Skip to main content

Showing 1–43 of 43 results for author: Alam, M S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.24099  [pdf, ps, other

    math.DS cs.AI cs.LG nlin.CD stat.ML

    Attractor learning for spatiotemporally chaotic dynamical systems using echo state networks with transfer learning

    Authors: Mohammad Shah Alam, William Ott, Ilya Timofeyev

    Abstract: In this paper, we explore the predictive capabilities of echo state networks (ESNs) for the generalized Kuramoto-Sivashinsky (gKS) equation, an archetypal nonlinear PDE that exhibits spatiotemporal chaos. We introduce a novel methodology that integrates ESNs with transfer learning, aiming to enhance predictive performance across various parameter regimes of the gKS model. Our research focuses on p… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    MSC Class: 37N99; 68T30

  2. arXiv:2505.19851  [pdf

    cs.CL cs.AI

    Beyond Specialization: Benchmarking LLMs for Transliteration of Indian Languages

    Authors: Gulfarogh Azam, Mohd Sadique, Saif Ali, Mohammad Nadeem, Erik Cambria, Shahab Saquib Sohail, Mohammad Sultan Alam

    Abstract: Transliteration, the process of mapping text from one script to another, plays a crucial role in multilingual natural language processing, especially within linguistically diverse contexts such as India. Despite significant advancements through specialized models like IndicXlit, recent developments in large language models suggest a potential for general-purpose models to excel at this task withou… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

  3. Optimizing DDoS Detection in SDNs Through Machine Learning Models

    Authors: Md. Ehsanul Haque, Amran Hossain, Md. Shafiqul Alam, Ahsan Habib Siam, Sayed Md Fazle Rabbi, Md. Muntasir Rahman

    Abstract: The emergence of Software-Defined Networking (SDN) has changed the network structure by separating the control plane from the data plane. However, this innovation has also increased susceptibility to DDoS attacks. Existing detection techniques are often ineffective due to data imbalance and accuracy issues; thus, a considerable research gap exists regarding DDoS detection methods suitable for SDN… ▽ More

    Submitted 14 May, 2025; originally announced May 2025.

    Comments: Published Paper of CICN2024

  4. arXiv:2504.21464  [pdf, ps, other

    cs.CV

    VR-FuseNet: A Fusion of Heterogeneous Fundus Data and Explainable Deep Network for Diabetic Retinopathy Classification

    Authors: Shamim Rahim Refat, Ziyan Shirin Raha, Shuvashis Sarker, Faika Fairuj Preotee, MD. Musfikur Rahman, Tashreef Muhammad, Mohammad Shafiul Alam

    Abstract: Diabetic retinopathy is a severe eye condition caused by diabetes where the retinal blood vessels get damaged and can lead to vision loss and blindness if not treated. Early and accurate detection is key to intervention and stopping the disease progressing. For addressing this disease properly, this paper presents a comprehensive approach for automated diabetic retinopathy detection by proposing a… ▽ More

    Submitted 21 June, 2025; v1 submitted 30 April, 2025; originally announced April 2025.

    Comments: 33 pages, 49 figures

  5. arXiv:2504.02749  [pdf, other

    quant-ph cs.IT

    Bacon-Shor Board Games

    Authors: M. Sohaib Alam, Jiajun Chen, Thomas R. Scruby

    Abstract: We identify a period-4 measurement schedule for the checks of the Bacon-Shor code that fully covers spacetime with constant-weight detectors, and is numerically observed to provide the code with a threshold. Unlike previous approaches, our method does not rely on code concatenation and instead arises as the solution to a coloring game on a square grid. Under a uniform circuit-level noise model, we… ▽ More

    Submitted 3 April, 2025; originally announced April 2025.

