var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fusers%2F6538716%2Fcollections%2FHQSSXXRW%2Fitems%3Fkey%3DeWyANMLLCecfw2Uc56WwG3XK%26format%3Dbibtex%26limit%3D100&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fusers%2F6538716%2Fcollections%2FHQSSXXRW%2Fitems%3Fkey%3DeWyANMLLCecfw2Uc56WwG3XK%26format%3Dbibtex%26limit%3D100&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fusers%2F6538716%2Fcollections%2FHQSSXXRW%2Fitems%3Fkey%3DeWyANMLLCecfw2Uc56WwG3XK%26format%3Dbibtex%26limit%3D100&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2021\n \n \n (14)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Anonymous Person Tracking Across Multiple Camera Using Color Histogram and Body Pose Estimation.\n \n \n \n\n\n \n Tabassum, T.; Tasnim, N.; Nizam, N.; and Al Mamun, S.\n\n\n \n\n\n\n In Kaiser, M. S.; Bandyopadhyay, A.; Mahmud, M.; and Ray, K., editor(s), Proceedings of International Conference on Trends in Computational and Cognitive Engineering, of Advances in Intelligent Systems and Computing, pages 639–648, Singapore, 2021. Springer\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{tabassum_anonymous_2021,\n\taddress = {Singapore},\n\tseries = {Advances in {Intelligent} {Systems} and {Computing}},\n\ttitle = {Anonymous {Person} {Tracking} {Across} {Multiple} {Camera} {Using} {Color} {Histogram} and {Body} {Pose} {Estimation}},\n\tisbn = {978-981-334-673-4},\n\tdoi = {10.1007/978-981-33-4673-4_52},\n\tabstract = {Tabassum, TasnuvaTasnim, NusratNizam, NusaibaAl Mamun, ShamimTracking anonymous persons is a necessary domain of the computer vision sector for security purposes. Nowadays, most of the important areas are covered with video surveillance cameras to tackle unwanted occurrences. Previous learning-based studies overlooked the checking of similarities of features of a person among multiple cameras for person detection and tracking. Only color feature-based studies may fail to recognize the same dressed different persons. In this paper, we are proposing a method for tracking and re-identification of a person in multiple cameras using color-based features with posture estimation in real-time scenarios. For this, we have used YOLOv3 for person tracking and OpenCV and OpenPose libraries for feature collection [16]. Model accuracy is tested on experiment video of single person multi-camera environmental scenario. In our proposal, we have taken HSV values of the most dominant color (DMC) for a targeted person on a camera as well as the fast Fourier transformed spectrum magnitude (FSM) as our feature vector to compare with another subject on different cameras. Our experiment shows that the re-identification of a person in different camera locations can be done successfully using cosine similarity and one ID is to be assigned to the same person and different IDs to different persons among the cameras to make the security issue more reliable, accurate, and faster.},\n\tlanguage = {en},\n\tbooktitle = {Proceedings of {International} {Conference} on {Trends} in {Computational} and {Cognitive} {Engineering}},\n\tpublisher = {Springer},\n\tauthor = {Tabassum, Tasnuva and Tasnim, Nusrat and Nizam, Nusaiba and Al Mamun, Shamim},\n\teditor = {Kaiser, M. Shamim and Bandyopadhyay, Anirban and Mahmud, Mufti and Ray, Kanad},\n\tyear = {2021},\n\tkeywords = {Color Histogram, FFT, FSM, Pose Estimation, Re-identification, Tracking},\n\tpages = {639--648},\n}\n\n
\n
\n\n\n
\n Tabassum, TasnuvaTasnim, NusratNizam, NusaibaAl Mamun, ShamimTracking anonymous persons is a necessary domain of the computer vision sector for security purposes. Nowadays, most of the important areas are covered with video surveillance cameras to tackle unwanted occurrences. Previous learning-based studies overlooked the checking of similarities of features of a person among multiple cameras for person detection and tracking. Only color feature-based studies may fail to recognize the same dressed different persons. In this paper, we are proposing a method for tracking and re-identification of a person in multiple cameras using color-based features with posture estimation in real-time scenarios. For this, we have used YOLOv3 for person tracking and OpenCV and OpenPose libraries for feature collection [16]. Model accuracy is tested on experiment video of single person multi-camera environmental scenario. In our proposal, we have taken HSV values of the most dominant color (DMC) for a targeted person on a camera as well as the fast Fourier transformed spectrum magnitude (FSM) as our feature vector to compare with another subject on different cameras. Our experiment shows that the re-identification of a person in different camera locations can be done successfully using cosine similarity and one ID is to be assigned to the same person and different IDs to different persons among the cameras to make the security issue more reliable, accurate, and faster.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ALO: AI for Least Observed People.\n \n \n \n\n\n \n Mamun, S. A.; Daud, M. E.; Mahmud, M.; Kaiser, M. S.; and Rossi, A. L. D.\n\n\n \n\n\n\n In Mahmud, M.; Kaiser, M. S.; Kasabov, N.; Iftekharuddin, K.; and Zhong, N., editor(s), Applied Intelligence and Informatics, of Communications in Computer and Information Science, pages 306–317, Cham, 2021. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mamun_alo_2021,\n\taddress = {Cham},\n\tseries = {Communications in {Computer} and {Information} {Science}},\n\ttitle = {{ALO}: {AI} for {Least} {Observed} {People}},\n\tisbn = {978-3-030-82269-9},\n\tshorttitle = {{ALO}},\n\tdoi = {10.1007/978-3-030-82269-9_24},\n\tabstract = {In recent years, visual assistants of humans are taking place in the consumer market–the eye-line of humans equipped with a see-through optical display. Computer Vision Technology may play a vital role in visually challenged people to carry out their daily activities without much dependency on others. In this paper, we introduce ALO (AI for Least Observed) as an assistive glass for blind people. It can listen as a companion, read from the internet on the fly, detect surrounding objects and obstacles for freedom of movement, and recognize the faces he is communicating with. This glass can be a virtual companion of the users for social safety from unknown people, reduce the dependency of others. This system uses the camera for identifying human faces using MTCNN deep learning technique, bone conduction microphone, and google API (Application Programming Interface) for translating voice to text and text to bone conduction sound. A Market Valuable Product (MVP) has already been developed depending on our survey of over 300 visually impaired persons in Europe and Asia.},\n\tlanguage = {en},\n\tbooktitle = {Applied {Intelligence} and {Informatics}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Mamun, Shamim Al and Daud, Mohammad Eusuf and Mahmud, Mufti and Kaiser, M. Shamim and Rossi, Andre Luis Debiaso},\n\teditor = {Mahmud, Mufti and Kaiser, M. Shamim and Kasabov, Nikola and Iftekharuddin, Khan and Zhong, Ning},\n\tyear = {2021},\n\tkeywords = {Blind vision, Face recognition, Object detection, Smart glass},\n\tpages = {306--317},\n}\n\n
\n
\n\n\n
