-
Improving Multi-turn Task Completion in Task-Oriented Dialog Systems via Prompt Chaining and Fine-Grained Feedback
Authors:
Moghis Fereidouni,
Md Sajid Ahmed,
Adib Mosharrof,
A. B. Siddique
Abstract:
Task-oriented dialog (TOD) systems facilitate users in accomplishing complex, multi-turn tasks through natural language. While traditional approaches rely on extensive fine-tuning and annotated data for each domain, instruction-tuned large language models (LLMs) offer a more flexible alternative. However, LLMs struggle to reliably handle multi-turn task completion, particularly with accurately gen…
▽ More
Task-oriented dialog (TOD) systems facilitate users in accomplishing complex, multi-turn tasks through natural language. While traditional approaches rely on extensive fine-tuning and annotated data for each domain, instruction-tuned large language models (LLMs) offer a more flexible alternative. However, LLMs struggle to reliably handle multi-turn task completion, particularly with accurately generating API calls and adapting to new domains without explicit demonstrations. To address these challenges, we propose RealTOD, a novel framework that enhances TOD systems through prompt chaining and fine-grained feedback mechanisms. Prompt chaining enables zero-shot domain adaptation via a two-stage prompting strategy, eliminating the need for human-curated demonstrations. Meanwhile, the fine-grained feedback mechanism improves task completion by verifying API calls against domain schemas and providing precise corrective feedback when errors are detected. We conduct extensive experiments on the SGD and BiTOD benchmarks using four LLMs. RealTOD improves API accuracy, surpassing AutoTOD by 37.74% on SGD and SimpleTOD by 11.26% on BiTOD. Human evaluations further confirm that LLMs integrated with RealTOD achieve superior task completion, fluency, and informativeness compared to existing methods.
△ Less
Submitted 18 February, 2025;
originally announced February 2025.
-
A Bidirectional Siamese Recurrent Neural Network for Accurate Gait Recognition Using Body Landmarks
Authors:
Proma Hossain Progga,
Md. Jobayer Rahman,
Swapnil Biswas,
Md. Shakil Ahmed,
Arif Reza Anwary,
Swakkhar Shatabda
Abstract:
Gait recognition is a significant biometric technique for person identification, particularly in scenarios where other physiological biometrics are impractical or ineffective. In this paper, we address the challenges associated with gait recognition and present a novel approach to improve its accuracy and reliability. The proposed method leverages advanced techniques, including sequential gait lan…
▽ More
Gait recognition is a significant biometric technique for person identification, particularly in scenarios where other physiological biometrics are impractical or ineffective. In this paper, we address the challenges associated with gait recognition and present a novel approach to improve its accuracy and reliability. The proposed method leverages advanced techniques, including sequential gait landmarks obtained through the Mediapipe pose estimation model, Procrustes analysis for alignment, and a Siamese biGRU-dualStack Neural Network architecture for capturing temporal dependencies. Extensive experiments were conducted on large-scale cross-view datasets to demonstrate the effectiveness of the approach, achieving high recognition accuracy compared to other models. The model demonstrated accuracies of 95.7%, 94.44%, 87.71%, and 86.6% on CASIA-B, SZU RGB-D, OU-MVLP, and Gait3D datasets respectively. The results highlight the potential applications of the proposed method in various practical domains, indicating its significant contribution to the field of gait recognition.
△ Less
Submitted 4 December, 2024; v1 submitted 4 December, 2024;
originally announced December 2024.
-
Enhancing Bidirectional Sign Language Communication: Integrating YOLOv8 and NLP for Real-Time Gesture Recognition & Translation
Authors:
Hasnat Jamil Bhuiyan,
Mubtasim Fuad Mozumder,
Md. Rabiul Islam Khan,
Md. Sabbir Ahmed,
Nabuat Zaman Nahim
Abstract:
The primary concern of this research is to take American Sign Language (ASL) data through real time camera footage and be able to convert the data and information into text. Adding to that, we are also putting focus on creating a framework that can also convert text into sign language in real time which can help us break the language barrier for the people who are in need. In this work, for recogn…
▽ More
The primary concern of this research is to take American Sign Language (ASL) data through real time camera footage and be able to convert the data and information into text. Adding to that, we are also putting focus on creating a framework that can also convert text into sign language in real time which can help us break the language barrier for the people who are in need. In this work, for recognising American Sign Language (ASL), we have used the You Only Look Once(YOLO) model and Convolutional Neural Network (CNN) model. YOLO model is run in real time and automatically extracts discriminative spatial-temporal characteristics from the raw video stream without the need for any prior knowledge, eliminating design flaws. The CNN model here is also run in real time for sign language detection. We have introduced a novel method for converting text based input to sign language by making a framework that will take a sentence as input, identify keywords from that sentence and then show a video where sign language is performed with respect to the sentence given as input in real time. To the best of our knowledge, this is a rare study to demonstrate bidirectional sign language communication in real time in the American Sign Language (ASL).