    Comments: 10 pages (+ appendix), 12 figures. Comments/feedback welcome

  6. arXiv:2501.12502  [pdf, other

    cs.NI cs.LG

    Sequence Spreading-Based Semantic Communication Under High RF Interference

    Authors: Hazem Barka, Georges Kaddoum, Mehdi Bennis, Md Sahabul Alam, Minh Au

    Abstract: In the evolving landscape of wireless communications, semantic communication (SemCom) has recently emerged as a 6G enabler that prioritizes the transmission of meaning and contextual relevance over conventional bit-centric metrics. However, the deployment of SemCom systems in industrial settings presents considerable challenges, such as high radio frequency interference (RFI), that can adversely a… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

    Comments: Accepted in IEEE International Conference on Communications

  7. arXiv:2410.16406  [pdf, ps, other

    cs.LG cs.AI

    Hotel Booking Cancellation Prediction Using Applied Bayesian Models

    Authors: Md Asifuzzaman Jishan, Vikas Singh, Ayan Kumar Ghosh, Md Shahabub Alam, Khan Raqib Mahmud, Bijan Paul

    Abstract: This study applies Bayesian models to predict hotel booking cancellations, a key challenge affecting resource allocation, revenue, and customer satisfaction in the hospitality industry. Using a Kaggle dataset with 36,285 observations and 17 features, Bayesian Logistic Regression and Beta-Binomial models were implemented. The logistic model, applied to 12 features and 5,000 randomly selected observ… ▽ More

    Submitted 23 October, 2024; v1 submitted 21 October, 2024; originally announced October 2024.

  8. arXiv:2407.19528  [pdf, other

    cs.CL

    Motamot: A Dataset for Revealing the Supremacy of Large Language Models over Transformer Models in Bengali Political Sentiment Analysis

    Authors: Fatema Tuj Johora Faria, Mukaffi Bin Moin, Rabeya Islam Mumu, Md Mahabubul Alam Abir, Abrar Nawar Alfy, Mohammad Shafiul Alam

    Abstract: Sentiment analysis is the process of identifying and categorizing people's emotions or opinions regarding various topics. Analyzing political sentiment is critical for understanding the complexities of public opinion processes, especially during election seasons. It gives significant information on voter preferences, attitudes, and current trends. In this study, we investigate political sentiment… ▽ More

    Submitted 28 July, 2024; originally announced July 2024.

    Comments: Accepted for publication in "The IEEE Region 10 Symposium (TENSYMP 2024)"

  9. arXiv:2405.07332  [pdf, ps, other

    cs.CV

    PotatoGANs: Utilizing Generative Adversarial Networks, Instance Segmentation, and Explainable AI for Enhanced Potato Disease Identification and Classification

    Authors: Fatema Tuj Johora Faria, Mukaffi Bin Moin, Mohammad Shafiul Alam, Ahmed Al Wase, Md. Rabius Sani, Khan Md Hasib

    Abstract: Numerous applications have resulted from the automation of agricultural disease segmentation using deep learning techniques. However, when applied to new conditions, these applications frequently face the difficulty of overfitting, resulting in lower segmentation performance. In the context of potato farming, where diseases have a large influence on yields, it is critical for the agricultural econ… ▽ More

    Submitted 22 June, 2025; v1 submitted 12 May, 2024; originally announced May 2024.

  10. arXiv:2405.04610  [pdf, other

    eess.IV cs.CV

    Exploring Explainable AI Techniques for Improved Interpretability in Lung and Colon Cancer Classification

    Authors: Mukaffi Bin Moin, Fatema Tuj Johora Faria, Swarnajit Saha, Busra Kamal Rafa, Mohammad Shafiul Alam

    Abstract: Lung and colon cancer are serious worldwide health challenges that require early and precise identification to reduce mortality risks. However, diagnosis, which is mostly dependent on histopathologists' competence, presents difficulties and hazards when expertise is insufficient. While diagnostic methods like imaging and blood markers contribute to early detection, histopathology remains the gold… ▽ More

    Submitted 14 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: Accepted in 4th International Conference on Computing and Communication Networks (ICCCNet-2024)

  11. arXiv:2403.17218  [pdf, other

    cs.SE cs.CR cs.LG

    To Err is Machine: Vulnerability Detection Challenges LLM Reasoning

    Authors: Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Hengbo Tong, Swarna Das, Earl T. Barr, Wei Le

    Abstract: In this paper, we present a challenging code reasoning task: vulnerability detection. Large Language Models (LLMs) have shown promising results in natural-language and math reasoning, but state-of-the-art (SOTA) models reported only 54.5% Balanced Accuracy in our vulnerability detection evaluation, even those models pre-trained on large amounts of source code. Our error analysis on LLM responses s… ▽ More

    Submitted 7 January, 2025; v1 submitted 25 March, 2024; originally announced March 2024.

