Skip to main content

Showing 1–50 of 117 results for author: Anjum

  1. arXiv:2410.07872  [pdf, other

    cs.RO

    L-VITeX: Light-weight Visual Intuition for Terrain Exploration

    Authors: Antar Mazumder, Zarin Anjum Madhiha

    Abstract: This paper presents L-VITeX, a lightweight visual intuition system for terrain exploration designed for resource-constrained robots and swarms. L-VITeX aims to provide a hint of Regions of Interest (RoIs) without computationally expensive processing. By utilizing the Faster Objects, More Objects (FOMO) tinyML architecture, the system achieves high accuracy (>99%) in RoI detection while operating o… ▽ More

    Submitted 10 October, 2024; originally announced October 2024.

  2. arXiv:2409.19922  [pdf, other

    cs.SE

    Benchmarking ChatGPT, Codeium, and GitHub Copilot: A Comparative Study of AI-Driven Programming and Debugging Assistants

    Authors: Md Sultanul Islam Ovi, Nafisa Anjum, Tasmina Haque Bithe, Md. Mahabubur Rahman, Mst. Shahnaj Akter Smrity

    Abstract: With the increasing adoption of AI-driven tools in software development, large language models (LLMs) have become essential for tasks like code generation, bug fixing, and optimization. Tools like ChatGPT, GitHub Copilot, and Codeium provide valuable assistance in solving programming challenges, yet their effectiveness remains underexplored. This paper presents a comparative study of ChatGPT, Code… ▽ More

    Submitted 29 September, 2024; originally announced September 2024.

  3. arXiv:2409.14161  [pdf, other

    cs.LG

    When Witnesses Defend: A Witness Graph Topological Layer for Adversarial Graph Learning

    Authors: Naheed Anjum Arafat, Debabrota Basu, Yulia Gel, Yuzhou Chen

    Abstract: Capitalizing on the intuitive premise that shape characteristics are more robust to perturbations, we bridge adversarial graph learning with the emerging tools from computational topology, namely, persistent homology representations of graphs. We introduce the concept of witness complex to adversarial analysis on graphs, which allows us to focus only on the salient shape characteristics of graphs,… ▽ More

    Submitted 24 September, 2024; v1 submitted 21 September, 2024; originally announced September 2024.

  4. arXiv:2409.10011  [pdf, other

    cs.CL cs.AI

    HALO: Hallucination Analysis and Learning Optimization to Empower LLMs with Retrieval-Augmented Context for Guided Clinical Decision Making

    Authors: Sumera Anjum, Hanzhi Zhang, Wenjun Zhou, Eun Jin Paek, Xiaopeng Zhao, Yunhe Feng

    Abstract: Large language models (LLMs) have significantly advanced natural language processing tasks, yet they are susceptible to generating inaccurate or unreliable responses, a phenomenon known as hallucination. In critical domains such as health and medicine, these hallucinations can pose serious risks. This paper introduces HALO, a novel framework designed to enhance the accuracy and reliability of medi… ▽ More

    Submitted 18 September, 2024; v1 submitted 16 September, 2024; originally announced September 2024.

    Comments: 10 pages, 4 figures

  5. arXiv:2408.10457  [pdf, other

    cs.LG eess.SP

    Parkinson's Disease Classification via EEG: All You Need is a Single Convolutional Layer

    Authors: Md Fahim Anjum

    Abstract: In this work, we introduce LightCNN, a minimalist Convolutional Neural Network (CNN) architecture designed for Parkinson's disease (PD) classification using EEG data. LightCNN's strength lies in its simplicity, utilizing just a single convolutional layer. Embracing Leonardo da Vinci's principle that "simplicity is the ultimate sophistication," LightCNN demonstrates that complexity is not required… ▽ More

    Submitted 19 August, 2024; originally announced August 2024.

    Comments: 10 pages, 5 figures

  6. arXiv:2408.07292  [pdf, other

    cs.LG cs.AI eess.SP

    LiPCoT: Linear Predictive Coding based Tokenizer for Self-supervised Learning of Time Series Data via Language Models

    Authors: Md Fahim Anjum

    Abstract: Language models have achieved remarkable success in various natural language processing tasks. However, their application to time series data, a crucial component in many domains, remains limited. This paper proposes LiPCoT (Linear Predictive Coding based Tokenizer for time series), a novel tokenizer that encodes time series data into a sequence of tokens, enabling self-supervised learning of time… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

    Comments: 17 pages, 5 figures

  7. arXiv:2408.02961  [pdf, ps, other

    cs.NE cs.LG

    Synaptic Modulation using Interspike Intervals Increases Energy Efficiency of Spiking Neural Networks

