(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–49 of 49 results for author: Rahman, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07497  [pdf

    cs.SD eess.AS

    A pilot protocol and cohort for the investigation of non-pathological variability in speech

    Authors: Nicholas Cummins, Lauren L. White, Zahia Rahman, Catriona Lucas, Tian Pan, Ewan Carr, Faith Matcham, Johnny Downs, Richard J. Dobson, Judith Dineley

    Abstract: Background Speech-based biomarkers have potential as a means for regular, objective assessment of symptom severity, remotely and in-clinic in combination with advanced analytical models. However, the complex nature of speech and the often subtle changes associated with health mean that findings are highly dependent on methodological and cohort choices. These are often not reported adequately in st… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: 29 pages. Pre peer review

    ACM Class: J.3

  2. Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System

    Authors: Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal

    Abstract: Since the beginning of this decade, several incidents report that false data injection attacks targeting intelligent connected vehicles cause huge industrial damage and loss of lives. Data Theft, Flooding, Fuzzing, Hijacking, Malware Spoofing and Advanced Persistent Threats have been immensely growing attack that leads to end-user conflict by abolishing trust on autonomous vehicle. Looking after t… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 11 pages, 11 figures, 4 tables AsiaCCS conference 2023

    MSC Class: 11T71; 68T05 ACM Class: E.3.1; I.2.1

    Journal ref: ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2023)

  3. arXiv:2307.06853  [pdf, other

    cs.CV

    LVLane: Deep Learning for Lane Detection and Classification in Challenging Conditions

    Authors: Zillur Rahman, Brendan Tran Morris

    Abstract: Lane detection plays a pivotal role in the field of autonomous vehicles and advanced driving assistant systems (ADAS). Despite advances from image processing to deep learning based models, algorithm performance is highly dependent on training data matching the local challenges such as extreme lighting conditions, partially visible lane markings, and sparse lane markings like Botts' dots. To addres… ▽ More

    Submitted 18 August, 2023; v1 submitted 13 July, 2023; originally announced July 2023.

    Comments: 7 pages

    Journal ref: 2023 IEEE International Conference on Intelligent Transportation Systems (ITSC)

  4. A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies

    Authors: Khondokar Fida Hasan, Leonie Simpson, Mir Ali Rezazadeh Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, Matthew McKague

    Abstract: Quantum computing is emerging as a significant threat to information protected by widely used cryptographic systems. Cryptographic methods, once deemed secure for decades, are now at risk of being compromised, posing a massive threat to the security of sensitive data and communications across enterprises worldwide. As a result, there is an urgent need to migrate to quantum-resistant cryptographic… ▽ More

    Submitted 21 February, 2024; v1 submitted 12 July, 2023; originally announced July 2023.

    Comments: 24 Pages

  5. arXiv:2212.09265  [pdf, other

    cs.IT eess.SP

    Diversity Analysis of Multi-Aperture UWOC System over EGG Channel with Pointing Errors

    Authors: Ziyaur Rahman, Ankur Bansal, S. M. Zafaruddin

    Abstract: Single aperture reception for underwater wireless optical communication (UWOC) is insufficient to deal with oceanic turbulence caused by the combined effect of temperature gradient and air bubbles. This paper analyzes the performance of multi-aperture reception for UWOC under channel irradiance fluctuations characterized by the mixture exponential generalized gamma (EGG) distribution. We analyze t… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

    Comments: This paper has been submitted in IEEE for possible publication

  6. arXiv:2211.15013  [pdf, other

    cs.CR

    Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks

    Authors: Anichur Rahman, Md. Jahidul Islam, Rafiqul Islam, Ayesha Aziz, Dipanjali Kundu, Sadia Sazzad, Md. Razaul Karim, Mahedi Hasan, Ziaur Rahman, Said Elnaffar, Shahab S. Band

    Abstract: Blockchain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give c… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

