Skip to main content

Showing 1–8 of 8 results for author: Billah, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.13817  [pdf, ps, other

    cs.CV

    InstanceBEV: Unifying Instance and BEV Representation for Global Modeling

    Authors: Feng Li, Kun Xu, Zhaoyue Wang, Yunduan Cui, Mohammad Masum Billah, Jia Liu

    Abstract: Occupancy Grid Maps are widely used in navigation for their ability to represent 3D space occupancy. However, existing methods that utilize multi-view cameras to construct Occupancy Networks for perception modeling suffer from cubic growth in data complexity. Adopting a Bird's-Eye View (BEV) perspective offers a more practical solution for autonomous driving, as it provides higher semantic density… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

  2. arXiv:2504.19459  [pdf

    cs.SE

    Do Automatic Comment Generation Techniques Fall Short? Exploring the Influence of Method Dependencies on Code Understanding

    Authors: Md Mustakim Billah, Md Shamimur Rahman, Banani Roy

    Abstract: Method-level comments are critical for improving code comprehension and supporting software maintenance. With advancements in large language models (LLMs), automated comment generation has become a major research focus. However, existing approaches often overlook method dependencies, where one method relies on or calls others, affecting comment quality and code understandability. This study invest… ▽ More

    Submitted 27 April, 2025; originally announced April 2025.

    Comments: Just Accepted at EASE 2025

  3. arXiv:2501.03449  [pdf, other

    cs.IT cs.CR eess.SP

    Feasibility of short blocklength Reed-Muller codes for physical layer security in real environment

    Authors: Md Munibun Billah, Tyler Sweat, Willie K. Harrison

    Abstract: In this paper, we investigate the application of Reed-Muller (RM) codes for Physical-layer security in a real world wiretap channel scenario. Utilizing software-defined radios (SDRs) in a real indoor environment, we implement a coset coding scheme that leverages the hierarchical structure of RM codes to secure data transmission. The generator matrix of the RM code is used to partition codewords in… ▽ More

    Submitted 9 January, 2025; v1 submitted 6 January, 2025; originally announced January 2025.

    Comments: 10 pages, 10 figures

  4. Adaptive Tabu Dropout for Regularization of Deep Neural Network

    Authors: Md. Tarek Hasan, Arifa Akter, Mohammad Nazmush Shamael, Md Al Emran Hossain, H. M. Mutasim Billah, Sumayra Islam, Swakkhar Shatabda

    Abstract: Dropout is an effective strategy for the regularization of deep neural networks. Applying tabu to the units that have been dropped in the recent epoch and retaining them for training ensures diversification in dropout. In this paper, we improve the Tabu Dropout mechanism for training deep neural networks in two ways. Firstly, we propose to use tabu tenure, or the number of epochs a particular unit… ▽ More

    Submitted 31 December, 2024; originally announced January 2025.

    Journal ref: Neural Information Processing, ICONIP 2022, Lecture Notes in Computer Science 13623, Springer Cham, 2023, 334-345

  5. arXiv:2411.19726  [pdf

    cs.CL cs.LG

    Towards Santali Linguistic Inclusion: Building the First Santali-to-English Translation Model using mT5 Transformer and Data Augmentation

    Authors: Syed Mohammed Mostaque Billah, Ateya Ahmed Subarna, Sudipta Nandi Sarna, Ahmad Shawkat Wasit, Anika Fariha, Asif Sushmit, Arig Yousuf Sadeque

    Abstract: Around seven million individuals in India, Bangladesh, Bhutan, and Nepal speak Santali, positioning it as nearly the third most commonly used Austroasiatic language. Despite its prominence among the Austroasiatic language family's Munda subfamily, Santali lacks global recognition. Currently, no translation models exist for the Santali language. Our paper aims to include Santali to the NPL spectrum… ▽ More

    Submitted 29 November, 2024; originally announced November 2024.

  6. arXiv:2410.04202  [pdf, other

    cs.LG

    Deep Transfer Learning Based Peer Review Aggregation and Meta-review Generation for Scientific Articles

    Authors: Md. Tarek Hasan, Mohammad Nazmush Shamael, H. M. Mutasim Billah, Arifa Akter, Md Al Emran Hossain, Sumayra Islam, Salekul Islam, Swakkhar Shatabda

    Abstract: Peer review is the quality assessment of a manuscript by one or more peer experts. Papers are submitted by the authors to scientific venues, and these papers must be reviewed by peers or other authors. The meta-reviewers then gather the peer reviews, assess them, and create a meta-review and decision for each manuscript. As the number of papers submitted to these venues has grown in recent years,… ▽ More

    Submitted 5 October, 2024; originally announced October 2024.

  7. Are Large Language Models a Threat to Programming Platforms? An Exploratory Study

    Authors: Md Mustakim Billah, Palash Ranjan Roy, Zadia Codabux, Banani Roy

    Abstract: Competitive programming platforms like LeetCode, Codeforces, and HackerRank evaluate programming skills, often used by recruiters for screening. With the rise of advanced Large Language Models (LLMs) such as ChatGPT, Gemini, and Meta AI, their problem-solving ability on these platforms needs assessment. This study explores LLMs' ability to tackle diverse programming challenges across platforms wit… ▽ More

    Submitted 9 September, 2024; originally announced September 2024.

    Comments: Accepted in ESEM 2024

  8. arXiv:2307.12397  [pdf

    cs.NI eess.AS

    Performance Comparison Between VoLTE and non-VoLTE Voice Calls During Mobility in Commercial Deployment: A Drive Test-Based Analysis

    Authors: Rashed Hasan Ratul, Muhammad Iqbal, Jen-Yi Pan, Mohammad Mahadi Al Deen, Mohammad Tawhid Kawser, Mohammad Masum Billah

    Abstract: The optimization of network performance is vital for the delivery of services using standard cellular technologies for mobile communications. Call setup delay and User Equipment (UE) battery savings significantly influence network performance. Improving these factors is vital for ensuring optimal service delivery. In comparison to traditional circuit-switched voice calls, VoLTE (Voice over LTE) te… ▽ More

    Submitted 23 July, 2023; originally announced July 2023.

    Comments: Accepted for presentation and Publication on the IEEE 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI 2023)