  12. arXiv:2403.17093  [pdf, other

    cs.LG eess.SP

    Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis

    Authors: Ekramul Haque, Kamrul Hasan, Imtiaz Ahmed, Md. Sahabul Alam, Tariqul Islam

    Abstract: In the dynamic and ever-changing domain of Unmanned Aerial Vehicles (UAVs), the utmost importance lies in guaranteeing resilient and lucid security measures. This study highlights the necessity of implementing a Zero Trust Architecture (ZTA) to enhance the security of unmanned aerial vehicles (UAVs), hence departing from conventional perimeter defences that may expose vulnerabilities. The Zero Tru… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 6 pages, 5 figures

  13. arXiv:2401.15008  [pdf, other

    cs.NI

    Reinforcement Learning-based Relay Selection for Cooperative WSNs in the Presence of Bursty Impulsive Noise

    Authors: Hazem Barka, Md Sahabul Alam, Georges Kaddoum, Minh Au, Basile L. Agba

    Abstract: The problem of relay selection is pivotal in the realm of cooperative communication. However, this issue has not been thoroughly examined, particularly when the background noise is assumed to possess an impulsive characteristic with consistent memory as observed in smart grid communications and some other wireless communication scenarios. In this paper, we investigate the impact of this specific t… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: Accepted in 2024 IEEE Wireless Communications and Networking Conference

  14. arXiv:2401.00289  [pdf

    cs.HC

    ASL Champ!: A Virtual Reality Game with Deep-Learning Driven Sign Recognition

    Authors: Md Shahinur Alam, Jason Lamberton, Jianye Wang, Carly Leannah, Sarah Miller, Joseph Palagano, Myles de Bastion, Heather L. Smith, Melissa Malzkuhn, Lorna C. Quandt

    Abstract: We developed an American Sign Language (ASL) learning platform in a Virtual Reality (VR) environment to facilitate immersive interaction and real-time feedback for ASL learners. We describe the first game to use an interactive teaching style in which users learn from a fluent signing avatar and the first implementation of ASL sign recognition using deep learning within the VR environment. Advanced… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

    Comments: 36 pages, 9 figures

  15. arXiv:2312.01588  [pdf, other

    cs.SE cs.LG

    ActiveClean: Generating Line-Level Vulnerability Data via Active Learning

    Authors: Ashwin Kallingal Joshy, Mirza Sanjida Alam, Shaila Sharmin, Qi Li, Wei Le

    Abstract: Deep learning vulnerability detection tools are increasing in popularity and have been shown to be effective. These tools rely on large volume of high quality training data, which are very hard to get. Most of the currently available datasets provide function-level labels, reporting whether a function is vulnerable or not vulnerable. However, for a vulnerability detection to be useful, we need to… ▽ More

    Submitted 3 December, 2023; originally announced December 2023.

  16. arXiv:2309.06449  [pdf

    cond-mat.mes-hall cs.LG cs.NE

    Quantized Non-Volatile Nanomagnetic Synapse based Autoencoder for Efficient Unsupervised Network Anomaly Detection

    Authors: Muhammad Sabbir Alam, Walid Al Misba, Jayasimha Atulasimha

    Abstract: In the autoencoder based anomaly detection paradigm, implementing the autoencoder in edge devices capable of learning in real-time is exceedingly challenging due to limited hardware, energy, and computational resources. We show that these limitations can be addressed by designing an autoencoder with low-resolution non-volatile memory-based synapses and employing an effective quantized neural netwo… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  17. arXiv:2309.02712  [pdf

    cs.LG cs.AI cs.NE

    Unveiling the frontiers of deep learning: innovations shaping diverse domains

    Authors: Shams Forruque Ahmed, Md. Sakib Bin Alam, Maliha Kabir, Shaila Afrin, Sabiha Jannat Rafa, Aanushka Mehjabin, Amir H. Gandomi

    Abstract: Deep learning (DL) allows computer models to learn, visualize, optimize, refine, and predict data. To understand its present state, examining the most recent advancements and applications of deep learning across various domains is essential. However, prior reviews focused on DL applications in only one or two domains. The current review thoroughly investigates the use of DL in four different broad… ▽ More

    Submitted 4 April, 2025; v1 submitted 6 September, 2023; originally announced September 2023.

