-
A New Horizon of Data Communication through Quantum Entanglement
Authors:
S. M. Rashadul Islam,
Md Manirul Islam,
Umme Salsabil
Abstract:
By the blessing of our existing data communication system, we can communicate or share our information with each other in every nook and corner of the world within some few seconds but there are some limitations in our traditional data communication system. Every day we are trying to overcome these limitations and improve our systems for better performance. Among them some problems may not be reso…
▽ More
By the blessing of our existing data communication system, we can communicate or share our information with each other in every nook and corner of the world within some few seconds but there are some limitations in our traditional data communication system. Every day we are trying to overcome these limitations and improve our systems for better performance. Among them some problems may not be resolvable, for the reason of very basic or root dependencies of physics. In this paper, we have clarified some main drawbacks in our traditional communication system and provided a conceptual model to overcome these issues by using mystic Quantum Entanglement theorem rather than classical or modern physics phenomenon. In the end, we introduced a possible Quantum circuit diagram and Quantum network architecture for end-to-end data communication. It is predicted that through this hypothetical model data can be transmitted faster than light and it will be 100% real time between any distances without any kinds of traditional communication medium that are being used to date.
△ Less
Submitted 31 July, 2024;
originally announced August 2024.
-
Exploring Bengali Religious Dialect Biases in Large Language Models with Evaluation Perspectives
Authors:
Azmine Toushik Wasi,
Raima Islam,
Mst Rafia Islam,
Taki Hasan Rafi,
Dong-Kyu Chae
Abstract:
While Large Language Models (LLM) have created a massive technological impact in the past decade, allowing for human-enabled applications, they can produce output that contains stereotypes and biases, especially when using low-resource languages. This can be of great ethical concern when dealing with sensitive topics such as religion. As a means toward making LLMS more fair, we explore bias from a…
▽ More
While Large Language Models (LLM) have created a massive technological impact in the past decade, allowing for human-enabled applications, they can produce output that contains stereotypes and biases, especially when using low-resource languages. This can be of great ethical concern when dealing with sensitive topics such as religion. As a means toward making LLMS more fair, we explore bias from a religious perspective in Bengali, focusing specifically on two main religious dialects: Hindu and Muslim-majority dialects. Here, we perform different experiments and audit showing the comparative analysis of different sentences using three commonly used LLMs: ChatGPT, Gemini, and Microsoft Copilot, pertaining to the Hindu and Muslim dialects of specific words and showcasing which ones catch the social biases and which do not. Furthermore, we analyze our findings and relate them to potential reasons and evaluation perspectives, considering their global impact with over 300 million speakers worldwide. With this work, we hope to establish the rigor for creating more fairness in LLMs, as these are widely used as creative writing agents.
△ Less
Submitted 25 July, 2024;
originally announced July 2024.
-
Impacts of National Cultures on Managerial Decisions of Engaging in Core Earnings Management
Authors:
Muhammad Rofiqul Islam,
Abdullah Al Mehdi
Abstract:
This study investigates the impact of Hofstede's cultural dimensions on abnormal core earnings management in multiple national cultural contexts. We employ an Ordinary Least Squares (OLS) regression model with abnormal core earnings as the dependent variable. The independent variables analyzed include Hofstede's dimensions: Power Distance Index (PDI), Individualism (IDV), Masculinity (MAS), and Un…
▽ More
This study investigates the impact of Hofstede's cultural dimensions on abnormal core earnings management in multiple national cultural contexts. We employ an Ordinary Least Squares (OLS) regression model with abnormal core earnings as the dependent variable. The independent variables analyzed include Hofstede's dimensions: Power Distance Index (PDI), Individualism (IDV), Masculinity (MAS), and Uncertainty Avoidance Index (UAI). Our findings reveal that individualism is positively associated with abnormal core earnings, suggesting that cultures characterized by high individualism may encourage practices that inflate earnings due to the prominence of personal achievement and rewards. In contrast, masculinity negatively correlates with abnormal core earnings, indicating that the risk-taking attributes associated with masculine cultures may deter earnings management. Interestingly, uncertainty avoidance is positively linked to abnormal core earnings, supporting the notion that managers tend to engage more in earnings management to minimize fluctuations in financial reports in cultures with high uncertainty avoidance. The relationship between power distance and abnormal core earnings is found to be non-significant, indicating no substantial effect in this context. These findings contribute to the literature on cultural influences in financial reporting, providing valuable insights for policymakers and multinational firms concerning the cultural contexts within which financial decisions and reporting occur.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Bridging Climate Awareness and Sustainable Entrepreneurship: A Conceptual Framework Based on the Theory of Planned Behavior
Authors:
Muhammad Rofiqul Islam,
Abdullah Al Mehdi
Abstract:
Many studies have examined the connection between the intention to start a business and environmental values. However, there still needs to be more knowledge in the extant literature about how climate change campaigns influence sustainable entrepreneurial intention. This study uses the Theory of Planned Behavior (TPB) to develop a theoretical framework to explain how climate change campaigns affec…
▽ More
Many studies have examined the connection between the intention to start a business and environmental values. However, there still needs to be more knowledge in the extant literature about how climate change campaigns influence sustainable entrepreneurial intention. This study uses the Theory of Planned Behavior (TPB) to develop a theoretical framework to explain how climate change campaigns affect the intention to start a sustainable business. This interdisciplinary conceptual research model bridges the gap between climate awareness, sustainable values, and entrepreneurial intentions, offering a robust framework for understanding and fostering sustainable entrepreneurial behaviors. Our study lays the groundwork for future empirical studies and real-world interventions to advance sustainability through entrepreneurship.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Enhancing Semantic Segmentation with Adaptive Focal Loss: A Novel Approach
Authors:
Md Rakibul Islam,
Riad Hassan,
Abdullah Nazib,
Kien Nguyen,
Clinton Fookes,
Md Zahidul Islam
Abstract:
Deep learning has achieved outstanding accuracy in medical image segmentation, particularly for objects like organs or tumors with smooth boundaries or large sizes. Whereas, it encounters significant difficulties with objects that have zigzag boundaries or are small in size, leading to a notable decrease in segmentation effectiveness. In this context, using a loss function that incorporates smooth…
▽ More
Deep learning has achieved outstanding accuracy in medical image segmentation, particularly for objects like organs or tumors with smooth boundaries or large sizes. Whereas, it encounters significant difficulties with objects that have zigzag boundaries or are small in size, leading to a notable decrease in segmentation effectiveness. In this context, using a loss function that incorporates smoothness and volume information into a model's predictions offers a promising solution to these shortcomings. In this work, we introduce an Adaptive Focal Loss (A-FL) function designed to mitigate class imbalance by down-weighting the loss for easy examples that results in up-weighting the loss for hard examples and giving greater emphasis to challenging examples, such as small and irregularly shaped objects. The proposed A-FL involves dynamically adjusting a focusing parameter based on an object's surface smoothness, size information, and adjusting the class balancing parameter based on the ratio of targeted area to total area in an image. We evaluated the performance of the A-FL using ResNet50-encoded U-Net architecture on the Picai 2022 and BraTS 2018 datasets. On the Picai 2022 dataset, the A-FL achieved an Intersection over Union (IoU) of 0.696 and a Dice Similarity Coefficient (DSC) of 0.769, outperforming the regular Focal Loss (FL) by 5.5% and 5.4% respectively. It also surpassed the best baseline Dice-Focal by 2.0% and 1.2%. On the BraTS 2018 dataset, A-FL achieved an IoU of 0.883 and a DSC of 0.931. The comparative studies show that the proposed A-FL function surpasses conventional methods, including Dice Loss, Focal Loss, and their hybrid variants, in IoU, DSC, Sensitivity, and Specificity metrics. This work highlights A-FL's potential to improve deep learning models for segmenting clinically significant regions in medical images, leading to more precise and reliable diagnostic tools.
△ Less
Submitted 13 July, 2024;
originally announced July 2024.
-
Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol
Authors:
Md Ruman Islam,
Raja Hasnain Anwar,
Spyridon Mastorakis,
Muhammad Taqi Raza
Abstract:
Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key…
▽ More
Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key idea lies in observing the 5G physical and MAC layer interactions over time that reveal the application's behavior. The MAC layer receives the data from the application and requests the network to assign the radio resource blocks. The network assigns the radio resources as per application requirements, such as priority, Quality of Service (QoS) needs, amount of data to be transmitted, and buffer size. The adversary can passively observe the radio resources to fingerprint the applications. We empirically demonstrate this attack by considering four different categories of applications: online shopping, voice/video conferencing, video streaming, and Over-The-Top (OTT) media platforms. Finally, we have also demonstrated that an attacker can differentiate various types of applications in real-time within each category.
△ Less
Submitted 20 July, 2024; v1 submitted 10 July, 2024;
originally announced July 2024.