\n In recent years, visual assistants of humans are taking place in the consumer market–the eye-line of humans equipped with a see-through optical display. Computer Vision Technology may play a vital role in visually challenged people to carry out their daily activities without much dependency on others. In this paper, we introduce ALO (AI for Least Observed) as an assistive glass for blind people. It can listen as a companion, read from the internet on the fly, detect surrounding objects and obstacles for freedom of movement, and recognize the faces he is communicating with. This glass can be a virtual companion of the users for social safety from unknown people, reduce the dependency of others. This system uses the camera for identifying human faces using MTCNN deep learning technique, bone conduction microphone, and google API (Application Programming Interface) for translating voice to text and text to bone conduction sound. A Market Valuable Product (MVP) has already been developed depending on our survey of over 300 visually impaired persons in Europe and Asia.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Artificial Intelligence Based Approach Towards Inclusive Healthcare Provisioning in Society 5.0: A Perspective on Brain Disorder.\n \n \n \n\n\n \n Al Mamun, S.; Kaiser, M. S.; and Mahmud, M.\n\n\n \n\n\n\n In Mahmud, M.; Kaiser, M. S.; Vassanelli, S.; Dai, Q.; and Zhong, N., editor(s), Brain Informatics, of Lecture Notes in Computer Science, pages 157–169, Cham, 2021. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{al_mamun_artificial_2021,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {An {Artificial} {Intelligence} {Based} {Approach} {Towards} {Inclusive} {Healthcare} {Provisioning} in {Society} 5.0: {A} {Perspective} on {Brain} {Disorder}},\n\tisbn = {978-3-030-86993-9},\n\tshorttitle = {An {Artificial} {Intelligence} {Based} {Approach} {Towards} {Inclusive} {Healthcare} {Provisioning} in {Society} 5.0},\n\tdoi = {10.1007/978-3-030-86993-9_15},\n\tabstract = {Face detection and sparse facial feature analysis is popular as a non-invasive approach to diagnosis special disease. In futuristic intelligent healthcare system, the confined way of preliminary computer aided diagnosis of diseases becoming more inclusive and faster than usual time. Therefore, face spacial feature analysis can be an elegant way of measuring attempt in tele-medicine industry. In this research paper, we investigate thorough review on disease diagnosis techniques, healthcare management and, data security features being used currently. Moreover, this work propose a i-health care monitoring and examining system of neuronal/brain disorder in layer base approach. Overall, this paper reviews about diseases which have already been detected by spacial feature of face using deep learning algorithm or feature based learning with a proposal of a monitoring system with its research area and challenges in smart intelligent healthcare system in society 5.0.},\n\tlanguage = {en},\n\tbooktitle = {Brain {Informatics}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Al Mamun, Shamim and Kaiser, M. Shamim and Mahmud, Mufti},\n\teditor = {Mahmud, Mufti and Kaiser, M. Shamim and Vassanelli, Stefano and Dai, Qionghai and Zhong, Ning},\n\tyear = {2021},\n\tkeywords = {Cloud system, Deep learning, Face detection, Features},\n\tpages = {157--169},\n}\n\n
\n
\n\n\n
\n Face detection and sparse facial feature analysis is popular as a non-invasive approach to diagnosis special disease. In futuristic intelligent healthcare system, the confined way of preliminary computer aided diagnosis of diseases becoming more inclusive and faster than usual time. Therefore, face spacial feature analysis can be an elegant way of measuring attempt in tele-medicine industry. In this research paper, we investigate thorough review on disease diagnosis techniques, healthcare management and, data security features being used currently. Moreover, this work propose a i-health care monitoring and examining system of neuronal/brain disorder in layer base approach. Overall, this paper reviews about diseases which have already been detected by spacial feature of face using deep learning algorithm or feature based learning with a proposal of a monitoring system with its research area and challenges in smart intelligent healthcare system in society 5.0.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Performance Analysis of Machine Learning Approaches in Software Complexity Prediction.\n \n \n \n\n\n \n Moshin Reza, S.; Mahfujur Rahman, M.; Parvez, H.; Badreddin, O.; and Al Mamun, S.\n\n\n \n\n\n\n In Kaiser, M. S.; Bandyopadhyay, A.; Mahmud, M.; and Ray, K., editor(s), Proceedings of International Conference on Trends in Computational and Cognitive Engineering, of Advances in Intelligent Systems and Computing, pages 27–39, Singapore, 2021. Springer\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{moshin_reza_performance_2021,\n\taddress = {Singapore},\n\tseries = {Advances in {Intelligent} {Systems} and {Computing}},\n\ttitle = {Performance {Analysis} of {Machine} {Learning} {Approaches} in {Software} {Complexity} {Prediction}},\n\tisbn = {978-981-334-673-4},\n\tdoi = {10.1007/978-981-33-4673-4_3},\n\tabstract = {Moshin Reza, SayedMahfujur Rahman, Md.Parvez, HasnatBadreddin, OmarAl Mamun, ShamimSoftware design is one of the core concepts in software engineering. This covers insights and intuitions of software evolution, reliability, and maintainability. Effective software design facilitates software reliability and better quality management during development which reduces software development cost. Therefore, it is required to detect and maintain these issues earlier. Class complexity is one of the ways of detecting software quality. The objective of this paper is to predict class complexity from source code metrics using machine learning (ML) approaches and compare the performance of the approaches. In order to do that, we collect ten popular and quality maintained open source repositories and extract 18 source code metrics that relate to complexity for class-level analysis. First, we apply statistical correlation to find out the source code metrics that impact most on class complexity. Second, we apply five alternative ML techniques to build complexity predictors and compare the performances. The results report that the following source code metrics: Depth inheritance tree (DIT), response for class (RFC), weighted method count (WMC), lines of code (LOC), and coupling between objects (CBO) have the most impact on class complexity. Also, we evaluate the performance of the techniques, and results show that random forest (RF) significantly improves accuracy without providing additional false negative or false positive that work as false alarms in complexity prediction.},\n\tlanguage = {en},\n\tbooktitle = {Proceedings of {International} {Conference} on {Trends} in {Computational} and {Cognitive} {Engineering}},\n\tpublisher = {Springer},\n\tauthor = {Moshin Reza, Sayed and Mahfujur Rahman, Md. and Parvez, Hasnat and Badreddin, Omar and Al Mamun, Shamim},\n\teditor = {Kaiser, M. Shamim and Bandyopadhyay, Anirban and Mahmud, Mufti and Ray, Kanad},\n\tyear = {2021},\n\tkeywords = {Machine learning, Software complexity, Software design, Software quality, Software reliability},\n\tpages = {27--39},\n}\n\n
\n
\n\n\n
