Skip to main content

Showing 1–47 of 47 results for author: Kabir, H

Searching in archive cs. Search in all archives.
.
  1. Performance Analysis of Few-Shot Learning Approaches for Bangla Handwritten Character and Digit Recognition

    Authors: Mehedi Ahamed, Radib Bin Kabir, Tawsif Tashwar Dipto, Mueeze Al Mushabbir, Sabbir Ahmed, Md. Hasanul Kabir

    Abstract: This study investigates the performance of few-shot learning (FSL) approaches in recognizing Bangla handwritten characters and numerals using limited labeled data. It demonstrates the applicability of these methods to scripts with intricate and complex structures, where dataset scarcity is a common challenge. Given the complexity of Bangla script, we hypothesize that models performing well on thes… ▽ More

    Submitted 31 May, 2025; originally announced June 2025.

    Journal ref: 2024 6th International Conference on Sustainable Technologies for Industry 5.0 (STI)

  2. arXiv:2505.06592  [pdf, other

    cs.CV

    Batch Augmentation with Unimodal Fine-tuning for Multimodal Learning

    Authors: H M Dipu Kabir, Subrota Kumar Mondal, Mohammad Ali Moni

    Abstract: This paper proposes batch augmentation with unimodal fine-tuning to detect the fetus's organs from ultrasound images and associated clinical textual information. We also prescribe pre-training initial layers with investigated medical data before the multimodal training. At first, we apply a transferred initialization with the unimodal image portion of the dataset with batch augmentation. This step… ▽ More

    Submitted 10 May, 2025; originally announced May 2025.

  3. arXiv:2504.14269  [pdf, other

    cs.HC

    Recognition of Frequencies of Short-Time SSVEP Signals Utilizing an SSCCA-Based Spatio-Spectral Feature Fusion Framework

    Authors: Saif Bashar, Samia Nasir Nira, Shabbir Mahmood, Md. Humaun Kabir, Sujit Roy, Iffat Farhana

    Abstract: A brain-computer interface (BCI) facilitates direct communication between the brain and external equipment through EEG, which is preferred for its superior temporal resolution. Among EEG techniques, the steady-state visual evoked potential (SSVEP) is favored due to its robust signal-to-noise ratio, minimal training demands, and elevated information transmission rate. Frequency detection in SSVEP-b… ▽ More

    Submitted 19 April, 2025; originally announced April 2025.

    Comments: This paper is presented in the Undergraduate Conference on Intelligent Computing and Systems (UCICS 2025) organised by Varendra University, Rajshahi, Bangladesh, 2025

  4. arXiv:2504.13990  [pdf, other

    cs.LG cs.AI eess.SY

    PC-DeepNet: A GNSS Positioning Error Minimization Framework Using Permutation-Invariant Deep Neural Network

    Authors: M. Humayun Kabir, Md. Ali Hasan, Md. Shafiqul Islam, Kyeongjun Ko, Wonjae Shin

    Abstract: Global navigation satellite systems (GNSS) face significant challenges in urban and sub-urban areas due to non-line-of-sight (NLOS) propagation, multipath effects, and low received power levels, resulting in highly non-linear and non-Gaussian measurement error distributions. In light of this, conventional model-based positioning approaches, which rely on Gaussian error approximations, struggle to… ▽ More

    Submitted 18 April, 2025; originally announced April 2025.

    Comments: 31 pages, 14 figures, 6 tables

  5. arXiv:2503.12368  [pdf, other

    eess.IV cs.CR eess.SP

    SCReedSolo: A Secure and Robust LSB Image Steganography Framework with Randomized Symmetric Encryption and Reed-Solomon Coding

    Authors: Syed Rifat Raiyan, Md. Hasanul Kabir

    Abstract: Image steganography is an information-hiding technique that involves the surreptitious concealment of covert informational content within digital images. In this paper, we introduce ${\rm SCR{\small EED}S{\small OLO}}$, a novel framework for concealing arbitrary binary data within images. Our approach synergistically leverages Random Shuffling, Fernet Symmetric Encryption, and Reed-Solomon Error C… ▽ More

    Submitted 16 March, 2025; originally announced March 2025.

