Skip to main content

Showing 1–50 of 55 results for author: Alam, M M

.
  1. arXiv:2506.00025  [pdf, other

    stat.AP cs.CE math.PR

    Learning Spatio-Temporal Vessel Behavior using AIS Trajectory Data and Markovian Models in the Gulf of St. Lawrence

    Authors: Gabriel Spadon, Ruixin Song, Vaishnav Vaidheeswaran, Md Mahbub Alam, Floris Goerlandt, Ronald Pelot

    Abstract: Maritime Mobility is at the center of the global economy, and analyzing and understanding such data at scale is critical for ocean conservation and governance. Accordingly, this work introduces a spatio-temporal analytical framework based on discrete-time Markov chains to analyze vessel movement patterns in the Gulf of St. Lawrence, emphasizing changes induced during the COVID-19 pandemic. We disc… ▽ More

    Submitted 22 May, 2025; originally announced June 2025.

  2. arXiv:2503.09513  [pdf, other

    cs.CR cs.AI

    RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment

    Authors: Md Morshed Alam, Lokesh Chandra Das, Sandip Roy, Sachin Shetty, Weichao Wang

    Abstract: Internet of Things (IoT) platforms with trigger-action capability allow event conditions to trigger actions in IoT devices autonomously by creating a chain of interactions. Adversaries exploit this chain of interactions to maliciously inject fake event conditions into IoT hubs, triggering unauthorized actions on target IoT devices to implement remote injection attacks. Existing defense mechanisms… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  3. arXiv:2501.00940  [pdf, other

    cs.CR

    SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering

    Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid

    Abstract: The rapid evolution of modern malware presents significant challenges to the development of effective defense mechanisms. Traditional cyber deception techniques often rely on static or manually configured parameters, limiting their adaptability to dynamic and sophisticated threats. This study leverages Generative AI (GenAI) models to automate the creation of adaptive cyber deception ploys, focusin… ▽ More

    Submitted 1 January, 2025; originally announced January 2025.

    Journal ref: 2025 IEEE 15th Annual Computing and Communication Workshop and Conference

  4. arXiv:2411.08573  [pdf

    physics.flu-dyn physics.comp-ph

    Heat transfer in a planer diverging channel with a slot jet inlet

    Authors: Md Insiat Islam Rabby, Mohammad Ali Rob Sharif, Mohammad Tarequl Islam, Md. Rakidul Islam, Md. Mahidul Alam

    Abstract: This article delves into a numerical exploration of two-dimensional, incompressible, laminar flow within a confined diverging jet. The study aims to understand how variations in the inlet opening fraction and Reynolds number affect the heat transfer and flow patterns. The research employs the finite volume method with a collocated mesh to solve the governing equations. Across a broad spectrum of i… ▽ More

    Submitted 13 November, 2024; originally announced November 2024.

  5. arXiv:2411.07053  [pdf

    cs.RO cs.CG

    UAV survey coverage path planning of complex regions containing exclusion zones

    Authors: Shadman Tajwar Shahid, Shah Md. Ahasan Siddique, Md. Mahidul Alam

    Abstract: This article addresses the challenge of UAV survey coverage path planning for areas that are complex concave polygons, containing exclusion zones or obstacles. While standard drone path planners typically generate coverage paths for simple convex polygons, this study proposes a method to manage more intricate regions, including boundary splits, merges, and interior holes. To achieve this, polygona… ▽ More

    Submitted 13 November, 2024; v1 submitted 11 November, 2024; originally announced November 2024.

  6. arXiv:2410.22669  [pdf, other

    cs.AI cs.LG

    A Walsh Hadamard Derived Linear Vector Symbolic Architecture

    Authors: Mohammad Mahmudul Alam, Alexander Oberle, Edward Raff, Stella Biderman, Tim Oates, James Holt

    Abstract: Vector Symbolic Architectures (VSAs) are one approach to developing Neuro-symbolic AI, where two vectors in $\mathbb{R}^d$ are `bound' together to produce a new vector in the same space. VSAs support the commutativity and associativity of this binding operation, along with an inverse operation, allowing one to construct symbolic-style manipulations over real-valued vectors. Most VSAs were develope… ▽ More

    Submitted 29 October, 2024; originally announced October 2024.

