Skip to main content

Showing 1–50 of 54 results for author: Mamun, M

.
  1. arXiv:2504.09646  [pdf

    stat.ME

    Replacing ARDL? Introducing the NSB-ARDL Model for Structural and Asymmetric Forecasting

    Authors: Tuhin G M Al Mamun

    Abstract: This paper introduces the NSB-ARDL (Nonlinear Structural Break Autoregressive Distributed Lag) model, a novel econometric framework designed to capture asymmetric and nonlinear dynamics in macroeconomic time series. Traditional ARDL models, while widely used for estimating short- and long-run relationships, rely on assumptions of linearity and symmetry that may overlook critical structural feature… ▽ More

    Submitted 13 April, 2025; originally announced April 2025.

    Comments: draft

    MSC Class: C22; C52; C53; Q54

  2. arXiv:2504.08854  [pdf, other

    cs.CR

    Hardware Design and Security Needs Attention: From Survey to Path Forward

    Authors: Sujan Ghimire, Muhtasim Alam Chowdhury, Banafsheh Saber Latibari, Muntasir Mamun, Jaeden Wolf Carpenter, Benjamin Tan, Hammond Pearce, Pratik Satam, Soheil Salehi

    Abstract: Recent advances in attention-based artificial intelligence (AI) models have unlocked vast potential to automate digital hardware design while enhancing and strengthening security measures against various threats. This rapidly emerging field leverages Large Language Models (LLMs) to generate HDL code, identify vulnerabilities, and sometimes mitigate them. The state of the art in this design automat… ▽ More

    Submitted 10 April, 2025; originally announced April 2025.

  3. arXiv:2503.15584  [pdf

    econ.GN

    Assessing Fiscal Policy Effectiveness on Household Savings in Hungary, Slovenia, and the Czech Republic during the COVID-19 Crisis: A Markov Switching VAR Approach

    Authors: Tuhin G M Al Mamun

    Abstract: The COVID-19 pandemic significantly disrupted household consumption, savings, and income across Europe, particularly affecting countries like Hungary, Slovenia, and the Czech Republic. This study investigates the effectiveness of fiscal policies in mitigating these impacts, focusing on government interventions such as spending, subsidies, revenue, and debt. Utilizing a Markov Switching Vector Auto… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

  4. arXiv:2503.14946  [pdf

    econ.EM

    Has the Paris Agreement Shaped Emission Trends? A Panel VECM Analysis of Energy, Growth, and CO$_2$ in 106 Middle-Income Countries

    Authors: Tuhin G. M. Al Mamun, Ehsanullah, Md. Sharif Hassan, Mohammad Bin Amin, Judit Oláh

    Abstract: Rising CO$_2$ emissions remain a critical global challenge, particularly in middle-income countries where economic growth drives environmental degradation. This study examines the long-run and short-run relationships between CO$_2$ emissions, energy use, GDP per capita, and population across 106 middle-income countries from 1980 to 2023. Using a Panel Vector Error Correction Model (VECM), we asses… ▽ More

    Submitted 24 March, 2025; v1 submitted 19 March, 2025; originally announced March 2025.

    Comments: 28

  5. arXiv:2503.12178  [pdf

    econ.GN

    Public Sector Efficiency in Delivering Social Services and Its Impact on Human Development: A Comparative Study of Healthcare and Education Spending in India, Pakistan, and Bangladesh

    Authors: Tuhin G. M. Al Mamun, Rahim Md. Abdur, Md. Sharif Hassan, Mohammad Bin Amin, Judit Oláh

    Abstract: The research investigates the effects of public spending on health and education in shaping the human development in south Asian three countries: India, Pakistan and Bangladesh. The study uses the VAR (Vector Auto regression) model to estimate the effects on government spending on these sectors to evaluate the human development. The findings state that there are different degrees of impact in thes… ▽ More

    Submitted 24 March, 2025; v1 submitted 15 March, 2025; originally announced March 2025.

    Comments: draft

  6. arXiv:2502.15844  [pdf, other

    cs.CL cs.LG

    Hallucination Detection in Large Language Models with Metamorphic Relations

    Authors: Borui Yang, Md Afif Al Mamun, Jie M. Zhang, Gias Uddin

    Abstract: Large Language Models (LLMs) are prone to hallucinations, e.g., factually incorrect information, in their responses. These hallucinations present challenges for LLM-based applications that demand high factual accuracy. Existing hallucination detection methods primarily depend on external resources, which can suffer from issues such as low availability, incomplete coverage, privacy concerns, high l… ▽ More

    Submitted 11 March, 2025; v1 submitted 20 February, 2025; originally announced February 2025.