    Comments: Submitted to the 33rd European Signal Processing Conference (EUSIPCO 2025), 5 pages, 21 figures, 4 tables

  6. arXiv:2411.12667  [pdf

    cs.LG cs.CV

    Machine Learning Approaches on Crop Pattern Recognition a Comparative Analysis

    Authors: Kazi Hasibul Kabir, Md. Zahiruddin Aqib, Sharmin Sultana, Shamim Akhter

    Abstract: Monitoring agricultural activities is important to ensure food security. Remote sensing plays a significant role for large-scale continuous monitoring of cultivation activities. Time series remote sensing data were used for the generation of the cropping pattern. Classification algorithms are used to classify crop patterns and mapped agriculture land used. Some conventional classification methods… ▽ More

    Submitted 19 November, 2024; originally announced November 2024.

    Comments: Published in ICNTET2018: International Conference on New Trends in Engineering & Technology Tirupathi Highway, Tiruvallur Dist Chennai, India, September 7-8, 2018

  7. arXiv:2409.14852  [pdf, other

    cs.CV cs.AI

    FUSED-Net: Detecting Traffic Signs with Limited Data

    Authors: Md. Atiqur Rahman, Nahian Ibn Asad, Md. Mushfiqul Haque Omi, Md. Bakhtiar Hasan, Sabbir Ahmed, Md. Hasanul Kabir

    Abstract: Automatic Traffic Sign Recognition is paramount in modern transportation systems, motivating several research endeavors to focus on performance improvement by utilizing large-scale datasets. As the appearance of traffic signs varies across countries, curating large-scale datasets is often impractical; and requires efficient models that can produce satisfactory performance using limited data. In th… ▽ More

    Submitted 3 January, 2025; v1 submitted 23 September, 2024; originally announced September 2024.

    Comments: 19 pages, 8 figures, 5 tables, submitted to IEEE Access for review

  8. arXiv:2409.05026  [pdf, other

    cs.IT

    A Double-Difference Doppler Shift-Based Positioning Framework with Ephemeris Error Correction of LEO Satellites

    Authors: Md. Ali Hasan, M. Humayun Kabir, Md. Shafiqul Islam, Sangmin Han, Wonjae Shin

    Abstract: In signals of opportunity (SOPs)-based positioning utilizing low Earth orbit (LEO) satellites, ephemeris data derived from two-line element files can introduce increasing error over time. To handle the erroneous measurement, an additional base receiver with a known position is often used to compensate for the effect of ephemeris error when positioning the user terminal (UT). However, this approach… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

    Comments: 32 pages, 8 figures, 2 tables

  9. A Methodological and Structural Review of Hand Gesture Recognition Across Diverse Data Modalities

    Authors: Jungpil Shin, Abu Saleh Musa Miah, Md. Humaun Kabir, Md. Abdur Rahim, Abdullah Al Shiam

    Abstract: Researchers have been developing Hand Gesture Recognition (HGR) systems to enhance natural, efficient, and authentic human-computer interaction, especially benefiting those who rely solely on hand gestures for communication. Despite significant progress, the automatic and precise identification of hand gestures remains a considerable challenge in computer vision. Recent studies have focused on spe… ▽ More

    Submitted 10 August, 2024; originally announced August 2024.

    Journal ref: IEEE Access-09 September 2024

  10. arXiv:2306.14255  [pdf, other

    eess.IV cs.CV

    AttResDU-Net: Medical Image Segmentation Using Attention-based Residual Double U-Net

    Authors: Akib Mohammed Khan, Alif Ashrafee, Fahim Shahriar Khan, Md. Bakhtiar Hasan, Md. Hasanul Kabir

    Abstract: Manually inspecting polyps from a colonoscopy for colorectal cancer or performing a biopsy on skin lesions for skin cancer are time-consuming, laborious, and complex procedures. Automatic medical image segmentation aims to expedite this diagnosis process. However, numerous challenges exist due to significant variations in the appearance and sizes of objects with no distinct boundaries. This paper… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

    Comments: Accepted in 2023 International Joint Conference on Neural Networks (IJCNN 2023)

  11. arXiv:2305.03238  [pdf, other

    cs.CV

    Reduction of Class Activation Uncertainty with Background Information

    Authors: H M Dipu Kabir

    Abstract: Multitask learning is a popular approach to training high-performing neural networks with improved generalization. In this paper, we propose a background class to achieve improved generalization at a lower computation compared to multitask learning to help researchers and organizations with limited computation power. We also present a methodology for selecting background images and discuss potenti… ▽ More

    Submitted 10 January, 2025; v1 submitted 4 May, 2023; originally announced May 2023.