    Comments: To appear in the 38th Conference on Neural Information Processing Systems (NeurIPS 2024)

  7. arXiv:2410.11490  [pdf

    eess.SY eess.SP

    Survey on Neighbor Discovery and Beam Alignment in mmWave-Enabled UAV Swarm Networks

    Authors: Muhammad Morshed Alam, Sangman Moh

    Abstract: Millimeter wave (mmWave)-enabled unmanned aerial vehicle (UAV) swarm networks (UAVSNs) can utilize a large spectrum of resources to provide low latency and high data transmission rate. Additionally, owing to the short wavelength, UAVs equipped with large antenna arrays can form secure narrow directive beam to establish communication with less interference. However, due to the high UAV mobility, li… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

    Journal ref: The 11th International Conference on Smart Media and Applications (SMA 2022), Saipan, USA, 2022

  8. arXiv:2410.06627  [pdf

    eess.SY

    Variations in Multi-Agent Actor-Critic Frameworks for Joint Optimizations in UAV Swarm Networks: Recent Evolution, Challenges, and Directions

    Authors: Muhammad Morshed Alam, Muhammad Yeasir Aarafat, Tamim Hossain

    Abstract: Autonomous unmanned aerial vehicle (UAV) swarm networks (UAVSNs) can effectively execute surveillance, connectivity, and computing services to ground users (GUs). These missions require trajectory planning, UAV-GUs association, task offloading, next-hop selection, and resources such as transmit power, bandwidth, caching, and computing allocation to improve network performances. Owing to the highly… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

  9. Reconfigurable Intelligent Surfaces in Dynamic Rich Scattering Environments: BiLSTM-Based Optimization for Accurate User Localization

    Authors: Anum Umer, Ivo Müürsepp, Muhammad Mahtab Alam

    Abstract: The integration of reconfigurable intelligent surfaces (RIS) in wireless environments offers channel programmability and dynamic control over propagation channels, which is expected to play a crucial role in sixth generation (6G) networks. The majority of RIS-related research has focused on simpler, quasi-free-space conditions, where wireless channels are typically modeled analytically. However, m… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  10. arXiv:2405.16683  [pdf, other

    cs.CV cs.CY cs.LG

    Toward Digitalization: A Secure Approach to Find a Missing Person Using Facial Recognition Technology

    Authors: Abid Faisal Ayon, S M Maksudul Alam

    Abstract: Facial Recognition is a technique, based on machine learning technology that can recognize a human being analyzing his facial profile, and is applied in solving various types of realworld problems nowadays. In this paper, a common real-world problem, finding a missing person has been solved in a secure and effective way with the help of facial recognition technology. Although there exist a few wor… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  11. arXiv:2405.01130  [pdf, other

    cs.CV

    Automated Virtual Product Placement and Assessment in Images using Diffusion Models

    Authors: Mohammad Mahmudul Alam, Negin Sokhandan, Emmett Goodman

    Abstract: In Virtual Product Placement (VPP) applications, the discrete integration of specific brand products into images or videos has emerged as a challenging yet important task. This paper introduces a novel three-stage fully automated VPP system. In the first stage, a language-guided image segmentation model identifies optimal regions within images for product inpainting. In the second stage, Stable Di… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: Accepted at the 6th AI for Content Creation (AI4CC) workshop at CVPR 2024

  12. arXiv:2403.17978  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection

    Authors: Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt

    Abstract: Malware detection is an interesting and valuable domain to work in because it has significant real-world impact and unique machine-learning challenges. We investigate existing long-range techniques and benchmarks and find that they're not very suitable in this problem area. In this paper, we introduce Holographic Global Convolutional Networks (HGConv) that utilize the properties of Holographic Red… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: To appear in Proceedings of the 27th International Conference on Artificial Intelligence and Statistics (AISTATS) 2024, Valencia, Spain

  13. arXiv:2403.15937  [pdf, other

    cs.SI cs.IR

    Model, Analyze, and Comprehend User Interactions within a Social Media Platform

    Authors: Md Kaykobad Reza, S M Maksudul Alam, Yiran Luo, Youzhe Liu, Md Siam

    Abstract: In this study, we propose a novel graph-based approach to model, analyze and comprehend user interactions within a social media platform based on post-comment relationship. We construct a user interaction graph from social media data and analyze it to gain insights into community dynamics, user behavior, and content preferences. Our investigation reveals that while 56.05% of the active users are s… ▽ More

    Submitted 28 November, 2024; v1 submitted 23 March, 2024; originally announced March 2024.