    Authors: Dylan Adams, Magda Zajaczkowska, Ashiq Anjum, Andrea Soltoggio, Shirin Dora

    Abstract: Despite basic differences between Spiking Neural Networks (SNN) and Artificial Neural Networks (ANN), most research on SNNs involve adapting ANN-based methods for SNNs. Pruning (dropping connections) and quantization (reducing precision) are often used to improve energy efficiency of SNNs. These methods are very effective for ANNs whose energy needs are determined by signals transmitted on synapse… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: 9 pages, 3 figures

  8. arXiv:2408.01008  [pdf, other

    cs.LG cs.AI

    Tensor Train Low-rank Approximation (TT-LoRA): Democratizing AI with Accelerated LLMs

    Authors: Afia Anjum, Maksim E. Eren, Ismael Boureima, Boian Alexandrov, Manish Bhattarai

    Abstract: In recent years, Large Language Models (LLMs) have demonstrated remarkable capabilities across a wide range of natural language processing (NLP) tasks, such as question-answering, sentiment analysis, text summarization, and machine translation. However, the ever-growing complexity of LLMs demands immense computational resources, hindering the broader research and application of these models. To ad… ▽ More

    Submitted 2 August, 2024; originally announced August 2024.

    Comments: LA-UR-24-28177

  9. arXiv:2405.20071  [pdf

    physics.med-ph cs.LG

    A Staged Approach using Machine Learning and Uncertainty Quantification to Predict the Risk of Hip Fracture

    Authors: Anjum Shaik, Kristoffer Larsen, Nancy E. Lane, Chen Zhao, Kuan-Jui Su, Joyce H. Keyak, Qing Tian, Qiuying Sha, Hui Shen, Hong-Wen Deng, Weihua Zhou

    Abstract: Despite advancements in medical care, hip fractures impose a significant burden on individuals and healthcare systems. This paper focuses on the prediction of hip fracture risk in older and middle-aged adults, where falls and compromised bone quality are predominant factors. We propose a novel staged model that combines advanced imaging and clinical data to improve predictive performance. By using… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 29 pages, 5 figures, 6 tables

  10. arXiv:2405.03643  [pdf, other

    cs.CV

    Collecting Consistently High Quality Object Tracks with Minimal Human Involvement by Using Self-Supervised Learning to Detect Tracker Errors

    Authors: Samreen Anjum, Suyog Jain, Danna Gurari

    Abstract: We propose a hybrid framework for consistently producing high-quality object tracks by combining an automated object tracker with little human input. The key idea is to tailor a module for each dataset to intelligently decide when an object tracker is failing and so humans should be brought in to re-localize an object for continued tracking. Our approach leverages self-supervised learning on unlab… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  11. arXiv:2403.02454  [pdf, other

    cs.AI

    The Ink Splotch Effect: A Case Study on ChatGPT as a Co-Creative Game Designer

    Authors: Asad Anjum, Yuting Li, Noelle Law, M Charity, Julian Togelius

    Abstract: This paper studies how large language models (LLMs) can act as effective, high-level creative collaborators and ``muses'' for game design. We model the design of this study after the exercises artists use by looking at amorphous ink splotches for creative inspiration. Our goal is to determine whether AI-assistance can improve, hinder, or provide an alternative quality to games when compared to the… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 12 pages

  12. arXiv:2312.08748  [pdf, other

    cs.DC cs.ET cs.NE quant-ph

    All-to-all reconfigurability with sparse and higher-order Ising machines

    Authors: Srijan Nikhar, Sidharth Kannan, Navid Anjum Aadit, Shuvro Chowdhury, Kerem Y. Camsari

    Abstract: Domain-specific hardware to solve computationally hard optimization problems has generated tremendous excitement. Here, we evaluate probabilistic bit (p-bit) based Ising Machines (IM) on the 3-regular 3-Exclusive OR Satisfiability (3R3X), as a representative hard optimization problem. We first introduce a multiplexed architecture that emulates all-to-all network functionality while maintaining hig… ▽ More

    Submitted 26 September, 2024; v1 submitted 21 November, 2023; originally announced December 2023.