    Comments: 12 Pages 16 Figures 3 Tables

    ACM Class: E.3

  7. Pedestrian Emergency Braking in Ten Weeks

    Authors: Steven Nguyen, Zillur Rahman, Brendan Tan Morris

    Abstract: In the last decade, research in the field of autonomous vehicles has grown immensely, and there is a wealth of information available for researchers to rapidly establish an autonomous vehicle platform for basic maneuvers. In this paper, we design, implement, and test, in ten weeks, a PD approach to longitudinal control for pedestrian emergency braking. We also propose a lateral controller with a s… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: Accepted for publication, 6 pages

    Journal ref: 2022 IEEE International Conference on Vehicular Electronics and Safety (ICVES)

  8. A Real-Time Wrong-Way Vehicle Detection Based on YOLO and Centroid Tracking

    Authors: Zillur Rahman, Amit Mazumder Ami, Muhammad Ahsan Ullah

    Abstract: Wrong-way driving is one of the main causes of road accidents and traffic jam all over the world. By detecting wrong-way vehicles, the number of accidents can be minimized and traffic jam can be reduced. With the increasing popularity of real-time traffic management systems and due to the availability of cheaper cameras, the surveillance video has become a big source of data. In this paper, we pro… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: 5 pages

    Journal ref: 2020 IEEE Region 10 Symposium (TENSYMP), page:916-920

  9. An enhanced method of initial cluster center selection for K-means algorithm

    Authors: Zillur Rahman, Md. Sabir Hossain, Mohammad Hasan, Ahmed Imteaj

    Abstract: Clustering is one of the widely used techniques to find out patterns from a dataset that can be applied in different applications or analyses. K-means, the most popular and simple clustering algorithm, might get trapped into local minima if not properly initialized and the initialization of this algorithm is done randomly. In this paper, we propose a novel approach to improve initial cluster selec… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: 6 pages

    Journal ref: 2021 Innovations in Intelligent Systems and Applications Conference (ASYU)

  10. arXiv:2205.00384  [pdf

    cs.CR

    Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions

    Authors: Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev

    Abstract: Blockchain has recently been able to draw wider attention throughout the research community. Since its emergence, the world has seen the mind-blowing expansion of this new technology, which was initially developed as a pawn of digital currency more than a decade back. A self-administering ledger that ensures extensive data immutability over the peer-to-peer network has made it attractive for cyber… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

    Comments: 22 pages, 11 Figures, 7 Tables

    ACM Class: H.4

    Journal ref: MDPI Electronics May 2022

  11. Direct Air-to-Underwater Optical Wireless Communication: Statistical Characterization and Outage Performance

    Authors: Ziyaur Rahman, S. M. Zafaruddin, V. K. Chaubey

    Abstract: In general, a buoy relay is used to connect the underwater communication to the terrestrial network over a radio or optical wireless communication (OWC) link. The use of relay deployment may pose security and deployment issues. This paper investigates the feasibility of direct air-to-underwater (A2UW) communication from an over-the-sea OWC system to an underwater submarine without deploying a rela… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

    Comments: This work has been submitted to the IEEE for possible publication

    Journal ref: IEEE Transactions on Vehicular Technology, Vol. 72, No. 2, Feb 2023

  12. arXiv:2204.07782  [pdf, other

    cs.IT

    Multihop Optical Wireless Communication Over ${\cal{F}}$-Turbulence Channels and Generalized Pointing Errors with Fog-Induced Fading

    Authors: Ziyaur Rahman, S. M. Zafaruddin, V. K. Chaubey

    Abstract: Multihop relaying is a potential technique to mitigate channel impairments in optical wireless communications (OWC). In this paper, multiple fixed-gain amplify-and-forward (AF) relays are employed to enhance the OWC performance under the combined effect of atmospheric turbulence, pointing errors, and fog. We consider a long-range OWC link by modeling the atmospheric turbulence by the Fisher-Snedec… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