    Comments: 88 pages, 11 figures, 7 tables

    MSC Class: 68T07

    Journal ref: Applied Intelligence, 55(7), 573 (2025)

  18. arXiv:2309.02707  [pdf

    cs.NI cs.CR cs.SI

    Forensics and security issues in the Internet of Things

    Authors: Shams Forruque Ahmed, Shanjana Shuravi, Afsana Bhuyian, Shaila Afrin, Aanushka Mehjabin, Sweety Angela Kuldeep, Md. Sakib Bin Alam, Amir H. Gandomi

    Abstract: Given the exponential expansion of the internet, the possibilities of security attacks and cybercrimes have increased accordingly. However, poorly implemented security mechanisms in the Internet of Things (IoT) devices make them susceptible to cyberattacks, which can directly affect users. IoT forensics is thus needed to investigate and mitigate such attacks. While many works have examined IoT app… ▽ More

    Submitted 25 April, 2025; v1 submitted 6 September, 2023; originally announced September 2023.

    Comments: 83 pages, 4 figures, 7 tables

    MSC Class: 68M11

    Journal ref: Wireless Networks, 31, 3431-3466 (2025)

  19. arXiv:2308.12423  [pdf, other

    quant-ph cs.ET

    Design and execution of quantum circuits using tens of superconducting qubits and thousands of gates for dense Ising optimization problems

    Authors: Filip B. Maciejewski, Stuart Hadfield, Benjamin Hall, Mark Hodson, Maxime Dupont, Bram Evert, James Sud, M. Sohaib Alam, Zhihui Wang, Stephen Jeffrey, Bhuvanesh Sundar, P. Aaron Lott, Shon Grabbe, Eleanor G. Rieffel, Matthew J. Reagor, Davide Venturelli

    Abstract: We develop a hardware-efficient ansatz for variational optimization, derived from existing ansatze in the literature, that parametrizes subsets of all interactions in the Cost Hamiltonian in each layer. We treat gate orderings as a variational parameter and observe that doing so can provide significant performance boosts in experiments. We carried out experimental runs of a compilation-optimized i… ▽ More

    Submitted 12 September, 2024; v1 submitted 17 August, 2023; originally announced August 2023.

    Comments: v2: extended experimental results, updated references, fixed typos; v3: improved main narration, added new experimental data and analysis, updated references, fixed typos; v4: slightly improved narration, updated references 15+8 pages; 3+5 figures

  20. arXiv:2308.01987  [pdf, other

    cs.CL

    Bengali Fake Reviews: A Benchmark Dataset and Detection System

    Authors: G. M. Shahariar, Md. Tanvir Rouf Shawon, Faisal Muhammad Shah, Mohammad Shafiul Alam, Md. Shahriar Mahbub

    Abstract: The proliferation of fake reviews on various online platforms has created a major concern for both consumers and businesses. Such reviews can deceive customers and cause damage to the reputation of products or services, making it crucial to identify them. Although the detection of fake reviews has been extensively studied in English language, detecting fake reviews in non-English languages such as… ▽ More

    Submitted 4 May, 2024; v1 submitted 3 August, 2023; originally announced August 2023.

  21. Bengali Fake Review Detection using Semi-supervised Generative Adversarial Networks

    Authors: Md. Tanvir Rouf Shawon, G. M. Shahariar, Faisal Muhammad Shah, Mohammad Shafiul Alam, Md. Shahriar Mahbub

    Abstract: This paper investigates the potential of semi-supervised Generative Adversarial Networks (GANs) to fine-tune pretrained language models in order to classify Bengali fake reviews from real reviews with a few annotated data. With the rise of social media and e-commerce, the ability to detect fake or deceptive reviews is becoming increasingly important in order to protect consumers from being misled… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  22. arXiv:2211.01551  [pdf, other

    cs.LG cs.AI cs.CY

    Crime Prediction using Machine Learning with a Novel Crime Dataset

    Authors: Faisal Tareque Shohan, Abu Ubaida Akash, Muhammad Ibrahim, Mohammad Shafiul Alam