    Comments: Accepted to the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2025)

    MSC Class: 68N30 (Primary) 68T50 (Secondary) ACM Class: I.2.7; D.2.5

  7. arXiv:2502.15334  [pdf, other

    cs.CR cs.AI cs.LG

    Attention Eclipse: Manipulating Attention to Bypass LLM Safety-Alignment

    Authors: Pedram Zaree, Md Abdullah Al Mamun, Quazi Mishkatul Alam, Yue Dong, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: Recent research has shown that carefully crafted jailbreak inputs can induce large language models to produce harmful outputs, despite safety measures such as alignment. It is important to anticipate the range of potential Jailbreak attacks to guide effective defenses and accurate assessment of model safety. In this paper, we present a new approach for generating highly effective Jailbreak attacks… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

  8. arXiv:2502.14041  [pdf

    econ.GN

    Fiscal Policy and Household Savings in Central Europe (Poland, Croatia, and Slovak Republic) -- A Markov Switching VAR with Covid Shock

    Authors: Tuhin G M Al Mamun, Ehsanullah, Md Sharif Hassan, Mohd Faizal Yusof, Md Aminul Islam, Naharin Binte Rab

    Abstract: This study investigates the effectiveness of fiscal policies on household consumption, disposable income, and the propensity to consume during the COVID-19 pandemic across Croatia, Slovakia, and Poland. The purpose is to assess how variations in government debt, expenditures, revenue, and subsidies influenced household financial behaviors in response to economic shocks. Using a Markov Switching VA… ▽ More

    Submitted 24 March, 2025; v1 submitted 19 February, 2025; originally announced February 2025.

    Comments: draft

  9. arXiv:2412.07109  [pdf, other

    physics.flu-dyn physics.comp-ph

    Collision Dynamics and Deformation Behaviors of Multi-Core Compound Droplet Pairs in Microchannel Flow

    Authors: S M Abdullah Al Mamun, Samaneh Farokhirad

    Abstract: We numerically investigate the collision dynamics and deformation behaviors of double-core compound droplet pairs within confined shear flows using free-energy-based lattice Boltzmann method. While significant research has advanced our understanding of simple droplet pair interactions, the collision behaviors of core-shell compound droplets, where each shell contains one or more core droplets, rem… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

  10. Photogrammetry for Digital Twinning Industry 4.0 (I4) Systems

    Authors: Ahmed Alhamadah, Muntasir Mamun, Henry Harms, Mathew Redondo, Yu-Zheng Lin, Jesus Pacheco, Soheil Salehi, Pratik Satam

    Abstract: The onset of Industry 4.0 is rapidly transforming the manufacturing world through the integration of cloud computing, machine learning (ML), artificial intelligence (AI), and universal network connectivity, resulting in performance optimization and increase productivity. Digital Twins (DT) are one such transformational technology that leverages software systems to replicate physical process behavi… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  11. arXiv:2407.10354  [pdf

    physics.app-ph

    High Voltage (~2 kV) field-plated Al0.64Ga0.36N-channel HEMTs

    Authors: Md Tahmidul Alam, Jiahao Chen, Kenneth Stephenson, Md Abdullah-Al Mamun, Abdullah Al Mamun Mazumder, Shubhra S. Pasayat, Asif Khan, Chirag Gupta

    Abstract: High voltage (~2 kV) AlGaN-channel HEMTs were fabricated with 64% Aluminum composition in the channel. The average on-resistance was ~75 ohm. mm (~21 miliohm. cm^2) for LGD = 20 microns. Breakdown voltage reached >3 kV (tool limit) before passivation however it reduced to ~2 kV after SiN surface passivation and field plates. The apparent high breakdown voltage prior to passivation can possibly be… ▽ More

    Submitted 14 July, 2024; originally announced July 2024.