    Comments: This paper has been submitted in IEEE for possible publication

  13. Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

    Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam

    Abstract: Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these applications are constantly emerging and changing, and therefore, sophisticated and dependable defense solutions are necessary against such threats. With the rapid development of IoT networks and evolving threat types, the traditional machine lea… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: 12 pages, 13 Figures, 4 tables IEEE Transaction

    ACM Class: I.2; K.3.2

    Journal ref: IEEE Transactions on Industrial Informatics, 2022

  14. Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home

    Authors: Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar

    Abstract: The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security challenges. Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. When publi… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: 15 Pages, 7 Figures and 3 Tables

    ACM Class: E.3

    Journal ref: Electronics 2022, 11(7), 1083

  15. arXiv:2203.15232  [pdf, other

    cs.IT

    Unified Performance Assessment of Optical Wireless Communication over Multi-Layer Underwater Channels

    Authors: Ziyaur Rahman, Neel Vipulbhai Tailor, S. M. Zafaruddin, V. K. Chaubey

    Abstract: In this paper, we model the multi-layer vertical underwater link as a cascaded channel and unify the performance analysis for the underwater optical communication (UWOC) system using generalized Gamma (GG), exponential GG (EGG), exponentiated Weibull (EW), and Gamma-Gamma (ΓがんまΓがんま) oceanic turbulence models. We derive unified analytical expressions for probability density function (PDF) and cumulative… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: This paper has been submitted in IEEE for possible publication. arXiv admin note: substantial text overlap with arXiv:2203.14003

  16. arXiv:2203.14003  [pdf, other

    cs.IT eess.SP

    Optical Wireless Transmissions over Multi-layer Underwater Channels with Generalized Gamma Fading

    Authors: Suhrid Das, Ziyaur Rahman, S. M. Zafaruddin

    Abstract: Underwater optical communication (UWOC) is a potential solution for broadband connectivity in oceans and seas for underwater applications providing high data rate transmission with low latency and high reliability. Recent measurement campaigns suggest generalized Gamma distribution as a viable model for oceanic turbulence. In this paper, we analyze the performance of a UWOC system by modeling the… ▽ More

    Submitted 26 April, 2022; v1 submitted 26 March, 2022; originally announced March 2022.

    Comments: This paper has been accepted for presentation in the 2022 IEEE 95th Vehicular Technology Conference: VTC2022-Spring, Helsinki, Finland

  17. arXiv:2203.05192  [pdf, other

    cs.CR cs.AI

    A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles

    Authors: Mustain Billah, Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Rafiqul Islam

    Abstract: While the convergence of Artificial Intelligence (AI) techniques with improved information technology systems ensured enormous benefits to the Internet of Vehicles (IoVs) systems, it also introduced an increased amount of security and privacy threats. To ensure the security of IoVs data, privacy preservation methodologies have gained significant attention in the literature. However, these strategi… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  18. Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat

    Authors: Ziaur Rahman, Xun Yi Ibrahim Khalil

    Abstract: Industry 4.0 is all about doing things in a concurrent, secure, and fine-grained manner. IoT edge-sensors and their associated data play a predominant role in today's industry ecosystem. Breaching data or forging source devices after injecting advanced persistent threats (APT) damages the industry owners' money and loss of operators' lives. The existing challenges include APT injection attacks tar… ▽ More

    Submitted 30 January, 2022; originally announced January 2022.

    Comments: 10 Pages, 9 Figures, 3 Tables Published in the IEEE Internet of Things Journal

    ACM Class: I.2; J.6

    Journal ref: IEEE Internet of Things Journal Jan 2022

  19. Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

    Authors: Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Sumi

    Abstract: Several efforts have been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor-oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering th… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: 17 Pages, 3 Tables, 7 Figures, Conference

    ACM Class: H.4.1

  20. Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability

    Authors: Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev

    Abstract: The world has been experiencing a mind-blowing expansion of blockchain technology since it was first introduced as an emerging means of cryptocurrency called bitcoin. Currently, it has been regarded as a pervasive frame of reference across almost all research domains, ranging from virtual cash to agriculture or even supply-chain to the Internet of Things. The ability to have a self-administering r… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: 18 Pages, 9 Figures, 1 Table Conference