△ Less
Submitted 18 November, 2024;
originally announced November 2024.
-
Sentiment Analysis of ML Projects: Bridging Emotional Intelligence and Code Quality
Authors:
Md Shoaib Ahmed,
Dongyoung Park,
Nasir U. Eisty
Abstract:
This study explores the intricate relationship between sentiment analysis (SA) and code quality within machine learning (ML) projects, illustrating how the emotional dynamics of developers affect the technical and functional attributes of software projects. Recognizing the vital role of developer sentiments, this research employs advanced sentiment analysis techniques to scrutinize affective state…
▽ More
This study explores the intricate relationship between sentiment analysis (SA) and code quality within machine learning (ML) projects, illustrating how the emotional dynamics of developers affect the technical and functional attributes of software projects. Recognizing the vital role of developer sentiments, this research employs advanced sentiment analysis techniques to scrutinize affective states from textual interactions such as code comments, commit messages, and issue discussions within high-profile ML projects. By integrating a comprehensive dataset of popular ML repositories, this analysis applies a blend of rule-based, machine learning, and hybrid sentiment analysis methodologies to systematically quantify sentiment scores. The emotional valence expressed by developers is then correlated with a spectrum of code quality indicators, including the prevalence of bugs, vulnerabilities, security hotspots, code smells, and duplication instances. Findings from this study distinctly illustrate that positive sentiments among developers are strongly associated with superior code quality metrics manifested through reduced bugs and lower incidence of code smells. This relationship underscores the importance of fostering positive emotional environments to enhance productivity and code craftsmanship. Conversely, the analysis reveals that negative sentiments correlate with an uptick in code issues, particularly increased duplication and heightened security risks, pointing to the detrimental effects of adverse emotional conditions on project health.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes
Authors:
Md Mashrur Arifin,
Md Shoaib Ahmed,
Tanmai Kumar Ghosh,
Ikteder Akhand Udoy,
Jun Zhuang,
Jyh-haw Yeh
Abstract:
With the proliferation of Artificial Intelligence, there has been a massive increase in the amount of data required to be accumulated and disseminated digitally. As the data are available online in digital landscapes with complex and sophisticated infrastructures, it is crucial to implement various defense mechanisms based on cybersecurity. Generative Adversarial Networks (GANs), which are deep le…
▽ More
With the proliferation of Artificial Intelligence, there has been a massive increase in the amount of data required to be accumulated and disseminated digitally. As the data are available online in digital landscapes with complex and sophisticated infrastructures, it is crucial to implement various defense mechanisms based on cybersecurity. Generative Adversarial Networks (GANs), which are deep learning models, have emerged as powerful solutions for addressing the constantly changing security issues. This survey studies the significance of the deep learning model, precisely on GANs, in strengthening cybersecurity defenses. Our survey aims to explore the various works completed in GANs, such as Intrusion Detection Systems (IDS), Mobile and Network Trespass, BotNet Detection, and Malware Detection. The focus is to examine how GANs can be influential tools to strengthen cybersecurity defenses in these domains. Further, the paper discusses the challenges and constraints of using GANs in these areas and suggests future research directions. Overall, the paper highlights the potential of GANs in enhancing cybersecurity measures and addresses the need for further exploration in this field.
△ Less
Submitted 19 September, 2024; v1 submitted 11 July, 2024;
originally announced July 2024.