  12. Uncertainty Aware Neural Network from Similarity and Sensitivity

    Authors: H M Dipu Kabir, Subrota Kumar Mondal, Sadia Khanam, Abbas Khosravi, Shafin Rahman, Mohammad Reza Chalak Qazani, Roohallah Alizadehsani, Houshyar Asadi, Shady Mohamed, Saeid Nahavandi, U Rajendra Acharya

    Abstract: Researchers have proposed several approaches for neural network (NN) based uncertainty quantification (UQ). However, most of the approaches are developed considering strong assumptions. Uncertainty quantification algorithms often perform poorly in an input domain and the reason for poor performance remains unknown. Therefore, we present a neural network training method that considers similar sampl… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Journal ref: Applied Soft Computing, 2023

  13. Interpretable Multi Labeled Bengali Toxic Comments Classification using Deep Learning

    Authors: Tanveer Ahmed Belal, G. M. Shahariar, Md. Hasanul Kabir

    Abstract: This paper presents a deep learning-based pipeline for categorizing Bengali toxic comments, in which at first a binary classification model is used to determine whether a comment is toxic or not, and then a multi-label classifier is employed to determine which toxicity type the comment belongs to. For this purpose, we have prepared a manually labeled dataset consisting of 16,073 instances among wh… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Journal ref: 2023 International Conference on Electrical, Computer and Communication Engineering (ECCE)

  14. arXiv:2303.09645  [pdf

    cs.RO cs.SD eess.AS

    Development of a Voice Controlled Robotic Arm

    Authors: Akkas U. Haque, Humayun Kabir, S. C. Banik, M. T. Islam

    Abstract: This paper describes a robotic arm with 5 degrees-of-freedom (DOF) which is controlled by human voice and has been developed in the Mechatronics Laboratory, CUET. This robotic arm is interfaced with a PC by serial communication (RS-232). Users' voice command is captured by a microphone, and this voice is processed by software which is made by Microsoft visual studio. Then the specific signal (obta… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  15. arXiv:2212.11211  [pdf, other

    cs.CV

    Land Cover and Land Use Detection using Semi-Supervised Learning

    Authors: Fahmida Tasnim Lisa, Md. Zarif Hossain, Sharmin Naj Mou, Shahriar Ivan, Md. Hasanul Kabir

    Abstract: Semi-supervised learning (SSL) has made significant strides in the field of remote sensing. Finding a large number of labeled datasets for SSL methods is uncommon, and manually labeling datasets is expensive and time-consuming. Furthermore, accurately identifying remote sensing satellite images is more complicated than it is for conventional images. Class-imbalanced datasets are another prevalent… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  16. Performance Analysis of YOLO-based Architectures for Vehicle Detection from Traffic Images in Bangladesh

    Authors: Refaat Mohammad Alamgir, Ali Abir Shuvro, Mueeze Al Mushabbir, Mohammed Ashfaq Raiyan, Nusrat Jahan Rani, Md. Mushfiqur Rahman, Md. Hasanul Kabir, Sabbir Ahmed

    Abstract: The task of locating and classifying different types of vehicles has become a vital element in numerous applications of automation and intelligent systems ranging from traffic surveillance to vehicle identification and many more. In recent times, Deep Learning models have been dominating the field of vehicle detection. Yet, Bangladeshi vehicle detection has remained a relatively unexplored area. O… ▽ More

    Submitted 24 December, 2022; v1 submitted 18 December, 2022; originally announced December 2022.