    Comments: 4 pages, 6 figures

  12. arXiv:2404.00470  [pdf

    cs.SD cs.LG eess.AS

    Classification of Short Segment Pediatric Heart Sounds Based on a Transformer-Based Convolutional Neural Network

    Authors: Md Hassanuzzaman, Nurul Akhtar Hasan, Mohammad Abdullah Al Mamun, Khawza I Ahmed, Ahsan H Khandoker, Raqibul Mostafa

    Abstract: Congenital anomalies arising as a result of a defect in the structure of the heart and great vessels are known as congenital heart diseases or CHDs. A PCG can provide essential details about the mechanical conduction system of the heart and point out specific patterns linked to different kinds of CHD. This study aims to investigate the minimum signal duration required for the automatic classificat… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

    Comments: 16 pages,11 Figures

  13. arXiv:2312.13530  [pdf, other

    cs.CR cs.AI cs.LG

    HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

    Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi

    Abstract: The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is stil… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: 22 pages, 10 pages appendix, 10 figures, Submitted to ACM TODAES

  14. TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining

    Authors: Mohammad Mamun, Scott Buffett

    Abstract: Audit logs containing system level events are frequently used for behavior modeling as they can provide detailed insight into cyber-threat occurrences. However, mapping low-level system events in audit logs to highlevel behaviors has been a major challenge in identifying host contextual behavior for the purpose of detecting potential cyber threats. Relying on domain expert knowledge may limit its… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

    Comments: 20pages

    Journal ref: Information and Communications Security. 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings Sep 2022 Pages 546-565

  15. SynthEnsemble: A Fusion of CNN, Vision Transformer, and Hybrid Models for Multi-Label Chest X-Ray Classification

    Authors: S. M. Nabil Ashraf, Md. Adyelullahil Mamun, Hasnat Md. Abdullah, Md. Golam Rabiul Alam

    Abstract: Chest X-rays are widely used to diagnose thoracic diseases, but the lack of detailed information about these abnormalities makes it challenging to develop accurate automated diagnosis systems, which is crucial for early detection and effective treatment. To address this challenge, we employed deep learning techniques to identify patterns in chest X-rays that correspond to different diseases. We co… ▽ More

    Submitted 22 May, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

    Comments: Published in International Conference on Computer and Information Technology (ICCIT) 2023

    ACM Class: I.4; I.5

    Journal ref: 2023 26th International Conference on Computer and Information Technology (ICCIT), Cox's Bazar, Bangladesh, 2023, pp. 1-6

  16. arXiv:2310.10844  [pdf, other

    cs.CL cs.CR cs.LG

    Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks

    Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh

    Abstract: Large Language Models (LLMs) are swiftly advancing in architecture and capability, and as they integrate more deeply into complex systems, the urgency to scrutinize their security properties grows. This paper surveys research in the emerging interdisciplinary field of adversarial attacks on LLMs, a subfield of trustworthy ML, combining the perspectives of Natural Language Processing and Security.… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  17. arXiv:2310.09986  [pdf

    cs.LG cs.AI math.OC

    On Statistical Learning of Branch and Bound for Vehicle Routing Optimization

    Authors: Andrew Naguib, Waleed A. Yousef, Issa Traoré, Mohammad Mamun

    Abstract: Recently, machine learning of the branch and bound algorithm has shown promise in approximating competent solutions to NP-hard problems. In this paper, we utilize and comprehensively compare the outcomes of three neural networks--graph convolutional neural network (GCNN), GraphSAGE, and graph attention network (GAT)--to solve the capacitated vehicle routing problem. We train these neural networks… ▽ More

    Submitted 17 October, 2023; v1 submitted 15 October, 2023; originally announced October 2023.

  18. arXiv:2307.08811  [pdf, other

    cs.LG cs.IT

    Co(ve)rtex: ML Models as storage channels and their (mis-)applications

    Authors: Md Abdullah Al Mamun, Quazi Mishkatul Alam, Erfan Shayegani, Pedram Zaree, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: Machine learning (ML) models are overparameterized to support generality and avoid overfitting. The state of these parameters is essentially a "don't-care" with respect to the primary model provided that this state does not interfere with the primary model. In both hardware and software systems, don't-care states and undefined behavior have been shown to be sources of significant vulnerabilities.… ▽ More

    Submitted 11 May, 2024; v1 submitted 17 July, 2023; originally announced July 2023.