    ACM Class: H.1.1

  21. Software Process Improvement Based on Defect Prevention Using Capability and Testing Model Integration in Extreme Programming

    Authors: Md. Habibur Rahman, Ziaur Rahman, Md. Al - Mustanjid, Muhammad Shahin Uddin, Mehedy Hasan Rafsan Jany

    Abstract: Nowadays, Software Process Improvement popularly known as SPI has been able to receive an immense concern in the continuous process to purify software quality. Several Agile methodologies previously have worked with Extreme programming (XP). Before improving the process, defect prevention (DP) is inevitable. In addition, DP largely depends on defect detection either found earlier in the design and… ▽ More

    Submitted 11 July, 2021; originally announced July 2021.

    Comments: 10 Pages, 4 Figures, 2 Tables

    ACM Class: D.2.5; D.2.3; D.2.4; D.2.11

    Journal ref: 2021 LNICST, ICONCS, volume 325, 270-279

  22. arXiv:2107.05172  [pdf

    cs.CR cs.AI

    Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks

    Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed

    Abstract: The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle Network (IVN) systems for its simple, suitable, and robust architecture. The risk of IVN devices has still been insecure and vulnerable due to the complex data-intensive architectures which greatly increase the accessibility to unauthorized networks and the possibility of various types of cyberattacks.… ▽ More

    Submitted 11 July, 2021; originally announced July 2021.

    Comments: 23 Pages, 14 Figures, 6 Tables with Appendix

    ACM Class: I.2.6; K.3.2

    Journal ref: MDPI Sensor, 2021, 21(14), 4736

  23. Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes

    Authors: Mustain Billah, Adnan Anwar, Ziaur Rahman, Syed Md. Galib

    Abstract: Accurate building energy prediction is useful in various applications starting from building energy automation and management to optimal storage control. However, vulnerabilities should be considered when designing building energy prediction models, as intelligent attackers can deliberately influence the model performance using sophisticated attack models. These may consequently degrade the predic… ▽ More

    Submitted 30 June, 2021; originally announced July 2021.

    Comments: 17 Pages, 7 Figures, 1 table

    ACM Class: H.1

    Journal ref: Energies 2021, 14(13), 3887

  24. arXiv:2107.01032  [pdf

    eess.SY cs.LG

    Design and implementation of an islanded hybrid microgrid system for a large resort center for Penang Island with the proper application of excess energy

    Authors: SK. A. Shezan, S. Rawdah, Shafin Ali, Ziaur Rahman

    Abstract: The energy demand is growing daily at an accelerated pace due to the internationalization and development of civilization. Yet proper economic utilization of additional energy generated by the Islanded Hybrid Microgrid System (IHMS) that was not consumed by the load is a major global challenge. To resolve the above-stated summons, this research focuses on a multi-optimal combination of IHMS for th… ▽ More

    Submitted 30 June, 2021; originally announced July 2021.

    Comments: 15 Pages, 14 Figures, 6 Tables

    ACM Class: J.7

    Journal ref: Environ Prog Sustainable Energy. 2021;e13584

  25. Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System

    Authors: Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman

    Abstract: There has been an intense concern for security alternatives because of the recent rise of cyber attacks, mainly targeting critical systems such as industry, medical, or energy ecosystem. Though the latest industry infrastructures largely depend on AI-driven maintenance, the prediction based on corrupted data undoubtedly results in loss of life and capital. Admittedly, an inadequate data-protection… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 07 Pages, 4 Figures, IEEE Communication Magazine

    ACM Class: E.3

    Journal ref: in IEEE Communications Magazine, vol. 59, no. 5, pp. 128-134, May 2021