-
A Comparative Study on COVID-19 Fake News Detection Using Different Transformer Based Models
Authors:
Sajib Kumar Saha Joy,
Dibyo Fabian Dofadar,
Riyo Hayat Khan,
Md. Sabbir Ahmed,
Rafeed Rahman
Abstract:
The rapid advancement of social networks and the convenience of internet availability have accelerated the rampant spread of false news and rumors on social media sites. Amid the COVID 19 epidemic, this misleading information has aggravated the situation by putting peoples mental and physical lives in danger. To limit the spread of such inaccuracies, identifying the fake news from online platforms…
▽ More
The rapid advancement of social networks and the convenience of internet availability have accelerated the rampant spread of false news and rumors on social media sites. Amid the COVID 19 epidemic, this misleading information has aggravated the situation by putting peoples mental and physical lives in danger. To limit the spread of such inaccuracies, identifying the fake news from online platforms could be the first and foremost step. In this research, the authors have conducted a comparative analysis by implementing five transformer based models such as BERT, BERT without LSTM, ALBERT, RoBERTa, and a Hybrid of BERT & ALBERT in order to detect the fraudulent news of COVID 19 from the internet. COVID 19 Fake News Dataset has been used for training and testing the models. Among all these models, the RoBERTa model has performed better than other models by obtaining an F1 score of 0.98 in both real and fake classes.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network
Authors:
Mir Shahnawaz Ahmed,
Shahid Mehraj Shah
Abstract:
The Internet of Things (IoT) has altered living by controlling devices/things over the Internet. IoT has specified many smart solutions for daily problems, transforming cyber-physical systems (CPS) and other classical fields into smart regions. Most of the edge devices that make up the Internet of Things have very minimal processing power. To bring down the IoT network, attackers can utilise these…
▽ More
The Internet of Things (IoT) has altered living by controlling devices/things over the Internet. IoT has specified many smart solutions for daily problems, transforming cyber-physical systems (CPS) and other classical fields into smart regions. Most of the edge devices that make up the Internet of Things have very minimal processing power. To bring down the IoT network, attackers can utilise these devices to conduct a variety of network attacks. In addition, as more and more IoT devices are added, the potential for new and unknown threats grows exponentially. For this reason, an intelligent security framework for IoT networks must be developed that can identify such threats. In this paper, we have developed an unsupervised ensemble learning model that is able to detect new or unknown attacks in an IoT network from an unlabelled dataset. The system-generated labelled dataset is used to train a deep learning model to detect IoT network attacks. Additionally, the research presents a feature selection mechanism for identifying the most relevant aspects in the dataset for detecting attacks. The study shows that the suggested model is able to identify the unlabelled IoT network datasets and DBN (Deep Belief Network) outperform the other models with a detection accuracy of 97.5% and a false alarm rate of 2.3% when trained using labelled dataset supplied by the proposed approach.
△ Less
Submitted 16 July, 2022;
originally announced July 2022.
-
Fish Disease Detection Using Image Based Machine Learning Technique in Aquaculture
Authors:
Md Shoaib Ahmed,
Tanjim Taharat Aurpa,
Md. Abul Kalam Azad
Abstract:
Fish diseases in aquaculture constitute a significant hazard to nutriment security. Identification of infected fishes in aquaculture remains challenging to find out at the early stage due to the dearth of necessary infrastructure. The identification of infected fish timely is an obligatory step to thwart from spreading disease. In this work, we want to find out the salmon fish disease in aquacultu…
▽ More
Fish diseases in aquaculture constitute a significant hazard to nutriment security. Identification of infected fishes in aquaculture remains challenging to find out at the early stage due to the dearth of necessary infrastructure. The identification of infected fish timely is an obligatory step to thwart from spreading disease. In this work, we want to find out the salmon fish disease in aquaculture, as salmon aquaculture is the fastest-growing food production system globally, accounting for 70 percent (2.5 million tons) of the market. In the alliance of flawless image processing and machine learning mechanism, we identify the infected fishes caused by the various pathogen. This work divides into two portions. In the rudimentary portion, image pre-processing and segmentation have been applied to reduce noise and exaggerate the image, respectively. In the second portion, we extract the involved features to classify the diseases with the help of the Support Vector Machine (SVM) algorithm of machine learning with a kernel function. The processed images of the first portion have passed through this (SVM) model. Then we harmonize a comprehensive experiment with the proposed combination of techniques on the salmon fish image dataset used to examine the fish disease. We have conveyed this work on a novel dataset compromising with and without image augmentation. The results have bought a judgment of our applied SVM performs notably with 91.42 and 94.12 percent of accuracy, respectively, with and without augmentation.
△ Less
Submitted 9 May, 2021;
originally announced May 2021.