  19. arXiv:2305.09688  [pdf

    eess.AS cs.CL cs.LG

    OOD-Speech: A Large Bengali Speech Recognition Dataset for Out-of-Distribution Benchmarking

    Authors: Fazle Rabbi Rakib, Souhardya Saha Dip, Samiul Alam, Nazia Tasnim, Md. Istiak Hossain Shihab, Md. Nazmuddoha Ansary, Syed Mobassir Hossen, Marsia Haque Meghla, Mamunur Mamun, Farig Sadeque, Sayma Sultana Chowdhury, Tahsin Reasat, Asif Sushmit, Ahmed Imtiaz Humayun

    Abstract: We present OOD-Speech, the first out-of-distribution (OOD) benchmarking dataset for Bengali automatic speech recognition (ASR). Being one of the most spoken languages globally, Bengali portrays large diversity in dialects and prosodic features, which demands ASR frameworks to be robust towards distribution shifts. For example, islamic religious sermons in Bengali are delivered with a tonality that… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

  20. arXiv:2304.11046  [pdf

    cs.SD cs.AI cs.CL cs.HC cs.LG

    Affective social anthropomorphic intelligent system

    Authors: Md. Adyelullahil Mamun, Hasnat Md. Abdullah, Md. Golam Rabiul Alam, Muhammad Mehedi Hassan, Md. Zia Uddin

    Abstract: Human conversational styles are measured by the sense of humor, personality, and tone of voice. These characteristics have become essential for conversational intelligent virtual assistants. However, most of the state-of-the-art intelligent virtual assistants (IVAs) are failed to interpret the affective semantics of human voices. This research proposes an anthropomorphic intelligent system that ca… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: Multimedia Tools and Applications (2023)

  21. arXiv:2304.05022  [pdf, other

    eess.IV cs.CV cs.LG

    A Deep Analysis of Transfer Learning Based Breast Cancer Detection Using Histopathology Images

    Authors: Md Ishtyaq Mahmud, Muntasir Mamun, Ahmed Abdelgawad

    Abstract: Breast cancer is one of the most common and dangerous cancers in women, while it can also afflict men. Breast cancer treatment and detection are greatly aided by the use of histopathological images since they contain sufficient phenotypic data. A Deep Neural Network (DNN) is commonly employed to improve accuracy and breast cancer detection. In our research, we have analyzed pre-trained deep transf… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: 7 pages, Accepted by 10th International Conference on Signal Processing and Integrated Networks (SPIN 2023)

  22. arXiv:2304.04839  [pdf

    cs.LG cs.CY

    MHfit: Mobile Health Data for Predicting Athletics Fitness Using Machine Learning

    Authors: Jonayet Miah, Muntasir Mamun, Md Minhazur Rahman, Md Ishtyaq Mahmud, Sabbir Ahmed, Md Hasan Bin Nasir

    Abstract: Mobile phones and other electronic gadgets or devices have aided in collecting data without the need for data entry. This paper will specifically focus on Mobile health data. Mobile health data use mobile devices to gather clinical health data and track patient vitals in real-time. Our study is aimed to give decisions for small or big sports teams on whether one athlete good fit or not for a parti… ▽ More

    Submitted 26 April, 2023; v1 submitted 10 April, 2023; originally announced April 2023.

    Comments: 6, Accepted by 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)

  23. arXiv:2304.04814  [pdf

    eess.IV cs.CV cs.LG

    LCDctCNN: Lung Cancer Diagnosis of CT scan Images Using CNN Based Model

    Authors: Muntasir Mamun, Md Ishtyaq Mahmud, Mahabuba Meherin, Ahmed Abdelgawad

    Abstract: The most deadly and life-threatening disease in the world is lung cancer. Though early diagnosis and accurate treatment are necessary for lowering the lung cancer mortality rate. A computerized tomography (CT) scan-based image is one of the most effective imaging techniques for lung cancer detection using deep learning models. In this article, we proposed a deep learning model-based Convolutional… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: 8, accepted by 10th International Conference on Signal Processing and Integrated Networks (SPIN 2023)

  24. arXiv:2301.07527  [pdf, other

    cs.DC

    Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering

    Authors: Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traore

    Abstract: Blockchain and distributed ledger technologies rely on distributed consensus algorithms. In recent years many consensus algorithms and protocols have been proposed; most of them are for permissioned blockchain networks. However, the performance of these algorithms is not well understood. This paper introduces an approach to evaluating consensus algorithms and blockchain platforms in a hostile netw… ▽ More

    Submitted 14 January, 2023; originally announced January 2023.