  26. Performance of Dual-Hop Relaying for OWC System Over Foggy Channel with Pointing Errors and Atmospheric Turbulence

    Authors: Ziyaur Rahman, Tejas Nimish Shah, S. M. Zafaruddin, V. K. Chaubey

    Abstract: Optical wireless communication (OWC) over atmospheric turbulence and pointing errors is a well-studied topic. Still, there is limited research on signal fading due to random fog in an outdoor environment for terrestrial wireless communications. In this paper, we analyze the performance of a decode-and-forward (DF) relaying under the combined effect of random fog, pointing errors, and atmospheric t… ▽ More

    Submitted 23 December, 2021; v1 submitted 29 May, 2021; originally announced May 2021.

    Comments: 16 pages, 5 figures, 3 Tables. Accepted for publication in the IEEE Transactions on Vehicular Technology

    Journal ref: IEEE Transactions on Vehicular Technology, Early Access, Dec 2021

  27. arXiv:2103.08294  [pdf, other

    cs.CV

    3D-FFS: Faster 3D object detection with Focused Frustum Search in sensor fusion based networks

    Authors: Aniruddha Ganguly, Tasin Ishmam, Khandker Aftarul Islam, Md Zahidur Rahman, Md. Shamsuzzoha Bayzid

    Abstract: In this work we propose 3D-FFS, a novel approach to make sensor fusion based 3D object detection networks significantly faster using a class of computationally inexpensive heuristics. Existing sensor fusion based networks generate 3D region proposals by leveraging inferences from 2D object detectors. However, as images have no depth information, these networks rely on extracting semantic features… ▽ More

    Submitted 4 October, 2021; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: Contains 6 pages and 2 figures. Manuscript accepted and presented in the IEEE International Conference on Intelligent Robots and Systems (IROS) 2021

  28. DistB-SDoIndustry: Enhancing Security in Industry 4.0 Services based on Distributed Blockchain through Software Defined Networking-IoT Enabled Architecture

    Authors: Anichur Rahman, Umme Sara, Dipanjali Kundu, Saiful Islam, Md. Jahidul Islam, Mahedi Hasan, Ziaur Rahman, Mostofa Kamal Nasir

    Abstract: The concept of Industry 4.0 is a newly emerging focus of research throughout the world. However, it has lots of challenges to control data, and it can be addressed with various technologies like Internet of Things (IoT), Big Data, Artificial Intelligence (AI), Software Defined Networking (SDN), and Blockchain (BC) for managing data securely. Further, the complexity of sensors, appliances, sensor n… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: 8 Pages, 6 Figures

    ACM Class: J.7

    Journal ref: IJACSA, 11(9), 2020

  29. DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium

    Authors: Anichur Rahman, Md. Jahidul Islam, Ziaur Rahman, Md. Mahfuz Reza, Adnan Anwar, M. A. Parvez Mahmud, Mostofa Kamal Nasir, Rafidah Md Noor

    Abstract: Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtual… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: 17 Pages, 12 Tables, 17 Figures

    ACM Class: H.1.1

    Journal ref: EEE Access, vol. 8, pp. 209594-209609, 2020

  30. arXiv:2009.07250  [pdf, other

    cs.CV cs.LG q-bio.QM

    PointIso: Point Cloud Based Deep Learning Model for Detecting Arbitrary-Precision Peptide Features in LC-MS Map through Attention Based Segmentation

    Authors: Fatema Tuz Zohora, M Ziaur Rahman, Ngoc Hieu Tran, Lei Xin, Baozhen Shan, Ming Li

    Abstract: A promising technique of discovering disease biomarkers is to measure the relative protein abundance in multiple biofluid samples through liquid chromatography with tandem mass spectrometry (LC-MS/MS) based quantitative proteomics. The key step involves peptide feature detection in LC-MS map, along with its charge and intensity. Existing heuristic algorithms suffer from inaccurate parameters since… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

    Comments: 16 pages (main text) with 10 figures, then supplementary material of about 5 pages. preprint of journal submission