-
Developing Mobility and Traffic Visualization Applications for Connected Vehicles
Authors:
Noah Carter,
Md Salman Ahmed,
Jacob Hoyos,
Matthew Dale,
JT Blevins,
Nick Hodge,
Nusrat Chowdhury,
Mohammad A. Hoque
Abstract:
This technical report is a catalog of two applications that have been enhanced and developed to augment vehicular networking research. The first application is already described in our previous work [21], while the second one is a desktop application that was developed as a publicly-hosted web app which allows any Internet-connected device to remotely monitor a roadway intersection's state over HT…
▽ More
This technical report is a catalog of two applications that have been enhanced and developed to augment vehicular networking research. The first application is already described in our previous work [21], while the second one is a desktop application that was developed as a publicly-hosted web app which allows any Internet-connected device to remotely monitor a roadway intersection's state over HTTP. This collaborative work was completed under and for the utility of ETSU's Vehicular Networking Lab. It can serve as a basis for further development in the field of connected and autonomous vehicles.
△ Less
Submitted 24 November, 2018;
originally announced November 2018.
-
Simulating Vehicle Movement and Multi-Hop Connectivity from Basic Safety Messages
Authors:
Noah Carter,
Mohammad A. Hoque,
Md Salman Ahmed
Abstract:
The Basic Safety Message (BSM) is a standardized communication packet that is sent every tenth of a second between connected vehicles using Dedicated Short Range Communication (DSRC). BSMs contain data about the sending vehicle's state, such as speed, location, and the status of the turn signal. Currently, many BSM datasets are available through the connected vehicle testbeds of U.S. Department of…
▽ More
The Basic Safety Message (BSM) is a standardized communication packet that is sent every tenth of a second between connected vehicles using Dedicated Short Range Communication (DSRC). BSMs contain data about the sending vehicle's state, such as speed, location, and the status of the turn signal. Currently, many BSM datasets are available through the connected vehicle testbeds of U.S. Department of Transportation from all over the country. However, without a proper visualization tool, it is not possible to analyze or visually get an overview of the spatio-temporal distribution of the data. With this goal, a web application has been developed which can ingest a raw BSM dataset and display a time-based simulation of vehicle movement. The simulation also displays multi-hop vehicular network connectivity over DSRC. This paper gives details about the application, including an explanation of the multi-hop partitioning algorithm used to classify the vehicles into separate network partitions. A performance analysis for the simulation is included, in which it is suggested that calculating a connectivity matrix with the multi-hop partitioning algorithm is computationally expensive for large number of vehicles.
△ Less
Submitted 5 May, 2018;
originally announced June 2018.
-
Parallel Closed-Loop Connected Vehicle Simulator for Large-Scale Transportation Network Management: Challenges, Issues, and Solution Approaches
Authors:
Mohammad A Hoque,
Xiaoyan Hong,
Md Salman Ahmed
Abstract:
The augmented scale and complexity of urban transportation networks have significantly increased the execution time and resource requirements of vehicular network simulations, exceeding the capabilities of sequential simulators. The need for a parallel and distributed simulation environment is inevitable from a smart city perspective, especially when the entire city-wide information system is expe…
▽ More
The augmented scale and complexity of urban transportation networks have significantly increased the execution time and resource requirements of vehicular network simulations, exceeding the capabilities of sequential simulators. The need for a parallel and distributed simulation environment is inevitable from a smart city perspective, especially when the entire city-wide information system is expected to be integrated with numerous services and ITS applications. In this paper, we present a conceptual model of an Integrated Distributed Connected Vehicle Simulator (IDCVS) that can emulate real-time traffic in a large metro area by incorporating hardware-in-the-loop simulation together with the closed-loop coupling of SUMO and OMNET++. We also discuss the challenges, issues, and solution approaches for implementing such a parallel closed-loop transportation network simulator by addressing transportation network partitioning problems, synchronization, and scalability issues. One unique feature of the envisioned integrated simulation tool is that it utilizes the vehicle traces collected through multiple roadway sensors-DSRC onboard unit, magnetometer, loop detector, and video detector. Another major feature of the proposed model is the incorporation of hybrid parallelism in both transportation and communication simulation platforms. We identify the challenges and issues involved in IDCVS to incorporate this multi-level parallelism. We also discuss the approaches for integrating hardware-in-the-loop simulation, addressing the steps involved in preprocessing sensor data, filtering, and extrapolating missing data, managing large real-time traffic data, and handling different data formats.
△ Less
Submitted 5 May, 2018;
originally announced May 2018.