-
Parallel Computing Architectures for Robotic Applications: A Comprehensive Review
Authors:
Md Rafid Islam
Abstract:
With the growing complexity and capability of contemporary robotic systems, the necessity of sophisticated computing solutions to efficiently handle tasks such as real-time processing, sensor integration, decision-making, and control algorithms is also increasing. Conventional serial computing frequently fails to meet these requirements, underscoring the necessity for high-performance computing al…
▽ More
With the growing complexity and capability of contemporary robotic systems, the necessity of sophisticated computing solutions to efficiently handle tasks such as real-time processing, sensor integration, decision-making, and control algorithms is also increasing. Conventional serial computing frequently fails to meet these requirements, underscoring the necessity for high-performance computing alternatives. Parallel computing, the utilization of several processing elements simultaneously to solve computational problems, offers a possible answer. Various parallel computing designs, such as multi-core CPUs, GPUs, FPGAs, and distributed systems, provide substantial enhancements in processing capacity and efficiency. By utilizing these architectures, robotic systems can attain improved performance in functionalities such as real-time image processing, sensor fusion, and path planning. The transformative potential of parallel computing architectures in advancing robotic technology has been underscored, real-life case studies of these architectures in the robotics field have been discussed, and comparisons are presented. Challenges pertaining to these architectures have been explored, and possible solutions have been mentioned for further research and enhancement of the robotic applications.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
Identification of cross-frequency interactions in compressible cavity flow using harmonic resolvent analysis
Authors:
Md Rashidul Islam,
Yiyang Sun
Abstract:
The resolvent analysis reveals the worst-case disturbances and the most amplified response in a fluid flow that can develop around a stationary base state. The recent work by Padovan et al.(2020) extended the classical resolvent analysis to the harmonic resolvent analysis framework by incorporating the time-varying nature of the base flow. The harmonic resolvent analysis can capture the triadic in…
▽ More
The resolvent analysis reveals the worst-case disturbances and the most amplified response in a fluid flow that can develop around a stationary base state. The recent work by Padovan et al.(2020) extended the classical resolvent analysis to the harmonic resolvent analysis framework by incorporating the time-varying nature of the base flow. The harmonic resolvent analysis can capture the triadic interactions between perturbations at two different frequencies through a base flow at a particular frequency. The singular values of the harmonic resolvent operator act as a gain between the spatio-temporal forcing and the response provided by the singular vectors. In the current study, we formulate the harmonic resolvent analysis framework for compressible flows based on the linearized Navier-Stokes equation (i.e., operator-based formulation). We validate our approach by applying the technique to the low-mach number flow past an airfoil. We further illustrate the application of this method to compressible cavity flows at Mach numbers of 0.6 and 0.8 with a length-to-depth ratio of $2$. For the cavity flow at Mach number of 0.6, the harmonic resolvent analysis reveals that the nonlinear cross-frequency interactions dominate the amplification of perturbations at frequencies that are harmonics of the leading Rossiter mode in the nonlinear flow. The findings demonstrate a physically consistent representation of an energy transfer from slow-evolving modes toward fast-evolving modes in the flow through cross-frequency interactions. For the cavity flow at Mach number of 0.8, the analysis also sheds light on the nature of cross-frequency interaction in a cavity flow with two coexisting resonances.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Sentiment Polarity Analysis of Bangla Food Reviews Using Machine and Deep Learning Algorithms
Authors:
Al Amin,
Anik Sarkar,
Md Mahamodul Islam,
Asif Ahammad Miazee,
Md Robiul Islam,
Md Mahmudul Hoque
Abstract:
The Internet has become an essential tool for people in the modern world. Humans, like all living organisms, have essential requirements for survival. These include access to atmospheric oxygen, potable water, protective shelter, and sustenance. The constant flux of the world is making our existence less complicated. A significant portion of the population utilizes online food ordering services to…
▽ More
The Internet has become an essential tool for people in the modern world. Humans, like all living organisms, have essential requirements for survival. These include access to atmospheric oxygen, potable water, protective shelter, and sustenance. The constant flux of the world is making our existence less complicated. A significant portion of the population utilizes online food ordering services to have meals delivered to their residences. Although there are numerous methods for ordering food, customers sometimes experience disappointment with the food they receive. Our endeavor was to establish a model that could determine if food is of good or poor quality. We compiled an extensive dataset of over 1484 online reviews from prominent food ordering platforms, including Food Panda and HungryNaki. Leveraging the collected data, a rigorous assessment of various deep learning and machine learning techniques was performed to determine the most accurate approach for predicting food quality. Out of all the algorithms evaluated, logistic regression emerged as the most accurate, achieving an impressive 90.91% accuracy. The review offers valuable insights that will guide the user in deciding whether or not to order the food.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Enhancing Bangla Language Next Word Prediction and Sentence Completion through Extended RNN with Bi-LSTM Model On N-gram Language
Authors:
Md Robiul Islam,
Al Amin,
Aniqua Nusrat Zereen
Abstract:
Texting stands out as the most prominent form of communication worldwide. Individual spend significant amount of time writing whole texts to send emails or write something on social media, which is time consuming in this modern era. Word prediction and sentence completion will be suitable and appropriate in the Bangla language to make textual information easier and more convenient. This paper expa…
▽ More
Texting stands out as the most prominent form of communication worldwide. Individual spend significant amount of time writing whole texts to send emails or write something on social media, which is time consuming in this modern era. Word prediction and sentence completion will be suitable and appropriate in the Bangla language to make textual information easier and more convenient. This paper expands the scope of Bangla language processing by introducing a Bi-LSTM model that effectively handles Bangla next-word prediction and Bangla sentence generation, demonstrating its versatility and potential impact. We proposed a new Bi-LSTM model to predict a following word and complete a sentence. We constructed a corpus dataset from various news portals, including bdnews24, BBC News Bangla, and Prothom Alo. The proposed approach achieved superior results in word prediction, reaching 99\% accuracy for both 4-gram and 5-gram word predictions. Moreover, it demonstrated significant improvement over existing methods, achieving 35\%, 75\%, and 95\% accuracy for uni-gram, bi-gram, and tri-gram word prediction, respectively
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
PhishGuard: A Convolutional Neural Network Based Model for Detecting Phishing URLs with Explainability Analysis
Authors:
Md Robiul Islam,
Md Mahamodul Islam,
Mst. Suraiya Afrin,
Anika Antara,
Nujhat Tabassum,
Al Amin
Abstract:
Cybersecurity is one of the global issues because of the extensive dependence on cyber systems of individuals, industries, and organizations. Among the cyber attacks, phishing is increasing tremendously and affecting the global economy. Therefore, this phenomenon highlights the vital need for enhancing user awareness and robust support at both individual and organizational levels. Phishing URL ide…
▽ More
Cybersecurity is one of the global issues because of the extensive dependence on cyber systems of individuals, industries, and organizations. Among the cyber attacks, phishing is increasing tremendously and affecting the global economy. Therefore, this phenomenon highlights the vital need for enhancing user awareness and robust support at both individual and organizational levels. Phishing URL identification is the best way to address the problem. Various machine learning and deep learning methods have been proposed to automate the detection of phishing URLs. However, these approaches often need more convincing accuracy and rely on datasets consisting of limited samples. Furthermore, these black box intelligent models decision to detect suspicious URLs needs proper explanation to understand the features affecting the output. To address the issues, we propose a 1D Convolutional Neural Network (CNN) and trained the model with extensive features and a substantial amount of data. The proposed model outperforms existing works by attaining an accuracy of 99.85%. Additionally, our explainability analysis highlights certain features that significantly contribute to identifying the phishing URL.
△ Less
Submitted 27 April, 2024;
originally announced April 2024.
-
TRABSA: Interpretable Sentiment Analysis of Tweets using Attention-based BiLSTM and Twitter-RoBERTa
Authors:
Md Abrar Jahin,
Md Sakib Hossain Shovon,
M. F. Mridha,
Md Rashedul Islam,
Yutaka Watanobe
Abstract:
Sentiment analysis is crucial for understanding public opinion and consumer behavior. Existing models face challenges with linguistic diversity, generalizability, and explainability. We propose TRABSA, a hybrid framework integrating transformer-based architectures, attention mechanisms, and BiLSTM networks to address this. Leveraging RoBERTa-trained on 124M tweets, we bridge gaps in sentiment anal…
▽ More
Sentiment analysis is crucial for understanding public opinion and consumer behavior. Existing models face challenges with linguistic diversity, generalizability, and explainability. We propose TRABSA, a hybrid framework integrating transformer-based architectures, attention mechanisms, and BiLSTM networks to address this. Leveraging RoBERTa-trained on 124M tweets, we bridge gaps in sentiment analysis benchmarks, ensuring state-of-the-art accuracy. Augmenting datasets with tweets from 32 countries and US states, we compare six word-embedding techniques and three lexicon-based labeling techniques, selecting the best for optimal sentiment analysis. TRABSA outperforms traditional ML and deep learning models with 94% accuracy and significant precision, recall, and F1-score gains. Evaluation across diverse datasets demonstrates consistent superiority and generalizability. SHAP and LIME analyses enhance interpretability, improving confidence in predictions. Our study facilitates pandemic resource management, aiding resource planning, policy formation, and vaccination tactics.
△ Less
Submitted 16 May, 2024; v1 submitted 30 March, 2024;
originally announced April 2024.
-
LLMs as Writing Assistants: Exploring Perspectives on Sense of Ownership and Reasoning
Authors:
Azmine Toushik Wasi,
Mst Rafia Islam,
Raima Islam
Abstract:
Sense of ownership in writing confines our investment of thoughts, time, and contribution, leading to attachment to the output. However, using writing assistants introduces a mental dilemma, as some content isn't directly our creation. For instance, we tend to credit Large Language Models (LLMs) more in creative tasks, even though all tasks are equal for them. Additionally, while we may not claim…
▽ More
Sense of ownership in writing confines our investment of thoughts, time, and contribution, leading to attachment to the output. However, using writing assistants introduces a mental dilemma, as some content isn't directly our creation. For instance, we tend to credit Large Language Models (LLMs) more in creative tasks, even though all tasks are equal for them. Additionally, while we may not claim complete ownership of LLM-generated content, we freely claim authorship. We conduct a short survey to examine these issues and understand underlying cognitive processes in order to gain a better knowledge of human-computer interaction in writing and improve writing aid systems.
△ Less
Submitted 27 July, 2024; v1 submitted 20 March, 2024;
originally announced April 2024.
-
Ink and Individuality: Crafting a Personalised Narrative in the Age of LLMs
Authors:
Azmine Toushik Wasi,
Raima Islam,
Mst Rafia Islam
Abstract:
Individuality and personalization comprise the distinctive characteristics that make each writer unique and influence their words in order to effectively engage readers while conveying authenticity. However, our growing reliance on LLM-based writing assistants risks compromising our creativity and individuality over time. We often overlook the negative impacts of this trend on our creativity and u…
▽ More
Individuality and personalization comprise the distinctive characteristics that make each writer unique and influence their words in order to effectively engage readers while conveying authenticity. However, our growing reliance on LLM-based writing assistants risks compromising our creativity and individuality over time. We often overlook the negative impacts of this trend on our creativity and uniqueness, despite the possible consequences. This study investigates these concerns by performing a brief survey to explore different perspectives and concepts, as well as trying to understand people's viewpoints, in conjunction with past studies in the area. Addressing these issues is essential for improving human-computer interaction systems and enhancing writing assistants for personalization and individuality.