\n Moshin Reza, SayedMahfujur Rahman, Md.Parvez, HasnatBadreddin, OmarAl Mamun, ShamimSoftware design is one of the core concepts in software engineering. This covers insights and intuitions of software evolution, reliability, and maintainability. Effective software design facilitates software reliability and better quality management during development which reduces software development cost. Therefore, it is required to detect and maintain these issues earlier. Class complexity is one of the ways of detecting software quality. The objective of this paper is to predict class complexity from source code metrics using machine learning (ML) approaches and compare the performance of the approaches. In order to do that, we collect ten popular and quality maintained open source repositories and extract 18 source code metrics that relate to complexity for class-level analysis. First, we apply statistical correlation to find out the source code metrics that impact most on class complexity. Second, we apply five alternative ML techniques to build complexity predictors and compare the performances. The results report that the following source code metrics: Depth inheritance tree (DIT), response for class (RFC), weighted method count (WMC), lines of code (LOC), and coupling between objects (CBO) have the most impact on class complexity. Also, we evaluate the performance of the techniques, and results show that random forest (RF) significantly improves accuracy without providing additional false negative or false positive that work as false alarms in complexity prediction.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Performance Analysis of Different Loss Function in Face Detection Architectures.\n \n \n \n\n\n \n Ferdous, R. H.; Arifeen, M. M.; Eiko, T. S.; and Mamun, S. A.\n\n\n \n\n\n\n In Kaiser, M. S.; Bandyopadhyay, A.; Mahmud, M.; and Ray, K., editor(s), Proceedings of International Conference on Trends in Computational and Cognitive Engineering, of Advances in Intelligent Systems and Computing, pages 659–669, Singapore, 2021. Springer\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{ferdous_performance_2021,\n\taddress = {Singapore},\n\tseries = {Advances in {Intelligent} {Systems} and {Computing}},\n\ttitle = {Performance {Analysis} of {Different} {Loss} {Function} in {Face} {Detection} {Architectures}},\n\tisbn = {978-981-334-673-4},\n\tdoi = {10.1007/978-981-33-4673-4_54},\n\tabstract = {Ferdous, Rezowan HossainArifeen, Md. MurshedulEiko, Tipu SultanMamun, Shamim AlMasked face detection is a challenging task due to the occlusions created by the masks. Recent studies show that deep learning models can achieve effective performance for not only occluded faces but also for unconstrained environments, illuminations or various poses. In this study, we have addressed the problem of occlusion due to wearing masks in masked face detection technique in deep transfer learning method. We have also reviewed the recent deep learning models for face detection and considered VGG16, VGG19, MobileNet and DenseNet as our underlying masked face detection models. Moreover, we have prepared a dataset containing masked face and without mask from 120 individuals and enhanced the dataset using augmentation. After training the deep learning models with our own dataset, we have analysed the performance of the deep learning models for several types of loss functions. From the experiment, it is clear that all the deep learning models perform well in terms of classification losses like categorical cross entropy loss and KL divergence loss.},\n\tlanguage = {en},\n\tbooktitle = {Proceedings of {International} {Conference} on {Trends} in {Computational} and {Cognitive} {Engineering}},\n\tpublisher = {Springer},\n\tauthor = {Ferdous, Rezowan Hossain and Arifeen, Md. Murshedul and Eiko, Tipu Sultan and Mamun, Shamim Al},\n\teditor = {Kaiser, M. Shamim and Bandyopadhyay, Anirban and Mahmud, Mufti and Ray, Kanad},\n\tyear = {2021},\n\tkeywords = {Deep learning, Face detection, VGG face},\n\tpages = {659--669},\n}\n\n
\n
\n\n\n
\n Ferdous, Rezowan HossainArifeen, Md. MurshedulEiko, Tipu SultanMamun, Shamim AlMasked face detection is a challenging task due to the occlusions created by the masks. Recent studies show that deep learning models can achieve effective performance for not only occluded faces but also for unconstrained environments, illuminations or various poses. In this study, we have addressed the problem of occlusion due to wearing masks in masked face detection technique in deep transfer learning method. We have also reviewed the recent deep learning models for face detection and considered VGG16, VGG19, MobileNet and DenseNet as our underlying masked face detection models. Moreover, we have prepared a dataset containing masked face and without mask from 120 individuals and enhanced the dataset using augmentation. After training the deep learning models with our own dataset, we have analysed the performance of the deep learning models for several types of loss functions. From the experiment, it is clear that all the deep learning models perform well in terms of classification losses like categorical cross entropy loss and KL divergence loss.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Indoor Navigation Support System for Patients with Neurodegenerative Diseases.\n \n \n \n\n\n \n Biswas, M.; Rahman, A.; Kaiser, M. S.; Al Mamun, S.; Ebne Mizan, K. S.; Islam, M. S.; and Mahmud, M.\n\n\n \n\n\n\n In Mahmud, M.; Kaiser, M. S.; Vassanelli, S.; Dai, Q.; and Zhong, N., editor(s), Brain Informatics, of Lecture Notes in Computer Science, pages 411–422, Cham, 2021. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{biswas_indoor_2021,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Indoor {Navigation} {Support} {System} for {Patients} with {Neurodegenerative} {Diseases}},\n\tisbn = {978-3-030-86993-9},\n\tdoi = {10.1007/978-3-030-86993-9_37},\n\tabstract = {A handheld device (such as a smartphone/wearable) can be used for tracking and delivering navigation within a building using a wireless interface (such as WiFi or Bluetooth Low Energy), in situations when a traditional navigation system (such as a global positioning system) is unable to function effectively. In this paper, we present an indoor navigation system based on a combination of wall-mounted wireless sensors, a mobile health application (mHealth app), and WiFi/Bluetooth beacons. Such a system can be used to track and trace people with neurological disorders, such as Alzheimer’s disease (AD) patients, throughout the hospital complex. The Contact tracing is accomplished by using Bluetooth low-energy beacons to detect and monitor the possibilities of those who have been exposed to communicable diseases such as COVID-19. The communication flow between the mHealth app and the cloud-based framework is explained elaborately in the paper. The system provides a real-time remote monitoring system for primary medical care in cases where relatives of Alzheimer’s patients and doctors are having complications that may demand medical care or hospitalization. The proposed indoor navigation system has been found to be useful in assisting patients with Alzheimer’s disease (AD) while in the hospital building.},\n\tlanguage = {en},\n\tbooktitle = {Brain {Informatics}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Biswas, Milon and Rahman, Ashiqur and Kaiser, M. Shamim and Al Mamun, Shamim and Ebne Mizan, K. Shayekh and Islam, Mohammad Shahidul and Mahmud, Mufti},\n\teditor = {Mahmud, Mufti and Kaiser, M. Shamim and Vassanelli, Stefano and Dai, Qionghai and Zhong, Ning},\n\tyear = {2021},\n\tkeywords = {Alzheimer’s disease, Bluetooth beacon, IoT, Sensor, Smart care},\n\tpages = {411--422},\n}\n\n