  31. Guiding Software Developers by Social Networking Application Plug-in using the Multiple Bridge Source Repository through a Data Mining Integrated Approach

    Authors: Anjela Diana Corraya, Mousumi Akter Sumi, Sadia Islam Shachi, Ziaur Rahman

    Abstract: In today's world, social networking is an important (power full) medium of mass communication. People of almost all classes have been interacting with each other and sharing their views, moments, and ideas by using enormous user-friendly applications in different social networking sites. It's really unbelievable to find a person who never heard about the social network. The available social networ… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: 4 pages, 4 figures, 2 tables, Received the Best Paper Award

    ACM Class: K.6.3

    Journal ref: 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), Dhaka, 2015, pp. 118-121

  32. Better User Recommendations using Enhancing Software Development Process Repository

    Authors: Ziaur Rahman, Md. Kamrul Hasan

    Abstract: Reusing previously completed software repository to enhance the development process is a common phenomenon. If developers get suggestions from the existing projects they might be benefited a lot what they eventually expect while coding. The strategies available in this field have been rapidly changing day by day. There are a number of efforts that have been focusing on mining process and construct… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 6 Pages 6 Figures 8 Tables

    ACM Class: K.6.3

    Journal ref: 2015 18th International Conference on Computer and Information Technology (ICCIT), Dhaka, 2015, pp. 70-75

  33. Database Optimization to Recommend Software Developers using Canonical Order Tree

    Authors: T. M. Amir-Ul-Haque Bhuiyan, Mehedi Hasan Talukdar, Ziaur Rahman, Dr. Mohammad Motiur Rahman

    Abstract: Recently frequent and sequential pattern mining algorithms have been widely used in the field of software engineering to mine various source code or specification patterns. In practice software evolves from one version to another is needed for providing extra facilities to user. This kind of task is challenging in this domain since the database is usually updated in all kinds of manners such as in… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 4 Pages 8 Figures 7 Tables

    ACM Class: D.1.1

    Journal ref: 2015 International Conference on Advances in Electrical Engineering (ICAEE), Dhaka, 2015, pp. 157-160

  34. Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud based on Packet Utilization

    Authors: Ziaur Rahman, Asma Islam Swapna, Habibur Rahman Habib, Akramuzzaman Shaoun

    Abstract: Cloud computing is one of the highly flexible, confidential and easily accessible medium of platforms and provides powerful service for sharing information over the Internet. Cloud security has become an emerging issue as network manager eventually encounter its data protection, vulnerability during information exchange on the cloud system. We can protect our data from unwanted access on a hybrid… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 6 Pages, 2 Tables, 7 Figures

    ACM Class: C.2.1

    Journal ref: 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), Wuhan, 2016, pp. 253-256

  35. Helping Software Developers through Offline Repository Based API Searching in Data MiningIntegrated Environment

    Authors: Ratul Uddin Ashraf, Anujoy Das, Ziaur Rahman, Ali Newaz Bahar, Husne Ara Rubaiyeat

    Abstract: Software development is getting changed so rapidly. It will be highly benefited if we can accelerate software development process by guiding developers. Appropriate guidelines and accurate recommendations to developers during development process can reduce software development expenses, as well as can save valuable times of developers. There are a number of approaches to speed up the software deve… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 4 Pages, 4 Figures 3 Tables

    ACM Class: K.6.3

    Journal ref: 2015 2nd International Conference on Electrical Information and Communication Technologies (EICT)

  36. Enhancing Software Development Process Using Automated Adaptation of Object Ensembles

    Authors: Md. Emran, Humaun Kabir, Ziaur Rahman, Nazrul Islam

    Abstract: Software development has been changing rapidly. This development process can be influenced through changing developer friendly approaches. We can save time consumption and accelerate the development process if we can automatically guide programmer during software development. There are some approaches that recommended relevant code snippets and APIitems to the developer. Some approaches apply gene… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: 6 pages, 5 figures, 2 tables published in the IEEE Sponsored Conferences