    Comments: S.N, S. K, N.A.A are equally contributing first authors

    Journal ref: Nature Communications (2024)

  13. arXiv:2311.14464  [pdf, other

    cs.LG cs.CE physics.flu-dyn

    Finite Volume Features, Global Geometry Representations, and Residual Training for Deep Learning-based CFD Simulation

    Authors: Loh Sher En Jessica, Naheed Anjum Arafat, Wei Xian Lim, Wai Lee Chan, Adams Wai Kin Kong

    Abstract: Computational fluid dynamics (CFD) simulation is an irreplaceable modelling step in many engineering designs, but it is often computationally expensive. Some graph neural network (GNN)-based CFD methods have been proposed. However, the current methods inherit the weakness of traditional numerical simulators, as well as ignore the cell characteristics in the mesh used in the finite volume method, a… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  14. arXiv:2311.14012  [pdf, other

    cs.CV

    Shadow: A Novel Loss Function for Efficient Training in Siamese Networks

    Authors: Alif Elham Khan, Mohammad Junayed Hasan, Humayra Anjum, Nabeel Mohammed

    Abstract: Despite significant recent advances in similarity detection tasks, existing approaches pose substantial challenges under memory constraints. One of the primary reasons for this is the use of computationally expensive metric learning loss functions such as Triplet Loss in Siamese networks. In this paper, we present a novel loss function called Shadow Loss that compresses the dimensions of an embedd… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  15. BLP-2023 Task 2: Sentiment Analysis

    Authors: Md. Arid Hasan, Firoj Alam, Anika Anjum, Shudipta Das, Afiyat Anjum

    Abstract: We present an overview of the BLP Sentiment Shared Task, organized as part of the inaugural BLP 2023 workshop, co-located with EMNLP 2023. The task is defined as the detection of sentiment in a given piece of social media text. This task attracted interest from 71 participants, among whom 29 and 30 teams submitted systems during the development and evaluation phases, respectively. In total, partic… ▽ More

    Submitted 21 February, 2024; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: Accepted in BLP Workshop at EMNLP-23

    ACM Class: I.2.7

  16. arXiv:2310.06847  [pdf, other

    cs.CV cs.LG eess.IV

    Performance Analysis of Various EfficientNet Based U-Net++ Architecture for Automatic Building Extraction from High Resolution Satellite Images

    Authors: Tareque Bashar Ovi, Nomaiya Bashree, Protik Mukherjee, Shakil Mosharrof, Masuma Anjum Parthima

    Abstract: Building extraction is an essential component of study in the science of remote sensing, and applications for building extraction heavily rely on semantic segmentation of high-resolution remote sensing imagery. Semantic information extraction gap constraints in the present deep learning based approaches, however can result in inadequate segmentation outcomes. To address this issue and extract buil… ▽ More

    Submitted 5 September, 2023; originally announced October 2023.

    Comments: 12 Pages,Keywords: Deep learning,satellite image,transfer learning,segmentation,deep supervision

  17. arXiv:2308.11662  [pdf, other

    cs.CV

    VQA Therapy: Exploring Answer Differences by Visually Grounding Answers

    Authors: Chongyan Chen, Samreen Anjum, Danna Gurari

    Abstract: Visual question answering is a task of predicting the answer to a question about an image. Given that different people can provide different answers to a visual question, we aim to better understand why with answer groundings. We introduce the first dataset that visually grounds each unique answer to each visual question, which we call VQAAnswerTherapy. We then propose two novel problems of predic… ▽ More

    Submitted 24 August, 2023; v1 submitted 21 August, 2023; originally announced August 2023.

    Comments: IEEE/CVF International Conference on Computer Vision

  18. arXiv:2308.10783  [pdf, other

    cs.CL cs.LG

    Zero- and Few-Shot Prompting with LLMs: A Comparative Study with Fine-tuned Models for Bangla Sentiment Analysis

    Authors: Md. Arid Hasan, Shudipta Das, Afiyat Anjum, Firoj Alam, Anika Anjum, Avijit Sarker, Sheak Rashed Haider Noori

    Abstract: The rapid expansion of the digital world has propelled sentiment analysis into a critical tool across diverse sectors such as marketing, politics, customer service, and healthcare. While there have been significant advancements in sentiment analysis for widely spoken languages, low-resource languages, such as Bangla, remain largely under-researched due to resource constraints. Furthermore, the rec… ▽ More

    Submitted 4 April, 2024; v1 submitted 21 August, 2023; originally announced August 2023.