    Comments: Accepted by 27th International Conference on Computer and Information Technology (ICCIT), 2024. 6 Pages, 6 Figures

  14. arXiv:2403.01983  [pdf

    cs.CL

    Language and Speech Technology for Central Kurdish Varieties

    Authors: Sina Ahmadi, Daban Q. Jaff, Md Mahfuz Ibn Alam, Antonios Anastasopoulos

    Abstract: Kurdish, an Indo-European language spoken by over 30 million speakers, is considered a dialect continuum and known for its diversity in language varieties. Previous studies addressing language and speech technology for Kurdish handle it in a monolithic way as a macro-language, resulting in disparities for dialects and varieties for which there are few resources and tools available. In this paper,… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Accepted to LREC-COLING 2024

  15. arXiv:2402.01945  [pdf, other

    cs.CL

    A Case Study on Filtering for End-to-End Speech Translation

    Authors: Md Mahfuz Ibn Alam, Antonios Anastasopoulos

    Abstract: It is relatively easy to mine a large parallel corpus for any machine learning task, such as speech-to-text or speech-to-speech translation. Although these mined corpora are large in volume, their quality is questionable. This work shows that the simplest filtering technique can trim down these big, noisy datasets to a more manageable, clean dataset. We also show that using this clean dataset can… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  16. arXiv:2402.01939  [pdf, other

    cs.CL

    A Morphologically-Aware Dictionary-based Data Augmentation Technique for Machine Translation of Under-Represented Languages

    Authors: Md Mahfuz Ibn Alam, Sina Ahmadi, Antonios Anastasopoulos

    Abstract: The availability of parallel texts is crucial to the performance of machine translation models. However, most of the world's languages face the predominant challenge of data scarcity. In this paper, we propose strategies to synthesize parallel data relying on morpho-syntactic information and using bilingual lexicons along with a small amount of seed parallel data. Our methodology adheres to a real… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  17. arXiv:2401.08141  [pdf, other

    cs.CR

    IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks

    Authors: Md Morshed Alam, Israt Jahan, Weichao Wang

    Abstract: In trigger-action IoT platforms, IoT devices report event conditions to IoT hubs notifying their cyber states and let the hubs invoke actions in other IoT devices based on functional dependencies defined as rules in a rule engine. These functional dependencies create a chain of interactions that help automate network tasks. Adversaries exploit this chain to report fake event conditions to IoT hubs… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: 2024 IEEE Wireless Communications and Networking Conference (WCNC 2024)

  18. arXiv:2312.15310  [pdf, other

    cs.CV cs.LG q-bio.NC

    Towards Generalization in Subitizing with Neuro-Symbolic Loss using Holographic Reduced Representations

    Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates

    Abstract: While deep learning has enjoyed significant success in computer vision tasks over the past decade, many shortcomings still exist from a Cognitive Science (CogSci) perspective. In particular, the ability to subitize, i.e., quickly and accurately identify the small (less than 6) count of items, is not well learned by current Convolutional Neural Networks (CNNs) or Vision Transformers (ViTs) when usi… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

    Comments: Accepted in 38th Annual AAAI Workshop on Neuro-Symbolic Learning and Reasoning in the Era of Large Language Models (NuCLeaR), 2024

  19. Reconfigurable Intelligent Surfaces in 6G Radio Localization: A Survey of Recent Developments, Opportunities, and Challenges

    Authors: Anum Umer, Ivo Müürsepp, Muhammad Mahtab Alam, Henk Wymeersch

    Abstract: In this survey paper, we present an extensive review of the use of RIS in 6G radio localization, highlighting their pivotal role as a low-cost, energy-efficient technology that reshapes wireless communication and localization landscapes. Investigating the versatile capabilities of RIS, we explore their dynamic control over electromagnetic wave manipulation, including reflection, refraction, and tr… ▽ More

    Submitted 4 February, 2025; v1 submitted 12 December, 2023; originally announced December 2023.

