Zobrazeno 1 - 10
of 493
pro vyhledávání: '"Ahmed, Sabbir"'
Autor:
Tabassum, Farzana, Islam, Sabrina, Rizwan, Siana, Sobhan, Masrur, Ahmed, Tasnim, Ahmed, Sabbir, Chowdhury, Tareque Mohmud
Gene expression analysis is a critical method for cancer classification, enabling precise diagnoses through the identification of unique molecular signatures associated with various tumors. Identifying cancer-specific genes from gene expression value
Externí odkaz:
http://arxiv.org/abs/2410.07260
Autor:
Rahman, Md. Atiqur, Asad, Nahian Ibn, Omi, Md. Mushfiqul Haque, Hasan, Md. Bakhtiar, Ahmed, Sabbir, Kabir, Md. Hasanul
Automatic Traffic Sign Recognition is paramount in modern transportation systems, motivating several research endeavors to focus on performance improvement by utilizing large-scale datasets. As the appearance of traffic signs varies across countries,
Externí odkaz:
http://arxiv.org/abs/2409.14852
Autor:
Haque, Md. Rafid, Munna, Sakibul Islam, Ahmed, Sabbir, Islam, Md. Tahmid, Onik, Md Mehedi Hassan, Rahman, A. B. M. Ashikur
Version control systems (VCS) are essential for software development, yet centralized VCS present risks such as data loss, security breaches, and ownership disputes. While blockchain-based approaches to decentralized source code repository hosting ha
Externí odkaz:
http://arxiv.org/abs/2409.14530
Hand shadow puppetry, also known as shadowgraphy or ombromanie, is a form of theatrical art and storytelling where hand shadows are projected onto flat surfaces to create illusions of living creatures. The skilled performers create these silhouettes
Externí odkaz:
http://arxiv.org/abs/2408.10360
Autor:
Zhou, Ranyang, Liu, Jacqueline T., Kochar, Nakul, Ahmed, Sabbir, Rakin, Adnan Siraj, Angizi, Shaahin
RowHammer stands out as a prominent example, potentially the pioneering one, showcasing how a failure mechanism at the circuit level can give rise to a significant and pervasive security vulnerability within systems. Prior research has approached Row
Externí odkaz:
http://arxiv.org/abs/2404.18396
In this work, we propose DRAM-Locker as a robust general-purpose defense mechanism that can protect DRAM against various adversarial Deep Neural Network (DNN) weight attacks affecting data or page tables. DRAM-Locker harnesses the capabilities of in-
Externí odkaz:
http://arxiv.org/abs/2312.09027
Autor:
Ahmed, Sabbir, Nahiduzzaman, Md, Islam, Tariqul, Bappy, Faisal Haque, Zaman, Tarannum Shaila, Hasan, Raiful
With the surge in cloud storage adoption, enterprises face challenges managing data duplication and exponential data growth. Deduplication mitigates redundancy, yet maintaining redundancy ensures high availability, incurring storage costs. Balancing
Externí odkaz:
http://arxiv.org/abs/2312.08309
With deep learning deployed in many security-sensitive areas, machine learning security is becoming progressively important. Recent studies demonstrate attackers can exploit system-level techniques exploiting the RowHammer vulnerability of DRAM to de
Externí odkaz:
http://arxiv.org/abs/2305.08034
Autor:
Ashmafee, Md. Hamjajul, Ahmed, Tasnim, Ahmed, Sabbir, Hasan, Md. Bakhtiar, Jahan, Mst Nura, Rahman, A. B. M. Ashikur
Correct identification and categorization of plant diseases are crucial for ensuring the safety of the global food supply and the overall financial success of stakeholders. In this regard, a wide range of solutions has been made available by introduc
Externí odkaz:
http://arxiv.org/abs/2304.06520
Autor:
Miah, Jonayet, Mamun, Muntasir, Rahman, Md Minhazur, Mahmud, Md Ishtyaq, Ahmed, Sabbir, Nasir, Md Hasan Bin
Mobile phones and other electronic gadgets or devices have aided in collecting data without the need for data entry. This paper will specifically focus on Mobile health data. Mobile health data use mobile devices to gather clinical health data and tr
Externí odkaz:
http://arxiv.org/abs/2304.04839