    Abstract: Crime is an unlawful act that carries legal repercussions. Bangladesh has a high crime rate due to poverty, population growth, and many other socio-economic issues. For law enforcement agencies, understanding crime patterns is essential for preventing future criminal activity. For this purpose, these agencies need structured crime database. This paper introduces a novel crime dataset that contains… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: 24 pages

  23. arXiv:2210.02102   

    cs.DC cs.NI

    An Architectural Approach to Creating a Cloud Application for Developing Microservices

    Authors: A. N. M. Sajedul Alam, Junaid Bin Kibria, Al Hasib Mahamud, Arnob Kumar Dey, Hasan Muhammed Zahidul Amin, Md Sabbir Hossain, Annajiat Alim Rasel

    Abstract: The cloud is a new paradigm that is paving the way for new approaches and standards. The architectural styles are evolving in response to the cloud's requirements. In recent years, microservices have emerged as the preferred architectural style for scalable, rapidly evolving cloud applications. The adoption of microservices to the detriment of monolithic structures, which are increasingly being ph… ▽ More

    Submitted 7 October, 2022; v1 submitted 5 October, 2022; originally announced October 2022.

    Comments: It is not completed properly yet, I want to withdraw it as an author

  24. arXiv:2209.15293  [pdf

    q-fin.GN cs.CL cs.LG

    A Survey: Credit Sentiment Score Prediction

    Authors: A. N. M. Sajedul Alam, Junaid Bin Kibria, Arnob Kumar Dey, Zawad Alam, Shifat Zaman, Motahar Mahtab, Mohammed Julfikar Ali Mahbub, Annajiat Alim Rasel

    Abstract: Manual approvals are still used by banks and other NGOs to approve loans. It takes time and is prone to mistakes because it is controlled by a bank employee. Several fields of machine learning mining technologies have been utilized to enhance various areas of credit rating forecast. A major goal of this research is to look at current sentiment analysis techniques that are being used to generate cr… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: 16 pages, 3 figures, 3 tables

  25. arXiv:2209.15288  [pdf

    cs.CR cs.DC

    A Survey: Implementations of Non-fungible Token System in Different Fields

    Authors: A. N. M. Sajedul Alam, Junaid Bin Kibria, Al Hasib Mahamud, Arnob Kumar Dey, Hasan Muhammed Zahidul Amin, Md Sabbir Hossain, Annajiat Alim Rasel

    Abstract: In the realm of digital art and collectibles, NFTs are sweeping the board. Because of the massive sales to a new crypto audience, the livelihoods of digital artists are being transformed. It is no surprise that celebs are jumping on the bandwagon. It is a fact that NFTs can be used in multiple ways, including digital artwork such as animation, character design, digital painting, collection of self… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: 14 pages, 3 figures, 3 tables

  26. arXiv:2209.14907  [pdf

    cs.LG cs.AI

    Patients' Severity States Classification based on Electronic Health Record (EHR) Data using Multiple Machine Learning and Deep Learning Approaches

    Authors: A. N. M. Sajedul Alam, Rimi Reza, Asir Abrar, Tanvir Ahmed, Salsabil Ahmed, Shihab Sharar, Annajiat Alim Rasel

    Abstract: This research presents an examination of categorizing the severity states of patients based on their electronic health records during a certain time range using multiple machine learning and deep learning approaches. The suggested method uses an EHR dataset collected from an open-source platform to categorize severity. Some tools were used in this research, such as openRefine was used to pre-proce… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: 32 pages, 13 figures, and 14 tables

  27. arXiv:2208.09699  [pdf, other

    cs.NE

    An Approach of Adjusting the Switch Probability based on Dimension Size: A Case Study for Performance Improvement of the Flower Pollination Algorithm

    Authors: Tahsin Aziz, Tashreef Muhammad, Md. Rashedul Karim Chowdhury, Mohammad Shafiul Alam

    Abstract: Numerous meta-heuristic algorithms have been influenced by nature. Over the past couple of decades, their quantity has been significantly escalating. The majority of these algorithms attempt to emulate natural biological and physical phenomena. This research concentrates on the Flower Pollination algorithm, which is one of several bio-inspired algorithms. The original approach was suggested for po… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