    Comments: https://ieeexplore.ieee.org/document/10858311

  20. arXiv:2312.01242  [pdf, other

    cs.LG cs.AI

    DDxT: Deep Generative Transformer Models for Differential Diagnosis

    Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, Cynthia Matuszek

    Abstract: Differential Diagnosis (DDx) is the process of identifying the most likely medical condition among the possible pathologies through the process of elimination based on evidence. An automated process that narrows a large set of pathologies down to the most likely pathologies will be of great importance. The primary prior works have relied on the Reinforcement Learning (RL) paradigm under the intuit… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

    Comments: Accepted at 1st Workshop on Deep Generative Models for Health at NeurIPS 2023

  21. arXiv:2310.06145  [pdf, other

    physics.flu-dyn

    Revisit the intrinsic features of flip-flopping flow behind side-by-side circular cylinders

    Authors: Wailing Chen, Yuhao Yan, Chunning Ji, Md. Mahbub Alam, Narakron Srinil, Bernd R. Noack, Nan Deng

    Abstract: As one of the most intriguing wake patterns of two side-by-side circular cylinders at an intermediate gap spacing, the flip-flopping (FF) flow has attracted great attention of fundamental research interest. This FF flow is featured by the intermittently and randomly switching gap flow with correspondingly changing forces of the two cylinders. In this paper, we first present a partition map of the… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  22. arXiv:2305.19534  [pdf, other

    cs.LG cs.AI stat.ML

    Recasting Self-Attention with Holographic Reduced Representations

    Authors: Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt

    Abstract: In recent years, self-attention has become the dominant paradigm for sequence modeling in a variety of domains. However, in domains with very long sequence lengths the $\mathcal{O}(T^2)$ memory and $\mathcal{O}(T^2 H)$ compute costs can make using transformers infeasible. Motivated by problems in malware detection, where sequence lengths of $T \geq 100,000$ are a roadblock to deep learning, we re-… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: To appear in Proceedings of the 40th International Conference on Machine Learning (ICML)

  23. arXiv:2305.17267  [pdf, other

    cs.CL

    CODET: A Benchmark for Contrastive Dialectal Evaluation of Machine Translation

    Authors: Md Mahfuz Ibn Alam, Sina Ahmadi, Antonios Anastasopoulos

    Abstract: Neural machine translation (NMT) systems exhibit limited robustness in handling source-side linguistic variations. Their performance tends to degrade when faced with even slight deviations in language usage, such as different domains or variations introduced by second-language speakers. It is intuitive to extend this observation to encompass dialectal variations as well, but the work allowing the… ▽ More

    Submitted 2 February, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

  24. arXiv:2305.17202  [pdf, other

    cs.CL

    BIG-C: a Multimodal Multi-Purpose Dataset for Bemba

    Authors: Claytone Sikasote, Eunice Mukonde, Md Mahfuz Ibn Alam, Antonios Anastasopoulos

    Abstract: We present BIG-C (Bemba Image Grounded Conversations), a large multimodal dataset for Bemba. While Bemba is the most populous language of Zambia, it exhibits a dearth of resources which render the development of language technologies or language processing research almost impossible. The dataset is comprised of multi-turn dialogues between Bemba speakers based on images, transcribed and translated… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: accepted to ACL 2023

  25. arXiv:2305.14263  [pdf, other

    cs.CL cs.AI

    LIMIT: Language Identification, Misidentification, and Translation using Hierarchical Models in 350+ Languages

    Authors: Milind Agarwal, Md Mahfuz Ibn Alam, Antonios Anastasopoulos

    Abstract: Knowing the language of an input text/audio is a necessary first step for using almost every NLP tool such as taggers, parsers, or translation systems. Language identification is a well-studied problem, sometimes even considered solved; in reality, due to lack of data and computational challenges, current systems cannot accurately identify most of the world's 7000 languages. To tackle this bottlen… ▽ More

    Submitted 6 November, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: To appear at EMNLP 2023. 24 pages, 2 figures, 12 tables