    Comments: 21. arXiv admin note: text overlap with arXiv:2108.08441

  25. Tunable Multistate Terahertz Switch Based on Multilayered Graphene Metamaterial

    Authors: Dip Sarker, Partha Pratim Nakti, Md Ishfak Tahmid, Md Asaduz Zaman Mamun, Ahmed Zubair

    Abstract: We proposed plasmonic effect based narrow band tunable terahertz switches consisting of multilayered graphene metamaterial. Though several terahertz optical switches based on metamaterials were previously reported, these switches had complicated fabrication processes, limited tunability, and low modulation depths. We designed and simulated ingenious four and eight state terahertz optical switch de… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

    Comments: 17 Pages, 8 Figures

  26. A Simple Evolutionary Algorithm for Multi-modal Multi-objective Optimization

    Authors: Tapabrata Ray, Mohammad Mohiuddin Mamun, Hemant Kumar Singh

    Abstract: In solving multi-modal, multi-objective optimization problems (MMOPs), the objective is not only to find a good representation of the Pareto-optimal front (PF) in the objective space but also to find all equivalent Pareto-optimal subsets (PSS) in the variable space. Such problems are practically relevant when a decision maker (DM) is interested in identifying alternative designs with similar perfo… ▽ More

    Submitted 20 October, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Journal ref: 2022 IEEE Congress on Evolutionary Computation (CEC)

  27. arXiv:2112.13990  [pdf, other

    eess.SY

    Real-Time Power System Dynamic Simulation using Windowing based Waveform Relaxation Method

    Authors: M Al Mamun, Sumit Paudyal, Sukumar Kamalasadan

    Abstract: Power system dynamic modeling involves nonlinear differential and algebraic equations (DAEs). Solving DAEs for large power grid networks by direct implicit numerical methods could be inefficient in terms of solution time; thus, such methods are not preferred when real-time or faster than real-time performance is sought. Hence, this paper revisits Waveform Relaxation (WR) algorithm, as a distribute… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

    Comments: 5 pages, 8 figures, Published in 2021 IEEE PES General Meeting, To be included in the IEEE Xplore

  28. arXiv:2108.13989  [pdf, other

    cs.CR cs.AI

    DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning

    Authors: Mohammad Mamun, Kevin Shi

    Abstract: APT, known as Advanced Persistent Threat, is a difficult challenge for cyber defence. These threats make many traditional defences ineffective as the vulnerabilities exploited by these threats are insiders who have access to and are within the network. This paper proposes DeepTaskAPT, a heterogeneous task-tree based deep learning method to construct a baseline model based on sequences of tasks usi… ▽ More

    Submitted 31 August, 2021; originally announced August 2021.

    Comments: Conference: IEEE Trustcom 2021

  29. arXiv:2108.08441  [pdf, other

    cs.DC cs.CR cs.SE

    Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains

    Authors: Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traore

    Abstract: A critical component of any blockchain or distributed ledger technology (DLT) platform is the consensus algorithm. Blockchain consensus algorithms are the primary vehicle for the nodes within a blockchain network to reach an agreement. In recent years, many blockchain consensus algorithms have been proposed mainly for private and permissioned blockchain networks. However, the performance of these… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: to appear in The 19th IEEE International Conference on Dependable, Autonomic & Secure Computing (DASC 2021)

  30. Machine Learning in Precision Medicine to Preserve Privacy via Encryption

    Authors: William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traore, Mohammad Mamun

    Abstract: Precision medicine is an emerging approach for disease treatment and prevention that delivers personalized care to individual patients by considering their genetic makeups, medical histories, environments, and lifestyles. Despite the rapid advancement of precision medicine and its considerable promise, several underlying technological challenges remain unsolved. One such challenge of great importa… ▽ More

    Submitted 5 February, 2021; originally announced February 2021.

  31. Determination of the $^{60}$Zn level density from neutron evaporation spectra

    Authors: D. Soltesz, M. A. A. Mamun, A. V. Voinov, Z. Meisel, B. A. Brown, C. R. Brune, S. M. Grimes, H. Hadizadeh, M. Hornish, T. N. Massey, J. E. O'Donnell, W. E. Ormand

    Abstract: Nuclear reactions of interest for astrophysics and applications often rely on statistical model calculations for nuclear reaction rates, particularly for nuclei far from $β$-stability. However, statistical model parameters are often poorly constrained, where experimental constraints are particularly sparse for exotic nuclides. For example, our understanding of the breakout from the NiCu cycle in t… ▽ More

    Submitted 9 January, 2021; originally announced January 2021.

