret Hamilton, Mohammad Saiedur Rahaman

    Abstract: Accurate and reliable prediction of Photovoltaic (PV) power output is critical to electricity grid stability and power dispatching capabilities. However, Photovoltaic (PV) power generation is highly volatile and unstable due to different reasons. The Wavelet Transform (WT) has been utilised in time series applications, such as Photovoltaic (PV) power prediction, to model the stochastic volatility… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

    Journal ref: Neurocomputing Neurocomputing Volume 508, 7 October 2022, Pages 182-207

  9. Deep Learning for Prawn Farming: Forecasting and Anomaly Detection

    Authors: Joel Janek Dabrowski, Ashfaqur Rahman, Andrew Hellicar, Mashud Rana, Stuart Arnold

    Abstract: We present a decision support system for managing water quality in prawn ponds. The system uses various sources of data and deep learning models in a novel way to provide 24-hour forecasting and anomaly detection of water quality parameters. It provides prawn farmers with tools to proactively avoid a poor growing environment, thereby optimising growth and reducing the risk of losing stock. This is… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: Advances in Knowledge Discovery and Data Mining. PAKDD 2022. Lecture Notes in Computer Science, vol 13282. Springer, Cham

  10. arXiv:2112.10251  [pdf, other

    cs.LG

    SSDNet: State Space Decomposition Neural Network for Time Series Forecasting

    Authors: Yang Lin, Irena Koprinska, Mashud Rana

    Abstract: In this paper, we present SSDNet, a novel deep learning approach for time series forecasting. SSDNet combines the Transformer architecture with state space models to provide probabilistic and interpretable forecasts, including trend and seasonality components and previous time steps important for the prediction. The Transformer architecture is used to learn the temporal patterns and estimate the p… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Comments: ICDM 2021 Regular paper

  11. arXiv:2112.01454  [pdf, other

    cs.CV cs.HC

    Altering Facial Expression Based on Textual Emotion

    Authors: Mohammad Imrul Jubair, Md. Masud Rana, Md. Amir Hamza, Mohsena Ashraf, Fahim Ahsan Khan, Ahnaf Tahseen Prince

    Abstract: Faces and their expressions are one of the potent subjects for digital images. Detecting emotions from images is an ancient task in the field of computer vision; however, performing its reverse -- synthesizing facial expressions from images -- is quite new. Such operations of regenerating images with different facial expressions, or altering an existing expression in an image require the Generativ… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

    Comments: Accepted in VISAPP2022

  12. arXiv:2109.10443  [pdf, other

    cs.RO eess.SY

    Geometric Fabrics: Generalizing Classical Mechanics to Capture the Physics of Behavior

    Authors: Karl Van Wyk, Mandy Xie, Anqi Li, Muhammad Asif Rana, Buck Babich, Bryan Peele, Qian Wan, Iretiayo Akinola, Balakumar Sundaralingam, Dieter Fox, Byron Boots, Nathan D. Ratliff

    Abstract: Classical mechanical systems are central to controller design in energy sha** methods of geometric control. However, their expressivity is limited by position-only metrics and the intimate link between metric and geometry. Recent work on Riemannian Motion Policies (RMPs) has shown that shedding these restrictions results in powerful design tools, but at the expense of theoretical stability guara… ▽ More

    Submitted 18 January, 2022; v1 submitted 21 September, 2021; originally announced September 2021.

  13. arXiv:2107.06782  [pdf

    q-fin.ST cs.LG

    Clustering and attention model based for intelligent trading

    Authors: Mimansa Rana, Nanxiang Mao, Ming Ao, Xiaohui Wu, Poning Liang, Matloob Khushi

    Abstract: The foreign exchange market has taken an important role in the global financial market. While foreign exchange trading brings high-yield opportunities to investors, it also brings certain risks. Since the establishment of the foreign exchange market in the 20th century, foreign exchange rate forecasting has become a hot issue studied by scholars from all over the world. Due to the complexity and n… ▽ More

    Submitted 6 August, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

  14. arXiv:2103.05922  [pdf, other

    cs.RO cs.LG eess.SY

    RMP2: A Structured Composable Policy Class for Robot Learning

    Authors: Anqi Li, Ching-An Cheng, M. Asif Rana, Man Xie, Karl Van Wyk, Nathan Ratliff, Byron Boots

    Abstract: We consider the problem of learning motion policies for acceleration-based robotics systems with a structured policy class specified by RMPflow. RMPflow is a multi-task control framework that has been successfully applied in many robotics problems. Using RMPflow as a structured policy class in learning has several benefits, such as sufficient expressiveness, the flexibility to inject different lev… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

  15. arXiv:2012.13457  [pdf, other

    cs.RO cs.LG

    Towards Coordinated Robot Motions: End-to-End Learning of Motion Policies on Transform Trees

    Authors: M. Asif Rana, Anqi Li, Dieter Fox, Sonia Chernova, Byron Boots, Nathan Ratliff

    Abstract: Generating robot motion that fulfills multiple tasks simultaneously is challenging due to the geometric constraints imposed by the robot. In this paper, we propose to solve multi-task problems through learning structured policies from human demonstrations. Our structured policy is inspired by RMPflow, a framework for combining subtask policies on different spaces. The policy structure provides the… ▽ More

    Submitted 10 March, 2021; v1 submitted 24 December, 2020; originally announced December 2020.

