Skip to main content

Showing 1–9 of 9 results for author: Khan, K M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.17725  [pdf, other

    cs.NI

    STGen: A Novel Lightweight IoT Testbed for Generating Sensor Traffic for the Experimentation of IoT Protocol and its Application in Hybrid Network

    Authors: Hasan MA Islam, S. Nath, M. Rahman, N. Shahriar, M. K. M. Khan, R. Islam

    Abstract: A Wireless Sensor Network (WSN) is a network that does not rely on a fixed infrastructure and consists of numerous sensors, such as temperature, humidity, GPS, and cameras, equipped with onboard processors that manage and monitor the environment in a specific area. As a result, building a real sensor network testbed for verifying, validating, or experimenting with a newly designed protocol present… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

    Comments: 23 Pages, 12 Figures, Submitted to ACM Transactions on Sensor Networks

  2. arXiv:2411.07315  [pdf

    cs.RO cs.AI

    Harnessing Smartphone Sensors for Enhanced Road Safety: A Comprehensive Dataset and Review

    Authors: Amith Khandakar, David G. Michelson, Mansura Naznine, Abdus Salam, Md. Nahiduzzaman, Khaled M. Khan, Ponnuthurai Nagaratnam Suganthan, Mohamed Arselene Ayari, Hamid Menouar, Julfikar Haider

    Abstract: Severe collisions can result from aggressive driving and poor road conditions, emphasizing the need for effective monitoring to ensure safety. Smartphones, with their array of built-in sensors, offer a practical and affordable solution for road-sensing. However, the lack of reliable, standardized datasets has hindered progress in assessing road conditions and driving patterns. This study addresses… ▽ More

    Submitted 13 November, 2024; v1 submitted 11 November, 2024; originally announced November 2024.

    Comments: 29 pages, 14 Figures, journal paper, submitted into Scientific Data Journal

  3. arXiv:2405.01310  [pdf, other

    cs.IR cs.CL

    Overcoming LLM Challenges using RAG-Driven Precision in Coffee Leaf Disease Remediation

    Authors: Selva Kumar S, Afifah Khan Mohammed Ajmal Khan, Imadh Ajaz Banday, Manikantha Gada, Vibha Venkatesh Shanbhag

    Abstract: This research introduces an innovative AI-driven precision agriculture system, leveraging YOLOv8 for disease identification and Retrieval Augmented Generation (RAG) for context-aware diagnosis. Focused on addressing the challenges of diseases affecting the coffee production sector in Karnataka, The system integrates sophisticated object detection techniques with language models to address the inhe… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 6 pages, 3 figures

  4. arXiv:2401.04619  [pdf, other

    cs.CL

    Language Detection for Transliterated Content

    Authors: Selva Kumar S, Afifah Khan Mohammed Ajmal Khan, Chirag Manjeshwar, Imadh Ajaz Banday

    Abstract: In the contemporary digital era, the Internet functions as an unparalleled catalyst, dismantling geographical and linguistic barriers particularly evident in texting. This evolution facilitates global communication, transcending physical distances and fostering dynamic cultural exchange. A notable trend is the widespread use of transliteration, where the English alphabet is employed to convey mess… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 4 Pages, 6 diagrams

    ACM Class: C.m; I.2

  5. arXiv:2311.16161  [pdf, other

    cs.CV cs.AI

    Vision Encoder-Decoder Models for AI Coaching

    Authors: Jyothi S Nayak, Afifah Khan Mohammed Ajmal Khan, Chirag Manjeshwar, Imadh Ajaz Banday

    Abstract: This research paper introduces an innovative AI coaching approach by integrating vision-encoder-decoder models. The feasibility of this method is demonstrated using a Vision Transformer as the encoder and GPT-2 as the decoder, achieving a seamless integration of visual input and textual interaction. Departing from conventional practices of employing distinct models for image recognition and text-b… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 6 pages, 2 figures

    ACM Class: I.2.1

  6. arXiv:1911.05771  [pdf

    cs.CR cs.LG cs.NI

    Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

    Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain

    Abstract: It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology. By extension, these techniques can help improve the security of the IIoT systems as well. In this paper, we first pre… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

    Journal ref: in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6822-6834, Aug. 2019

  7. arXiv:1903.04271  [pdf, ps, other

    cs.CR

    CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing

    Authors: Seoungmo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim

    Abstract: Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees. However, existing models do not consider all ty… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

  8. arXiv:1103.5760  [pdf

    cs.DC

    Triangular Dynamic Architecture for Distributed Computing in a LAN Environment

    Authors: M. Shahriar Hossain, Kazi Muhammad Najmul Hasan Khan, M. Muztaba Fuad, Debzani Deb

    Abstract: A computationally intensive large job, granulized to concurrent pieces and operating in a dynamic environment should reduce the total processing time. However, distributing jobs across a networked environment is a tedious and difficult task. Job distribution in a Local Area Network based on Triangular Dynamic Architecture (TDA) is a mechanism that establishes a dynamic environment for job distribu… ▽ More

    Submitted 29 March, 2011; originally announced March 2011.

    Comments: Published

    Journal ref: 6th International Conference on Computer and Information Technology, Dhaka, Bangladesh, 2003, Pages 481-486

  9. arXiv:1103.5743  [pdf

    cs.DC

    Load Balancing in a Networked Environment through Homogenization

    Authors: M. Shahriar Hossain, M. Muztaba Fuad, Debzani Deb, Kazi Muhammad Najmul Hasan Khan, Md. Mahbubul Alam Joarder

    Abstract: Distributed processing across a networked environment suffers from unpredictable behavior of speedup due to heterogeneous nature of the hardware and software in the remote machines. It is challenging to get a better performance from a distributed system by distributing task in an intelligent manner such that the heterogeneous nature of the system do not have any effect on the speedup ratio. This p… ▽ More

    Submitted 29 March, 2011; originally announced March 2011.

    Comments: International Conference on Cybernetics and Information Technologies, Orlando, USA, July 21-25, 2004, Pages 99-104

    Journal ref: International Conference on Cybernetics and Information Technologies, Systems and Applications Orlando, USA, July 21-25, CITSA 2004, Pages: 99-104