\n
\n\n\n
\n A handheld device (such as a smartphone/wearable) can be used for tracking and delivering navigation within a building using a wireless interface (such as WiFi or Bluetooth Low Energy), in situations when a traditional navigation system (such as a global positioning system) is unable to function effectively. In this paper, we present an indoor navigation system based on a combination of wall-mounted wireless sensors, a mobile health application (mHealth app), and WiFi/Bluetooth beacons. Such a system can be used to track and trace people with neurological disorders, such as Alzheimer’s disease (AD) patients, throughout the hospital complex. The Contact tracing is accomplished by using Bluetooth low-energy beacons to detect and monitor the possibilities of those who have been exposed to communicable diseases such as COVID-19. The communication flow between the mHealth app and the cloud-based framework is explained elaborately in the paper. The system provides a real-time remote monitoring system for primary medical care in cases where relatives of Alzheimer’s patients and doctors are having complications that may demand medical care or hospitalization. The proposed indoor navigation system has been found to be useful in assisting patients with Alzheimer’s disease (AD) while in the hospital building.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Cascade Classification of Face Liveliness Detection Using Heart Beat Measurement.\n \n \n \n\n\n \n Rahman, M. M.; Mamun, S. A.; Kaiser, M. S.; Islam, M. S.; and Rahman, M. A.\n\n\n \n\n\n\n In Kaiser, M. S.; Bandyopadhyay, A.; Mahmud, M.; and Ray, K., editor(s), Proceedings of International Conference on Trends in Computational and Cognitive Engineering, of Advances in Intelligent Systems and Computing, pages 581–590, Singapore, 2021. Springer\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{rahman_cascade_2021,\n\taddress = {Singapore},\n\tseries = {Advances in {Intelligent} {Systems} and {Computing}},\n\ttitle = {Cascade {Classification} of {Face} {Liveliness} {Detection} {Using} {Heart} {Beat} {Measurement}},\n\tisbn = {978-981-334-673-4},\n\tdoi = {10.1007/978-981-33-4673-4_47},\n\tabstract = {Rahman, Md. MahfujurMamun, Shamim AlKaiser, M. ShamimIslam, Md. ShahidulRahman, Md. ArifurFace detection and recognition is a prevalent concept in security and access control area which is commonly used in surveillance cameras at public places, attendance etc. But often this type of system can be circumvented by holding a photo or running a video of authorized person to the camera. Therefore, liveliness concept comes up with a solution to detect the person is real or spoofed. In this paper, We proposed a cascade classifier based model for detecting liveliness using deep-learning and Heart-beat measurement. Moreover, we have evaluated our model accuracy with our own dataset of real and fake videos and photos. By using our proposed model of face liveliness detection model, FPR and FNR have declined 16\\% and 5.22\\% respectively. In addition, we have also compared proposed system with other state-of-art methods. And here proposed study has achieved an accuracy of 99.46\\%.},\n\tlanguage = {en},\n\tbooktitle = {Proceedings of {International} {Conference} on {Trends} in {Computational} and {Cognitive} {Engineering}},\n\tpublisher = {Springer},\n\tauthor = {Rahman, Md. Mahfujur and Mamun, Shamim Al and Kaiser, M. Shamim and Islam, Md. Shahidul and Rahman, Md. Arifur},\n\teditor = {Kaiser, M. Shamim and Bandyopadhyay, Anirban and Mahmud, Mufti and Ray, Kanad},\n\tyear = {2021},\n\tkeywords = {CNN, Deep Learning, Face Detection, Face Liveliness, FaceNet, Features, Heart Beat, PCA},\n\tpages = {581--590},\n}\n\n
\n
\n\n\n
\n Rahman, Md. MahfujurMamun, Shamim AlKaiser, M. ShamimIslam, Md. ShahidulRahman, Md. ArifurFace detection and recognition is a prevalent concept in security and access control area which is commonly used in surveillance cameras at public places, attendance etc. But often this type of system can be circumvented by holding a photo or running a video of authorized person to the camera. Therefore, liveliness concept comes up with a solution to detect the person is real or spoofed. In this paper, We proposed a cascade classifier based model for detecting liveliness using deep-learning and Heart-beat measurement. Moreover, we have evaluated our model accuracy with our own dataset of real and fake videos and photos. By using our proposed model of face liveliness detection model, FPR and FNR have declined 16% and 5.22% respectively. In addition, we have also compared proposed system with other state-of-art methods. And here proposed study has achieved an accuracy of 99.46%.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 6G Access Network for Intelligent Internet of Healthcare Things: Opportunity, Challenges, and Research Directions.\n \n \n \n\n\n \n Kaiser, M. S.; Zenia, N.; Tabassum, F.; Mamun, S. A.; Rahman, M. A.; Islam, M. S.; and Mahmud, M.\n\n\n \n\n\n\n In Kaiser, M. S.; Bandyopadhyay, A.; Mahmud, M.; and Ray, K., editor(s), Proceedings of International Conference on Trends in Computational and Cognitive Engineering, of Advances in Intelligent Systems and Computing, pages 317–328, Singapore, 2021. Springer\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{kaiser_6g_2021,\n\taddress = {Singapore},\n\tseries = {Advances in {Intelligent} {Systems} and {Computing}},\n\ttitle = {{6G} {Access} {Network} for {Intelligent} {Internet} of {Healthcare} {Things}: {Opportunity}, {Challenges}, and {Research} {Directions}},\n\tisbn = {978-981-334-673-4},\n\tshorttitle = {{6G} {Access} {Network} for {Intelligent} {Internet} of {Healthcare} {Things}},\n\tdoi = {10.1007/978-981-33-4673-4_25},\n\tabstract = {Kaiser, M. ShamimZenia, NusratTabassum, FarihaMamun, Shamim AlRahman, M. ArifurIslam, Md. ShahidulMahmud, MuftiThe Internet of Healthcare Things (IoHT) demands massive and smart connectivity, huge bandwidth, lower latency with ultra-high data rate and better quality of healthcare experience. Unlike the 5G wireless network, the upcoming 6G communication system is expected to provide Intelligent IoHT (IIoHT) services everywhere at any time to improve the quality of life of the human being. In this paper, we present the framework of 6G cellular networks, its aggregation with multidimensional communication techniques such as optical wireless communication network, cell-free communication system, backhaul network, and quantum communication, as well as distributed security paradigm in the context of IIoHT. Such low latency and ultra-high-speed communication network will provide a new paradigm for connecting homes to hospitals, healthcare people, medical devices, hospital infrastructure, etc. Also, the requirements of 6G wireless networking, other key techniques, challenges and research direction of deploying IIoHT are outlined in the article.},\n\tlanguage = {en},\n\tbooktitle = {Proceedings of {International} {Conference} on {Trends} in {Computational} and {Cognitive} {Engineering}},\n\tpublisher = {Springer},\n\tauthor = {Kaiser, M. Shamim and Zenia, Nusrat and Tabassum, Fariha and Mamun, Shamim Al and Rahman, M. Arifur and Islam, Md. Shahidul and Mahmud, Mufti},\n\teditor = {Kaiser, M. Shamim and Bandyopadhyay, Anirban and Mahmud, Mufti and Ray, Kanad},\n\tyear = {2021},\n\tkeywords = {Distributed security, Internet of everything (IoE), Machine learning, Massive MIMO, holographic beamforming},\n\tpages = {317--328},\n}\n\n