    Comments: 10 pages, 8 figures

    Journal ref: Physical Review C, 103, 015802 (2021)

  32. Towards a Robust and Trustworthy Machine Learning System Development: An Engineering Perspective

    Authors: Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Mamun, Heather Molyneaux

    Abstract: While Machine Learning (ML) technologies are widely adopted in many mission critical fields to support intelligent decision-making, concerns remain about system resilience against ML-specific security attacks and privacy breaches as well as the trust that users have in these systems. In this article, we present our recent systematic and comprehensive survey on the state-of-the-art ML robustness an… ▽ More

    Submitted 14 February, 2022; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: 20 pages (58 pages pre-print), 6 figures

    Journal ref: Journal of Information Security and Applications 65 (2022) 103121

  33. arXiv:2012.14417  [pdf

    physics.flu-dyn

    Boundary Layer Flow over a Moving Flat Plate in Jeffrey Fluid with Newtonian Heating

    Authors: Didarul Ahasan Redwan, K. M. Faisal Karim, M. A. H. Mamun, Muhammad Khairul Anuar Mohamed, Syazwani Mohd Zokri

    Abstract: In this paper, a numerical analysis of boundary layer flow and heat transfer in Jeffrey fluid over a moving flat plate with Newtonian Heating have been presented. The governing partial differential equations were reduced to a transformed ordinary differential equation with the help of similarity transformation. Numerical solutions were obtained for these transformed ordinary differential equation… ▽ More

    Submitted 28 December, 2020; originally announced December 2020.

  34. arXiv:1906.04095  [pdf, other

    astro-ph.HE astro-ph.SR nucl-th

    Treating quarks within neutron stars

    Authors: Sophia Han, M. A. A. Mamun, S. Lalit, C. Constantinou, M. Prakash

    Abstract: Neutron star interiors provide the opportunity to probe properties of cold dense matter in the QCD phase diagram. Utilizing models of dense matter in accord with nuclear systematics at nuclear densities, we investigate the compatibility of deconfined quark cores with current observational constraints on the maximum mass and tidal deformability of neutron stars. We explore various methods of implem… ▽ More

    Submitted 31 October, 2019; v1 submitted 10 June, 2019; originally announced June 2019.

    Comments: 24 pages, 8 figures, 7 tables; accepted for publication in PRD

    Journal ref: Phys. Rev. D 100, 103022 (2019)

  35. arXiv:1812.09988  [pdf, other

    nucl-th

    Role of fluctuations on the pairing properties of nuclei in the random spacing model

    Authors: M. A. A. Mamun, C. Constantinou, M. Prakash

    Abstract: The influence of thermal fluctuations on fermion pairing is investigated using a semiclassical treatment of fluctuations. When the average pairing gaps along with those differing by one standard deviation are used, the characteristic discontinuity of the specific heat at the critical temperature $T_c$ in the BCS formalism with its most probable gap becomes smooth. This indicates the suppression of… ▽ More

    Submitted 24 December, 2018; originally announced December 2018.

    Comments: 6 pages, 5 figures, 6th International Workshop on Compound-Nuclear Reactions and Related Topics

  36. arXiv:1809.08126  [pdf, other

    astro-ph.HE nucl-th

    Dense matter equation of state for neutron star mergers

    Authors: S. Lalit, M. A. A. Mamun, C. Constantinou, M. Prakash

    Abstract: In simulations of binary neutron star mergers, the dense matter equation of state (EOS) is required over wide ranges of density and temperature as well as under conditions in which neutrinos are trapped, and the effects of magnetic fields and rotation prevail. Here we assess the status of dense matter theory and point out the successes and limitations of approaches currently in use. A comparative… ▽ More

    Submitted 29 November, 2018; v1 submitted 20 September, 2018; originally announced September 2018.

