Skip to main content

Showing 1–18 of 18 results for author: Azad, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.10431  [pdf, other

    eess.IV cs.CV

    Low Complexity Point Tracking of the Myocardium in 2D Echocardiography

    Authors: Artem Chernyshov, John Nyberg, Vegard Holmstrøm, Md Abulkalam Azad, Bjørnar Grenne, Håvard Dalen, Svein Arne Aase, Lasse Lovstakken, Andreas Østvik

    Abstract: Deep learning methods for point tracking are applicable in 2D echocardiography, but do not yet take advantage of domain specifics that enable extremely fast and efficient configurations. We developed MyoTracker, a low-complexity architecture (0.3M parameters) for point tracking in echocardiography. It builds on the CoTracker2 architecture by simplifying its components and extending the temporal co… ▽ More

    Submitted 13 March, 2025; originally announced March 2025.

  2. Metadata augmented deep neural networks for wild animal classification

    Authors: Aslak Tøn, Ammar Ahmed, Ali Shariq Imran, Mohib Ullah, R. Muhammad Atif Azad

    Abstract: Camera trap imagery has become an invaluable asset in contemporary wildlife surveillance, enabling researchers to observe and investigate the behaviors of wild animals. While existing methods rely solely on image data for classification, this may not suffice in cases of suboptimal animal angles, lighting, or image quality. This study introduces a novel approach that enhances wild animal classifica… ▽ More

    Submitted 7 September, 2024; originally announced September 2024.

    Journal ref: Ecological Informatics, Volume 83, 2024, 102805, ISSN 1574-9541, (https://www.sciencedirect.com/science/article/pii/S1574954124003479)

  3. arXiv:2406.11731  [pdf, other

    cs.SE

    PerfCurator: Curating a large-scale dataset of performance bug-related commits from public repositories

    Authors: Md Abul Kalam Azad, Manoj Alexender, Matthew Alexender, Syed Salauddin Mohammad Tariq, Foyzul Hassan, Probir Roy

    Abstract: Performance bugs challenge software development, degrading performance and wasting computational resources. Software developers invest substantial effort in addressing these issues. Curating these performance bugs can offer valuable insights to the software engineering research community, aiding in developing new mitigation strategies. However, there is no large-scale open-source performance bugs… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  4. arXiv:2405.08587  [pdf, other

    cs.CV cs.AI

    EchoTracker: Advancing Myocardial Point Tracking in Echocardiography

    Authors: Md Abulkalam Azad, Artem Chernyshov, John Nyberg, Ingrid Tveten, Lasse Lovstakken, Håvard Dalen, Bjørnar Grenne, Andreas Østvik

    Abstract: Tissue tracking in echocardiography is challenging due to the complex cardiac motion and the inherent nature of ultrasound acquisitions. Although optical flow methods are considered state-of-the-art (SOTA), they struggle with long-range tracking, noise occlusions, and drift throughout the cardiac cycle. Recently, novel learning-based point tracking techniques have been introduced to tackle some of… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: Submitted version that got provisionally (early) accepted (top 11%) to MICCAI2024

  5. Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing

    Authors: Muhammad Baqer Mollah, Md Abul Kalam Azad, Yinghui Zhang

    Abstract: Smart devices are considered as an integral part of Internet of Things (IoT), have an aim to make a dynamic network to exchange information, collect data, analysis, and make optimal decisions in an autonomous way to achieve more efficient, automatic, and economical services. Message dissemination among these smart devices allows adding new features, sending updated instructions, alerts or safety m… ▽ More

    Submitted 2 August, 2024; v1 submitted 12 January, 2024; originally announced January 2024.