    Comments: Accepted in 25th ICCIT (6 pages, 5 figures, 1 table)

    Report number: 10055758

    Journal ref: 2022 25th International Conference on Computer and Information Technology (ICCIT)

  17. Huruf: An Application for Arabic Handwritten Character Recognition Using Deep Learning

    Authors: Minhaz Kamal, Fairuz Shaiara, Chowdhury Mohammad Abdullah, Sabbir Ahmed, Tasnim Ahmed, Md. Hasanul Kabir

    Abstract: Handwriting Recognition has been a field of great interest in the Artificial Intelligence domain. Due to its broad use cases in real life, research has been conducted widely on it. Prominent work has been done in this field focusing mainly on Latin characters. However, the domain of Arabic handwritten character recognition is still relatively unexplored. The inherent cursive nature of the Arabic c… ▽ More

    Submitted 24 December, 2022; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: Accepted in 25th ICCIT (6 pages, 4 tables, 4 figures)

    Report number: 10054769

    Journal ref: 2022 25th International Conference on Computer and Information Technology (ICCIT)

  18. arXiv:2209.09556  [pdf, other

    eess.IV cs.CV

    CoV-TI-Net: Transferred Initialization with Modified End Layer for COVID-19 Diagnosis

    Authors: Sadia Khanam, Mohammad Reza Chalak Qazani, Subrota Kumar Mondal, H M Dipu Kabir, Abadhan S. Sabyasachi, Houshyar Asadi, Keshav Kumar, Farzin Tabarsinezhad, Shady Mohamed, Abbas Khorsavi, Saeid Nahavandi

    Abstract: This paper proposes transferred initialization with modified fully connected layers for COVID-19 diagnosis. Convolutional neural networks (CNN) achieved a remarkable result in image classification. However, training a high-performing model is a very complicated and time-consuming process because of the complexity of image recognition applications. On the other hand, transfer learning is a relative… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

  19. arXiv:2209.04796  [pdf, other

    cs.CV

    Multiple Object Tracking in Recent Times: A Literature Review

    Authors: Mk Bashar, Samia Islam, Kashifa Kawaakib Hussain, Md. Bakhtiar Hasan, A. B. M. Ashikur Rahman, Md. Hasanul Kabir

    Abstract: Multiple object tracking gained a lot of interest from researchers in recent years, and it has become one of the trending problems in computer vision, especially with the recent advancement of autonomous driving. MOT is one of the critical vision tasks for different issues like occlusion in crowded scenes, similar appearance, small object detection difficulty, ID switching, etc. To tackle these ch… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  20. Two Decades of Bengali Handwritten Digit Recognition: A Survey

    Authors: A. B. M. Ashikur Rahman, Md. Bakhtiar Hasan, Sabbir Ahmed, Tasnim Ahmed, Md. Hamjajul Ashmafee, Mohammad Ridwan Kabir, Md. Hasanul Kabir

    Abstract: Handwritten Digit Recognition (HDR) is one of the most challenging tasks in the domain of Optical Character Recognition (OCR). Irrespective of language, there are some inherent challenges of HDR, which mostly arise due to the variations in writing styles across individuals, writing medium and environment, inability to maintain the same strokes while writing any digit repeatedly, etc. In addition t… ▽ More

    Submitted 25 September, 2022; v1 submitted 5 June, 2022; originally announced June 2022.

    Comments: This work has been submitted to the IEEE for possible publication. 38 pages, 23 figures, 12 tables

  21. HEATGait: Hop-Extracted Adjacency Technique in Graph Convolution based Gait Recognition

    Authors: Md. Bakhtiar Hasan, Tasnim Ahmed, Md. Hasanul Kabir

    Abstract: Biometric authentication using gait has become a promising field due to its unobtrusive nature. Recent approaches in model-based gait recognition techniques utilize spatio-temporal graphs for the elegant extraction of gait features. However, existing methods often rely on multi-scale operators for extracting long-range relationships among joints resulting in biased weighting. In this paper, we pre… ▽ More

    Submitted 21 April, 2022; originally announced April 2022.