    Comments: 9 pages, 2 figures, 3 tables

  28. Transformer-Based Deep Learning Model for Stock Price Prediction: A Case Study on Bangladesh Stock Market

    Authors: Tashreef Muhammad, Anika Bintee Aftab, Md. Mainul Ahsan, Maishameem Meherin Muhu, Muhammad Ibrahim, Shahidul Islam Khan, Mohammad Shafiul Alam

    Abstract: In modern capital market the price of a stock is often considered to be highly volatile and unpredictable because of various social, financial, political and other dynamic factors. With calculated and thoughtful investment, stock market can ensure a handsome profit with minimal capital investment, while incorrect prediction can easily bring catastrophic financial loss to the investors. This paper… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: 16 Pages, 14 Figures (including some containing subfigures)

    Journal ref: Preprint of an article published in [International Journal of Computational Intelligence and Applications, Volume 22, No. 01, 2023] \c{opyright} [copyright World Scientific Publishing Company] [https://www.worldscientific.com/worldscinet/ijcia]

  29. arXiv:2204.01478  [pdf, other

    cs.CY eess.SY

    WEcharge: democratizing EV charging infrastructure

    Authors: Md Umar Hashmi, Mohammad Meraj Alam, Ony Lalaina Valerie Ramarozatovo, Mohammad Shadab Alam

    Abstract: The sustainable growth of EVs will have to be met with proportional growth in EV charging infrastructure. With limited urban spaces to place new charging stations, shrinking profitability, privately owned charging facilities need to be shared. WEcharge will allow privately owned charging infrastructure to be shared with public EV owners using a business model. We propose a resource matching algori… ▽ More

    Submitted 25 March, 2022; originally announced April 2022.

  30. arXiv:2102.11994  [pdf, other

    cs.CV

    Characterization and recognition of handwritten digits using Julia

    Authors: M. A. Jishan, M. S. Alam, Afrida Islam, I. R. Mazumder, K. R. Mahmud, A. K. Al Azad

    Abstract: Automatic image and digit recognition is a computationally challenging task for image processing and pattern recognition, requiring an adequate appreciation of the syntactic and semantic importance of the image for the identification ofthe handwritten digits. Image and Pattern Recognition has been identified as one of the driving forces in the research areas because of its shifting of different ty… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

  31. arXiv:2008.10000  [pdf

    cs.RO

    Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization

    Authors: M. Shahab Alam, M. Usman Rafique, M. Umer Khan

    Abstract: Motion planning is a key element of robotics since it empowers a robot to navigate autonomously. Particle Swarm Optimization is a simple, yet a very powerful optimization technique which has been effectively used in many complex multi-dimensional optimization problems. This paper proposes a path planning algorithm based on particle swarm optimization for computing a shortest collision-free path fo… ▽ More

    Submitted 23 August, 2020; originally announced August 2020.

  32. arXiv:2007.15088  [pdf, other

    cs.IT eess.SP

    A Vision and Framework for the High Altitude Platform Station (HAPS) Networks of the Future

    Authors: Gunes Kurt, Mohammad G. Khoshkholgh, Safwan Alfattani, Ahmed Ibrahim, Tasneem S. J. Darwish, Md Sahabul Alam, Halim Yanikomeroglu, Abbas Yongacoglu

    Abstract: A High Altitude Platform Station (HAPS) is a network node that operates in the stratosphere at an of altitude around 20 km and is instrumental for providing communication services. Precipitated by technological innovations in the areas of autonomous avionics, array antennas, solar panel efficiency levels, and battery energy densities, and fueled by flourishing industry ecosystems, the HAPS has eme… ▽ More

    Submitted 17 March, 2021; v1 submitted 29 July, 2020; originally announced July 2020.