    Comments: 12 pages

    Journal ref: IEEE Transactions on Consumer Electronics, 2024

  6. arXiv:2306.06198  [pdf

    cs.CR

    Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems

    Authors: Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao

    Abstract: Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling u… ▽ More

    Submitted 24 September, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

    Comments: 25 pages, 12 figures, 2 tables

  7. arXiv:2305.17338  [pdf, other

    cs.CV cs.AI

    Multi-label Video Classification for Underwater Ship Inspection

    Authors: Md Abulkalam Azad, Ahmed Mohammed, Maryna Waszak, Brian Elvesæter, Martin Ludvigsen

    Abstract: Today ship hull inspection including the examination of the external coating, detection of defects, and other types of external degradation such as corrosion and marine growth is conducted underwater by means of Remotely Operated Vehicles (ROVs). The inspection process consists of a manual video analysis which is a time-consuming and labor-intensive process. To address this, we propose an automati… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: Accepted to be presented at OCEANS 2023 Limerick conference and will be published by IEEE

  8. arXiv:2105.03934  [pdf, other

    cs.CV cs.LG

    Fish Disease Detection Using Image Based Machine Learning Technique in Aquaculture

    Authors: Md Shoaib Ahmed, Tanjim Taharat Aurpa, Md. Abul Kalam Azad

    Abstract: Fish diseases in aquaculture constitute a significant hazard to nutriment security. Identification of infected fishes in aquaculture remains challenging to find out at the early stage due to the dearth of necessary infrastructure. The identification of infected fish timely is an obligatory step to thwart from spreading disease. In this work, we want to find out the salmon fish disease in aquacultu… ▽ More

    Submitted 9 May, 2021; originally announced May 2021.

    Comments: 15 pages, 10 figures, 7 tables. Accepted Manuscript. Journal of King Saud University - Computer and Information Sciences

  9. arXiv:2103.12633  [pdf, other

    cs.NE cs.LG

    GA-SVM for Evaluating Heroin Consumption Risk

    Authors: Sean-Kelly Palicki, R. Muhammad Atif Azad

    Abstract: There were over 70,000 drug overdose deaths in the USA in 2017. Almost half of those involved the use of Opioids such as Heroin. This research supports efforts to combat the Opioid Epidemic by further understanding factors that lead to Heroin consumption. Previous research has debated the cause of Heroin addiction, with some explaining the phenomenon as a transition from prescription Opioids, and… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: Genetic Algorithm, Feature Selection, Applied Computing, Psychology

  10. arXiv:2006.13354  [pdf, other

    cs.CR cs.CY

    A First Look at Privacy Analysis of COVID-19 Contact Tracing Mobile Applications

    Authors: Muhammad Ajmal Azad, Junaid Arshad, Ali Akmal, Farhan Riaz, Sidrah Abdullah, Muhammad Imran, Farhan Ahmad

    Abstract: Today's smartphones are equipped with a large number of powerful value-added sensors and features such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and a camera, etc. These value-added sensors have revolutionized the lives of the human being in many ways… ▽ More

    Submitted 16 August, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: submitted to IEEE IOT JOurnal

  11. arXiv:1903.12079  [pdf

    cs.CY cs.CR

    Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations

    Authors: Nader Sohrabi Safa, Carsten Maple, Steve Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak

    Abstract: Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information as… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Journal ref: Future Generation Computer Systems (FGCS) 2019

  12. arXiv:1812.09160  [pdf, other

    cs.CR

    A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

    Authors: Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Wei Jie, Razi Iqbal, Mamoun Alazab

    Abstract: Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significance of distinct protection mechanisms. Intrusion de… ▽ More

    Submitted 21 December, 2018; originally announced December 2018.

  13. arXiv:1305.0922  [pdf

    cs.NE cs.LG

    On Comparison between Evolutionary Programming Network-based Learning and Novel Evolution Strategy Algorithm-based Learning

    Authors: M. A. Khayer Azad, Md. Shafiqul Islam, M. M. A. Hashem

    Abstract: This paper presents two different evolutionary systems - Evolutionary Programming Network (EPNet) and Novel Evolutions Strategy (NES) Algorithm. EPNet does both training and architecture evolution simultaneously, whereas NES does a fixed network and only trains the network. Five mutation operators proposed in EPNet to reflect the emphasis on evolving ANNs behaviors. Close behavioral links between… ▽ More

    Submitted 4 May, 2013; originally announced May 2013.