    Comments: Accepted at LREC-COLING 2024. Zero-Shot Prompting, Few-Shot Prompting, LLMs, Comparative Study, Fine-tuned Models, Bangla, Sentiment Analysis

    MSC Class: 68T50 ACM Class: I.2.7

  19. arXiv:2306.11884  [pdf, other

    cs.CR cs.CY cs.DB cs.DC

    Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures

    Authors: Bilash Saha, Md Mehedi Hasan, Nafisa Anjum, Sharaban Tahora, Aiasha Siddika, Hossain Shahriar

    Abstract: Blockchain technology transformed the digital sphere by providing a transparent, secure, and decentralized platform for data security across a range of industries, including cryptocurrencies and supply chain management. Blockchain's integrity and dependability have been jeopardized by the rising number of security threats, which have attracted cybercriminals as a target. By summarizing suggested f… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: Submitted to BSTIA 2023 (Book - Blockchain and Smart-Contract Technologies for Innovative Applications)

  20. Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms

    Authors: Mst Shapna Akter, Md Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea

    Abstract: The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software development processes lead to vulnerabilities in software products targeting downstream customers and even involved stakeholders. Machine Learning approaches are proven in detecting… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  21. arXiv:2306.02449  [pdf, other

    cs.LG

    The Power Of Simplicity: Why Simple Linear Models Outperform Complex Machine Learning Techniques -- Case Of Breast Cancer Diagnosis

    Authors: Muhammad Arbab Arshad, Sakib Shahriar, Khizar Anjum

    Abstract: This research paper investigates the effectiveness of simple linear models versus complex machine learning techniques in breast cancer diagnosis, emphasizing the importance of interpretability and computational efficiency in the medical domain. We focus on Logistic Regression (LR), Decision Trees (DT), and Support Vector Machines (SVM) and optimize their performance using the UCI Machine Learning… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

    Comments: 15 pages, 6 figures, conference or journal

  22. arXiv:2306.00421  [pdf, other

    eess.IV cs.CV cs.LG

    Introduction to Medical Imaging Informatics

    Authors: Md. Zihad Bin Jahangir, Ruksat Hossain, Riadul Islam, MD Abdullah Al Nasim, Md. Mahim Anjum Haque, Md Jahangir Alam, Sajedul Talukder

    Abstract: Medical imaging informatics is a rapidly growing field that combines the principles of medical imaging and informatics to improve the acquisition, management, and interpretation of medical images. This chapter introduces the basic concepts of medical imaging informatics, including image processing, feature engineering, and machine learning. It also discusses the recent advancements in computer vis… ▽ More

    Submitted 17 June, 2023; v1 submitted 1 June, 2023; originally announced June 2023.

    Comments: 18 pages, 11 figures, 2 tables; Acceptance of the chapter for the Springer book "Data-driven approaches to medical imaging"

  23. arXiv:2304.05949  [pdf, other

    cond-mat.mes-hall cs.AI cs.ET cs.LG

    CMOS + stochastic nanomagnets: heterogeneous computers for probabilistic inference and learning

    Authors: Nihal Sanjay Singh, Keito Kobayashi, Qixuan Cao, Kemal Selcuk, Tianrui Hu, Shaila Niazi, Navid Anjum Aadit, Shun Kanai, Hideo Ohno, Shunsuke Fukami, Kerem Y. Camsari

    Abstract: Extending Moore's law by augmenting complementary-metal-oxide semiconductor (CMOS) transistors with emerging nanotechnologies (X) has become increasingly important. One important class of problems involve sampling-based Monte Carlo algorithms used in probabilistic machine learning, optimization, and quantum simulation. Here, we combine stochastic magnetic tunnel junction (sMTJ)-based probabilistic… ▽ More

    Submitted 23 February, 2024; v1 submitted 12 April, 2023; originally announced April 2023.

    Journal ref: Nature Communications volume 15, Article number: 2685 (2024)

  24. Training Deep Boltzmann Networks with Sparse Ising Machines

    Authors: Shaila Niazi, Navid Anjum Aadit, Masoud Mohseni, Shuvro Chowdhury, Yao Qin, Kerem Y. Camsari

    Abstract: The slowing down of Moore's law has driven the development of unconventional computing paradigms, such as specialized Ising machines tailored to solve combinatorial optimization problems. In this paper, we show a new application domain for probabilistic bit (p-bit) based Ising machines by training deep generative AI models with them. Using sparse, asynchronous, and massively parallel Ising machine… ▽ More

    Submitted 23 January, 2024; v1 submitted 19 March, 2023; originally announced March 2023.