  26. arXiv:2304.12979  [pdf, other

    cs.CL cs.LG

    GMNLP at SemEval-2023 Task 12: Sentiment Analysis with Phylogeny-Based Adapters

    Authors: Md Mahfuz Ibn Alam, Ruoyu Xie, Fahim Faisal, Antonios Anastasopoulos

    Abstract: This report describes GMU's sentiment analysis system for the SemEval-2023 shared task AfriSenti-SemEval. We participated in all three sub-tasks: Monolingual, Multilingual, and Zero-Shot. Our approach uses models initialized with AfroXLMR-large, a pre-trained multilingual language model trained on African languages and fine-tuned correspondingly. We also introduce augmented training data along wit… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: Accepted at SemEval Workshop at ACL 2023

  27. Retention Is All You Need

    Authors: Karishma Mohiuddin, Mirza Ariful Alam, Mirza Mohtashim Alam, Pascal Welke, Michael Martin, Jens Lehmann, Sahar Vahdati

    Abstract: Skilled employees are the most important pillars of an organization. Despite this, most organizations face high attrition and turnover rates. While several machine learning models have been developed to analyze attrition and its causal factors, the interpretations of those models remain opaque. In this paper, we propose the HR-DSS approach, which stands for Human Resource (HR) Decision Support Sys… ▽ More

    Submitted 26 August, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

    Comments: Accepted at CIKM 2023 Applied Research Track

  28. arXiv:2303.11414  [pdf

    q-fin.RM

    Cost of Implementation of Basel III reforms in Bangladesh -- A Panel data analysis

    Authors: Dipti Rani Hazra, Md. Shah Naoaj, Mohammed Mahinur Alam, Abdul Kader

    Abstract: Inspired by the recent debate on the macroeconomic implications of the new bank regulatory standards known as Basel III, we tried to find out in this study that the impact of Basel III liquidity and capital requirements in Bangladesh proposed by Basel Committee on Banking Supervision (BCBS, 2010a). A small set of macro variables, using a sample of 22 private commercial banks operating in Banglades… ▽ More

    Submitted 11 March, 2023; originally announced March 2023.

    Comments: 13 pages

  29. arXiv:2211.13250  [pdf, other

    cs.LG cs.AI

    Lempel-Ziv Networks

    Authors: Rebecca Saul, Mohammad Mahmudul Alam, John Hurwitz, Edward Raff, Tim Oates, James Holt

    Abstract: Sequence processing has long been a central area of machine learning research. Recurrent neural nets have been successful in processing sequences for a number of tasks; however, they are known to be both ineffective and computationally expensive when applied to very long sequences. Compression-based methods have demonstrated more robustness when processing such sequences -- in particular, an appro… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: I Can't Believe It's Not Better Workshop at NeurIPS 2022

  30. arXiv:2208.02743  [pdf, other

    cs.CL cs.AI

    Integrating Knowledge Graph embedding and pretrained Language Models in Hypercomplex Spaces

    Authors: Mojtaba Nayyeri, Zihao Wang, Mst. Mahfuja Akter, Mirza Mohtashim Alam, Md Rashad Al Hasan Rony, Jens Lehmann, Steffen Staab

    Abstract: Knowledge Graphs, such as Wikidata, comprise structural and textual knowledge in order to represent knowledge. For each of the two modalities dedicated approaches for graph embedding and language models learn patterns that allow for predicting novel structural knowledge. Few approaches have integrated learning and inference with both modalities and these existing ones could only partially exploit… ▽ More

    Submitted 16 August, 2023; v1 submitted 4 August, 2022; originally announced August 2022.

    Comments: ISWC2023 version

  31. arXiv:2206.05893  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

    Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt

    Abstract: Due to the computational cost of running inference for a neural network, the need to deploy the inferential steps on a third party's compute environment or hardware is common. If the third party is not fully trusted, it is desirable to obfuscate the nature of the inputs and outputs, so that the third party can not easily determine what specific task is being performed. Provably secure protocols fo… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

    Comments: To appear in the Proceedings of the 39 th International Conference on Machine Learning, Baltimore, Maryland, USA, PMLR 162, 2022

  32. arXiv:2204.01478  [pdf, other

    cs.CY eess.SY

    WEcharge: democratizing EV charging infrastructure

    Authors: Md Umar Hashmi, Mohammad Meraj Alam, Ony Lalaina Valerie Ramarozatovo, Mohammad Shadab Alam

    Abstract: The sustainable growth of EVs will have to be met with proportional growth in EV charging infrastructure. With limited urban spaces to place new charging stations, shrinking profitability, privately owned charging facilities need to be shared. WEcharge will allow privately owned charging infrastructure to be shared with public EV owners using a business model. We propose a resource matching algori… ▽ More

    Submitted 25 March, 2022; originally announced April 2022.