\n
\n\n\n
\n Kaiser, M. ShamimZenia, NusratTabassum, FarihaMamun, Shamim AlRahman, M. ArifurIslam, Md. ShahidulMahmud, MuftiThe Internet of Healthcare Things (IoHT) demands massive and smart connectivity, huge bandwidth, lower latency with ultra-high data rate and better quality of healthcare experience. Unlike the 5G wireless network, the upcoming 6G communication system is expected to provide Intelligent IoHT (IIoHT) services everywhere at any time to improve the quality of life of the human being. In this paper, we present the framework of 6G cellular networks, its aggregation with multidimensional communication techniques such as optical wireless communication network, cell-free communication system, backhaul network, and quantum communication, as well as distributed security paradigm in the context of IIoHT. Such low latency and ultra-high-speed communication network will provide a new paradigm for connecting homes to hospitals, healthcare people, medical devices, hospital infrastructure, etc. Also, the requirements of 6G wireless networking, other key techniques, challenges and research direction of deploying IIoHT are outlined in the article.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An XAI Based Autism Detection: The Context Behind the Detection.\n \n \n \n\n\n \n Biswas, M.; Kaiser, M. S.; Mahmud, M.; Al Mamun, S.; Hossain, M. S.; and Rahman, M. A.\n\n\n \n\n\n\n In Mahmud, M.; Kaiser, M. S.; Vassanelli, S.; Dai, Q.; and Zhong, N., editor(s), Brain Informatics, of Lecture Notes in Computer Science, pages 448–459, Cham, 2021. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{biswas_xai_2021,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {An {XAI} {Based} {Autism} {Detection}: {The} {Context} {Behind} the {Detection}},\n\tisbn = {978-3-030-86993-9},\n\tshorttitle = {An {XAI} {Based} {Autism} {Detection}},\n\tdoi = {10.1007/978-3-030-86993-9_40},\n\tabstract = {With the rapid growth of the Internet of Healthcare Things, a massive amount of data is generated by a broad variety of medical devices. Because of the complex relationship in large-scale healthcare data, researchers who bring a revolution in the healthcare industry embrace Artificial Intelligence (AI). In certain cases, it has been reported that AI can do better than humans at performing healthcare tasks. The data-driven black-box model, on the other hand, does not appeal to healthcare professionals as it is not transparent, and any biasing can hamper the performance the prediction model for the real-life operation. In this paper, we proposed an AI model for early detection of autism in children. Then we showed why AI with explainability is important. This paper provides examples focused on the Autism Spectrum Disorder dataset (Autism screening data for toddlers by Dr Fadi Fayez Thabtah) and discussed why explainability approaches should be used when using AI systems in healthcare.},\n\tlanguage = {en},\n\tbooktitle = {Brain {Informatics}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Biswas, Milon and Kaiser, M. Shamim and Mahmud, Mufti and Al Mamun, Shamim and Hossain, Md. Shahadat and Rahman, Muhammad Arifur},\n\teditor = {Mahmud, Mufti and Kaiser, M. Shamim and Vassanelli, Stefano and Dai, Qionghai and Zhong, Ning},\n\tyear = {2021},\n\tkeywords = {Co-relation coefficient, Explainable AI, Machine learning, Support vector machine (SVM)},\n\tpages = {448--459},\n}\n\n
\n
\n\n\n
\n With the rapid growth of the Internet of Healthcare Things, a massive amount of data is generated by a broad variety of medical devices. Because of the complex relationship in large-scale healthcare data, researchers who bring a revolution in the healthcare industry embrace Artificial Intelligence (AI). In certain cases, it has been reported that AI can do better than humans at performing healthcare tasks. The data-driven black-box model, on the other hand, does not appeal to healthcare professionals as it is not transparent, and any biasing can hamper the performance the prediction model for the real-life operation. In this paper, we proposed an AI model for early detection of autism in children. Then we showed why AI with explainability is important. This paper provides examples focused on the Autism Spectrum Disorder dataset (Autism screening data for toddlers by Dr Fadi Fayez Thabtah) and discussed why explainability approaches should be used when using AI systems in healthcare.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n iWorksafe: Towards Healthy Workplaces During COVID-19 With an Intelligent Phealth App for Industrial Settings.\n \n \n \n\n\n \n Kaiser, M. S.; Mahmud, M.; Noor, M. B. T.; Zenia, N. Z.; Mamun, S. A.; Mahmud, K. M. A.; Azad, S.; Aradhya, V. N. M.; Stephan, P.; Stephan, T.; Kannan, R.; Hanif, M.; Sharmeen, T.; Chen, T.; and Hussain, A.\n\n\n \n\n\n\n IEEE Access, 9: 13814–13828. 2021.\n Conference Name: IEEE Access\n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{kaiser_iworksafe_2021,\n\ttitle = {{iWorksafe}: {Towards} {Healthy} {Workplaces} {During} {COVID}-19 {With} an {Intelligent} {Phealth} {App} for {Industrial} {Settings}},\n\tvolume = {9},\n\tissn = {2169-3536},\n\tshorttitle = {{iWorksafe}},\n\tdoi = {10.1109/ACCESS.2021.3050193},\n\tabstract = {The recent outbreak of the novel Coronavirus Disease (COVID-19) has given rise to diverse health issues due to its high transmission rate and limited treatment options. Almost the whole world, at some point of time, was placed in lock-down in an attempt to stop the spread of the virus, with resulting psychological and economic sequela. As countries start to ease lock-down measures and reopen industries, ensuring a healthy workplace for employees has become imperative. Thus, this paper presents a mobile app-based intelligent portable healthcare (pHealth) tool, called i WorkSafe, to assist industries in detecting possible suspects for COVID-19 infection among their employees who may need primary care. Developed mainly for low-end Android devices, the i WorkSafe app hosts a fuzzy neural network model that integrates data of employees' health status from the industry's database, proximity and contact tracing data from the mobile devices, and user-reported COVID-19 self-test data. Using the built-in Bluetooth low energy sensing technology and K Nearest Neighbor and K-means techniques, the app is capable of tracking users' proximity and trace contact with other employees. Additionally, it uses a logistic regression model to calculate the COVID-19 self-test score and a Bayesian Decision Tree model for checking real-time health condition from an intelligent e-health platform for further clinical attention of the employees. Rolled out in an apparel factory on 12 employees as a test case, the pHealth tool generates an alert to maintain social distancing among employees inside the industry. In addition, the app helps employees to estimate risk with possible COVID-19 infection based on the collected data and found that the score is effective in estimating personal health condition of the app user.},\n\tjournal = {IEEE Access},\n\tauthor = {Kaiser, M. Shamim and Mahmud, Mufti and Noor, Manan Binth Taj and Zenia, Nusrat Zerin and Mamun, Shamim Al and Mahmud, K. M. Abir and Azad, Saiful and Aradhya, V. N. Manjunath and Stephan, Punitha and Stephan, Thompson and Kannan, Ramani and Hanif, Mohammed and Sharmeen, Tamanna and Chen, Tianhua and Hussain, Amir},\n\tyear = {2021},\n\tnote = {Conference Name: IEEE Access},\n\tkeywords = {COVID-19, Coronavirus, Diseases, Economics, Employment, Industry 4.0, Mobile applications, Safety, Viruses (medical), artificial intelligence, digital health, machine learning, mobile app, safe workplace, worker safety},\n\tpages = {13814--13828},\n}\n\n