    Journal ref: Nature Electronics (2024)

  25. arXiv:2302.06457  [pdf, other

    cs.ET cs.AR cs.DC cs.NE physics.comp-ph

    A full-stack view of probabilistic computing with p-bits: devices, architectures and algorithms

    Authors: Shuvro Chowdhury, Andrea Grimaldi, Navid Anjum Aadit, Shaila Niazi, Masoud Mohseni, Shun Kanai, Hideo Ohno, Shunsuke Fukami, Luke Theogarajan, Giovanni Finocchio, Supriyo Datta, Kerem Y. Camsari

    Abstract: The transistor celebrated its 75${}^\text{th}$ birthday in 2022. The continued scaling of the transistor defined by Moore's Law continues, albeit at a slower pace. Meanwhile, computing demands and energy consumption required by modern artificial intelligence (AI) algorithms have skyrocketed. As an alternative to scaling transistors for general-purpose computing, the integration of transistors with… ▽ More

    Submitted 16 March, 2023; v1 submitted 13 February, 2023; originally announced February 2023.

    Journal ref: IEEE Journal on Exploratory Solid-State Computational Devices and Circuits (2023)

  26. arXiv:2302.00128  [pdf, other

    cs.SI

    TBAM: Towards An Agent-Based Model to Enrich Twitter Data

    Authors: Usman Anjum, Vladimir Zadorozhny, Prashant Krishnamurthy

    Abstract: Twitter (one example of microblogging) is widely being used by researchers to understand human behavior, specifically how people behave when a significant event occurs and how it changes user microblogging patterns. The changing microblogging behavior can reveal patterns that can help in detecting real-world events. However, the Twitter data that is available has limitations, such as, it is incomp… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

    Journal ref: 18th ISCRAM Conference Proceedings 2021

  27. arXiv:2301.13031  [pdf, other

    cs.LG cs.AI

    BSSAD: Towards A Novel Bayesian State-Space Approach for Anomaly Detection in Multivariate Time Series

    Authors: Usman Anjum, Samuel Lin, Justin Zhan

    Abstract: Detecting anomalies in multivariate time series(MTS) data plays an important role in many domains. The abnormal values could indicate events, medical abnormalities,cyber-attacks, or faulty devices which if left undetected could lead to significant loss of resources, capital, or human lives. In this paper, we propose a novel and innovative approach to anomaly detection called Bayesian State-Space A… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

  28. arXiv:2301.06426  [pdf, other

    cs.SI cs.DS

    Neighborhood-based Hypergraph Core Decomposition

    Authors: Naheed Anjum Arafat, Arijit Khan, Arpit Kumar Rai, Bishwamittra Ghosh

    Abstract: We propose neighborhood-based core decomposition: a novel way of decomposing hypergraphs into hierarchical neighborhood-cohesive subhypergraphs. Alternative approaches to decomposing hypergraphs, e.g., reduction to clique or bipartite graphs, are not meaningful in certain applications, the later also results in inefficient decomposition; while existing degree-based hypergraph decomposition does no… ▽ More

    Submitted 9 April, 2023; v1 submitted 16 January, 2023; originally announced January 2023.

    Comments: accepted in Proceedings of the VLDB Volume 16 (for VLDB 2023)

  29. arXiv:2211.07712  [pdf, other

    cs.CL cs.AI cs.LG

    Cloning Ideology and Style using Deep Learning

    Authors: Omer Beg, Muhammad Nasir Zafar, Waleed Anjum

    Abstract: Text generation tasks have gotten the attention of researchers in the last few years because of their applications on a large scale.In the past, many researchers focused on task-based text generations.Our research focuses on text generation based on the ideology and style of a specific author, and text generation on a topic that was not written by the same author in the past.Our trained model requ… ▽ More

    Submitted 25 October, 2022; originally announced November 2022.

    Comments: 11 pages, 7 figures, 3 tables

  30. arXiv:2211.04194  [pdf, other

    cs.IR cs.AI

    Submission-Aware Reviewer Profiling for Reviewer Recommender System

    Authors: Omer Anjum, Alok Kamatar, Toby Liang, Jinjun Xiong, Wen-mei Hwu

    Abstract: Assigning qualified, unbiased and interested reviewers to paper submissions is vital for maintaining the integrity and quality of the academic publishing system and providing valuable reviews to authors. However, matching thousands of submissions with thousands of potential reviewers within a limited time is a daunting challenge for a conference program committee. Prior efforts based on topic mode… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

  31. arXiv:2211.02138  [pdf, other

    cs.CV

    Book Cover Synthesis from the Summary

    Authors: Emdadul Haque, Md. Faraz Kabir Khan, Mohammad Imrul Jubair, Jarin Anjum, Abrar Zahir Niloy

    Abstract: The cover is the face of a book and is a point of attraction for the readers. Designing book covers is an essential task in the publishing industry. One of the main challenges in creating a book cover is representing the theme of the book's content in a single image. In this research, we explore ways to produce a book cover using artificial intelligence based on the fact that there exists a relati… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: Accepted as a full paper in AICCSA2022 (19th ACS/IEEE International Conference on Computer Systems and Applications)