△ Less
Submitted 27 July, 2024; v1 submitted 20 March, 2024;
originally announced April 2024.
-
Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle
Authors:
Md Rafid Islam,
Ratun Rahman
Abstract:
In the past few years, the number of IoT devices has grown substantially, and this trend is likely to continue. An increasing amount of effort is being put into developing software for the ever-increasing IoT devices. Every IoT system at its core has software that enables the devices to function efficiently. But security has always been a concern in this age of information and technology. Security…
▽ More
In the past few years, the number of IoT devices has grown substantially, and this trend is likely to continue. An increasing amount of effort is being put into developing software for the ever-increasing IoT devices. Every IoT system at its core has software that enables the devices to function efficiently. But security has always been a concern in this age of information and technology. Security for IoT devices is now a top priority due to the growing number of threats. This study introduces best practices for ensuring security in the IoT, with an emphasis on guidelines to be utilized in software development for IoT devices. The objective of the study is to raise awareness of potential threats, emphasizing the secure software development lifecycle. The study will also serve as a point of reference for future developments and provide a solid foundation for securing IoT software and dealing with vulnerabilities.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Effects Investigation of MAC and PHY Layer Parameters on the Performance of IEEE 802.15.6 CSMA/CA
Authors:
Md. Abubakar Siddik,
Most. Anju Ara Hasi,
Md. Rajiul Islam,
Jakia Akter Nitu
Abstract:
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of different MAC and PHY parameters based on quality of service (QoS) requirements of different appli…
▽ More
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of different MAC and PHY parameters based on quality of service (QoS) requirements of different applications. The impact of different MAC and PHY parameters on the network performance and the trade-off relationship between the parameters are essential to overcome the limitations of exiting carrier sense multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.15.6 standard. To address this issue, we develop a Markov chain-based analytical model of IEEE 802.15.6 CSMA/CA for all user priorities (UPs) and apply this general model to different network scenarios to investigate the effects of the packet arrival rate, channel condition, payload size, access phase length, access mechanism and number of nodes on the performance parameters viz. reliability, normalized throughput, energy consumption and average access delay. Moreover, we conclude the effectiveness of different access phases, access mechanisms and user priorities of intra-WBAN.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
Image-based Deep Learning for Smart Digital Twins: a Review
Authors:
Md Ruman Islam,
Mahadevan Subramaniam,
Pei-Chi Huang
Abstract:
Smart Digital twins (SDTs) are being increasingly used to virtually replicate and predict the behaviors of complex physical systems through continual data assimilation enabling the optimization of the performance of these systems by controlling the actions of systems. Recently, deep learning (DL) models have significantly enhanced the capabilities of SDTs, particularly for tasks such as predictive…
▽ More
Smart Digital twins (SDTs) are being increasingly used to virtually replicate and predict the behaviors of complex physical systems through continual data assimilation enabling the optimization of the performance of these systems by controlling the actions of systems. Recently, deep learning (DL) models have significantly enhanced the capabilities of SDTs, particularly for tasks such as predictive maintenance, anomaly detection, and optimization. In many domains, including medicine, engineering, and education, SDTs use image data (image-based SDTs) to observe and learn system behaviors and control their behaviors. This paper focuses on various approaches and associated challenges in developing image-based SDTs by continually assimilating image data from physical systems. The paper also discusses the challenges involved in designing and implementing DL models for SDTs, including data acquisition, processing, and interpretation. In addition, insights into the future directions and opportunities for developing new image-based DL approaches to develop robust SDTs are provided. This includes the potential for using generative models for data augmentation, developing multi-modal DL models, and exploring the integration of DL with other technologies, including 5G, edge computing, and IoT. In this paper, we describe the image-based SDTs, which enable broader adoption of the digital twin DT paradigms across a broad spectrum of areas and the development of new methods to improve the abilities of SDTs in replicating, predicting, and optimizing the behavior of complex systems.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
Enhanced Robot Motion Block of A-star Algorithm for Robotic Path Planning
Authors:
Raihan Kabir,
Yutaka Watanobe,
Md. Rashedul Islam,
Keitaro Naruse
Abstract:
An efficient robot path-planning model is vulnerable to the number of search nodes, path cost, and time complexity. The conventional A-star (A*) algorithm outperforms other grid-based algorithms for its heuristic search. However it shows suboptimal performance for the time, space, and number of search nodes, depending on the robot motion block (RMB). To address this challenge, this study proposes…
▽ More
An efficient robot path-planning model is vulnerable to the number of search nodes, path cost, and time complexity. The conventional A-star (A*) algorithm outperforms other grid-based algorithms for its heuristic search. However it shows suboptimal performance for the time, space, and number of search nodes, depending on the robot motion block (RMB). To address this challenge, this study proposes an optimal RMB for the A* path-planning algorithm to enhance the performance, where the robot movement costs are calculated by the proposed adaptive cost function. Also, a selection process is proposed to select the optimal RMB size. In this proposed model, grid-based maps are used, where the robot's next move is determined based on the adaptive cost function by searching among surrounding octet neighborhood grid cells. The cumulative value from the output data arrays is used to determine the optimal motion block size, which is formulated based on parameters. The proposed RMB significantly affects the searching time complexity and number of search nodes of the A* algorithm while maintaining almost the same path cost to find the goal position by avoiding obstacles. For the experiment, a benchmarked online dataset is used and prepared three different dimensional maps. The proposed approach is validated using approximately 7000 different grid maps with various dimensions and obstacle environments. The proposed model with an optimal RMB demonstrated a remarkable improvement of 93.98% in the number of search cells and 98.94% in time complexity compared to the conventional A* algorithm. Path cost for the proposed model remained largely comparable to other state-of-the-art algorithms. Also, the proposed model outperforms other state-of-the-art algorithms.
△ Less
Submitted 25 December, 2023;
originally announced December 2023.
-
Demonstration and STEM Analysis of Ferroelectric Switching in MOCVD-Grown Single Crystalline Al$_{0.85}$Sc$_{0.15}$N
Authors:
Niklas Wolff,
Georg Schoenweger,
Isabel Streicher,
Md Redwanul Islam,
Nils Braun,
Patrik Stranak,
Lutz Kirste,
Mario Prescher,
Andriy Lotnyk,
Hermann Kohlstedt,
Stefano Leone,
Lorenz Kienle,
Simon Fichtner
Abstract:
Wurtzite-type Al$_{1-x}$Sc$_x$N solid solutions grown by metal organic chemical vapour deposition are for the first time confirmed to be ferroelectric. The film with 230 nm thickness and x = 0.15 exhibits a coercive field of 5.5 MV/cm at a measurement frequency of 1.5 kHz. Single crystal quality and homogeneous chemical composition of the film was confirmed by X-ray diffraction spectroscopic metho…
▽ More
Wurtzite-type Al$_{1-x}$Sc$_x$N solid solutions grown by metal organic chemical vapour deposition are for the first time confirmed to be ferroelectric. The film with 230 nm thickness and x = 0.15 exhibits a coercive field of 5.5 MV/cm at a measurement frequency of 1.5 kHz. Single crystal quality and homogeneous chemical composition of the film was confirmed by X-ray diffraction spectroscopic methods such as time of flight secondary ion mass spectrometry. Annular bright field scanning transmission electron microscopy served to proof the ferroelectric polarization inversion on unit cell level. The single crystal quality further allowed to image the large-scale domain pattern of a wurtzite-type ferroelectric for the first time, revealing a predominantly cone-like domain shape along the c-axis of the material. As in previous work, this again implies the presence of strong polarization discontinuities along this crystallographic axis, which could be suitable for current transport. The domains are separated by narrow domain walls, for which an upper thickness limit of 3 nm was deduced, but which could potentially be atomically sharp. We are confident that these results will advance the commencing integration of wurtzite-type ferroelectrics to GaN as well as generally III-N based heterostructures and devices.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Churn Prediction via Multimodal Fusion Learning:Integrating Customer Financial Literacy, Voice, and Behavioral Data
Authors:
David Hason Rudd,
Huan Huo,
Md Rafiqul Islam,
Guandong Xu
Abstract:
In todays competitive landscape, businesses grapple with customer retention. Churn prediction models, although beneficial, often lack accuracy due to the reliance on a single data source. The intricate nature of human behavior and high dimensional customer data further complicate these efforts. To address these concerns, this paper proposes a multimodal fusion learning model for identifying custom…
▽ More
In todays competitive landscape, businesses grapple with customer retention. Churn prediction models, although beneficial, often lack accuracy due to the reliance on a single data source. The intricate nature of human behavior and high dimensional customer data further complicate these efforts. To address these concerns, this paper proposes a multimodal fusion learning model for identifying customer churn risk levels in financial service providers. Our multimodal approach integrates customer sentiments financial literacy (FL) level, and financial behavioral data, enabling more accurate and bias-free churn prediction models. The proposed FL model utilizes a SMOGN COREG supervised model to gauge customer FL levels from their financial data. The baseline churn model applies an ensemble artificial neural network and oversampling techniques to predict churn propensity in high-dimensional financial data. We also incorporate a speech emotion recognition model employing a pre-trained CNN-VGG16 to recognize customer emotions based on pitch, energy, and tone. To integrate these diverse features while retaining unique insights, we introduced late and hybrid fusion techniques that complementary boost coordinated multimodal co learning. Robust metrics were utilized to evaluate the proposed multimodal fusion model and hence the approach validity, including mean average precision and macro-averaged F1 score. Our novel approach demonstrates a marked improvement in churn prediction, achieving a test accuracy of 91.2%, a Mean Average Precision (MAP) score of 66, and a Macro-Averaged F1 score of 54 through the proposed hybrid fusion learning technique compared with late fusion and baseline models. Furthermore, the analysis demonstrates a positive correlation between negative emotions, low FL scores, and high-risk customers.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
SPH-based framework for modelling fluid-structure interaction problems with finite deformation and fracturing
Authors:
Md Rushdie Ibne Islam
Abstract:
Understanding crack propagation in structures subjected to fluid loads is crucial in various engineering applications, ranging from underwater pipelines to aircraft components. This study investigates the dynamic response of structures, including their damage and fracture behaviour under hydrodynamic load, emphasizing the fluid-structure interaction (FSI) phenomena by applying Smoothed Particle Hy…
▽ More
Understanding crack propagation in structures subjected to fluid loads is crucial in various engineering applications, ranging from underwater pipelines to aircraft components. This study investigates the dynamic response of structures, including their damage and fracture behaviour under hydrodynamic load, emphasizing the fluid-structure interaction (FSI) phenomena by applying Smoothed Particle Hydrodynamics (SPH). The developed framework employs weakly compressible SPH (WCSPH) to model the fluid flow and a pseudo-spring-based SPH solver for modelling the structural response. For improved accuracy in FSI modelling, the $δ$-SPH technique is implemented to enhance pressure calculations within the fluid phase. The pseudo-spring analogy is employed for modelling material damage, where particle interactions are confined to their immediate neighbours. These particles are linked by springs, which don't contribute to system stiffness but determine the interaction strength between connected pairs. It is assumed that a crack propagates through a spring connecting a particle pair when the damage indicator of that spring exceeds a predefined threshold. The developed framework is extensively validated through a dam break case, oscillation of a deformable solid beam, dam break through a deformable elastic solid, and breaking dam impact on a deformable solid obstacle. Numerical outcomes are subsequently compared with the findings from existing literature. The ability of the framework to accurately depict material damage and fracture is showcased through a simulation of water impact on a deformable solid obstacle with an initial notch.