  16. arXiv:2010.15676  [pdf, other

    cs.RO math.OC

    Optimization Fabrics for Behavioral Design

    Authors: Nathan D. Ratliff, Karl Van Wyk, Mandy Xie, Anqi Li, Muhammad Asif Rana

    Abstract: A common approach to the provably stable design of reactive behavior, exemplified by operational space control, is to reduce the problem to the design of virtual classical mechanical systems (energy sha**). This framework is widely used, and through it we gain stability, but at the price of expressivity. This work presents a comprehensive theoretical framework expanding this approach showing tha… ▽ More

    Submitted 25 June, 2021; v1 submitted 28 October, 2020; originally announced October 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2008.02399

  17. arXiv:2010.14750  [pdf, other

    cs.RO

    Geometric Fabrics for the Acceleration-based Design of Robotic Motion

    Authors: Mandy Xie, Karl Van Wyk, Anqi Li, Muhammad Asif Rana, Qian Wan, Dieter Fox, Byron Boots, Nathan Ratliff

    Abstract: This paper describes the pragmatic design and construction of geometric fabrics for sha** a robot's task-independent nominal behavior, capturing behavioral components such as obstacle avoidance, joint limit avoidance, redundancy resolution, global navigation heuristics, etc. Geometric fabrics constitute the most concrete incarnation of a new mathematical formulation for reactive behavior called… ▽ More

    Submitted 25 June, 2021; v1 submitted 28 October, 2020; originally announced October 2020.

  18. arXiv:2010.14745  [pdf, other

    cs.RO

    Generalized Nonlinear and Finsler Geometry for Robotics

    Authors: Nathan D. Ratliff, Karl Van Wyk, Mandy Xie, Anqi Li, Muhammad Asif Rana

    Abstract: Robotics research has found numerous important applications of Riemannian geometry. Despite that, the concept remain challenging to many roboticists because the background material is complex and strikingly foreign. Beyond {\em Riemannian} geometry, there are many natural generalizations in the mathematical literature -- areas such as Finsler geometry and spray geometry -- but those generalization… ▽ More

    Submitted 2 July, 2021; v1 submitted 28 October, 2020; originally announced October 2020.

  19. arXiv:2010.00852  [pdf

    cs.CR

    Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey

    Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

    Abstract: With the advent of advanced technology, IoT introduces a vast number of devices connecting with each other and collecting a sheer volume of data. Thus, the demands of IoT security is paramount. Cryptography is being used to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint nature of IoT devices, the traditional crypt… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: 22 pages, 3 figures and 6 tables

  20. arXiv:2008.02399  [pdf, other

    cs.RO math.OC

    Optimization Fabrics

    Authors: Nathan D. Ratliff, Karl Van Wyk, Mandy Xie, Anqi Li, Muhammad Asif Rana

    Abstract: This paper presents a theory of optimization fabrics, second-order differential equations that encode nominal behaviors on a space and can be used to define the behavior of a smooth optimizer. Optimization fabrics can encode commonalities among optimization problems that reflect the structure of the space itself, enabling smooth optimization processes to intelligently navigate each problem even wh… ▽ More

    Submitted 21 August, 2020; v1 submitted 5 August, 2020; originally announced August 2020.

  21. arXiv:2005.13143  [pdf, other

    cs.RO cs.LG eess.SY

    Euclideanizing Flows: Diffeomorphic Reduction for Learning Stable Dynamical Systems

    Authors: Muhammad Asif Rana, Anqi Li, Dieter Fox, Byron Boots, Fabio Ramos, Nathan Ratliff

    Abstract: Robotic tasks often require motions with complex geometric structures. We present an approach to learn such motions from a limited number of human demonstrations by exploiting the regularity properties of human motions e.g. stability, smoothness, and boundedness. The complex motions are encoded as rollouts of a stable dynamical system, which, under a change of coordinates defined by a diffeomorphi… ▽ More

    Submitted 21 September, 2020; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: 2nd Annual Conference on Learning for Dynamics and Control (L4DC) 2020 -- Revised Version

  22. arXiv:2001.10386  [pdf, other

    cs.RO

    Taking Recoveries to Task: Recovery-Driven Development for Recipe-based Robot Tasks

    Authors: Siddhartha Banerjee, Angel Daruna, David Kent, Weiyu Liu, Jonathan Balloch, Abhinav Jain, Akshay Krishnan, Muhammad Asif Rana, Harish Ravichandar, Binit Shah, Nithin Shrivatsav, Sonia Chernova

    Abstract: Robot task execution when situated in real-world environments is fragile. As such, robot architectures must rely on robust error recovery, adding non-trivial complexity to highly-complex robot systems. To handle this complexity in development, we introduce Recovery-Driven Development (RDD), an iterative task scripting process that facilitates rapid task and recovery development by leveraging hiera… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: Published and presented at International Symposium on Robotics Research (ISRR), 2019 in Hanoi, Vietnam