\n
\n\n\n
\n The recent outbreak of the novel Coronavirus Disease (COVID-19) has given rise to diverse health issues due to its high transmission rate and limited treatment options. Almost the whole world, at some point of time, was placed in lock-down in an attempt to stop the spread of the virus, with resulting psychological and economic sequela. As countries start to ease lock-down measures and reopen industries, ensuring a healthy workplace for employees has become imperative. Thus, this paper presents a mobile app-based intelligent portable healthcare (pHealth) tool, called i WorkSafe, to assist industries in detecting possible suspects for COVID-19 infection among their employees who may need primary care. Developed mainly for low-end Android devices, the i WorkSafe app hosts a fuzzy neural network model that integrates data of employees' health status from the industry's database, proximity and contact tracing data from the mobile devices, and user-reported COVID-19 self-test data. Using the built-in Bluetooth low energy sensing technology and K Nearest Neighbor and K-means techniques, the app is capable of tracking users' proximity and trace contact with other employees. Additionally, it uses a logistic regression model to calculate the COVID-19 self-test score and a Bayesian Decision Tree model for checking real-time health condition from an intelligent e-health platform for further clinical attention of the employees. Rolled out in an apparel factory on 12 employees as a test case, the pHealth tool generates an alert to maintain social distancing among employees inside the industry. In addition, the app helps employees to estimate risk with possible COVID-19 infection based on the collected data and found that the score is effective in estimating personal health condition of the app user.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Smart City Technologies for Next Generation Healthcare.\n \n \n \n\n\n \n Faria, T. H.; Shamim Kaiser, M.; Hossian, C. A.; Mahmud, M.; Al Mamun, S.; and Chakraborty, C.\n\n\n \n\n\n\n In Data-Driven Mining, Learning and Analytics for Secured Smart Cities, pages 253–274. Springer, 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{faria_smart_2021,\n\ttitle = {Smart {City} {Technologies} for {Next} {Generation} {Healthcare}},\n\tbooktitle = {Data-{Driven} {Mining}, {Learning} and {Analytics} for {Secured} {Smart} {Cities}},\n\tpublisher = {Springer},\n\tauthor = {Faria, Tahmina Harun and Shamim Kaiser, M. and Hossian, Chowdhury Akram and Mahmud, Mufti and Al Mamun, Shamim and Chakraborty, Chinmay},\n\tyear = {2021},\n\tpages = {253--274},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n iWorkSafe: towards healthy workplaces during COVID-19 with an intelligent pHealth App for industrial settings.\n \n \n \n\n\n \n Kaiser, M. S.; Mahmud, M.; Noor, M. B. T.; Zenia, N. Z.; Al Mamun, S.; Mahmud, K. A.; Azad, S.; Aradhya, V. M.; Stephan, P.; and Stephan, T.\n\n\n \n\n\n\n Ieee Access, 9: 13814–13828. 2021.\n Publisher: IEEE\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kaiser_iworksafe_2021-1,\n\ttitle = {{iWorkSafe}: towards healthy workplaces during {COVID}-19 with an intelligent {pHealth} {App} for industrial settings},\n\tvolume = {9},\n\tshorttitle = {{iWorkSafe}},\n\tjournal = {Ieee Access},\n\tauthor = {Kaiser, M. Shamim and Mahmud, Mufti and Noor, Manan Binth Taj and Zenia, Nusrat Zerin and Al Mamun, Shamim and Mahmud, KM Abir and Azad, Saiful and Aradhya, VN Manjunath and Stephan, Punitha and Stephan, Thompson},\n\tyear = {2021},\n\tnote = {Publisher: IEEE},\n\tpages = {13814--13828},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Novel Approach of Detecting Image Forgery Using GLCM and KNN.\n \n \n \n\n\n \n Azam, K. S. F.; Riya, F. F.; Al Mamun, S.; and Kaiser, M. S.\n\n\n \n\n\n\n In 2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD), pages 125–129, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{azam_novel_2021,\n\ttitle = {A {Novel} {Approach} of {Detecting} {Image} {Forgery} {Using} {GLCM} and {KNN}},\n\tbooktitle = {2021 {International} {Conference} on {Information} and {Communication} {Technology} for {Sustainable} {Development} ({ICICT4SD})},\n\tpublisher = {IEEE},\n\tauthor = {Azam, Kazi Sultana Farhana and Riya, Farhin Farhad and Al Mamun, Shamim and Kaiser, Md Shamim},\n\tyear = {2021},\n\tpages = {125--129},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Healthcare Robots to Combat COVID-19.\n \n \n \n \n\n\n \n Kaiser, M. S.; Al Mamun, S.; Mahmud, M.; and Tania, M. H.\n\n\n \n\n\n\n In Santosh, K.; and Joshi, A., editor(s), COVID-19: Prediction, Decision-Making, and its Impacts, of Lecture Notes on Data Engineering and Communications Technologies, pages 83–97. Springer, Singapore, 2021.\n \n\n\n\n
\n\n\n\n \n \n \"HealthcarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@incollection{kaiser_healthcare_2021,\n\taddress = {Singapore},\n\tseries = {Lecture {Notes} on {Data} {Engineering} and {Communications} {Technologies}},\n\ttitle = {Healthcare {Robots} to {Combat} {COVID}-19},\n\tisbn = {9789811596827},\n\turl = {https://doi.org/10.1007/978-981-15-9682-7_10},\n\tabstract = {Advancement in robotic technology triggered its usability in the next generation healthcare system. Healthcare robots are expected to assist clinicians and healthcare professionals at all settings by monitoring patient’s physiological conditions in real time, facilitating advanced intervention such as robotic surgery, supporting patient care at the hospital and home, dispensing medication, assisting patients with cognition challenges and disabilities, keeping company to geriatric and physically/mentally challenged patients and hospital building management such as disinfecting places. Thus, the robotic agent can enhance healthcare experiences by reducing patient care work and strenuous/repetitive manual tasks. The robotic applications can also be elongated in supporting the healthcare system for the management of pandemics like novel coronavirus (COVID-19) infection and upcoming pandemics. Such applications include collecting the sample from a patient for screening, disinfecting the hospital, supply logistics, and food to the infected patient, collect physiological conditions. This chapter aims to provide an overview of various types of assistive robots employed for healthcare services especially in fighting pandemic and natural disasters.},\n\tlanguage = {en},\n\turldate = {2022-09-11},\n\tbooktitle = {{COVID}-19: {Prediction}, {Decision}-{Making}, and its {Impacts}},\n\tpublisher = {Springer},\n\tauthor = {Kaiser, M. Shamim and Al Mamun, Shamim and Mahmud, Mufti and Tania, Marzia Hoque},\n\teditor = {Santosh, K.C. and Joshi, Amit},\n\tyear = {2021},\n\tdoi = {10.1007/978-981-15-9682-7_10},\n\tkeywords = {IoT, Pandemics, Patient care, Physically and mentally challenged},\n\tpages = {83--97},\n}\n\n