△ Less
Submitted 22 September, 2023;
originally announced October 2023.
-
Analyzing the Influence of Processor Speed and Clock Speed on Remaining Useful Life Estimation of Software Systems
Authors:
M. Rubyet Islam,
Peter Sandborn
Abstract:
Prognostics and Health Management (PHM) is a discipline focused on predicting the point at which systems or components will cease to perform as intended, typically measured as Remaining Useful Life (RUL). RUL serves as a vital decision-making tool for contingency planning, guiding the timing and nature of system maintenance. Historically, PHM has primarily been applied to hardware systems, with it…
▽ More
Prognostics and Health Management (PHM) is a discipline focused on predicting the point at which systems or components will cease to perform as intended, typically measured as Remaining Useful Life (RUL). RUL serves as a vital decision-making tool for contingency planning, guiding the timing and nature of system maintenance. Historically, PHM has primarily been applied to hardware systems, with its application to software only recently explored. In a recent study we introduced a methodology and demonstrated how changes in software can impact the RUL of software. However, in practical software development, real-time performance is also influenced by various environmental attributes, including operating systems, clock speed, processor performance, RAM, machine core count and others. This research extends the analysis to assess how changes in environmental attributes, such as operating system and clock speed, affect RUL estimation in software. Findings are rigorously validated using real performance data from controlled test beds and compared with predictive model-generated data. Statistical validation, including regression analysis, supports the credibility of the results. The controlled test bed environment replicates and validates faults from real applications, ensuring a standardized assessment platform. This exploration yields actionable knowledge for software maintenance and optimization strategies, addressing a significant gap in the field of software health management.
△ Less
Submitted 9 March, 2024; v1 submitted 22 September, 2023;
originally announced September 2023.
-
Gravitational collapse in generalized K-essence emergent Vaidya spacetime via $f(\bar{R},\bar{T})$ gravity
Authors:
Arijit Panda,
Goutam Manna,
Saibal Ray,
Maxim Khlopov,
Md. Rabiul Islam
Abstract:
This study focuses on investigating the collapse possibilities of the generalized emergent Vaidya spacetime within the framework of $f(\bar{R}, \bar{T})$ gravity, specifically in the setting of K-essence theory. The Dirac-Born-Infeld type non-standard Lagrangian is used in this work to determine the emergent metric $\bar{G}_{μν}$, which is not conformally equal to the usual gravitational metric. H…
▽ More
This study focuses on investigating the collapse possibilities of the generalized emergent Vaidya spacetime within the framework of $f(\bar{R}, \bar{T})$ gravity, specifically in the setting of K-essence theory. The Dirac-Born-Infeld type non-standard Lagrangian is used in this work to determine the emergent metric $\bar{G}_{μν}$, which is not conformally equal to the usual gravitational metric. Here, we employ the function $f(\bar{R}, \bar{T})$ to represent the additive character of the emergent Ricci scalar ($\bar{R}$) and trace of the emergent energy-momentum tensor ($\bar{T}$). In our analysis, it can be shown that certain selections of $f(\bar{R}, \bar{T})$ can lead to the presence of a naked singularity resulting from gravitational collapse. Additionally, alternative choices of $f(\bar{R}, \bar{T})$ were found to yield an accelerating universe primarily governed by dark energy. In addition, the investigation revealed the existence of both positive and negative masses, which can be understood as a gravitational dipole. It is also found that the K-essence theory has the potential to serve as both a dark energy framework and a simple gravitational theory at the same time, allowing for the investigation of a wide range of cosmological phenomena.
△ Less
Submitted 25 August, 2023;
originally announced August 2023.
-
JutePestDetect: An Intelligent Approach for Jute Pest Identification Using Fine-Tuned Transfer Learning
Authors:
Md. Simul Hasan Talukder,
Mohammad Raziuddin Chowdhury,
Md Sakib Ullah Sourav,
Abdullah Al Rakin,
Shabbir Ahmed Shuvo,
Rejwan Bin Sulaiman,
Musarrat Saberin Nipun,
Muntarin Islam,
Mst Rumpa Islam,
Md Aminul Islam,
Zubaer Haque
Abstract:
In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, challenging, and somewhat imprecise, which poses a subs…
▽ More
In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, challenging, and somewhat imprecise, which poses a substantial financial risk. To address this issue, the study proposes a high-performing and resilient transfer learning (TL) based JutePestDetect model to identify jute pests at the early stage. Firstly, we prepared jute pest dataset containing 17 classes and around 380 photos per pest class, which were evaluated after manual and automatic pre-processing and cleaning, such as background removal and resizing. Subsequently, five prominent pre-trained models -DenseNet201, InceptionV3, MobileNetV2, VGG19, and ResNet50 were selected from a previous study to design the JutePestDetect model. Each model was revised by replacing the classification layer with a global average pooling layer and incorporating a dropout layer for regularization. To evaluate the models performance, various metrics such as precision, recall, F1 score, ROC curve, and confusion matrix were employed. These analyses provided additional insights for determining the efficacy of the models. Among them, the customized regularized DenseNet201-based proposed JutePestDetect model outperformed the others, achieving an impressive accuracy of 99%. As a result, our proposed method and strategy offer an enhanced approach to pest identification in the case of Jute, which can significantly benefit farmers worldwide.
△ Less
Submitted 28 May, 2023;
originally announced August 2023.
-
A nonlocal and nonlinear implicit electrolyte model for plane wave density functional theory
Authors:
S M Rezwanul Islam,
Foroogh Khezeli,
Stefan Ringe,
Craig Plaisance
Abstract:
We have developed and implemented an implicit electrolyte model in the Vienna Ab initio Simulation Package (VASP) that includes nonlinear dielectric and ionic responses as well as a nonlocal definition of the cavities defining the spatial regions where these responses can occur. The implementation into the existing VASPsol code is numerically efficient and exhibits robust convergence, requiring co…
▽ More
We have developed and implemented an implicit electrolyte model in the Vienna Ab initio Simulation Package (VASP) that includes nonlinear dielectric and ionic responses as well as a nonlocal definition of the cavities defining the spatial regions where these responses can occur. The implementation into the existing VASPsol code is numerically efficient and exhibits robust convergence, requiring computational effort only slightly higher than the original self-consistent continuum solvation (SCCS) model. The nonlinear+nonlocal model is able to reproduce the characteristic `double hump' shape observed experimentally for the differential capacitance of an electrified metal interface while preventing the `leakage' of the electrolyte into regions of space too small to contain a single water molecule or solvation ion. The model also gives a reasonable prediction of molecular solvation free energies as well as the self-ionization free energy of water and the absolute electron chemical potential of the standard hydrogen electrode. All of this, combined with the additional ability to run constant potential density functional theory calculations, should enable the routine computation of activation barriers for electrocatalytic processes.
△ Less
Submitted 13 September, 2023; v1 submitted 10 July, 2023;
originally announced July 2023.
-
Determination of the antibiotic susceptibility pattern of Gram positive bacteria causing UTI in Dhaka Bangladesh
Authors:
Bushra Rahman Eipa,
Md Riadul Islam,
Raquiba Sultana,
Seemi Tasnim Alam,
Tanaj Mehjabin,
Nohor Noon Haque Bushra,
S M Moniruzzaman,
Md Ifrat Hossain,
Shamia Naz Rashna,
Md Aftab Uddin
Abstract:
Urinary Tract Infection (UTIs) is referred as one of the most common infection in medical sectors worldwide and antimicrobial resistance (AMR) is also a global threat to human that is related with many diseases. As antibiotics used for the treatment of infectious diseases, the rate of resistance is increasing day by day. Gram positive pathogens are commonly found in urine sample collected from dif…
▽ More
Urinary Tract Infection (UTIs) is referred as one of the most common infection in medical sectors worldwide and antimicrobial resistance (AMR) is also a global threat to human that is related with many diseases. As antibiotics used for the treatment of infectious diseases, the rate of resistance is increasing day by day. Gram positive pathogens are commonly found in urine sample collected from different age groups of people, associated with UTI. The study was conducted in a diagnostic center in Dhaka, Bangladesh with total 1308 urine samples from November 2021 to April 2022. Gram positive pathogens were isolated and antimicrobial susceptibility tests were done. From total 121 samples of gram positive bacteria the highest prevalence rate of UTIs was found in age group of 21-30 year. Mostly Enterococcus spp. (33.05%) Staphylococcus aureus (27.27%), Streptococcus spp. (20.66%), Beta-hemolytic streptococci (19.00%) were found as causative agents of UTI compared to others. The majority of isolates have been detected as multi-drug resistant (MDR). The higher percentage of antibiotic resistance were found against Azithromycin (75%), and cefixime (64.46%). This research focused on the regular basis of surveillance for the Gram-positive bacteria antibiotic susceptibility to increase awareness about the use of proper antibiotic thus minimize the drug resistance.