    Comments: Accepted in 2022 4th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2022). 6 pages, 4 figures, 2 tables

  22. arXiv:2203.12315  [pdf

    cs.AI cs.NI

    The state-of-the-art review on resource allocation problem using artificial intelligence methods on various computing paradigms

    Authors: Javad Hassannataj Joloudari, Sanaz Mojrian, Hamid Saadatfar, Issa Nodehi, Fatemeh Fazl, Sahar Khanjani shirkharkolaie, Roohallah Alizadehsani, H M Dipu Kabir, Ru-San Tan, U Rajendra Acharya

    Abstract: With the increasing growth of information through smart devices, increasing the quality level of human life requires various computational paradigms presentation including the Internet of Things, fog, and cloud. Between these three paradigms, the cloud computing paradigm as an emerging technology adds cloud layer services to the edge of the network so that resource allocation operations occur clos… ▽ More

    Submitted 4 November, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

    Comments: 23 pages, 9 figures

  23. arXiv:2111.00601  [pdf

    cs.LG cs.CR cs.NI

    Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform

    Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari

    Abstract: Artificial Intelligence (AI) is one of the disruptive technologies that is shaping the future. It has growing applications for data-driven decisions in major smart city solutions, including transportation, education, healthcare, public governance, and power systems. At the same time, it is gaining popularity in protecting critical cyber infrastructure from cyber threats, attacks, damages, or unaut… ▽ More

    Submitted 31 October, 2021; originally announced November 2021.

    Comments: Book_Chapter, Springer Nature

  24. arXiv:2110.07097  [pdf, other

    cs.CV cs.LG

    A Comprehensive Study on Torchvision Pre-trained Models for Fine-grained Inter-species Classification

    Authors: Feras Albardi, H M Dipu Kabir, Md Mahbub Islam Bhuiyan, Parham M. Kebria, Abbas Khosravi, Saeid Nahavandi

    Abstract: This study aims to explore different pre-trained models offered in the Torchvision package which is available in the PyTorch library. And investigate their effectiveness on fine-grained images classification. Transfer Learning is an effective method of achieving extremely good performance with insufficient training data. In many real-world situations, people cannot collect sufficient data required… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

    Comments: Accepted

    Journal ref: 2021 IEEE International Conference on Systems, Man, and Cybernetics

  25. Less is More: Lighter and Faster Deep Neural Architecture for Tomato Leaf Disease Classification

    Authors: Sabbir Ahmed, Md. Bakhtiar Hasan, Tasnim Ahmed, Redwan Karim Sony, Md. Hasanul Kabir

    Abstract: To ensure global food security and the overall profit of stakeholders, the importance of correctly detecting and classifying plant diseases is paramount. In this connection, the emergence of deep learning-based image classification has introduced a substantial number of solutions. However, the applicability of these solutions in low-end devices requires fast, accurate, and computationally inexpens… ▽ More

    Submitted 4 July, 2022; v1 submitted 6 September, 2021; originally announced September 2021.

    Comments: 18 pages, 13 figures, 5 tables, Accepted in IEEE Access

    ACM Class: I.4.9

  26. Efficient Two-Stream Network for Violence Detection Using Separable Convolutional LSTM

    Authors: Zahidul Islam, Mohammad Rukonuzzaman, Raiyan Ahmed, Md. Hasanul Kabir, Moshiur Farazi

    Abstract: Automatically detecting violence from surveillance footage is a subset of activity recognition that deserves special attention because of its wide applicability in unmanned security monitoring systems, internet video filtration, etc. In this work, we propose an efficient two-stream deep learning architecture leveraging Separable Convolutional LSTM (SepConvLSTM) and pre-trained MobileNet where one… ▽ More

    Submitted 20 April, 2021; v1 submitted 21 February, 2021; originally announced February 2021.

    Comments: Accepted by the 2021 International Joint Conference on Neural Networks (IJCNN 2021)

    Journal ref: 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1-8

  27. Improving Action Quality Assessment using Weighted Aggregation

    Authors: Shafkat Farabi, Hasibul Himel, Fakhruddin Gazzali, Md. Bakhtiar Hasan, Md. Hasanul Kabir, Moshiur Farazi

    Abstract: Action quality assessment (AQA) aims at automatically judging human action based on a video of the said action and assigning a performance score to it. The majority of works in the existing literature on AQA divide RGB videos into short clips, transform these clips to higher-level representations using Convolutional 3D (C3D) networks, and aggregate them through averaging. These higher-level repres… ▽ More

    Submitted 11 March, 2022; v1 submitted 21 February, 2021; originally announced February 2021.