    Comments: Revised manuscript with one additional figure and previous Fig. 4 replaced, 19 additional references and new text

  37. arXiv:1803.07056  [pdf

    physics.acc-ph

    Non-evaporable getter coating chambers for extreme high vacuum

    Authors: Marcy L. Stutzman, Philip A. Adderley, Md Abdullah A. Mamun, Matt Poelker

    Abstract: Techniques for NEG coating a large diameter chamber are presented along with vacuum measurements in the chamber using several pumping configurations, with base pressure as low as 1.56x10^-12 Torr (N2 equivalent) with only a NEG coating and small ion pump. We then describe modifications to the NEG coating process to coat complex geometry chambers for ultra-cold atom trap experiments. Surface analys… ▽ More

    Submitted 22 March, 2018; v1 submitted 19 March, 2018; originally announced March 2018.

    Comments: Corrected Typos, adjusted table formats

  38. Pairing properties from random distributions of single-particle energy levels

    Authors: A. A. Mamun, C. Constantinou, M. Prakash

    Abstract: Exploiting the similarity between the bunched single-particle energy levels of nuclei and of random distributions around the Fermi surface, pairing properties of the latter are calculated to establish statistically-based bounds on the basic characteristics of the pairing phenomenon. When the most probable values for the pairing gaps germane to the BCS formalism are used to calculate thermodynamic… ▽ More

    Submitted 7 December, 2017; v1 submitted 25 May, 2017; originally announced May 2017.

    Comments: 8 pages and 12 figures added in new sections

    Journal ref: Phys. Rev. C 97, 064324 (2018)

  39. Efficient Design of Reversible Sequential Circuit

    Authors: Md. Selim Al Mamun, Indrani Mandal, Md. Hasanuzzaman

    Abstract: Reversible logic has come to the forefront of theoretical and applied research today. Although many researchers are investigating techniques to synthesize reversible combinational logic, there is little work in the area of sequential reversible logic. Latches and flip-flops are the most significant memory elements for the forthcoming sequential memory elements. In this paper, we proposed two new r… ▽ More

    Submitted 26 July, 2014; originally announced July 2014.

    Comments: IOSR Journal of Computer Engineering (IOSR-JCE) 5.6(2012)

  40. Quantum Cost Optimization for Reversible Sequential Circuit

    Authors: Md. Selim Al Mamun, David Menville

    Abstract: Reversible sequential circuits are going to be the significant memory blocks for the forthcoming computing devices for their ultra low power consumption. Therefore design of various types of latches has been considered a major objective for the researchers quite a long time. In this paper we proposed efficient design of reversible sequential circuits that are optimized in terms of quantum cost, de… ▽ More

    Submitted 26 July, 2014; originally announced July 2014.

    Comments: Quantum 4.12 (2013). arXiv admin note: substantial text overlap with arXiv:1312.7354

  41. Design of Reversible Counter

    Authors: Md. Selim Al Mamun, B. K. Karmaker

    Abstract: This article presents a research work on the design and synthesis of sequential circuits and flip-flops that are available in digital arena; and describes a new synthesis design of reversible counter that is optimized in terms of quantum cost, delay and garbage outputs compared to the existing designs. We proposed a new model of reversible T flip-flop in designing reversible counter

    Submitted 29 March, 2014; originally announced April 2014.

    Comments: International Journal of Advanced Computer Science and Applications(IJACSA), Volume 5 Issue 1, 2014

  42. arXiv:1401.3985  [pdf, other

    cs.SE cs.RO

    Engineering the Hardware/Software Interface for Robotic Platforms - A Comparison of Applied Model Checking with Prolog and Alloy

    Authors: Md Abdullah Al Mamun, Christian Berger, Jörgen Hansson

    Abstract: Robotic platforms serve different use cases ranging from experiments for prototyping assistive applications up to embedded systems for realizing cyber-physical systems in various domains. We are using 1:10 scale miniature vehicles as a robotic platform to conduct research in the domain of self-driving cars and collaborative vehicle fleets. Thus, experiments with different sensors like e.g.~ultra-s… ▽ More

    Submitted 16 January, 2014; originally announced January 2014.

    Comments: Presented at DSLRob 2013 (arXiv:cs/1312.5952)

    Report number: DSLRob/2013/02

  43. arXiv:1312.7355  [pdf

    cs.ET cs.AR

    A Novel Approach for Designing Online Testable Reversible Circuits

    Authors: Md. Selim Al Mamun, Pronab Kumar Mondal, Uzzal Kumar Prodhan

    Abstract: Reversible logic is gaining interest of many researchers due to its low power dissipating characteristic. In this paper we proposed a new approach for designing online testable reversible circuits. The resultant testable reversible circuit can detect any single bit error whiles it is operating. Appropriate theorems and lemmas are presented to clarify the proposed design. The experimental results s… ▽ More

    Submitted 22 December, 2013; originally announced December 2013.