  32. arXiv:2210.13336  [pdf, other

    eess.IV cs.CV cs.LG

    Brain Tumor Segmentation using Enhanced U-Net Model with Empirical Analysis

    Authors: MD Abdullah Al Nasim, Abdullah Al Munem, Maksuda Islam, Md Aminul Haque Palash, MD. Mahim Anjum Haque, Faisal Muhammad Shah

    Abstract: Cancer of the brain is deadly and requires careful surgical segmentation. The brain tumors were segmented using U-Net using a Convolutional Neural Network (CNN). When looking for overlaps of necrotic, edematous, growing, and healthy tissue, it might be hard to get relevant information from the images. The 2D U-Net network was improved and trained with the BraTS datasets to find these four areas. U… ▽ More

    Submitted 15 January, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

    Comments: 5 tables, 4 figures, 5 equations

  33. arXiv:2208.10300  [pdf, ps, other

    cs.LG cs.AI

    Efficient Utility Function Learning for Multi-Objective Parameter Optimization with Prior Knowledge

    Authors: Farha A. Khan, Jörg P. Dietrich, Christian Wirth

    Abstract: The current state-of-the-art in multi-objective optimization assumes either a given utility function, learns a utility function interactively or tries to determine the complete Pareto front, requiring a post elicitation of the preferred result. However, result elicitation in real world problems is often based on implicit and explicit expert knowledge, making it difficult to define a utility functi… ▽ More

    Submitted 25 April, 2023; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: 16 pages

  34. arXiv:2208.07955  [pdf

    cs.IR

    The least-used key selection method for information retrieval in large-scale Cloud-based service repositories

    Authors: Jiayan Gu, Ashiq Anjum, Yan Wu, Lu Liu, John Panneerselvam, Yao Lu, Bo Yuan

    Abstract: As the number of devices connected to the Internet of Things (IoT) increases significantly, it leads to an exponential growth in the number of services that need to be processed and stored in the large-scale Cloud-based service repositories. An efficient service indexing model is critical for service retrieval and management of large-scale Cloud-based service repositories. The multilevel index mod… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  35. arXiv:2208.07399  [pdf, other

    cs.IR cs.AI

    A Survey of Recommender System Techniques and the Ecommerce Domain

    Authors: Imran Hossain, Md Aminul Haque Palash, Anika Tabassum Sejuty, Noor A Tanjim, MD Abdullah AL Nasim, Sarwar Saif, Abu Bokor Suraj, Md Mahim Anjum Haque, Nazmul Karim

    Abstract: In this big data era, it is hard for the current generation to find the right data from the huge amount of data contained within online platforms. In such a situation, there is a need for an information filtering system that might help them find the information they are looking for. In recent years, a research field has emerged known as recommender systems. Recommenders have become important as th… ▽ More

    Submitted 21 February, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

    Comments: 22 pages, 13 figures

  36. arXiv:2208.04836  [pdf

    cs.NI cs.CR

    Non-Fungible Tokens in Business and Management -- A Review

    Authors: Najam A. Anjum, Mubashir Husain Rehmani

    Abstract: Non-Fungible Tokens (NFTs) are a new development in blockchain technology. News around NFTs is surrounded by skepticism because unrealistically high prices are being paid online for these NFTs which are in the form of apparently simple digital arts and photographs. It is not clear if this is a trend, a hype, a bubble, or a legitimate novel way of holding and trading value. A literature review of p… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: This is an author version of our paper submitted to a journal

  37. arXiv:2208.02222  [pdf

    cs.LG cs.AI cs.CY eess.SP

    Blockchain associated machine learning and IoT based hypoglycemia detection system with auto-injection feature

    Authors: Rahnuma Mahzabin, Fahim Hossain Sifat, Sadia Anjum, Al-Akhir Nayan, Muhammad Golam Kibria

    Abstract: Hypoglycemia is an unpleasant phenomenon caused by low blood glucose. The disease can lead a person to death or a high level of body damage. To avoid significant damage, patients need sugar. The research aims at implementing an automatic system to detect hypoglycemia and perform automatic sugar injections to save a life. Receiving the benefits of the internet of things (IoT), the sensor data was t… ▽ More

    Submitted 26 July, 2022; originally announced August 2022.