    Comments: Accepted for presentation at the IbPRIA 2022: 10th Iberian Conference on Pattern Recognition and Image Analysis Aveiro, Portugal. May 4-6, 2022

  28. arXiv:2009.14434  [pdf, other

    eess.SY cs.RO

    Efficient, Decentralized, and Collaborative Multi-Robot Exploration using Optimal Transport Theory

    Authors: Rabiul Hasan Kabir, Kooktae Lee

    Abstract: An Optimal Transport (OT)-based decentralized collaborative multi-robot exploration strategy is proposed in this paper. This method is to achieve an efficient exploration with a predefined priority in the given domain. In this context, the efficiency indicates how a team of robots (agents) cover the domain reflecting the corresponding priority map (or degrees of importance) in the domain. The dece… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2009.00862

  29. arXiv:2009.13744  [pdf, other

    eess.SY cs.RO

    Ergodic Control Strategy for Multi-Agent Environment Exploration

    Authors: Rabiul Hasan Kabir, Kooktae Lee, Geronimo Macias

    Abstract: In this study, an ergodic environment exploration problem is introduced for a centralized multi-agent system. Given the reference distribution represented by the Mixture of Gaussian (MoG), the ergodicity is achieved when the time-averaged robot distribution is identical to the given reference distribution. The major challenge associated with this problem is to determine proper timing for a team of… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

  30. arXiv:2009.00862  [pdf, other

    eess.SY cs.MA cs.RO

    Efficient Multi-Robot Exploration with Energy Constraint based on Optimal Transport Theory

    Authors: Rabiul Hasan Kabir, Kooktae Lee

    Abstract: This paper addresses an Optimal Transport (OT)-based efficient multi-robot exploration problem, considering the energy constraints of a multi-robot system. The efficiency in this problem implies how a team of robots (agents) covers a given domain, reflecting a priority of areas of interest represented by a density distribution, rather than simply following a preset of uniform patterns. To achieve… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

  31. arXiv:2007.03347  [pdf, other

    cs.CV cs.LG cs.NE eess.IV

    SpinalNet: Deep Neural Network with Gradual Input

    Authors: H M Dipu Kabir, Moloud Abdar, Seyed Mohammad Jafar Jalali, Abbas Khosravi, Amir F Atiya, Saeid Nahavandi, Dipti Srinivasan

    Abstract: Deep neural networks (DNNs) have achieved the state of the art performance in numerous fields. However, DNNs need high computation times, and people always expect better performance in a lower computation. Therefore, we study the human somatosensory system and design a neural network (SpinalNet) to achieve higher accuracy with fewer computations. Hidden layers in traditional NNs receive inputs in… ▽ More

    Submitted 7 January, 2022; v1 submitted 7 July, 2020; originally announced July 2020.

    Journal ref: IEEE Transactions on Artificial Intelligence, 2023

  32. Enhancing Software Development Process Using Automated Adaptation of Object Ensembles

    Authors: Md. Emran, Humaun Kabir, Ziaur Rahman, Nazrul Islam

    Abstract: Software development has been changing rapidly. This development process can be influenced through changing developer friendly approaches. We can save time consumption and accelerate the development process if we can automatically guide programmer during software development. There are some approaches that recommended relevant code snippets and APIitems to the developer. Some approaches apply gene… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: 6 pages, 5 figures, 2 tables published in the IEEE Sponsored Conferences

    Journal ref: 2016 IEEE EICT Conference

  33. Optimal Uncertainty-guided Neural Network Training

    Authors: H M Dipu Kabir, Abbas Khosravi, Abdollah Kavousi-Fard, Saeid Nahavandi, Dipti Srinivasan

    Abstract: The neural network (NN)-based direct uncertainty quantification (UQ) methods have achieved the state of the art performance since the first inauguration, known as the lower-upper-bound estimation (LUBE) method. However, currently-available cost functions for uncertainty guided NN training are not always converging and all converged NNs are not generating optimized prediction intervals (PIs). Moreo… ▽ More

    Submitted 29 December, 2019; originally announced December 2019.