    Journal ref: 2016 IEEE EICT Conference

  37. arXiv:2005.02652  [pdf

    cs.SE

    Enhancing Software Development Process (ESDP) using Data Mining Integrated Environment

    Authors: Ziaur Rahman

    Abstract: Nowadays, it has become a basic need to reuse existing Application Programming Interface (API), Class Libraries, and frameworks for rapid software development. Software developers often reuse this by calling the respective APIs or libraries. But in doing so, developers usually encounter different problems in searching for appropriate code snippets. In most cases, API and Libraries are complex and… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

    Comments: 67 pages, 27 figures, 12 tables, Masters Thesis

    Journal ref: 23 October 2015 Masters Thesis of Islamic University of Technology

  38. arXiv:2003.13786  [pdf, other

    cs.DS

    Generating Weakly Chordal Graphs from Arbitrary Graphs

    Authors: Sudiksha Khanduja, Aayushi Srivastava, Md. Zamilur Rahman, Asish Mukhopadhyay

    Abstract: We propose a scheme for generating a weakly chordal graph from a randomly generated input graph, G = (V, E). We reduce G to a chordal graph H by adding fill-edges, using the minimum vertex degree heuristic. Since H is necessarily a weakly chordal graph, we use an algorithm for deleting edges from a weakly chordal graph that preserves the weak chordality property of H. The edges that are candidates… ▽ More

    Submitted 19 March, 2020; originally announced March 2020.

    Comments: 15 pages, 29 figures

  39. arXiv:2002.07207  [pdf, ps, other

    cs.DS cs.DM math.CO

    Semi-dynamic Algorithms for Strongly Chordal Graphs

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay

    Abstract: There is an extensive literature on dynamic algorithms for a large number of graph theoretic problems, particularly for all varieties of shortest path problems. Germane to this paper are a number fully dynamic algorithms that are known for chordal graphs. However, to the best of our knowledge no study has been done for the problem of dynamic algorithms for strongly chordal graphs. To address this… ▽ More

    Submitted 30 January, 2020; originally announced February 2020.

    Comments: 12 pages and 13 figures

  40. arXiv:1909.02545  [pdf, ps, other

    cs.DS math.CO

    Strongly Chordal Graph Generation using Intersection Graph Characterisation

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay

    Abstract: Strongly chordal graphs are a subclass of chordal graphs. Farber also established a number of different characterisations for this class of graphs. These include an intersection graph characterisation that is analogous to a similar characterisation for chordal graphs. Seker et al. exploited this characterisation of chordal graphs to obtain an algorithm for generating them. In this paper, we propos… ▽ More

    Submitted 25 July, 2019; originally announced September 2019.

    Comments: 5 pages

  41. arXiv:1906.01056  [pdf, ps, other

    cs.DS

    A separator-based method for generating weakly chordal graphs

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay, Yash P. Aneja

    Abstract: We propose a scheme for generating a weakly chordal graph on n vertices with m edges. In this method, we first construct a tree and then generate an orthogonal layout (which is a weakly chordal graph on the n vertices) based on this tree. In the next and final step, we insert additional edges to give us a weakly chordal graph on m edges. Our algorithm ensures that the graph remains weakly chordal… ▽ More

    Submitted 8 May, 2019; originally announced June 2019.

    Comments: 14 pages and 30 figures

  42. arXiv:1804.09019  [pdf, ps, other

    cs.DS

    An Algorithm for Generating Strongly Chordal Graphs

    Authors: Md. Zamilur Rahman, Asish Mukhopadhyay, Yash P. Aneja

    Abstract: Strongly chordal graphs are a subclass of chordal graphs. The interest in this subclass stems from the fact that many problems which are NP-complete for chordal graphs are solvable in polynomial time for this subclass. However, we are not aware of any algorithm that can generate instances of this class, often necessary for testing purposes. In this paper, we address this issue. Our algorithm first… ▽ More

    Submitted 14 April, 2018; originally announced April 2018.