    Journal ref: International Journal of Engineering Research and Development, Volume 5, Issue 2, PP. 39-44 Year 2012

  44. arXiv:1312.7354  [pdf

    cs.ET cs.AR

    Design of Reversible Random Access Memory

    Authors: Md. Selim Al Mamun, Syed Monowar Hossain

    Abstract: Reversible logic has become immensely popular research area and its applications have spread in various technologies for their low power consumption. In this paper we proposed an efficient design of random access memory using reversible logic. In the way of designing the reversible random access memory we proposed a reversible decoder and a write enable reversible master slave D flip-flop. All the… ▽ More

    Submitted 22 December, 2013; originally announced December 2013.

    Journal ref: International Journal of Computer Applications,Volume 56 - Number 15 , Year of Publication: 2012

  45. arXiv:1307.4338  [pdf

    physics.ins-det nucl-ex

    The effect of heat treatments and coatings on the outgassing rate of stainless steel chambers

    Authors: M. A. Mamun, A. A. Elmustafa, M. L. Stutzman, P. A. Adderley, M. Poelker

    Abstract: The outgassing rates of three nominally identical 304L stainless steel vacuum chambers were measured to determine the effect of chamber coatings and heat treatments. One chamber was coated with titanium nitride (TiN) and one with amorphous silicon (a-Si) immediately following fabrication. The last chamber was first tested without any coating, and then coated with a-Si following a series of heat tr… ▽ More

    Submitted 27 January, 2014; v1 submitted 16 July, 2013; originally announced July 2013.

    Comments: 9 figures, 4 tables

    Journal ref: J. Vac. Sci. Technol. A 32 , 021604 (2014) ;

  46. arXiv:1209.5448  [pdf

    cs.IR

    A New Compression Based Index Structure for Efficient Information Retrieval

    Authors: Md. Abdullah al Mamun, Md. Hanif, Md. Rakib Uddin, Tanvir Ahmed, Md. Mofizul Islam

    Abstract: Finding desired information from large data set is a difficult problem. Information retrieval is concerned with the structure, analysis, organization, storage, searching, and retrieval of information. Index is the main constituent of an IR system. Now a day exponential growth of information makes the index structure large enough affecting the IR system's quality. So compressing the Index structure… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

    Comments: 5 pages

    Journal ref: International Journal of Science and Technology, Volume 2 No.1, pp. 10-14, January 2012

  47. arXiv:1209.1678  [pdf

    cs.CR

    Policy based intrusion detection and response system in hierarchical WSN architecture

    Authors: Mohammad Saiful Islam Mamun, A. F. M Sultanul Kabir, Md. Sakhawat Hossen, Md. Razib Hayat Khan

    Abstract: In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose… ▽ More

    Submitted 7 September, 2012; originally announced September 2012.

    Comments: 5 pages, IEEE International Conference on Wireless Communication,Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless Vitae'09, May 17-20, 2009. Aalborg, Denmark. ISBN 978-1-4244-4067-2

  48. arXiv:1208.5096  [pdf, other

    cs.CR

    An Optimized Signature Verification System for Vehicle Ad hoc NETwork

    Authors: Mohammad Saiful Islam Mamun, Atsuko Miyaji

    Abstract: This paper1 presents an efficient approach to an existing batch verification system on Identity based group signature (IBGS) which can be applied to any Mobile ad hoc network device including Vehicle Ad hoc Networks (VANET). We propose an optimized way to batch signatures in order to get maximum throughput from a device in runtime environment. In addition, we minimize the number of pairing computa… ▽ More

    Submitted 24 August, 2012; originally announced August 2012.

    Comments: 8 pages, IEEE WiCOM 2012

  49. Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information

    Authors: A. F. M. Sultanul Kabir, Mohammad Saiful Islam Mamun

    Abstract: A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 15 pages, International Journal of Computer Applications (IJCA) (0975 - 8887) Volume 15- No.1, February 2011

    Journal ref: International Journal of Computer Applications 15(1):11-25, February 2011. Published by Foundation of Computer Science

  50. Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    Authors: Mohammad Saiful Islam Mamun, A. F. M. Sultanul Kabir

    Abstract: In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion preven… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other authors