  33. arXiv:2203.04703  [pdf, other

    cs.AI cs.LG

    LEMON: LanguagE ModeL for Negative Sampling of Knowledge Graph Embeddings

    Authors: Md Rashad Al Hasan Rony, Mirza Mohtashim Alam, Semab Ali, Jens Lehmann, Sahar Vahdati

    Abstract: Knowledge Graph Embedding models have become an important area of machine learning.Those models provide a latent representation of entities and relations in a knowledge graph which can then be used in downstream machine learning tasks such as link prediction. The learning process of such models can be performed by contrasting positive and negative triples. While all triples of a KG are considered… ▽ More

    Submitted 15 October, 2022; v1 submitted 9 March, 2022; originally announced March 2022.

  34. arXiv:2202.04620  [pdf, other

    cs.CR

    IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms

    Authors: Md Morshed Alam, Md Sajidul Islam Sajid, Weichao Wang, Jinpeng Wei

    Abstract: With the emergence and fast development of trigger-action platforms in IoT settings, security vulnerabilities caused by the interactions among IoT devices become more prevalent. The event occurrence at one device triggers an action in another device, which may eventually contribute to the creation of a chain of events in a network. Adversaries exploit the chain effect to compromise IoT devices and… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

    Comments: This paper appears in the 2022 IEEE Wireless Communications and Networking Conference (WCNC 2022). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses

  35. arXiv:2111.09286  [pdf, ps, other

    eess.SY

    Impact of subsidy on profitability of residential photovoltaics, battery and inverter in Flanders

    Authors: Md Umar Hashmi, Mohammed Meraj Alam

    Abstract: The sustained future growth of renewable energy in the distribution network is governed by its financial viability. The recent subsidies in Flanders for photovoltaic (PV) and battery are used to calculate the payback period on prosumer investment in residential PV, battery and inverter installations. Realistic scenario of PV, battery and inverter are created based on the market catalogue of one ma… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

  36. arXiv:2109.12072  [pdf

    cs.CL

    SD-QA: Spoken Dialectal Question Answering for the Real World

    Authors: Fahim Faisal, Sharlina Keshava, Md Mahfuz ibn Alam, Antonios Anastasopoulos

    Abstract: Question answering (QA) systems are now available through numerous commercial applications for a wide variety of domains, serving millions of users that interact with them via speech interfaces. However, current benchmarks in QA research do not account for the errors that speech recognition models might introduce, nor do they consider the language variations (dialects) of the users. To address thi… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

    Comments: EMNLP 2021 Findings

  37. arXiv:2107.08342  [pdf

    econ.GN

    A Probit Estimation of Urban Bases of Environmental Awareness: Evidence from Sylhet City, Bangladesh

    Authors: Mohammad Masud Alam, AFM Zakaria

    Abstract: This paper evaluates the significant factors contributing to environmental awareness among individuals living in the urban area of Sylhet, Bangladesh. Ordered Probit(OPM) estimation is applied on the value of ten measures of individual environmental concern. The estimated results of OPM reveal the dominance of higher education, higher income, and full-employment status on environmental concern and… ▽ More

    Submitted 28 September, 2021; v1 submitted 17 July, 2021; originally announced July 2021.

    Comments: 14 pages

    Journal ref: Development Compilation, Volume 09, Issue 01 (2013)

  38. A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

    Authors: Md Morshed Alam, Weichao Wang

    Abstract: Data provenance collects comprehensive information about the events and operations in a computer system at both application and system levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are… ▽ More

    Submitted 4 July, 2021; originally announced July 2021.