    Comments: 9 pages and 6 figures

  43. arXiv:1705.09643  [pdf, ps, other

    cs.DS

    A greedy approximation algorithm for the minimum (2,2)-connected dominating set problem

    Authors: Yash P. Aneja, Asish Mukhopadhyay, Md. Zamilur Rahman

    Abstract: Using a connected dominating set (CDS) to serve as the virtual backbone of a wireless sensor network (WSN) is an effective way to save energy and reduce the impact of broadcasting storms. Since nodes may fail due to accidental damage or energy depletion, it is desirable that the virtual backbone is fault tolerant. This could be modeled as a k-connected, m-fold dominating set ((k,m)-CDS). Given a v… ▽ More

    Submitted 26 May, 2017; originally announced May 2017.

  44. arXiv:1209.5982  [pdf, other

    cs.CR cs.CV

    PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

    Authors: Robert Templeman, Zahid Rahman, David Crandall, Apu Kapadia

    Abstract: As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken cr… ▽ More

    Submitted 26 September, 2012; originally announced September 2012.

  45. ReDS: A Framework for Reputation-Enhanced DHTs

    Authors: Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew Wright

    Abstract: Distributed Hash Tables (DHTs) such as Chord and Kademlia offer an efficient solution for locating resources in peer-to-peer networks. Unfortunately, malicious nodes along a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using a combination of redundancy and diversity in the paths taken by redundan… ▽ More

    Submitted 21 September, 2012; originally announced September 2012.

    Journal ref: IEEE TPDS Special Issue on Trust, Security, and Privacy, Feb. 2014, Vol. 5, Issue 2

  46. A Comprehensive Survey of MAC Protocols for Wireless Body Area Networks

    Authors: A. Rahim, N. Javaid, M. Aslam, Z. Rahman, U. Qasim, Z. A. Khan

    Abstract: In this paper, we present a comprehensive study of Medium Access Control (MAC) protocols developed for Wireless Body Area Networks (WBANs). In WBANs, small batteryoperated on-body or implanted biomedical sensor nodes are used to monitor physiological signs such as temperature, blood pressure, ElectroCardioGram (ECG), ElectroEncephaloGraphy (EEG) etc. We discuss design requirements for WBANs with m… ▽ More

    Submitted 11 August, 2012; originally announced August 2012.

    Comments: BioSPAN-2012 with 7th IEEE International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2012), Victoria, Canada, 2012

  47. CEEC: Centralized Energy Efficient Clustering A New Routing Protocol for WSNs

    Authors: M. Aslam, T. Shah, N. Javaid, A. Rahim, Z. Rahman, Z. A. Khan

    Abstract: Energy efficient routing protocol for Wireless Sensor Networks (WSNs) is one of the most challenging task for researcher. Hierarchical routing protocols have been proved more energy efficient routing protocols, as compare to flat and location based routing protocols. Heterogeneity of nodes with respect to their energy level, has also added extra lifespan for sensor network. In this paper, we propo… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Comments: 9th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Seoul, Korea June, 2012

  48. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    Authors: Dewan Md. Farid, Nouria Harbi, Mohammad Zahidur Rahman

    Abstract: In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The pro… ▽ More

    Submitted 25 May, 2010; originally announced May 2010.

    Comments: 14 Pages, IJNSA

    Journal ref: International Journal of Network Security & Its Applications 2.2 (2010) 12-25

  49. arXiv:1005.0919  [pdf

    cs.CR

    Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection

    Authors: Dewan Md. Farid, Mohammad Zahidur Rahman

    Abstract: In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive naïve Bayesian tree, which not only reduce the false positives (FP) at acceptable level, but also scale up the detection rates (DR) for different types of network intrusions. Due to the tremendous growth of network-based servi… ▽ More

    Submitted 6 May, 2010; originally announced May 2010.

    Comments: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/