△ Less
Submitted 18 June, 2023;
originally announced June 2023.
-
Surface EMG-Based Inter-Session/Inter-Subject Gesture Recognition by Leveraging Lightweight All-ConvNet and Transfer Learning
Authors:
Md. Rabiul Islam,
Daniel Massicotte,
Philippe Y. Massicotte,
Wei-Ping Zhu
Abstract:
Gesture recognition using low-resolution instantaneous HD-sEMG images opens up new avenues for the development of more fluid and natural muscle-computer interfaces. However, the data variability between inter-session and inter-subject scenarios presents a great challenge. The existing approaches employed very large and complex deep ConvNet or 2SRNN-based domain adaptation methods to approximate th…
▽ More
Gesture recognition using low-resolution instantaneous HD-sEMG images opens up new avenues for the development of more fluid and natural muscle-computer interfaces. However, the data variability between inter-session and inter-subject scenarios presents a great challenge. The existing approaches employed very large and complex deep ConvNet or 2SRNN-based domain adaptation methods to approximate the distribution shift caused by these inter-session and inter-subject data variability. Hence, these methods also require learning over millions of training parameters and a large pre-trained and target domain dataset in both the pre-training and adaptation stages. As a result, it makes high-end resource-bounded and computationally very expensive for deployment in real-time applications. To overcome this problem, we propose a lightweight All-ConvNet+TL model that leverages lightweight All-ConvNet and transfer learning (TL) for the enhancement of inter-session and inter-subject gesture recognition performance. The All-ConvNet+TL model consists solely of convolutional layers, a simple yet efficient framework for learning invariant and discriminative representations to address the distribution shifts caused by inter-session and inter-subject data variability. Experiments on four datasets demonstrate that our proposed methods outperform the most complex existing approaches by a large margin and achieve state-of-the-art results on inter-session and inter-subject scenarios and perform on par or competitively on intra-session gesture recognition. These performance gaps increase even more when a tiny amount (e.g., a single trial) of data is available on the target domain for adaptation. These outstanding experimental results provide evidence that the current state-of-the-art models may be overparameterized for sEMG-based inter-session and inter-subject gesture recognition tasks.
△ Less
Submitted 19 February, 2024; v1 submitted 13 May, 2023;
originally announced May 2023.
-
When a CBR in Hand is Better than Twins in the Bush
Authors:
Mobyen Uddin Ahmed,
Shaibal Barua,
Shahina Begum,
Mir Riyanul Islam,
Rosina O Weber
Abstract:
AI methods referred to as interpretable are often discredited as inaccurate by supporters of the existence of a trade-off between interpretability and accuracy. In many problem contexts however this trade-off does not hold. This paper discusses a regression problem context to predict flight take-off delays where the most accurate data regression model was trained via the XGBoost implementation of…
▽ More
AI methods referred to as interpretable are often discredited as inaccurate by supporters of the existence of a trade-off between interpretability and accuracy. In many problem contexts however this trade-off does not hold. This paper discusses a regression problem context to predict flight take-off delays where the most accurate data regression model was trained via the XGBoost implementation of gradient boosted decision trees. While building an XGB-CBR Twin and converting the XGBoost feature importance into global weights in the CBR model, the resultant CBR model alone provides the most accurate local prediction, maintains the global importance to provide a global explanation of the model, and offers the most interpretable representation for local explanations. This resultant CBR model becomes a benchmark of accuracy and interpretability for this problem context, and hence it is used to evaluate the two additive feature attribute methods SHAP and LIME to explain the XGBoost regression model. The results with respect to local accuracy and feature attribution lead to potentially valuable future work.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
Drones on the Rise: Exploring the Current and Future Potential of UAVs
Authors:
S. M. Riazul Islam
Abstract:
Unmanned Aerial Vehicles (UAVs) have become increasingly popular in recent years due to their versatility and affordability. This article provides an overview of the history and development of UAVs, as well as their current and potential applications in various fields. In particular, the article highlights the use of UAVs in aerial photography and videography, surveying and mapping, agriculture an…
▽ More
Unmanned Aerial Vehicles (UAVs) have become increasingly popular in recent years due to their versatility and affordability. This article provides an overview of the history and development of UAVs, as well as their current and potential applications in various fields. In particular, the article highlights the use of UAVs in aerial photography and videography, surveying and mapping, agriculture and forestry, infrastructure inspection and maintenance, search and rescue operations, disaster management and humanitarian aid, and military applications such as reconnaissance, surveillance, and combat. The article also explores potential advancements in UAV technology and new applications that could emerge in the future, as well as concerns about the impact of UAVs on society, such as privacy, safety, security, job displacement, and environmental impact. Overall, the article aims to provide a comprehensive overview of the current state and future potential of UAV technology, and the benefits and challenges associated with its use in various industries and fields.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
VREd: A Virtual Reality-Based Classroom for Online Education Using Unity3D WebGL
Authors:
Ratun Rahman,
Md Rafid Islam
Abstract:
Virtual reality is the way of the future. The use of virtual reality is expanding over time across all sectors, from the entertainment industry to the military and space. VREd is a similar concept where a virtual reality-based classroom is used for online education where the user will have better interaction and more control. Unity3D and WebGL software have been used for implementation. Students o…
▽ More
Virtual reality is the way of the future. The use of virtual reality is expanding over time across all sectors, from the entertainment industry to the military and space. VREd is a similar concept where a virtual reality-based classroom is used for online education where the user will have better interaction and more control. Unity3D and WebGL software have been used for implementation. Students or learners accustomed to contemporary technologies may find the traditional educational system unappealing because of its flaws. Incorporating the latest technologies can increase the curiosity and learning abilities of students. The system architecture of VREd is similar to that of an actual classroom, allowing both students and teachers to access all of the course materials and interact with one another using only an internet connection. The environment and the background are also customizable. Therefore, all the users can comfortably use the system and feel at home. We can create an effective educational system that raises educational quality by utilizing virtual reality.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
In-Grain Ferroelectric Switching in Sub-5 nm Thin AlScN Films at 1 V
Authors:
Georg Schönweger,
Niklas Wolff,
Md Redwanul Islam,
Maike Gremmel,
Adrian Petraru,
Lorenz Kienle,
Hermann Kohlstedt,
Simon Fichtner
Abstract:
Analog switching in ferroelectric devices promises neuromorphic computing with highest energy efficiency, if limited device scalability can be overcome. To contribute to a solution, we report on the ferroelectric switching characteristics of sub-5 nm thin Al$_{0.74}$Sc$_{0.26}$N films grown on Pt/Ti/SiO2/Si and epitaxial Pt/GaN/sapphire templates by sputter-deposition. In this context, we focus on…
▽ More
Analog switching in ferroelectric devices promises neuromorphic computing with highest energy efficiency, if limited device scalability can be overcome. To contribute to a solution, we report on the ferroelectric switching characteristics of sub-5 nm thin Al$_{0.74}$Sc$_{0.26}$N films grown on Pt/Ti/SiO2/Si and epitaxial Pt/GaN/sapphire templates by sputter-deposition. In this context, we focus on the following major achievements compared to previously available wurtzite-type ferroelectrics: 1) Record low switching voltages down to 1 V are achieved, which is in a range that can be supplied by standard on-chip voltage sources. 2) Compared to the previously investigated deposition of thinnest Al$_{1-x}$Sc$_x$N films on epitaxial templates, a significantly larger coercive field to breakdown field ratio is observed for Al$_{0.74}$Sc$_{0.26}$N films grown on silicon substrates, the technologically most relevant substrate-type. 3) The formation of true ferroelectric domains in wurtzite-type materials is for the first time demonstrated on the atomic scale by scanning transmission electron microscopy investigations of a sub-5 nm thin partially switched film. The direct observation of inversion domain boundaries within single nm-sized grains supports the theory of a gradual domain-wall motion limited switching process in wurtzite-type ferroelectrics. Ultimately, this should enable the analog switching necessary for mimicking neuromorphic concepts also in highly scaled devices.
△ Less
Submitted 6 April, 2023;
originally announced April 2023.