-
A Cooperative Freeway Merge Assistance System using Connected Vehicles
Authors:
Md Salman Ahmed,
Mohammad A Hoque,
Jackeline Rios-Torres,
Asad Khattak
Abstract:
The rapid growth of traffic-related fatalities and injuries around the world including developed countries has drawn researchers' attention for conducting research on automated highway systems to improve road safety over the past few years. In addition, fuel expenses due to traffic congestion in the U.S. translate to billions of dollars annually. These issues are motivating researchers across many…
▽ More
The rapid growth of traffic-related fatalities and injuries around the world including developed countries has drawn researchers' attention for conducting research on automated highway systems to improve road safety over the past few years. In addition, fuel expenses due to traffic congestion in the U.S. translate to billions of dollars annually. These issues are motivating researchers across many disciplines to develop strategies to implement automation in transportation. The advent of connected-vehicle (CV) technology has added a new dimension to the research. The CV technology allows a vehicle to communicate with roadside infrastructure (vehicle-to-infrastructure), and other vehicles (vehicle-to-vehicle) on roads wirelessly using dedicated short-range communication (DSRC) protocol. Collectively, the vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication technologies are known as V2X technology. Automotive companies have started to include On-Board Units (OBUs) on latest automobiles which can run safety-critical and assistive applications using V2X technology. For example, US Department of Transportation has already launched various applications including but not limited to lane-change assistance, collision avoidance, SPaT for emergency and transit vehicles. Merge conflicts, especially when vehicles are trying to merge from ramps to freeways, are a significant source of collisions, traffic congestion and fuel use. This paper describes a novel freeway merge assistance system utilizing V2X technology with the help of the DSRC protocol. The freeway merge assistance system uses an innovative three-way handshaking protocol and provides advisories to drivers to guide the merging sequence.
△ Less
Submitted 29 April, 2018;
originally announced May 2018.
-
Intersection Approach Advisory Through Vehicle-to-Infrastructure Communication Using Signal Phase and Timing Information at Signalized Intersection
Authors:
Md Salman Ahmed,
Mohammad A Hoque,
Asad Khattak
Abstract:
Advancement in connected vehicle technology has created opportunities for researchers to develop safety critical and assistive applications for drivers. These applications do not only ensure drivers' safety and assistance services but also benefit the environment by reducing fuel consumption and CO2 emission. An intersection approach advisory system, which is one of the connected vehicle applicati…
▽ More
Advancement in connected vehicle technology has created opportunities for researchers to develop safety critical and assistive applications for drivers. These applications do not only ensure drivers' safety and assistance services but also benefit the environment by reducing fuel consumption and CO2 emission. An intersection approach advisory system, which is one of the connected vehicle applications, utilizes the dedicated short-range communications (DSRC) technology for V2X communications and National Transportation Communications for ITS Protocol (NTCIP) protocol reading SPaT data to provide intersection related information to drivers. In this paper, we discuss such a system that provides drivers the live signal information and recommends speeds through visual and auditory means in a less distractive way to make informed decisions before reaching to an intersection for different traffic scenarios. We also discuss the in-depth analysis of the implementation issues and challenges of such a system.
△ Less
Submitted 29 April, 2018;
originally announced May 2018.
-
ICFVR 2017: 3rd International Competition on Finger Vein Recognition
Authors:
Yi Zhang,
Houjun Huang,
Haifeng Zhang,
Liao Ni,
Wei Xu,
Nasir Uddin Ahmed,
Md. Shakil Ahmed,
Yilun Jin,
Yingjie Chen,
Jingxuan Wen,
Wenxin Li
Abstract:
In recent years, finger vein recognition has become an important sub-field in biometrics and been applied to real-world applications. The development of finger vein recognition algorithms heavily depends on large-scale real-world data sets. In order to motivate research on finger vein recognition, we released the largest finger vein data set up to now and hold finger vein recognition competitions…
▽ More
In recent years, finger vein recognition has become an important sub-field in biometrics and been applied to real-world applications. The development of finger vein recognition algorithms heavily depends on large-scale real-world data sets. In order to motivate research on finger vein recognition, we released the largest finger vein data set up to now and hold finger vein recognition competitions based on our data set every year. In 2017, International Competition on Finger Vein Recognition(ICFVR) is held jointly with IJCB 2017. 11 teams registered and 10 of them joined the final evaluation. The winner of this year dramatically improved the EER from 2.64% to 0.483% compared to the winner of last year. In this paper, we introduce the process and results of ICFVR 2017 and give insights on development of state-of-art finger vein recognition algorithms.
△ Less
Submitted 4 January, 2018;
originally announced January 2018.