Zobrazeno 1 - 10
of 160 882
pro vyhledávání: '"A, Hossain"'
Autor:
Morshed, Abrar, Shihab, Abdulla Al, Jahin, Md Abrar, Nahian, Md Jaber Al, Sarker, Md Murad Hossain, Wadud, Md Sharjis Ibne, Uddin, Mohammad Istiaq, Siraji, Muntequa Imtiaz, Anjum, Nafisa, Shristy, Sumiya Rajjab, Rahman, Tanvin, Khatun, Mahmuda, Dewan, Md Rubel, Hossain, Mosaddeq, Sultana, Razia, Chakma, Ripel, Emon, Sonet Barua, Islam, Towhidul, Hussain, Mohammad Arafat
The COVID-19 pandemic has affected millions of people globally, with respiratory organs being strongly affected in individuals with comorbidities. Medical imaging-based diagnosis and prognosis have become increasingly popular in clinical settings for
Externí odkaz:
http://arxiv.org/abs/2411.05029
Autor:
Miah, Abu Saleh Musa, Tusher, Md Mahbubur Rahman, Hossain, Md. Moazzem, Hossain, Md Mamun, Rahim, Md Abdur, Hamid, Md Ekramul, Islam, Md. Saiful, Shin, Jungpil
In recent years, advanced artificial intelligence technologies, such as ChatGPT, have significantly impacted various fields, including education and research. Developed by OpenAI, ChatGPT is a powerful language model that presents numerous opportunit
Externí odkaz:
http://arxiv.org/abs/2411.02816
Compositional and Interface Engineering of Hybrid Metal Halide Perovskite Thin Films for Solar Cells
Autor:
Hossain, Kashimul
Perovskite solar cells (PSCs) are the fastest-growing photovoltaic (PV) technology in the solar cell community and have reached an efficiency close to that of commercial silicon (Si) solar cells. The organic-inorganic halide perovskite solar cell is
Externí odkaz:
http://arxiv.org/abs/2411.17919
Autor:
Sultan, Md. Fahim, Karim, Tasmin, Shaon, Md. Shazzad Hossain, Wardat, Mohammad, Akter, Mst Shapna
In software, a vulnerability is a defect in a program that attackers might utilize to acquire unauthorized access, alter system functions, and acquire information. These vulnerabilities arise from programming faults, design flaws, incorrect setups, a
Externí odkaz:
http://arxiv.org/abs/2411.17621
Automated detection of software vulnerabilities is critical for enhancing security, yet existing methods often struggle with the complexity and diversity of modern codebases. In this paper, we introduce EnStack, a novel ensemble stacking framework th
Externí odkaz:
http://arxiv.org/abs/2411.16561
SAGEval: The frontiers of Satisfactory Agent based NLG Evaluation for reference-free open-ended text
Autor:
Ghosh, Reshmi, Yao, Tianyi, Chen, Lizzy, Hasan, Sadid, Chen, Tianwei, Bernal, Dario, Jiao, Huitian, Hossain, H M Sajjad
Large Language Model (LLM) integrations into applications like Microsoft365 suite and Google Workspace for creating/processing documents, emails, presentations, etc. has led to considerable enhancements in productivity and time savings. But as these
Externí odkaz:
http://arxiv.org/abs/2411.16077
Autor:
Akthar, Shiriny, Hossain, Md. Wali
We present a general parametrization for energy density of a quintessence field, a minimally coupled canonical scalar field which rolls down slowly during the late time. This parametrization can mimic all classes of quintessence dynamics, namely scal
Externí odkaz:
http://arxiv.org/abs/2411.15892
Preserving topological structures is important in real-world applications, particularly in sensitive domains such as healthcare and medicine, where the correctness of human anatomy is critical. However, most existing image editing models focus on man
Externí odkaz:
http://arxiv.org/abs/2411.16714
Autor:
Hossain, Md Shafayat, Zhang, Qi, Choi, Eun Sang, Ratkovski, Danilo, Lüscher, Bernhard, Li, Yongkai, Jiang, Yu-Xiao, Litskevich, Maksim, Cheng, Zi-Jia, Yin, Jia-Xin, Cochran, Tyler A., Casas, Brian, Kim, Byunghoon, Yang, Xian, Liu, Jinjin, Yao, Yugui, Bangura, Ali, Wang, Zhiwei, Fischer, Mark H., Neupert, Titus, Balicas, Luis, Hasan, M. Zahid
Determining the types of superconducting order in quantum materials is a challenge, especially when multiple degrees of freedom, such as bands or orbitals, contribute to the fermiology and when superconductivity competes, intertwines, or coexists wit
Externí odkaz:
http://arxiv.org/abs/2411.15333
In the recent years, we have witnessed a paradigm shift in the field of Computer Vision, with the forthcoming of the transformer architecture. Detection Transformers has become a state of the art solution to object detection and is a potential candid
Externí odkaz:
http://arxiv.org/abs/2411.15110