-
Design and numerical investigation of cadmium telluride (CdTe) and iron silicide (FeSi2) based double absorber solar cells to enhance power conversion efficiency
Authors:
Md. Ferdous Rahman,
M. J. A. Habib,
Md. Hasan Ali,
M. H. K. Rubel,
M. Rounakul Islam,
Abu Bakar Md. Ismail,
M. Khalid Hossain
Abstract:
Inorganic CdTe and FeSi2-based solar cells have recently drawn a lot of attention because they offer superior thermal stability and good optoelectronic properties compared to conventional solar cells. In this work, a unique alternative technique is presented by using FeSi2 as a secondary absorber layer and In2S3 as the window layer for improving photovoltaic (PV) performance parameters. Simulating…
▽ More
Inorganic CdTe and FeSi2-based solar cells have recently drawn a lot of attention because they offer superior thermal stability and good optoelectronic properties compared to conventional solar cells. In this work, a unique alternative technique is presented by using FeSi2 as a secondary absorber layer and In2S3 as the window layer for improving photovoltaic (PV) performance parameters. Simulating on SCAPS-1D, the proposed double-absorber (Cu/FTO/In2S3/CdTe/FeSi2/Ni) structure is thoroughly examined and analyzed. The window layer thickness, absorber layer thickness, acceptor density (NA), donor density (ND), defect density (Nt), series resistance (RS), and shunt resistance (Rsh) were simulated in detail for optimization of the above configuration to improve PV performance. According to this study, 0.5 um is the optimized thickness for both the CdTe and FeSi2 absorber layers in order to maximize efficiency. Here, the value of the optimum window layer thickness is 50 nm. For using CdTe as a single absorber, the efficiency is achieved by 13.26%. But for using CdTe and FeSi2 as a dual absorber, the efficiency is enhanced and the obtaining value is 27.35%. The other parameters are also improved and the obtaining values for fill factor (FF) are 83.68%, open-circuit voltage (Voc) is 0.6566V, and short circuit current density (JSc) is 49.78 mA/cm2. Furthermore, the proposed model performs good at 300 K operating temperature. The addition of the FeSi2 layer to the cell structure has resulted in a significant quantum efficiency (QE) enhancement because of the rise in solar spectrum absorption at longer wavelengths. The findings of this work offer a promising approach for producing high-performance and reasonably priced CdTe-based solar cells.
△ Less
Submitted 6 November, 2022;
originally announced November 2022.
-
Semantic Web in Healthcare: A Systematic Literature Review of Application, Research Gap, and Future Research Avenues
Authors:
A. K. M. Bahalul Haque,
B. M. Arifuzzaman,
Sayed Abu Noman Siddik,
Abul Kalam,
Tabassum Sadia Shahjahan,
T. S. Saleena,
Morshed Alam,
Md. Rabiul Islam,
Foyez Ahmmed,
5and Md. Jamal Hossain
Abstract:
Today, healthcare has become one of the largest and most fast-paced industries due to the rapid development of digital healthcare technologies. The fundamental thing to enhance healthcare services is communicating and linking massive volumes of available healthcare data. However, the key challenge in reaching this ambitious goal is letting the information exchange across heterogeneous sources and…
▽ More
Today, healthcare has become one of the largest and most fast-paced industries due to the rapid development of digital healthcare technologies. The fundamental thing to enhance healthcare services is communicating and linking massive volumes of available healthcare data. However, the key challenge in reaching this ambitious goal is letting the information exchange across heterogeneous sources and methods as well as establishing efficient tools and techniques. Semantic Web (SW) technology can help to tackle these problems. They can enhance knowledge exchange, information management, data interoperability, and decision support in healthcare systems. They can also be utilized to create various e-healthcare systems that aid medical practitioners in making decisions and provide patients with crucial medical information and automated hospital services. This systematic literature review (SLR) on SW in healthcare systems aims to assess and critique previous findings while adhering to appropriate research procedures. We looked at 65 papers and came up with five themes: e-service, disease, information management, frontier technology, and regulatory conditions. In each thematic research area, we presented the contributions of previous literature. We emphasized the topic by responding to five specific research questions. We have finished the SLR study by identifying research gaps and establishing future research goals that will help to minimize the difficulty of adopting SW in healthcare systems and provide new approaches for SW-based medical systems progress.
△ Less
Submitted 19 October, 2022;
originally announced November 2022.
-
Vision-Based Robust Lane Detection and Tracking under Different Challenging Environmental Conditions
Authors:
Samia Sultana,
Boshir Ahmed,
Manoranjan Paul,
Muhammad Rafiqul Islam,
Shamim Ahmad
Abstract:
Lane marking detection is fundamental for both advanced driving assistance systems. However, detecting lane is highly challenging when the visibility of a road lane marking is low due to real-life challenging environment and adverse weather. Most of the lane detection methods suffer from four types of challenges: (i) light effects i.e., shadow, glare of light, reflection etc.; (ii) Obscured visibi…
▽ More
Lane marking detection is fundamental for both advanced driving assistance systems. However, detecting lane is highly challenging when the visibility of a road lane marking is low due to real-life challenging environment and adverse weather. Most of the lane detection methods suffer from four types of challenges: (i) light effects i.e., shadow, glare of light, reflection etc.; (ii) Obscured visibility of eroded, blurred, colored and cracked lane caused by natural disasters and adverse weather; (iii) lane marking occlusion by different objects from surroundings (wiper, vehicles etc.); and (iv) presence of confusing lane like lines inside the lane view e.g., guardrails, pavement marking, road divider etc. Here, we propose a robust lane detection and tracking method with three key technologies. First, we introduce a comprehensive intensity threshold range (CITR) to improve the performance of the canny operator in detecting low intensity lane edges. Second, we propose a two-step lane verification technique, the angle based geometric constraint (AGC) and length-based geometric constraint (LGC) followed by Hough Transform, to verify the characteristics of lane marking and to prevent incorrect lane detection. Finally, we propose a novel lane tracking technique, by defining a range of horizontal lane position (RHLP) along the x axis which will be updating with respect to the lane position of previous frame. It can keep track of the lane position when either left or right or both lane markings are partially and fully invisible. To evaluate the performance of the proposed method we used the DSDLDE [1] and SLD [2] dataset with 1080x1920 and 480x720 resolutions at 24 and 25 frames/sec respectively. Experimental results show that the average detection rate is 97.55%, and the average processing time is 22.33 msec/frame, which outperform the state of-the-art method.
△ Less
Submitted 14 June, 2023; v1 submitted 18 October, 2022;
originally announced October 2022.
-
A Structural Equation Modeling Approach to Understand User's Perceptions of Acceptance of Ride-Sharing Services in Dhaka City
Authors:
Md. Mohaimenul Islam Sourav,
Mohammed Russedul Islam,
H M Imran Kays,
Md. Hadiuzzaman
Abstract:
This research aims at building a multivariate statistical model for assessing users' perceptions of acceptance of ride-sharing services in Dhaka City. A structured questionnaire is developed based on the users' reported attitudes and perceived risks. A total of 350 normally distributed responses are collected from ride-sharing service users and stakeholders of Dhaka City. Respondents are interview…
▽ More
This research aims at building a multivariate statistical model for assessing users' perceptions of acceptance of ride-sharing services in Dhaka City. A structured questionnaire is developed based on the users' reported attitudes and perceived risks. A total of 350 normally distributed responses are collected from ride-sharing service users and stakeholders of Dhaka City. Respondents are interviewed to express their experience and opinions on ride-sharing services through the stated preference questionnaire. Structural Equation Modeling (SEM) is used to validate the research hypotheses. Statistical parameters and several trials are used to choose the best SEM. The responses are also analyzed using the Relative Importance Index (RII) method, validating the chosen SEM. Inside SEM, the quality of ride-sharing services is measured by two latent and eighteen observed variables. The latent variable 'safety & security' is more influential than 'service performance' on the overall quality of service index. Under 'safety & security' the other two variables, i.e., 'account information' and 'personal information' are found to be the most significant that impact the decision to share rides with others. In addition, 'risk of conflict' and 'possibility of accident' are identified using the perception model as the lowest contributing variables. Factor analysis reveals the suitability and reliability of the proposed SEM. Identifying the influential parameters in this will help the service providers understand and improve the quality of ride-sharing service for users.
△ Less
Submitted 19 June, 2023; v1 submitted 8 October, 2022;
originally announced October 2022.
-
Performance Evaluation of IEEE 802.11 for UAV-based Wireless Sensor Networks in NS-3
Authors:
Md. Abubakar Siddik,
Md. Rajiul Islam,
Md. Mahafujur Rahman,
Zannatul Ferdous,
Sumonto Sarker,
Most. Anju Ara Hasi,
Jakia Akter Nitu
Abstract:
Unmanned Aerial Vehicle (UAV) has extreme potential to change the future wireless sensor network (WSN). The UAV-based WSN performances is influenced by different system parameters. To investigate this issue, it is necessary to analyses the effects of system parameters on the UAV-based WSN performance. In this paper, we design a NS-3 script for UAV-based WSN according to the hierarchical manner of…
▽ More
Unmanned Aerial Vehicle (UAV) has extreme potential to change the future wireless sensor network (WSN). The UAV-based WSN performances is influenced by different system parameters. To investigate this issue, it is necessary to analyses the effects of system parameters on the UAV-based WSN performance. In this paper, we design a NS-3 script for UAV-based WSN according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of system parameters (access mechanism, UAV trajectory pattern, UAV velocity, number of sensors, and sensor traffic generation rate) on throughput, and average delay. The simulation results show that the RTS/CTS access mechanism provides better performance than the basic data access mechanism and the mobility model which has been prescribed shows higher performance than the random mobility model. Moreover, the results indicate that higher velocity of UAV degrades the system performance in terms of throughput and delay. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
△ Less
Submitted 28 August, 2022;
originally announced August 2022.
-
BDSL 49: A Comprehensive Dataset of Bangla Sign Language
Authors:
Ayman Hasib,
Saqib Sizan Khan,
Jannatul Ferdous Eva,
Mst. Nipa Khatun,
Ashraful Haque,
Nishat Shahrin,
Rashik Rahman,
Hasan Murad,
Md. Rajibul Islam,
Molla Rashied Hussein
Abstract:
Language is a method by which individuals express their thoughts. Each language has its own set of alphabetic and numeric characters. People can communicate with one another through either oral or written communication. However, each language has a sign language counterpart. Individuals who are deaf and/or mute communicate through sign language. The Bangla language also has a sign language, which…
▽ More
Language is a method by which individuals express their thoughts. Each language has its own set of alphabetic and numeric characters. People can communicate with one another through either oral or written communication. However, each language has a sign language counterpart. Individuals who are deaf and/or mute communicate through sign language. The Bangla language also has a sign language, which is called BDSL. The dataset is about Bangla hand sign images. The collection contains 49 individual Bangla alphabet images in sign language. BDSL49 is a dataset that consists of 29,490 images with 49 labels. Images of 14 different adult individuals, each with a distinct background and appearance, have been recorded during data collection. Several strategies have been used to eliminate noise from datasets during preparation. This dataset is available to researchers for free. They can develop automated systems using machine learning, computer vision, and deep learning techniques. In addition, two models were used in this dataset. The first is for detection, while the second is for recognition.