    Journal ref: Applied Soft Computing, 2021

  34. arXiv:1707.02000  [pdf, other

    cs.DC cs.DS cs.SI

    Shared-memory Graph Truss Decomposition

    Authors: Humayun Kabir, Kamesh Madduri

    Abstract: We present PKT, a new shared-memory parallel algorithm and OpenMP implementation for the truss decomposition of large sparse graphs. A k-truss is a dense subgraph definition that can be considered a relaxation of a clique. Truss decomposition refers to a partitioning of all the edges in the graph based on their k-truss membership. The truss decomposition of a graph has many applications. We show t… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

    Comments: 10 pages, conference submission

  35. arXiv:1606.07247  [pdf, ps, other

    cs.HC cs.CV

    Human Computer Interaction Using Marker Based Hand Gesture Recognition

    Authors: Sayem Mohammad Siam, Jahidul Adnan Sakel, Md. Hasanul Kabir

    Abstract: Human Computer Interaction (HCI) has been redefined in this era. People want to interact with their devices in such a way that has physical significance in the real world, in other words, they want ergonomic input devices. In this paper, we propose a new method of interaction with computing devices having a consumer grade camera, that uses two colored markers (red and green) worn on tips of the fi… ▽ More

    Submitted 23 June, 2016; originally announced June 2016.

    Comments: 8 Pages, didn't submit to any conference yet

  36. arXiv:1411.3049  [pdf

    cs.IT cs.ET

    Enhanced Modulation Technique for Molecular Communication: OOMoSK

    Authors: Md. Humaun Kabir, Kyung Sup Kwak

    Abstract: Molecular communication in nanonetworks is an emerging communication paradigm where molecules are used as information carriers. Concentration Shift Keying (CSK) and Molecule Shift Keying (MoSK) are being studied extensively for the short and medium range molecular nanonetworks. It is observed that MoSK outperforms CSK. However, MoSK requires different types of molecules for encoding which render t… ▽ More

    Submitted 11 November, 2014; originally announced November 2014.

  37. arXiv:1208.0995  [pdf, other

    cs.AR

    Design and implementation of a digital clock showing digits in Bangla font using microcontroller AT89C4051

    Authors: Nasif Muslim, Md. Tanvir Adnan, Mohammad Zahidul Kabir, Md. Humayun Kabir, Sheikh Mominul Islam

    Abstract: In this paper, a digital clock is designed where the microcontroller is used for timing controller and the font of the Bangla digits are designed, and programmed within the microcontroller. The design is cost effective, simple and easy for maintenance.

    Submitted 5 August, 2012; originally announced August 2012.

  38. Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti STBC in Different Modulation Schemes

    Authors: Rifat Ara Shams, M. Hasnat Kabir, Sheikh Enayet Ullah

    Abstract: In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on the performance of wavelet based MC-CDMA wireless communication system with the implementation of Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Journal ref: International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012, 23-33

  39. WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network

    Authors: Md. Golam Rashed, M. Hasnat Kabir, Shaikh Enayet Ullah

    Abstract: We develop an energy-efficient routing protocol in order to enhance the stability period of wireless sensor networks. This protocol is called weighted election protocol (WEP). It introduces a scheme to combine clustering strategy with chain routing algorithm for satisfy both energy and stable period constrains under heterogeneous environment in WSNs. Simulation results show that new one performs b… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Comments: 7 Pages

    Journal ref: International Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.2, March 2011, 54-60

  40. arXiv:1207.3876  [pdf

    cs.NI cs.PF

    Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    Authors: Md. Golam Rashed, M. Hasnat Kabir, Muhammad Sajjadur Rahim, Shaikh Enayet Ullah

    Abstract: The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. Th… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Comments: International Journal of Computer and Network Security(IJCNS), Vol. 2, No. 5, May 2010

  41. arXiv:1207.3875  [pdf

    cs.IT cs.PF

    Transmission of Voice Signal: BER Performance Analysis of Different FEC Schemes Based OFDM System over Various Channels

    Authors: Md. Golam Rashed, M. Hasnat Kabir, Md. Selim Reza, Md. Matiqul Islam, Rifat Ara Shams, Saleh Masum, Sheikh Enayet Ullah