    Comments: To appear in IEEE Communications Surveys & Tutorials

  33. arXiv:2005.06764  [pdf, other

    cs.AI cs.NE

    Rolling Horizon NEAT for General Video Game Playing

    Authors: Diego Perez-Liebana, Muhammad Sajid Alam, Raluca D. Gaina

    Abstract: This paper presents a new Statistical Forward Planning (SFP) method, Rolling Horizon NeuroEvolution of Augmenting Topologies (rhNEAT). Unlike traditional Rolling Horizon Evolution, where an evolutionary algorithm is in charge of evolving a sequence of actions, rhNEAT evolves weights and connections of a neural network in real-time, planning several steps ahead before returning an action to execute… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: 8 pages, 5 figures, accepted for publication in IEEE Conference on Games (CoG) 2020

  34. Quantum Logic Gate Synthesis as a Markov Decision Process

    Authors: M. Sohaib Alam, Noah F. Berthusen, Peter P. Orth

    Abstract: Reinforcement learning has witnessed recent applications to a variety of tasks in quantum programming. The underlying assumption is that those tasks could be modeled as Markov Decision Processes (MDPs). Here, we investigate the feasibility of this assumption by exploring its consequences for two fundamental tasks in quantum programming: state preparation and gate compilation. By forming discrete M… ▽ More

    Submitted 5 July, 2022; v1 submitted 27 December, 2019; originally announced December 2019.

    Journal ref: npj Quantum Inf 9, 108 (2023)

  35. arXiv:1908.08054  [pdf, other

    quant-ph cs.LG

    Automated quantum programming via reinforcement learning for combinatorial optimization

    Authors: Keri A. McKiernan, Erik Davis, M. Sohaib Alam, Chad Rigetti

    Abstract: We develop a general method for incentive-based programming of hybrid quantum-classical computing systems using reinforcement learning, and apply this to solve combinatorial optimization problems on both simulated and real gate-based quantum computers. Relative to a set of randomly generated problem instances, agents trained through reinforcement learning techniques are capable of producing short… ▽ More

    Submitted 21 August, 2019; originally announced August 2019.

  36. arXiv:1811.04968  [pdf, other

    quant-ph cs.ET cs.LG physics.comp-ph

    PennyLane: Automatic differentiation of hybrid quantum-classical computations

    Authors: Ville Bergholm, Josh Izaac, Maria Schuld, Christian Gogolin, Shahnawaz Ahmed, Vishnu Ajith, M. Sohaib Alam, Guillermo Alonso-Linaje, B. AkashNarayanan, Ali Asadi, Juan Miguel Arrazola, Utkarsh Azad, Sam Banning, Carsten Blank, Thomas R Bromley, Benjamin A. Cordier, Jack Ceroni, Alain Delgado, Olivia Di Matteo, Amintor Dusko, Tanya Garg, Diego Guala, Anthony Hayes, Ryan Hill, Aroosa Ijaz , et al. (43 additional authors not shown)

    Abstract: PennyLane is a Python 3 software framework for differentiable programming of quantum computers. The library provides a unified architecture for near-term quantum computing devices, supporting both qubit and continuous-variable paradigms. PennyLane's core feature is the ability to compute gradients of variational quantum circuits in a way that is compatible with classical techniques such as backpro… ▽ More

    Submitted 29 July, 2022; v1 submitted 12 November, 2018; originally announced November 2018.

    Comments: Code available at https://github.com/XanaduAI/pennylane/ . Significant contributions to the code (new features, new plugins, etc.) will be recognized by the opportunity to be a co-author on this paper

  37. arXiv:1809.03835  [pdf

    q-bio.PE cs.CE

    Analysis of Sequence Polymorphism of LINEs and SINEs in Entamoeba histolytica

    Authors: Mohammad Sultan Alam

    Abstract: The goal of this dissertation is to study the sequence polymorphism in retrotransposable elements of Entamoeba histolytica. The Quasispecies theory, a concept of equilibrium (stationary), has been used to understand the behaviour of these elements. Two datasets of retrotransposons of Entamoeba histolytica have been used. We present results from both datasets of retrotransposons (SINE1s) of E. hist… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

    Comments: M.Tech Dissertation (2010-2012) under the guidance of Prof. Alok Bhattacharya and Prof. Ram Ramaswamy in JNU. 59 pages, 28 figures, 8 tables

  38. arXiv:1805.09254  [pdf

    cs.NI

    Fog Assisted Cloud Models for Smart Grid Architectures- Comparison Study and Optimal Deployment