△ Less
Submitted 14 August, 2022;
originally announced August 2022.
-
Collapsing scenario for the k-essence emergent generalised Vaidya spacetime in the context of massive gravity's rainbow
Authors:
Saibal Ray,
Arijit Panda,
Bivash Majumder,
Md. Rabiul Islam,
Goutam Manna
Abstract:
In this paper, we study the collapsing scenario for the k-essence emergent Vaidya spacetime in the context of massive gravity's rainbow. For this study, we consider that the background metric is Vaidya spacetime in massive gravity's rainbow. We show that the k-essence emergent gravity metric resembles closely to the new type of generalized Vaidya massive gravity metric with the rainbow deformation…
▽ More
In this paper, we study the collapsing scenario for the k-essence emergent Vaidya spacetime in the context of massive gravity's rainbow. For this study, we consider that the background metric is Vaidya spacetime in massive gravity's rainbow. We show that the k-essence emergent gravity metric resembles closely to the new type of generalized Vaidya massive gravity metric with the rainbow deformations for null fluid collapse where we consider the k-essence scalar field as a function solely of the advanced or the retarded time. The k-essence emergent Vaidya massive gravity rainbow mass function is also different. This new type k-essence emergent Vaidya massive gravity rainbow metric has satisfied the required energy conditions. The existence of the locally naked central singularity, the strength and the strongness of the singularities for the rainbow deformations of the k-essence emergent Vaidya massive gravity metric are the interesting outcomes of the present work.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Ultrathin AlScN for low-voltage driven ferroelectric-based devices
Authors:
Georg Schönweger,
Md Redwanul Islam,
Niklas Wolff,
Adrian Petraru,
Lorenz Kienle,
Hermann Kohlstedt,
Simon Fichtner
Abstract:
Thickness scaling of ferroelectricity in AlScN is a determining factor for its potential application in neuromorphic computing and memory devices. In this letter, we report on ultrathin (10 nm) Al0.72Sc0.28N films that are ferroelectrically switchable at room temperature. All-epitaxial Al0.72Sc0.28N/Pt heterostructures are grown by magnetron sputtering onto GaN/sapphire substrates followed by an i…
▽ More
Thickness scaling of ferroelectricity in AlScN is a determining factor for its potential application in neuromorphic computing and memory devices. In this letter, we report on ultrathin (10 nm) Al0.72Sc0.28N films that are ferroelectrically switchable at room temperature. All-epitaxial Al0.72Sc0.28N/Pt heterostructures are grown by magnetron sputtering onto GaN/sapphire substrates followed by an in situ Pt capping approach to avoid oxidation of the Al0.72Sc0.28N film surface. Structural characterization by X-ray diffraction and transmission electron microscopy reveals the established epitaxy. The thus obtained high-quality interfaces in combination with the in situ capping is expected to facilitate ferroelectric switching of AlScN in the ultrathin regime. The analysis of the relative permittivity and coercive field dependence on the Al0.72Sc0.28N film thicknesses in the range of 100 nm down to 10 nm indicates only moderate scaling effects, suggesting that the critical thickness for ferroelectricity is not yet approached. Furthermore, the deposited layer stack demonstrates the possibility of including ultrathin ferroelectric AlScN into all-epitaxial GaN-based devices using sputter deposition techniques. Thus, our work highlights the integration and scaling potential of all-epitaxial ultrathin AlScN offering high storage density paired with low voltage operation desired for state of the art ferroelectric memory devices.
△ Less
Submitted 5 July, 2022;
originally announced July 2022.
-
Improving Solar Flare Prediction by Time Series Outlier Detection
Authors:
Junzhi Wen,
Md Reazul Islam,
Azim Ahmadzadeh,
Rafal A. Angryk
Abstract:
Solar flares not only pose risks to outer space technologies and astronauts' well being, but also cause disruptions on earth to our hight-tech, interconnected infrastructure our lives highly depend on. While a number of machine-learning methods have been proposed to improve flare prediction, none of them, to the best of our knowledge, have investigated the impact of outliers on the reliability and…
▽ More
Solar flares not only pose risks to outer space technologies and astronauts' well being, but also cause disruptions on earth to our hight-tech, interconnected infrastructure our lives highly depend on. While a number of machine-learning methods have been proposed to improve flare prediction, none of them, to the best of our knowledge, have investigated the impact of outliers on the reliability and those models' performance. In this study, we investigate the impact of outliers in a multivariate time series benchmark dataset, namely SWAN-SF, on flare prediction models, and test our hypothesis. That is, there exist outliers in SWAN-SF, removal of which enhances the performance of the prediction models on unseen datasets. We employ Isolation Forest to detect the outliers among the weaker flare instances. Several experiments are carried out using a large range of contamination rates which determine the percentage of present outliers. We asses the quality of each dataset in terms of its actual contamination using TimeSeriesSVC. In our best finding, we achieve a 279% increase in True Skill Statistic and 68% increase in Heidke Skill Score. The results show that overall a significant improvement can be achieved to flare prediction if outliers are detected and removed properly.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
NFS: A Hand Gesture Recognition Based Game Using MediaPipe and PyGame
Authors:
Md Rafid Islam,
Ratun Rahman,
Akib Ahmed,
Rafsan Jany
Abstract:
This paper represents a game which interacts with humans via hand gesture movement. Nowadays, apps like this seem rare, and there seems to be a window opening for this kind of application to be more prevalent and useful in the near future. This application is based on hand gesture movement instead of being dependent on a keyboard and mouse. The main issue was to figure out how to utilize machine l…
▽ More
This paper represents a game which interacts with humans via hand gesture movement. Nowadays, apps like this seem rare, and there seems to be a window opening for this kind of application to be more prevalent and useful in the near future. This application is based on hand gesture movement instead of being dependent on a keyboard and mouse. The main issue was to figure out how to utilize machine learning to make this application work as it should be. First, two games were selected one with a traditional controller and another with hand gesture method. Then these two games based on the difficulty to use, fun elements, gameplay, and replayability were compared. Though the difficulty increases but the other three aspects improve significantly. After going through all of that a conclusion can be drawn that people are more likely to play a simple hand gesture-based game.
△ Less
Submitted 23 April, 2022;
originally announced April 2022.
-
Myoelectric Pattern Recognition Performance Enhancement Using Nonlinear Features
Authors:
Md. Johirul Islam,
Shamim Ahmad,
Fahmida Haque,
Mamun Bin Ibne Reaz,
Mohammad A. S. Bhuiyan,
Md. Rezaul Islam
Abstract:
The multichannel electrode array used for electromyogram (EMG) pattern recognition provides good performance, but it has a high cost, is computationally expensive, and is inconvenient to wear. Therefore, researchers try to use as few channels as possible while maintaining improved pattern recognition performance. However, minimizing the number of channels affects the performance due to the least s…
▽ More
The multichannel electrode array used for electromyogram (EMG) pattern recognition provides good performance, but it has a high cost, is computationally expensive, and is inconvenient to wear. Therefore, researchers try to use as few channels as possible while maintaining improved pattern recognition performance. However, minimizing the number of channels affects the performance due to the least separable margin among the movements possessing weak signal strengths. To meet these challenges, two time-domain features based on nonlinear scaling, the log of the mean absolute value (LMAV) and the nonlinear scaled value (NSV), are proposed. In this study, we validate the proposed features on two datasets, existing four feature extraction methods, variable window size and various signal to noise ratios (SNR). In addition, we also propose a feature extraction method where the LMAV and NSV are grouped with the existing 11 time-domain features. The proposed feature extraction method enhances accuracy, sensitivity, specificity, precision, and F1 score by 1.00%, 5.01%, 0.55%, 4.71%, and 5.06% for dataset 1, and 1.18%, 5.90%, 0.66%, 5.63%, and 6.04% for dataset 2, respectively. Therefore, the experimental results strongly suggest the proposed feature extraction method, for taking a step forward with regard to improved myoelectric pattern recognition performance.
△ Less
Submitted 28 March, 2022;
originally announced March 2022.
-
Human Gait Analysis using Gait Energy Image
Authors:
Sagor Chandro Bakchy,
Md. Rabiul Islam,
M. Rasel Mahmud,
Faisal Imran
Abstract:
Gait recognition is one of the most recent emerging techniques of human biometric which can be used for security based purposes having unobtrusive learning method. In comparison with other bio-metrics gait analysis has some special security features. Most of the biometric technique uses sequential template based component analysis for recognition. Comparing with those methods, we proposed a develo…
▽ More
Gait recognition is one of the most recent emerging techniques of human biometric which can be used for security based purposes having unobtrusive learning method. In comparison with other bio-metrics gait analysis has some special security features. Most of the biometric technique uses sequential template based component analysis for recognition. Comparing with those methods, we proposed a developed technique for gait identification using the feature Gait Energy Image (GEI). GEI representation of gait contains all information of each image in one gait cycle and requires less storage and low processing speed. As only one image is enough to store the necessary information in GEI feature recognition process is very easier than any other feature for gait recognition. Gait recognition has some limitations in recognition process like viewing angle variation, walking speed, clothes, carrying load etc. Our proposed method in the paper compares the recognition performance with template based feature extraction which needs to process each frame in the cycle. We use GEI which gives relatively all information about all the frames in the cycle and results in better performance than other feature of gait analysis.
△ Less
Submitted 17 March, 2022;
originally announced March 2022.
