Skip to main content

Showing 1–11 of 11 results for author: Rahman, M Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.14629  [pdf, ps, other

    cs.CV cs.CL

    VisText-Mosquito: A Multimodal Dataset and Benchmark for AI-Based Mosquito Breeding Site Detection and Reasoning

    Authors: Md. Adnanul Islam, Md. Faiyaz Abdullah Sayeedi, Md. Asaduzzaman Shuvo, Muhammad Ziaur Rahman, Shahanur Rahman Bappy, Raiyan Rahman, Swakkhar Shatabda

    Abstract: Mosquito-borne diseases pose a major global health risk, requiring early detection and proactive control of breeding sites to prevent outbreaks. In this paper, we present VisText-Mosquito, a multimodal dataset that integrates visual and textual data to support automated detection, segmentation, and reasoning for mosquito breeding site analysis. The dataset includes 1,828 annotated images for objec… ▽ More

    Submitted 17 June, 2025; originally announced June 2025.

  2. arXiv:2103.08294  [pdf, other

    cs.CV

    3D-FFS: Faster 3D object detection with Focused Frustum Search in sensor fusion based networks

    Authors: Aniruddha Ganguly, Tasin Ishmam, Khandker Aftarul Islam, Md Zahidur Rahman, Md. Shamsuzzoha Bayzid

    Abstract: In this work we propose 3D-FFS, a novel approach to make sensor fusion based 3D object detection networks significantly faster using a class of computationally inexpensive heuristics. Existing sensor fusion based networks generate 3D region proposals by leveraging inferences from 2D object detectors. However, as images have no depth information, these networks rely on extracting semantic features… ▽ More

    Submitted 4 October, 2021; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: Contains 6 pages and 2 figures. Manuscript accepted and presented in the IEEE International Conference on Intelligent Robots and Systems (IROS) 2021

  3. arXiv:2009.07250  [pdf, other

    cs.CV cs.LG q-bio.QM

    PointIso: Point Cloud Based Deep Learning Model for Detecting Arbitrary-Precision Peptide Features in LC-MS Map through Attention Based Segmentation

    Authors: Fatema Tuz Zohora, M Ziaur Rahman, Ngoc Hieu Tran, Lei Xin, Baozhen Shan, Ming Li

    Abstract: A promising technique of discovering disease biomarkers is to measure the relative protein abundance in multiple biofluid samples through liquid chromatography with tandem mass spectrometry (LC-MS/MS) based quantitative proteomics. The key step involves peptide feature detection in LC-MS map, along with its charge and intensity. Existing heuristic algorithms suffer from inaccurate parameters since… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

    Comments: 16 pages (main text) with 10 figures, then supplementary material of about 5 pages. preprint of journal submission

  4. arXiv:2003.13786  [pdf, other

    cs.DS

    Generating Weakly Chordal Graphs from Arbitrary Graphs

    Authors: Sudiksha Khanduja, Aayushi Srivastava, Md. Zamilur Rahman, Asish Mukhopadhyay

    Abstract: We propose a scheme for generating a weakly chordal graph from a randomly generated input graph, G = (V, E). We reduce G to a chordal graph H by adding fill-edges, using the minimum vertex degree heuristic. Since H is necessarily a weakly chordal graph, we use an algorithm for deleting edges from a weakly chordal graph that preserves the weak chordality property of H. The edges that are candidates… ▽ More

    Submitted 19 March, 2020; originally announced March 2020.

    Comments: 15 pages, 29 figures

  5. arXiv:2002.07207  [pdf, ps, other

    cs.DS cs.DM math.CO

    Semi-dynamic Algorithms for Strongly Chordal Graphs

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay

    Abstract: There is an extensive literature on dynamic algorithms for a large number of graph theoretic problems, particularly for all varieties of shortest path problems. Germane to this paper are a number fully dynamic algorithms that are known for chordal graphs. However, to the best of our knowledge no study has been done for the problem of dynamic algorithms for strongly chordal graphs. To address this… ▽ More

    Submitted 30 January, 2020; originally announced February 2020.

    Comments: 12 pages and 13 figures

  6. arXiv:1909.02545  [pdf, ps, other

    cs.DS math.CO

    Strongly Chordal Graph Generation using Intersection Graph Characterisation

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay

    Abstract: Strongly chordal graphs are a subclass of chordal graphs. Farber also established a number of different characterisations for this class of graphs. These include an intersection graph characterisation that is analogous to a similar characterisation for chordal graphs. Seker et al. exploited this characterisation of chordal graphs to obtain an algorithm for generating them. In this paper, we propos… ▽ More

    Submitted 25 July, 2019; originally announced September 2019.

    Comments: 5 pages

  7. arXiv:1906.01056  [pdf, ps, other

    cs.DS

    A separator-based method for generating weakly chordal graphs

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay, Yash P. Aneja

    Abstract: We propose a scheme for generating a weakly chordal graph on n vertices with m edges. In this method, we first construct a tree and then generate an orthogonal layout (which is a weakly chordal graph on the n vertices) based on this tree. In the next and final step, we insert additional edges to give us a weakly chordal graph on m edges. Our algorithm ensures that the graph remains weakly chordal… ▽ More

    Submitted 8 May, 2019; originally announced June 2019.

    Comments: 14 pages and 30 figures

  8. arXiv:1804.09019  [pdf, ps, other

    cs.DS

    An Algorithm for Generating Strongly Chordal Graphs

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay, Yash P. Aneja

    Abstract: Strongly chordal graphs are a subclass of chordal graphs. The interest in this subclass stems from the fact that many problems which are NP-complete for chordal graphs are solvable in polynomial time for this subclass. However, we are not aware of any algorithm that can generate instances of this class, often necessary for testing purposes. In this paper, we address this issue. Our algorithm first… ▽ More

    Submitted 14 April, 2018; originally announced April 2018.

    Comments: 9 pages and 6 figures

  9. arXiv:1705.09643  [pdf, ps, other

    cs.DS

    A greedy approximation algorithm for the minimum (2,2)-connected dominating set problem

    Authors: Yash P. Aneja, Asish Mukhopadhyay, Md. Zamilur Rahman

    Abstract: Using a connected dominating set (CDS) to serve as the virtual backbone of a wireless sensor network (WSN) is an effective way to save energy and reduce the impact of broadcasting storms. Since nodes may fail due to accidental damage or energy depletion, it is desirable that the virtual backbone is fault tolerant. This could be modeled as a k-connected, m-fold dominating set ((k,m)-CDS). Given a v… ▽ More

    Submitted 26 May, 2017; originally announced May 2017.

  10. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    Authors: Dewan Md. Farid, Nouria Harbi, Mohammad Zahidur Rahman

    Abstract: In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The pro… ▽ More

    Submitted 25 May, 2010; originally announced May 2010.

    Comments: 14 Pages, IJNSA

    Journal ref: International Journal of Network Security & Its Applications 2.2 (2010) 12-25

  11. arXiv:1005.0919  [pdf

    cs.CR

    Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection

    Authors: Dewan Md. Farid, Mohammad Zahidur Rahman

    Abstract: In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive naïve Bayesian tree, which not only reduce the false positives (FP) at acceptable level, but also scale up the detection rates (DR) for different types of network intrusions. Due to the tremendous growth of network-based servi… ▽ More

    Submitted 6 May, 2010; originally announced May 2010.

    Comments: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/