    Journal ref: Journal of Computer Security. 29(4). 423-446 (2021)

  39. arXiv:2106.11891  [pdf, other

    cs.CL

    On the Evaluation of Machine Translation for Terminology Consistency

    Authors: Md Mahfuz ibn Alam, Antonios Anastasopoulos, Laurent Besacier, James Cross, Matthias Gallé, Philipp Koehn, Vassilina Nikoulina

    Abstract: As neural machine translation (NMT) systems become an important part of professional translator pipelines, a growing body of work focuses on combining NMT with terminologies. In many scenarios and particularly in cases of domain adaptation, one expects the MT output to adhere to the constraints provided by a terminology. In this work, we propose metrics to measure the consistency of MT output with… ▽ More

    Submitted 24 June, 2021; v1 submitted 22 June, 2021; originally announced June 2021.

    Comments: preprint

  40. arXiv:2103.14034  [pdf

    physics.flu-dyn math.NA

    Fluid Flow along the Riga Plate with the Influence of Magnetic Force in a Rotating System

    Authors: Muhammad Minarul Islam, Sheela Khatun, Md. Tusher Mollah, Md. Mahmud Alam

    Abstract: The fluid flow along the Riga plate with the influence of magnetic force in a rotating system has been investigated numerically. The governing equations have been derived from Navier-Stokes equations. Applying the boundary layer approximation, the appropriate boundary layer equations have been obtained. By using usual transformation, the obtained governing equations have been transformed into a co… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Comments: arXiv admin note: text overlap with arXiv:2103.13481

    Journal ref: 8th BSME International Conference on Thermal Engineering, AIP Conf. Proc. (2019) 2121, 050002-1 - 050002-6

  41. arXiv:2103.13481  [pdf

    physics.flu-dyn math.NA

    Hall Effects on Casson Fluid Flow along a Vertical Plate

    Authors: Mst. Sonia Akter, Mohammad Rafiqul Islam, Md. Tusher Mollah, Md. Mahmud Alam

    Abstract: The Hall effects on Casson fluid flow along a vertical plate has been investigated numerically. The governing equations have been derived from Navier-Stokes' equation and boundary layer approximation has been employed. By using usual transformations, the obtained non-linear coupled partial differential equations have been transformed into dimensionless governing equations. These equations have bee… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Journal ref: 8th BSME International Conference on Thermal Engineering, AIP Conf. Proc. (2019) 2121, 040004-1 - 040004-7

  42. arXiv:2103.13222  [pdf

    physics.flu-dyn math.NA

    Bingham Fluid Flow through Oscillatory Porous Plate with Ion-Slip and Hall Current

    Authors: Md. Tusher Mollah, Muhammad Minarul Islam, Mohammad Ferdows, Md. Mahmud Alam

    Abstract: The numerical approach has been performed to study the Bingham fluid flow through an oscillatory porous plate with Ion-Slip and Hall current. Initially, at time; t = 0 both the fluid and the upper plate are at rest. At time; t > 0 the upper plate begins to oscillate in its own plane while the lower plate is stationary. The lower plate temperature is constant while the upper plate temperature has o… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Journal ref: 8th BSME International Conference on Thermal Engineering, AIP Conference Proceedings (2019), 2121, 050011-1 - 050011-6

  43. arXiv:2103.09883  [pdf, other

    cs.LG

    A Survey on Spatio-temporal Data Analytics Systems

    Authors: Md Mahbub Alam, Luis Torgo, Albert Bifet

    Abstract: Due to the surge of spatio-temporal data volume, the popularity of location-based services and applications, and the importance of extracted knowledge from spatio-temporal data to solve a wide range of real-world problems, a plethora of research and development work has been done in the area of spatial and spatio-temporal data analytics in the past decade. The main goal of existing works was to de… ▽ More

    Submitted 17 March, 2021; originally announced March 2021.

  44. Unified Learning Approach for Egocentric Hand Gesture Recognition and Fingertip Detection

    Authors: Mohammad Mahmudul Alam, Mohammad Tariqul Islam, S. M. Mahbubur Rahman

    Abstract: Head-mounted device-based human-computer interaction often requires egocentric recognition of hand gestures and fingertips detection. In this paper, a unified approach of egocentric hand gesture recognition and fingertip detection is introduced. The proposed algorithm uses a single convolutional neural network to predict the probabilities of finger class and positions of fingertips in one forward… ▽ More

    Submitted 22 July, 2021; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: 30 pages, 8 figures, Manuscript Accepted to the Pattern Recognition, Elsevier Science Publishers, 2021