-
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
Authors:
Nan Sun,
Chang-Tsun Li,
Hin Chan,
Md Zahidul Islam,
Md Rafiqul Islam,
Warren Armstrong
Abstract:
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to conduct risk management to achieve cyber assurance. Utilizing cybersecurity standards and certifications can provide guidance for vendors to design a…
▽ More
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to conduct risk management to achieve cyber assurance. Utilizing cybersecurity standards and certifications can provide guidance for vendors to design and manufacture secure Information and Communication Technology (ICT) products as well as provide a level of assurance of the security functionality of the products for consumers. Hence, employing security standards and certifications is an effective strategy for risk management and cyber assurance. In this work, we begin with investigating the adoption of cybersecurity standards and certifications by surveying 258 participants from organizations across various countries and sectors. Specifically, we identify adoption barriers of the Common Criteria through the designed questionnaire. Taking into account the seven identified adoption barriers, we show the recommendations for promoting cybersecurity standards and certifications. Moreover, beyond cybersecurity standards and certifications, we shed light on other risk management strategies devised by our participants, which provides directions on cybersecurity approaches for enhancing cyber assurance in organizations.
△ Less
Submitted 5 March, 2022; v1 submitted 3 March, 2022;
originally announced March 2022.
-
AutoCl : A Visual Interactive System for Automatic Deep Learning Classifier Recommendation Based on Models Performance
Authors:
Fuad Ahmed,
Rubayea Ferdows,
Md Rafiqul Islam,
Abu Raihan M. Kamal
Abstract:
Nowadays, deep learning (DL) models being increasingly applied to various fields, people without technical expertise and domain knowledge struggle to find an appropriate model for their task. In this paper, we introduce AutoCl a visual interactive recommender system aimed at helping non-experts to adopt an appropriate DL classifier. Our system enables users to compare the performance and behavior…
▽ More
Nowadays, deep learning (DL) models being increasingly applied to various fields, people without technical expertise and domain knowledge struggle to find an appropriate model for their task. In this paper, we introduce AutoCl a visual interactive recommender system aimed at helping non-experts to adopt an appropriate DL classifier. Our system enables users to compare the performance and behavior of multiple classifiers trained with various hyperparameter setups as well as automatically recommends a best classifier with appropriate hyperparameter. We compare features of AutoCl against several recent AutoML systems and show that it helps non-experts better in choosing DL classifier. Finally, we demonstrate use cases for image classification using publicly available dataset to show the capability of our system.
△ Less
Submitted 24 February, 2022;
originally announced February 2022.
-
Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges
Authors:
Nan Sun,
Chang-Tsun Li,
Hin Chan,
Ba Dung Le,
MD Zahidul Islam,
Leo Yu Zhang,
MD Rafiqul Islam,
Warren Armstrong
Abstract:
Advances of emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products m…
▽ More
Advances of emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products meet the inherent security requirements. Such confidence and trust are primarily gained through the rigorous development of security requirements, validation criteria, evaluation, and certification. Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security certification. In this paper, we conduct a systematic review of the CC standards and its adoptions. Adoption barriers of the CC are also investigated based on the analysis of current trends in security evaluation. Specifically, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project that promotes the CC among stakeholders in ICT security products related to specification, development, evaluation, certification and approval, procurement, and deployment. Best practices on developing Protection Profiles, recommendations, and future directions for trusted cybersecurity advancement are presented.
△ Less
Submitted 2 April, 2022; v1 submitted 19 January, 2022;
originally announced January 2022.
-
Theoretical Development and Numerical Validation of an Asymmetric Linear Bilateral Control Model- Case Study for an Automated Truck Platoon
Authors:
M Sabbir Salek,
Mashrur Chowdhury,
Mizanur Rahman,
Kakan Dey,
Md Rafiul Islam
Abstract:
In this paper, we theoretically develop and numerically validate an asymmetric linear bilateral control model (LBCM). The novelty of the asymmetric LBCM is that using this model all the follower vehicles in a platoon can adjust their acceleration and deceleration to closely follow a constant desired time gap to improve platoon operational efficiency while maintaining local and string stability. We…
▽ More
In this paper, we theoretically develop and numerically validate an asymmetric linear bilateral control model (LBCM). The novelty of the asymmetric LBCM is that using this model all the follower vehicles in a platoon can adjust their acceleration and deceleration to closely follow a constant desired time gap to improve platoon operational efficiency while maintaining local and string stability. We theoretically analyze the local stability of the asymmetric LBCM using the condition for asymptotic stability of a linear time-invariant system and prove the string stability of the asymmetric LBCM using a space gap error attenuation approach. Then, we evaluate the efficacy of the asymmetric LBCM by simulating a closely coupled cooperative adaptive cruise control (CACC) platoon of fully automated trucks in various non-linear acceleration and deceleration states. We choose automated truck platooning as a case study since heavy-duty trucks experience higher delays and lags in the powertrain system, and limited acceleration and deceleration capabilities than passenger cars. To evaluate the platoon operational efficiency of the asymmetric LBCM, we compare the performance of the asymmetric LBCM to a baseline model, i.e., the symmetric LBCM, for different powertrain delays and lags. Our analyses found that the asymmetric LBCM can handle any combined powertrain delays and lags up to 0.6 sec while maintaining a constant desired time gap during a stable platoon operation, whereas the symmetric LBCM fails to ensure stable platoon operation as well as maintain a constant desired time gap for any combined powertrain delays and lags over 0.2 sec. These findings demonstrate the potential of the asymmetric LBCM in improving platoon operational efficiency and stability of an automated truck platoon.
△ Less
Submitted 12 April, 2023; v1 submitted 29 December, 2021;
originally announced December 2021.
-
Opportunistic Relay Selection over Generalized Fading and Inverse Gamma Composite Fading Mixed Multicast Channels: A Secrecy Tradeoff
Authors:
MD. Shakhawat Hossen,
A. S. M. Badrudduza,
S. M. Riazul Islam,
Abu Hanif,
Milton Kumar Kundu,
Kyung-Sup Kwak
Abstract:
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the…
▽ More
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the wiretapping attempts of multiple eavesdroppers. Two scenarios, i.e. non-line of sight (NLOS) and line of sight (LOS) communications along with the multiplicative and LOS shadowing are considered where the first scenario assumes eta-mu and eta-mu/inverse Gamma (IG) composite fading channels and the latter one follows kappa-mu and kappa-mu/IG composite fading channels as the source to relay and relay to receiver's as well as eavesdropper's links, respectively. Secrecy analysis is accomplished by deriving closed-form expressions of three familiar secrecy measures i.e. secure outage probability for multicasting, probability of non-zero secrecy multicast capacity, and ergodic secrecy multicast capacity. We further capitalize on those expressions to observe the effects of all system parameters which are again corroborated via Monte-Carlo simulations. Our observations indicate that a secrecy tradeoff between the number of relays and number of receivers, eavesdroppers, and shadowing parameters can be established to maintain the admissible security level by decreasing the detrimental influences of fading, shadowing, the number of multicast receivers and eavesdroppers.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Sentiment Analysis of Microblogging dataset on Coronavirus Pandemic
Authors:
Nosin Ibna Mahbub,
Md Rakibul Islam,
Md Al Amin,
Md Khairul Islam,
Bikash Chandra Singh,
Md Imran Hossain Showrov,
Anirudda Sarkar
Abstract:
Sentiment analysis can largely influence the people to get the update of the current situation. Coronavirus (COVID-19) is a contagious illness caused by the coronavirus 2 that causes severe respiratory symptoms. The lives of millions have continued to be affected by this pandemic, several countries have resorted to a full lockdown. During this lockdown, people have taken social networks to express…
▽ More
Sentiment analysis can largely influence the people to get the update of the current situation. Coronavirus (COVID-19) is a contagious illness caused by the coronavirus 2 that causes severe respiratory symptoms. The lives of millions have continued to be affected by this pandemic, several countries have resorted to a full lockdown. During this lockdown, people have taken social networks to express their emotions to find a way to calm themselves down. People are spreading their sentiments through microblogging websites as one of the most preventive steps of this disease is the socialization to gain people's awareness to stay home and keep their distance when they are outside home. Twitter is a popular online social media platform for exchanging ideas. People can post their different sentiments, which can be used to aware people. But, some people want to spread fake news to frighten the people. So, it is necessary to identify the positive, negative, and neutral thoughts so that the positive opinions can be delivered to the mass people for spreading awareness to the people. Moreover, a huge volume of data is floating on Twitter. So, it is also important to identify the context of the dataset. In this paper, we have analyzed the Twitter dataset for evaluating the sentiment using several machine learning algorithms. Later, we have found out the context learning of the dataset based on the sentiments.
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
Education and Food Consumption Patterns: Quasi-Experimental Evidence from Indonesia
Authors:
Dr Mohammad Rafiqul Islam,
Dr Nicholas Sim
Abstract:
How does food consumption improve educational outcomes is an important policy issue for developing countries. Applying the Indonesian Family Life Survey (IFLS) 2014, we estimate the returns of food consumption to education and investigate if more educated individuals tend to consume healthier bundles than less-educated individuals do. We implement the Expected Outcome Methodology, which is similar…
▽ More
How does food consumption improve educational outcomes is an important policy issue for developing countries. Applying the Indonesian Family Life Survey (IFLS) 2014, we estimate the returns of food consumption to education and investigate if more educated individuals tend to consume healthier bundles than less-educated individuals do. We implement the Expected Outcome Methodology, which is similar to Average Treatment on The Treated (ATT) conceptualized by Angrist and Pischke (2009). We find that education tends to tilt consumption towards healthier foods. Specifically, individuals with upper secondary or higher levels of education, on average, consume 31.5% more healthy foods than those with lower secondary education or lower levels of education. With respect to unhealthy food consumption, more highly-educated individuals, on average, consume 22.8% less unhealthy food than less-educated individuals. This suggests that education can increase the inequality in the consumption of healthy food bundles. Our study suggests that it is important to design policies to expand education for all for at least up to higher secondary level in the context of Indonesia. Our finding also speaks to the link between food-health gradient and human capital formation for a developing country such as Indonesia.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.