    Authors: Md. Muzakkir Hussain, Mohammad Saad Alam, M. M. Sufyan Beg

    Abstract: Cloud Computing (CC) serves to be a key driver for fulfilling the store and compute requirements of a modern Smart Grid (SG). However, since the datacenters are deployed in concentrated and far remote areas, it fails to guarantee the quality of experience (QoE) attributes for the SG services, viz. latency, bandwidth, energy consumption, and network cost. Fog Computing (FC) extends the processing c… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: 8 figures, 1 table

  39. arXiv:1802.01818  [pdf

    cs.DC cs.ET

    Fog Computing in IoT Aided Smart Grid Transition- Requirements, Prospects, Status Quos and Challenges

    Authors: Md. Muzakkir Hussain, Mohammad Saad Alam, M. M. Sufyan Beg

    Abstract: Due to unfolded developments in both the IT sectors viz. Intelligent Transportation and Information Technology contemporary Smart Grid (SG) systems are leveraged with smart devices and entities. Such infrastructures when bestowed with the Internet of Things (IoT) and sensor network make a universe of objects active and online. The traditional cloud deployment succumbs to meet the analytics and com… ▽ More

    Submitted 6 February, 2018; originally announced February 2018.

    Comments: 13 Pages, 1 table, 1 Figure

  40. arXiv:1210.3833  [pdf, other

    cs.DS

    Improved upper and lower bounds for the point placement problem

    Authors: Md. Shafiul Alam, Asish Mukhopadhyay

    Abstract: The point placement problem is to determine the positions of a set of $n$ distinct points, P = {p1, p2, p3, ..., pn}, on a line uniquely, up to translation and reflection, from the fewest possible distance queries between pairs of points. Each distance query corresponds to an edge in a graph, called point placement graph ppg, whose vertex set is P. The uniqueness requirement of the placement trans… ▽ More

    Submitted 14 October, 2012; originally announced October 2012.

    Comments: 19 pages, 11 figures

  41. arXiv:1108.4972  [pdf, other

    cs.CG

    Algorithms for the Problems of Length-Constrained Heaviest Segments

    Authors: Md. Shafiul Alam, Asish Mukhopadhyay

    Abstract: We present algorithms for length-constrained maximum sum segment and maximum density segment problems, in particular, and the problem of finding length-constrained heaviest segments, in general, for a sequence of real numbers. Given a sequence of n real numbers and two real parameters L and U (L <= U), the maximum sum segment problem is to find a consecutive subsequence, called a segment, of lengt… ▽ More

    Submitted 24 August, 2011; originally announced August 2011.

    Comments: 21 pages, 12 figures

  42. arXiv:1009.4974  [pdf

    cs.CV

    Rotation Invariant Face Detection Using Wavelet, PCA and Radial Basis Function Networks

    Authors: S. M. Kamruzzaman, Firoz Ahmed Siddiqi, Md. Saiful Islam, Md. Emdadul Haque, Mohammad Shamsul Alam

    Abstract: This paper introduces a novel method for human face detection with its orientation by using wavelet, principle component analysis (PCA) and redial basis networks. The input image is analyzed by two-dimensional wavelet and a two-dimensional stationary wavelet. The common goals concern are the image clearance and simplification, which are parts of de-noising or compression. We applied an effective p… ▽ More

    Submitted 25 September, 2010; originally announced September 2010.

    Comments: 5 Pages, International Conference

    Journal ref: 12th International Conference on Human Computer Interaction, Beijing, China, Vol. 18, Jul. 2007

  43. An Efficient Approach for Generalized Load Balancing in Multipath Packet Switched Networks

    Authors: G. G. Md. Nawaz Ali, Rajib Chakraborty, Md. Shihabul Alam, Edward Chan

    Abstract: This paper is a quantitative analysis on packet switched network with a view to generalize load balancing and determination of appropriate routing algorithm in multipath environment. Several routing algorithms have been introduced for routing of packets from source to destination. Some of them route packets accurately with increased workload and some of them drastically cut down the workload. A fe… ▽ More

    Submitted 17 March, 2010; originally announced March 2010.

    Comments: 12 Pages, IJCNC Journal 2010

    Journal ref: International Journal of Computer Networks & Communications 2.2 (2010) 142-153