\n
\n\n\n
\n Advancement in robotic technology triggered its usability in the next generation healthcare system. Healthcare robots are expected to assist clinicians and healthcare professionals at all settings by monitoring patient’s physiological conditions in real time, facilitating advanced intervention such as robotic surgery, supporting patient care at the hospital and home, dispensing medication, assisting patients with cognition challenges and disabilities, keeping company to geriatric and physically/mentally challenged patients and hospital building management such as disinfecting places. Thus, the robotic agent can enhance healthcare experiences by reducing patient care work and strenuous/repetitive manual tasks. The robotic applications can also be elongated in supporting the healthcare system for the management of pandemics like novel coronavirus (COVID-19) infection and upcoming pandemics. Such applications include collecting the sample from a patient for screening, disinfecting the hospital, supply logistics, and food to the infected patient, collect physiological conditions. This chapter aims to provide an overview of various types of assistive robots employed for healthcare services especially in fighting pandemic and natural disasters.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n COVID-19 Pandemic: A Comparative Prediction Using Machine Learning.\n \n \n \n \n\n\n \n Sadik, R.; Reza, M. L.; Noman, A. A.; Mamun, S. A.; Kaiser, M. S.; and Rahman, M. A.\n\n\n \n\n\n\n International Journal of Automation, Artificial Intelligence and Machine Learning, 1(1): 1–16. October 2020.\n Number: 1\n\n\n\n
\n\n\n\n \n \n \"COVID-19Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{sadik_covid-19_2020,\n\ttitle = {{COVID}-19 {Pandemic}: {A} {Comparative} {Prediction} {Using} {Machine} {Learning}},\n\tvolume = {1},\n\tcopyright = {Copyright (c) 2020 Rifat Sadik, Md Latifur Reza, Abdullah Al Noman, Shamim Al Mamun , M Shamim Kaiser, Muhammad Arifur Rahman},\n\tissn = {2563-7568},\n\tshorttitle = {{COVID}-19 {Pandemic}},\n\turl = {https://www.researchlakejournals.com/index.php/AAIML/article/view/44},\n\tabstract = {Coronavirus Disease 2019 or COVID-19 is an infectious disease which is declared as a pandemic by the World Health Organization (WHO) have a noxious effect on the entire human civilization. Each and every day the number of infected people is going higher and higher and so the death toll. Many of country Italy, UK, USA was affected badly, yet since the identification of the first case, after a certain number of days, the scenario of infection rate has been reduced significantly. However, a country like Bangladesh couldn't keep the infection rate down. A number of algorithms have been proposed to forecast the scenario in terms of the number of infection, recovery and death toll. Here, in this work, we present a comprehensive comparison based on Machine Learning to predict the outbreak of COVID-19 in Bangladesh. Among Several Machine Learning algorithms, here we used Polynomial Regression (PR) and Multilayer Perception (MLP) and Long Short Term Memory (LSTM) algorithm and epidemiological model Susceptible, Infected and Recovered (SIR), projected comparative outcomes.},\n\tlanguage = {en},\n\tnumber = {1},\n\turldate = {2022-09-13},\n\tjournal = {International Journal of Automation, Artificial Intelligence and Machine Learning},\n\tauthor = {Sadik, Rifat and Reza, Md Latifur and Noman, Abdullah Al and Mamun, Shamim Al and Kaiser, M. Shamim and Rahman, Muhammad Arifur},\n\tmonth = oct,\n\tyear = {2020},\n\tnote = {Number: 1},\n\tkeywords = {COVID-19, LSTM, MLP, Machine learning, PR, Pandemic, SIR},\n\tpages = {1--16},\n}\n\n
\n
\n\n\n
\n Coronavirus Disease 2019 or COVID-19 is an infectious disease which is declared as a pandemic by the World Health Organization (WHO) have a noxious effect on the entire human civilization. Each and every day the number of infected people is going higher and higher and so the death toll. Many of country Italy, UK, USA was affected badly, yet since the identification of the first case, after a certain number of days, the scenario of infection rate has been reduced significantly. However, a country like Bangladesh couldn't keep the infection rate down. A number of algorithms have been proposed to forecast the scenario in terms of the number of infection, recovery and death toll. Here, in this work, we present a comprehensive comparison based on Machine Learning to predict the outbreak of COVID-19 in Bangladesh. Among Several Machine Learning algorithms, here we used Polynomial Regression (PR) and Multilayer Perception (MLP) and Long Short Term Memory (LSTM) algorithm and epidemiological model Susceptible, Infected and Recovered (SIR), projected comparative outcomes.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Performance Analysis of Machine Learning Approaches in Stroke Prediction.\n \n \n \n\n\n \n Emon, M. U.; Keya, M. S.; Meghla, T. I.; Rahman, M. M.; Mamun, M S. A.; and Kaiser, M S.\n\n\n \n\n\n\n In 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), pages 1464–1469, November 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{emon_performance_2020,\n\ttitle = {Performance {Analysis} of {Machine} {Learning} {Approaches} in {Stroke} {Prediction}},\n\tdoi = {10.1109/ICECA49313.2020.9297525},\n\tabstract = {Most of strokes will occur due to an unexpected obstruction of courses by prompting both the brain and heart. Early awareness for different warning signs of stroke can minimize the stroke. This research work proposes an early prediction of stroke diseases by using different machine learning approaches with the occurrence of hypertension, body mass index level, heart disease, average glucose level, smoking status, previous stroke and age. Using these high features attributes, ten different classifiers have been trained, they are Logistics Regression, Stochastic Gradient Descent, Decision Tree Classifier, AdaBoost Classifier, Gaussian Classifier, Quadratic Discriminant Analysis, Multi layer Perceptron Classifier, KNeighbors Classifier, Gradient Boosting Classifier, and XGBoost Classifier for predicting the stroke. Afterwards, results of the base classifiers are aggregated by using the weighted voting approach to reach highest accuracy. Moreover, the proposed study has achieved an accuracy of 97\\%, where the weighted voting classifier performs better than the base classifiers. This model gives the best accuracy for the stroke prediction. The area under curve value of weighted voting classifier is also high. False positive rate and false negative rate of weighted classifier is lowest compared with others. As a result, weighted voting is almost the perfect classifier for predicting the stroke that can be used by physicians and patients to prescribe and early detect a potential stroke.},\n\tbooktitle = {2020 4th {International} {Conference} on {Electronics}, {Communication} and {Aerospace} {Technology} ({ICECA})},\n\tauthor = {Emon, Minhaz Uddin and Keya, Maria Sultana and Meghla, Tamara Islam and Rahman, Md. Mahfujur and Mamun, M Shamim Al and Kaiser, M Shamim},\n\tmonth = nov,\n\tyear = {2020},\n\tkeywords = {Area Under Curve (AUC), Confusion Matrices, Correlation Matrix, Diseases, Glucose, Heart, Machine Learning, Machine learning, Machine learning algorithms, Prediction algorithms, Stroke, Stroke (medical condition), Weighted Voting},\n\tpages = {1464--1469},\n}\n\n