    Journal ref: Indonesian Journal of Electrical Engineering and Computer Science, Vol. 27, No. 1, pp. 447-455, July 2022

  38. Optimization of Temperature and Relative Humidity in an Automatic Egg Incubator Using Mamdani Interference System

    Authors: Pramit Dutta, Nafisa Anjum

    Abstract: Temperature and humidity are two of the rudimentary factors that must be controlled during egg incubation. Improper temperature and humidity levels during the incubation period often result in unwanted conditions. This paper proposes the design of an efficient Mamdani fuzzy interference system instead of the widely used Takagi-Sugeno system in this field for controlling the temperature and humidit… ▽ More

    Submitted 17 June, 2022; originally announced July 2022.

    Comments: 5 pages, 13 figures, 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh

    Journal ref: 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh, 2021, pp. 12-16

  39. Identifying Counterfeit Products using Blockchain Technology in Supply Chain System

    Authors: Nafisa Anjum, Pramit Dutta

    Abstract: With the advent of globalization and the evergrowing rate of technology, the volume of production as well as ease of procuring counterfeit goods has become unprecedented. Be it food, drug or luxury items, all kinds of industrial manufacturers and distributors are now seeking greater transparency in supply chain operations with a view to deter counterfeiting. This paper introduces a decentralized B… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)

    Journal ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5

  40. COVID-19 Detection using Transfer Learning with Convolutional Neural Network

    Authors: Pramit Dutta, Tanny Roy, Nafisa Anjum

    Abstract: The Novel Coronavirus disease 2019 (COVID-19) is a fatal infectious disease, first recognized in December 2019 in Wuhan, Hubei, China, and has gone on an epidemic situation. Under these circumstances, it became more important to detect COVID-19 in infected people. Nowadays, the testing kits are gradually lessening in number compared to the number of infected population. Under recent prevailing con… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: 4 pages, 4 figures, 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh

    Journal ref: 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh, 2021, pp. 429-432

  41. arXiv:2206.07796  [pdf, other

    cs.SE cs.LG

    FixEval: Execution-based Evaluation of Program Fixes for Programming Problems

    Authors: Md Mahim Anjum Haque, Wasi Uddin Ahmad, Ismini Lourentzou, Chris Brown

    Abstract: The complexity of modern software has led to a drastic increase in the time and cost associated with detecting and rectifying software bugs. In response, researchers have explored various methods to automatically generate fixes for buggy code. However, due to the large combinatorial space of possible fixes for any given bug, few tools and datasets are available to evaluate model-generated fixes ef… ▽ More

    Submitted 30 March, 2023; v1 submitted 15 June, 2022; originally announced June 2022.

  42. arXiv:2206.06300  [pdf

    cs.CY

    Internet of Things (IoT) based Smart Agriculture Aiming to Achieve Sustainable Goals

    Authors: Dewan Md Nur Anjum Ashir, Md. Taimur Ahad, Manosh Talukder, Tahsinur Rahman

    Abstract: Despite the fact, a handful of scholars have endorsed the Internet of Things (IoT) as an effective transformative tool for shifting traditional farming to smart farming, relatively little study has addressed the enabling role of smart agriculture in achieving sustainable agriculture and green climate. Researchers are more focused on technological invention and model introduction rather than discus… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: 18 pages and 9 figures

  43. arXiv:2205.07402  [pdf, other

    cs.AR cs.DC cs.ET cs.NE physics.comp-ph

    Physics-inspired Ising Computing with Ring Oscillator Activated p-bits

    Authors: Navid Anjum Aadit, Andrea Grimaldi, Giovanni Finocchio, Kerem Y. Camsari

    Abstract: The nearing end of Moore's Law has been driving the development of domain-specific hardware tailored to solve a special set of problems. Along these lines, probabilistic computing with inherently stochastic building blocks (p-bits) have shown significant promise, particularly in the context of hard optimization and statistical sampling problems. p-bits have been proposed and demonstrated in differ… ▽ More

    Submitted 15 May, 2022; originally announced May 2022.

    Comments: To appear in the 22nd IEEE International Conference on Nanotechnology (IEEE-NANO 2022)

    Journal ref: 2022 IEEE 22nd International Conference on Nanotechnology (NANO)

  44. arXiv:2202.01993  [pdf, other

    cs.CV cs.CL

    Grounding Answers for Visual Questions Asked by Visually Impaired People

    Authors: Chongyan Chen, Samreen Anjum, Danna Gurari

    Abstract: Visual question answering is the task of answering questions about images. We introduce the VizWiz-VQA-Grounding dataset, the first dataset that visually grounds answers to visual questions asked by people with visual impairments. We analyze our dataset and compare it with five VQA-Grounding datasets to demonstrate what makes it similar and different. We then evaluate the SOTA VQA and VQA-Groundin… ▽ More

    Submitted 8 April, 2022; v1 submitted 4 February, 2022; originally announced February 2022.

