Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Khan, R H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.17729  [pdf

    cs.LG cs.AI cs.CV

    Improving Traffic Density Forecasting in Intelligent Transportation Systems Using Gated Graph Neural Networks

    Authors: Razib Hayat Khan, Jonayet Miah, S M Yasir Arafat, M M Mahbubul Syeed, Duc M Ca

    Abstract: This study delves into the application of graph neural networks in the realm of traffic forecasting, a crucial facet of intelligent transportation systems. Accurate traffic predictions are vital for functions like trip planning, traffic control, and vehicle routing in such systems. Three prominent GNN architectures Graph Convolutional Networks (Graph Sample and Aggregation) and Gated Graph Neural… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

  2. A Hybrid Evolutionary Approach to Solve University Course Allocation Problem

    Authors: Dibyo Fabian Dofadar, Riyo Hayat Khan, Shafqat Hasan, Towshik Anam Taj, Arif Shakil, Mahbub Majumdar

    Abstract: This paper discusses various types of constraints, difficulties and solutions to overcome the challenges regarding university course allocation problem. A hybrid evolutionary algorithm has been defined combining Local Repair Algorithm and Modified Genetic Algorithm to generate the best course assignment. After analyzing the collected dataset, all the necessary constraints were formulated. These co… ▽ More

    Submitted 24 July, 2023; v1 submitted 15 November, 2022; originally announced December 2022.

  3. A Comparative Study on COVID-19 Fake News Detection Using Different Transformer Based Models

    Authors: Sajib Kumar Saha Joy, Dibyo Fabian Dofadar, Riyo Hayat Khan, Md. Sabbir Ahmed, Rafeed Rahman

    Abstract: The rapid advancement of social networks and the convenience of internet availability have accelerated the rampant spread of false news and rumors on social media sites. Amid the COVID 19 epidemic, this misleading information has aggravated the situation by putting peoples mental and physical lives in danger. To limit the spread of such inaccuracies, identifying the fake news from online platforms… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  4. arXiv:2203.06721  [pdf

    cs.CV

    Food Recipe Recommendation Based on Ingredients Detection Using Deep Learning

    Authors: Md. Shafaat Jamil Rokon, Md Kishor Morol, Ishra Binte Hasan, A. M. Saif, Rafid Hussain Khan

    Abstract: Food is essential for human survival, and people always try to taste different types of delicious recipes. Frequently, people choose food ingredients without even knowing their names or pick up some food ingredients that are not obvious to them from a grocery store. Knowing which ingredients can be mixed to make a delicious food recipe is essential. Selecting the right recipe by choosing a list of… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

    Comments: Accepted at ICCA 2022

  5. arXiv:1209.1678  [pdf

    cs.CR

    Policy based intrusion detection and response system in hierarchical WSN architecture

    Authors: Mohammad Saiful Islam Mamun, A. F. M Sultanul Kabir, Md. Sakhawat Hossen, Md. Razib Hayat Khan

    Abstract: In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose… ▽ More

    Submitted 7 September, 2012; originally announced September 2012.

    Comments: 5 pages, IEEE International Conference on Wireless Communication,Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless Vitae'09, May 17-20, 2009. Aalborg, Denmark. ISBN 978-1-4244-4067-2

  6. arXiv:1208.3769  [pdf

    cs.NI

    WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure

    Authors: A. F. M Sultanul Kabir, Md. Razib Hayat Khan, Abul Ahsan Md. Mahmudul Haque, Mohammad Saiful Islam Mamun

    Abstract: This paper presents a description of the existing wireless technology Wi-Fi and WiMAX, and try to compare Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16), with respect to which technology provides a better solution to build a wireless access infrastructure. Each technology is evaluated based on some key characteristics. This paper concludes with a statement of, which technology will be the best and mo… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 6 pages,2 figures, Conference: ICLAN'2007, IEEE France

    ACM Class: C.2.1

  7. arXiv:1002.1146  [pdf

    cs.NI

    Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches

    Authors: Md. Sakhawat Hossen, A. F. M. Sultanul Kabir, Razib Hayat Khan, Abdullah Azfar

    Abstract: The increasing role of home automation in routine life and the rising demand for sensor networks enhanced wireless personal area networks (WPANs) development, pervasiveness of wireless & wired network, and research. Soon arose the need of implementing the Internet Protocol in these devices in order to WPAN standards, raising the way for questions on how to provide seamless communication between… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php