    Abstract: In this paper, we investigate the impact of Forward Error Correction (FEC) codes namely Cyclic Redundancy Code and Convolution Code on the performance of OFDM wireless communication system for speech signal transmission over both AWGN and fading (Rayleigh and Rician) channels in term of Bit Error Probability. The simulation has been done in conjunction with QPSK digital modulation and compared wit… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Comments: 12 Pages

    Journal ref: International Journal of Advanced Science and Technology, Vol. 34, September 2011, 89-100

  42. arXiv:1207.3871  [pdf

    cs.IT cs.PF

    Performance Analysis of Wavelet Based MC-CDMA System with Implementation of Various Antenna Diversity Schemes

    Authors: Md. Matiqul Islam, M. Hasnat Kabir, Sk. Enayet Ullah

    Abstract: The impact of using wavelet based technique on the performance of a MC-CDMA wireless communication system has been investigated. The system under proposed study incorporates Walsh Hadamard codes to discriminate the message signal for individual user. A computer program written in Mathlab source code is developed and this simulation study is made with implementation of various antenna diversity sch… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Journal ref: International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 2, April 2011, 271-274

  43. Impact of Different Spreading Codes Using FEC on DWT Based MC-CDMA System

    Authors: Saleh Masum, M. Hasnat Kabir, Md. Matiqul Islam, Rifat Ara Shams, Shaikh Enayet Ullah

    Abstract: The effect of different spreading codes in DWT based MC-CDMA wireless communication system is investigated. In this paper, we present the Bit Error Rate (BER) performance of different spreading codes (Walsh-Hadamard code, Orthogonal gold code and Golay complementary sequences) using Forward Error Correction (FEC) of the proposed system. The data is analyzed and is compared among different spreadin… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Comments: 10 Pages; International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.2, No.3, June 2012

  44. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    Authors: M. G. Rashed, M. Hasnat Kabir, M. Sajjadur Rahim, Sk. Enayet Ullah

    Abstract: A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Comments: 11 pages

    Journal ref: Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.3, August 2011

  45. arXiv:1205.4996  [pdf

    cs.IT

    Ber analysis of iterative turbo encoded miso wireless communication system under implementation of q-ostbc scheme

    Authors: M. Hasnat Kabir, Shaikh Enayet Ullah, Mustari Zaman, Md. Golam Rashed

    Abstract: In this paper, a comprehensive study has been made to evaluate the performance of a MISO wireless communication system. The 4-by-1 spatially multiplexed Turbo encoded system under investigation incorporates Quasi-orthogonal space-time block coding (Q-STBC) and ML signal detection schemes under QPSK, QAM, 16PSK and 16QAM digital modulations. The simulation results elucidate that a significant impro… ▽ More

    Submitted 8 March, 2012; originally announced May 2012.

    Comments: International Journal of Information Technology Convergence and Services (IJITCS), Vol.2, No.1, 2012

  46. arXiv:1203.1778  [pdf

    cs.NI cs.PF

    A Comprehensive Study and Performance Comparison of M-ary Modulation Schemes for an Efficient Wireless Mobile Communication System

    Authors: Md. Emdadul Haque, Md. Golam Rashed, M. Hasnat Kabir

    Abstract: Wireless communications has become one of the fastest growing areas in our modern life and creates enormous impact on nearly every feature of our daily life. In this paper, the performance of M-ary modulations schemes (MPSK, MQAM, MFSK) based wireless communication system on audio signal transmission over Additive Gaussian Noise (AWGN) channel are analyzed in terms of bit error probability as a fu… ▽ More

    Submitted 8 March, 2012; originally announced March 2012.

    Comments: International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.1, No.3, June 2011

  47. Performance Analysis of Two-Hop Cooperative MIMO transmission with Relay Selection in Rayleigh Fading Channel

    Authors: Ahasanun Nessa, Qinghai Yang, Sana Ullah, Humaun Kabir, Kyung Sup Kwak

    Abstract: Wireless relaying is one of the promising solutions to overcome the channel impairments and provide high data rate coverage that appears for beyond 3G mobile communications. In this paper we present an end to end BER performance analysis of dual hop wireless communication systems equipped with multiple decode and forward relays over the Rayleigh fading channel with relay selection. We select the… ▽ More

    Submitted 8 November, 2009; originally announced November 2009.

    Comments: 5 figures, 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08