    Comments: Computer Vision and Pattern Recognition

  45. ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

    Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin

    Abstract: We present ANUBIS, a highly effective machine learning-based APT detection system. Our design philosophy for ANUBIS involves two principal components. Firstly, we intend ANUBIS to be effectively utilized by cyber-response teams. Therefore, prediction explainability is one of the main focuses of ANUBIS design. Secondly, ANUBIS uses system provenance graphs to capture causality and thereby achieve h… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: Accepted for publication in the 37th ACM SIGAPP Symposium on Applied Computing (SAC 2022)

  46. arXiv:2112.09544  [pdf

    cs.CY

    It's Time to Do Something: Mitigating the Negative Impacts of Computing Through a Change to the Peer Review Process

    Authors: Brent Hecht, Lauren Wilcox, Jeffrey P. Bigham, Johannes Schöning, Ehsan Hoque, Jason Ernst, Yonatan Bisk, Luigi De Russis, Lana Yarosh, Bushra Anjum, Danish Contractor, Cathy Wu

    Abstract: The computing research community needs to work much harder to address the downsides of our innovations. Between the erosion of privacy, threats to democracy, and automation's effect on employment (among many other issues), we can no longer simply assume that our research will have a net positive impact on the world. While bending the arc of computing innovation towards societal benefit may at firs… ▽ More

    Submitted 17 December, 2021; originally announced December 2021.

    Comments: First published on the ACM Future of Computing Academy blog on March 29, 2018. This is the archival version

  47. Digital Twinning Remote Laboratories for Online Practical Learning

    Authors: Claire Palmer, Ben Roullier, Muhammad Aamir, Frank McQuade, Leonardo Stella, Ashiq Anjum

    Abstract: The COVID19 pandemic has demonstrated a need for remote learning and virtual learning applications such as virtual reality (VR) and tablet-based solutions. Creating complex learning scenarios by developers is highly time-consuming and can take over a year. It is also costly to employ teams of system analysts, developers and 3D artists. There is a requirement to provide a simple method to enable le… ▽ More

    Submitted 21 July, 2022; v1 submitted 1 December, 2021; originally announced December 2021.

    Comments: 56 pages, 14 figures. arXiv admin note: text overlap with arXiv:2106.09344. Added version accepted for publication

    Journal ref: Production and Manufacturing Research, 20(1), 519-545 (2022)

  48. arXiv:2111.09537  [pdf, other

    cs.LG cs.AI

    The Prominence of Artificial Intelligence in COVID-19

    Authors: MD Abdullah Al Nasim, Aditi Dhali, Faria Afrin, Noshin Tasnim Zaman, Nazmul Karimm, Md Mahim Anjum Haque

    Abstract: In December 2019, a novel virus called COVID-19 had caused an enormous number of causalities to date. The battle with the novel Coronavirus is baffling and horrifying after the Spanish Flu 2019. While the front-line doctors and medical researchers have made significant progress in controlling the spread of the highly contiguous virus, technology has also proved its significance in the battle. More… ▽ More

    Submitted 29 March, 2023; v1 submitted 18 November, 2021; originally announced November 2021.

    Comments: 63 pages, 3 tables, 17 figures

  49. arXiv:2111.03952  [pdf, other

    cs.CV cs.LG cs.NE

    CALText: Contextual Attention Localization for Offline Handwritten Text

    Authors: Tayaba Anjum, Nazar Khan

    Abstract: Recognition of Arabic-like scripts such as Persian and Urdu is more challenging than Latin-based scripts. This is due to the presence of a two-dimensional structure, context-dependent character shapes, spaces and overlaps, and placement of diacritics. Not much research exists for offline handwritten Urdu script which is the 10th most spoken language in the world. We present an attention based enco… ▽ More

    Submitted 6 November, 2021; originally announced November 2021.

    Comments: 25 pages, 15 figures and 6 tables

    MSC Class: 68T07 (Primary); 68U10 (Secondary) ACM Class: I.2.6; I.7.5

  50. arXiv:2110.08662  [pdf, other

    cs.CR

    An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification

    Authors: Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Zainal, Inshirah Idris, Anjum Nazir, Fatin Elhaj, Tasneem Darwish

    Abstract: A Network Intrusion Detection System (NIDS) is a network security technology for detecting intruder attacks. However, it produces a great amount of low-level alerts which makes the analysis difficult, especially to construct the attack scenarios. Attack scenario construction (ASC) via Alert Correlation (AC) is important to reveal the strategy of attack in terms of steps and stages that need to be… ▽ More

    Submitted 16 October, 2021; originally announced October 2021.