    Journal ref: Procs. of the 3rd International Conference on Electrical, Electronics and Computer Engineering (ICEECE 2003), pp. 213-218, Dhaka, Bangladesh, December 22-24, (2003)

  14. arXiv:1009.4981  [pdf

    cs.IT cs.IR

    An Efficient Technique for Text Compression

    Authors: Md. Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman

    Abstract: For storing a word or the whole text segment, we need a huge storage space. Typically a character requires 1 Byte for storing it in memory. Compression of the memory is very important for data management. In case of memory requirement compression for text data, lossless memory compression is needed. We are suggesting a lossless memory requirement compression method for text data compression. The p… ▽ More

    Submitted 25 September, 2010; originally announced September 2010.

    Comments: 7 Pages, International Conference

    Journal ref: Proc. International Conference on Information Management and Business (IMB 2005), Shih Chien University, Taiwan, pp. 467-473, Mar. 2005

  15. arXiv:1009.4980  [pdf

    cs.HC

    Completely Enhanced Cell Phone Keypad

    Authors: Rezwana Sharmeen, Md. Abul Kalam Azad, Shabbir Ahmad, S. M. Kamruzzaman

    Abstract: The enhanced frequency based keypad is designed to speed up the typing process. This paper will show that the proposed layout will increase the typing speed and be flexible for thumb. Traditional cell phone keypad is not a scientific keypad from the frequency point of view. Approaches have been explored to speed up the typing process. We found that no manufacturer has considered the frequency of t… ▽ More

    Submitted 25 September, 2010; originally announced September 2010.

    Comments: 5 Pages, International Conference

    Journal ref: Proc. International Conference on Information Management and Business (IMB 2005), Shih Chien University, Taiwan, pp. 217-221, Mar. 2005

  16. arXiv:1009.4979  [pdf

    cs.HC

    Smart Bengali Cell Phone Keypad Layout

    Authors: Md. Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman

    Abstract: Nowadays cell phone is the most common communicating used by mass people. SMS based communication is a cheap and popular communication method. It is human tendency to have the opportunity to write SMS in their mother language. Text input in mother language is more flexible when the alphabets of that language are printed on the keypad. Bangla mobile keypad based on phonetics has been proposed earli… ▽ More

    Submitted 25 September, 2010; originally announced September 2010.

    Comments: 4 Pages, International Conference

    Journal ref: Proc. 8th International Conference on Computer and Information Technology (ICCIT 2005), Dhaka, Bangladesh, pp. 1208-1211, Dec. 2005

  17. arXiv:1009.4977  [pdf

    cs.AR

    Universal Numeric Segmented Display

    Authors: Md. Abul kalam Azad, Rezwana Sharmeen, S. M. Kamruzzaman

    Abstract: Segmentation display plays a vital role to display numerals. But in today's world matrix display is also used in displaying numerals. Because numerals has lots of curve edges which is better supported by matrix display. But as matrix display is costly and complex to implement and also needs more memory, segment display is generally used to display numerals. But as there is yet no proposed compact… ▽ More

    Submitted 25 September, 2010; originally announced September 2010.

    Comments: 6 Pages, International Conference

    Journal ref: Proc. 7th International Conference on Computer and Information Technology (ICCIT-2004), Dhaka, Bangladesh, pp. 887-892, Dec. 2004

  18. arXiv:1009.4590  [pdf

    cs.AR

    A Unique 10 Segment Display for Bengali Numerals

    Authors: Md. Abul Kalam Azad, Rezwana Sharmeen, Shabbir Ahmad, S. M. Kamruzzaman

    Abstract: Segmented display is widely used for efficient display of alphanumeric characters. English numerals are displayed by 7 segment and 16 segment display. The segment size is uniform in this two display architecture. Display architecture using 8, 10, 11, 18 segments have been proposed for Bengali numerals 0...9 yet no display architecture is designed using segments of uniform size and uniform power co… ▽ More

    Submitted 23 September, 2010; originally announced September 2010.

    Comments: 3 Pages, International Conference

    Journal ref: Proc. 8th International Conference on Computer and Information Technology (ICCIT 2005), Dhaka, Bangladesh, pp. 97-99, Dec. 2005