  45. arXiv:2009.03518  [pdf, other

    cs.CR cs.DC eess.SY

    SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications

    Authors: A K M Mubashwir Alam, Sagar Sharma, Keke Chen

    Abstract: Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. However, the access patterns of SGX-based programs can still be observed by adversaries, which may leak important information for successful attacks. Researchers have been experimenting with Oblivious RAM (ORAM) to address t… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: To appear in Privacy Enhancing Technologies Symposium, 2021

  46. arXiv:2005.09079  [pdf

    physics.flu-dyn

    Comparative Mathematical Study of Blood Flow Through Stenotic and Aneurysmatic Artery with the Presence and Absence of Blood clots

    Authors: Mohammed Nasir Uddin, M. Monir Uddin, Md. Monjarul Alam

    Abstract: Numerical predictions of blood flow and hemodynamic properties through a stenotic and aneurysmal rigid artery are studied in the presence of blood clot at constricted area. Finite element method has been used to solve the steady partial differential equations of continuity, momentum, Oldroyd-B and bioheat transport in two dimensional cartesian coordinates system.The present investigation carries t… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

  47. arXiv:1905.13515  [pdf, ps, other

    math.AP

    Mild solutions of time fractional Navier-Stokes equations driven by finite delayed external forces

    Authors: Md Mansur Alam, Shruti Dubey

    Abstract: In this work, we consider time-fractional Navier-Stokes equations (NSE) with the external forces involving finite delay. Equations are considered on a bounded domain in 3-D space having sufficiently smooth boundary. We transform the system of equations (NSE) to an abstract Cauchy problem and then investigate local existence and uniqueness of the mild solutions. In particular, with some suitable co… ▽ More

    Submitted 8 August, 2019; v1 submitted 31 May, 2019; originally announced May 2019.

    Comments: 18 pages

    MSC Class: 34A08; 34K37; 35D99; 76D05; 76D0

  48. arXiv:1711.10845  [pdf

    cs.DC

    Data Dissemination Strategies for Emerging Wireless Body-to-Body Networks based Internet of Humans

    Authors: Dhafer Ben Arbia, Muhammad Mahtab Alam, Rabah Attia, Elyes Hamida

    Abstract: With the recent advent of Internet of Humans (IoH), wireless body-to-body networks (WBBNs) are emerging as the fundamental part of this new paradigm. In particular with reference to newly emerging applications, the research trends on data routing and dissemination strategies have gained a great interest in WBBN. In this paper, we present the performance evaluation of the clustered and distributed… ▽ More

    Submitted 29 November, 2017; originally announced November 2017.

    Comments: WiMob, Oct 2015, Abu Dhabi, United Arab Emirates

  49. arXiv:1711.10838  [pdf

    cs.NI cs.DC

    Behavior of Wireless Body-to-Body Networks Routing Strategies for Public Protection and Disaster Relief

    Authors: Dhafer Ben Arbia, Muhammad Mahtab Alam, Rabah Attia, Elyes Hamida

    Abstract: Critical and public safety operations require real-time data transfer from the incident area(s) to the distant operations command center going through the evacuation and medical support areas. Any delay in communication may cause significant loss. In some cases, it is anticipated that the existing communication infrastructures can be damaged or out-of-service. It is thus required to deploy tactica… ▽ More

    Submitted 29 November, 2017; originally announced November 2017.

    Comments: WiMob, Oct 2015, Abu Dhabi, United Arab Emirates

  50. arXiv:1708.03478  [pdf, other

    physics.chem-ph

    Combining extrapolation with ghost interaction correction in range-separated ensemble density functional theory for excited states

    Authors: Md. Mehboob Alam, Killian Deur, Stefan Knecht, Emmanuel Fromager

    Abstract: The extrapolation technique of Savin [J. Chem. Phys. 140, 18A509 (2014)], which was initially applied to range-separated ground-state-density-functional Hamiltonians, is adapted in this work to ghost-interaction-corrected (GIC) range-separated ensemble density-functional theory (eDFT) for excited states. While standard extrapolations rely on energies that decay as $μ^{-2}$ in the large range-separ… ▽ More

    Submitted 16 October, 2017; v1 submitted 11 August, 2017; originally announced August 2017.

    Comments: 17 pages, 10 figures, regular article