  23. arXiv:1911.02725  [pdf, other

    cs.RO cs.HC

    Benchmark for Skill Learning from Demonstration: Impact of User Experience, Task Complexity, and Start Configuration on Performance

    Authors: M. Asif Rana, Daphne Chen, S. Reza Ahmadzadeh, Jacob Williams, Vivian Chu, Sonia Chernova

    Abstract: In this work, we contribute a large-scale study benchmarking the performance of multiple motion-based learning from demonstration approaches. Given the number and diversity of existing methods, it is critical that comprehensive empirical studies be performed comparing the relative strengths of these learning techniques. In particular, we evaluate four different approaches based on properties an en… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

    Comments: 8 pages, 8 figures, submitted to IEEE Robotics and Automation Letters, videos and website can be found at https://sites.google.com/view/rail-lfd

  24. arXiv:1903.11725  [pdf, other

    cs.RO

    Skill Acquisition via Automated Multi-Coordinate Cost Balancing

    Authors: Harish Ravichandar, S. Reza Ahmadzadeh, M. Asif Rana, Sonia Chernova

    Abstract: We propose a learning framework, named Multi-Coordinate Cost Balancing (MCCB), to address the problem of acquiring point-to-point movement skills from demonstrations. MCCB encodes demonstrations simultaneously in multiple differential coordinates that specify local geometric properties. MCCB generates reproductions by solving a convex optimization problem with a multi-coordinate cost function and… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

    Comments: Accepted for publication in proceedings of ICRA 2019

  25. arXiv:1808.00349  [pdf, other

    cs.RO

    Learning Generalizable Robot Skills from Demonstrations in Cluttered Environments

    Authors: Muhammad Asif Rana, Mustafa Mukadam, Seyed Reza Ahmadzadeh, Sonia Chernova, Byron Boots

    Abstract: Learning from Demonstration (LfD) is a popular approach to endowing robots with skills without having to program them by hand. Typically, LfD relies on human demonstrations in clutter-free environments. This prevents the demonstrations from being affected by irrelevant objects, whose influence can obfuscate the true intention of the human or the constraints of the desired skill. However, it is unr… ▽ More

    Submitted 3 August, 2018; v1 submitted 1 August, 2018; originally announced August 2018.

    Comments: 6 pages, 9 figures, accepted in International Conference on Intelligent Robots & Systems (IROS), 2018

  26. arXiv:1711.00117  [pdf, other

    cs.CV

    Countering Adversarial Images using Input Transformations

    Authors: Chuan Guo, Mayank Rana, Moustapha Cisse, Laurens van der Maaten

    Abstract: This paper investigates strategies that defend against adversarial-example attacks on image-classification systems by transforming the inputs before feeding them to the system. Specifically, we study applying image transformations such as bit-depth reduction, JPEG compression, total variance minimization, and image quilting before feeding the image to a convolutional network classifier. Our experi… ▽ More

    Submitted 25 January, 2018; v1 submitted 31 October, 2017; originally announced November 2017.

    Comments: 12 pages, 6 figures, submitted to ICLR 2018

  27. arXiv:1605.03283  [pdf

    cs.DC

    Implementation of the open source virtualization technologies in cloud computing

    Authors: Mohammad Mamun Or Rashid, M. Masud Rana, Jugal Krishna Das

    Abstract: The Virtualization and Cloud Computing is a recent buzzword in the digital world. Cloud computing provide IT as a service to the users on demand basis. This service has greater flexibility, availability, reliability and scalability with utility computing model. This new concept of computing has an immense potential in it to be used in the field of e-governance and in the overall IT development per… ▽ More

    Submitted 11 May, 2016; originally announced May 2016.

    Comments: 19 pages

  28. arXiv:1412.6359  [pdf

    cs.SE

    An Empirical Study on Refactoring Activity

    Authors: Mohammad Iftekharul Hoque, Vijay Nag Ranga, Anurag Reddy Pedditi, Rachitha Srinath, Md Ali Ahsan Rana, Md Eftakhairul Islam, Afshin Somani

    Abstract: This paper reports an empirical study on refactoring activity in three Java software systems. We investigated some questions on refactoring activity, to confirm or disagree on conclusions that have been drawn from previous empirical studies. Unlike previous empirical studies, our study found that it is not always true that there are more refactoring activities before major project release date tha… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Comments: 11 pages, 9 figures, 1 table

    ACM Class: D.2; K.6; H.5.2

  29. Genetic Algorithm in Audio Steganography

    Authors: Manisha Rana, Rohit Tanwar

    Abstract: With the advancement of communication technology,data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to secure data. In steganography technique, the existence of data is concealed. GA is an emergin… ▽ More

    Submitted 10 July, 2014; originally announced July 2014.

    Comments: 6 pages,2 figures Published with International Journal of Engineering Trends and Technology (IJETT). arXiv admin note: text overlap with arXiv:1003.4084, arXiv:1205.2800 by other authors without attribution

    Journal ref: IJETT, V13(1),29-34 July 2014