\n
\n\n\n
\n Most of strokes will occur due to an unexpected obstruction of courses by prompting both the brain and heart. Early awareness for different warning signs of stroke can minimize the stroke. This research work proposes an early prediction of stroke diseases by using different machine learning approaches with the occurrence of hypertension, body mass index level, heart disease, average glucose level, smoking status, previous stroke and age. Using these high features attributes, ten different classifiers have been trained, they are Logistics Regression, Stochastic Gradient Descent, Decision Tree Classifier, AdaBoost Classifier, Gaussian Classifier, Quadratic Discriminant Analysis, Multi layer Perceptron Classifier, KNeighbors Classifier, Gradient Boosting Classifier, and XGBoost Classifier for predicting the stroke. Afterwards, results of the base classifiers are aggregated by using the weighted voting approach to reach highest accuracy. Moreover, the proposed study has achieved an accuracy of 97%, where the weighted voting classifier performs better than the base classifiers. This model gives the best accuracy for the stroke prediction. The area under curve value of weighted voting classifier is also high. False positive rate and false negative rate of weighted classifier is lowest compared with others. As a result, weighted voting is almost the perfect classifier for predicting the stroke that can be used by physicians and patients to prescribe and early detect a potential stroke.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Detecting Neurodegenerative Disease from MRI: A Brief Review on a Deep Learning Perspective.\n \n \n \n\n\n \n Noor, M. B. T.; Zenia, N. Z.; Kaiser, M. S.; Mahmud, M.; and Al Mamun, S.\n\n\n \n\n\n\n In Liang, P.; Goel, V.; and Shan, C., editor(s), Brain Informatics, of Lecture Notes in Computer Science, pages 115–125, Cham, 2019. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{noor_detecting_2019,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Detecting {Neurodegenerative} {Disease} from {MRI}: {A} {Brief} {Review} on a {Deep} {Learning} {Perspective}},\n\tisbn = {978-3-030-37078-7},\n\tshorttitle = {Detecting {Neurodegenerative} {Disease} from {MRI}},\n\tdoi = {10.1007/978-3-030-37078-7_12},\n\tabstract = {Rapid development of high speed computing devices and infrastructure along with improved understanding of deep machine learning techniques during the last decade have opened up possibilities for advanced analysis of neuroimaging data. Using those computing tools Neuroscientists now can identify Neurodegenerative diseases from neuroimaging data. Due to the similarities in disease phenotypes, accurate detection of such disorders from neuroimaging data is very challenging. In this article, we have reviewed the methodological research papers proposing to detect neurodegenerative diseases using deep machine learning techniques only from MRI data. The results show that deep learning based techniques can detect the level of disorder with relatively high accuracy. Towards the end, current challenges are reviewed and some possible future research directions are provided.},\n\tlanguage = {en},\n\tbooktitle = {Brain {Informatics}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Noor, Manan Binth Taj and Zenia, Nusrat Zerin and Kaiser, M. Shamim and Mahmud, Mufti and Al Mamun, Shamim},\n\teditor = {Liang, Peipeng and Goel, Vinod and Shan, Chunlei},\n\tyear = {2019},\n\tkeywords = {Alzheimer’s disease, MRI, Machine learning, Parkinson’s disease, Schizophrenia},\n\tpages = {115--125},\n}\n\n
\n
\n\n\n
\n Rapid development of high speed computing devices and infrastructure along with improved understanding of deep machine learning techniques during the last decade have opened up possibilities for advanced analysis of neuroimaging data. Using those computing tools Neuroscientists now can identify Neurodegenerative diseases from neuroimaging data. Due to the similarities in disease phenotypes, accurate detection of such disorders from neuroimaging data is very challenging. In this article, we have reviewed the methodological research papers proposing to detect neurodegenerative diseases using deep machine learning techniques only from MRI data. The results show that deep learning based techniques can detect the level of disorder with relatively high accuracy. Towards the end, current challenges are reviewed and some possible future research directions are provided.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Robotic Wheelchair for Navigating Urban Environments.\n \n \n \n \n\n\n \n MAMUN, S. A.\n\n\n \n\n\n\n Ph.D. Thesis, 埼玉大学, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"RoboticPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{mamun_robotic_2018,\n\ttype = {{PhD} {Thesis}},\n\ttitle = {Robotic {Wheelchair} for {Navigating} {Urban} {Environments}},\n\turl = {https://ci.nii.ac.jp/naid/500001358896},\n\turldate = {2022-09-13},\n\tschool = {埼玉大学},\n\tauthor = {MAMUN, SHAMIM AL},\n\tyear = {2018},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Companion Following Robotic Wheelchair with Bus Boarding Capabilities.\n \n \n \n\n\n \n Mamun, S. A.; Ali, S.; Fukuda, H.; Lam, A.; Kobayashi, Y.; and Kuno, Y.\n\n\n \n\n\n\n In 2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), pages 174–179, June 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mamun_companion_2018,\n\ttitle = {Companion {Following} {Robotic} {Wheelchair} with {Bus} {Boarding} {Capabilities}},\n\tdoi = {10.1109/ICIEV.2018.8641059},\n\tabstract = {In the last decade, several robotic wheelchairs possessing user-friendly interfaces and/or autonomous functions for reaching a goal have been proposed to meet the needs in aging societies. Moreover, it is vital to consider for the researchers, how to reduce the companion's load and support their activities like bus boarding and disembarkation. In this paper, we propose an autonomous bus boarding wheelchair system that can give freedom of movement to wheelchair users by following its companion side by side or in front-behind positions and simultaneously scan the environment to move smoothly in outside terrain. Additionally, our bus boarding wheelchair is able to detect buses and bus doors with precise measurements of the doorstep's height and width to board and disembark the bus. Our experiments show the effectiveness and applicability of our system in moving around urban areas in using community bus services.},\n\tbooktitle = {2018 {Joint} 7th {International} {Conference} on {Informatics}, {Electronics} \\& {Vision} ({ICIEV}) and 2018 2nd {International} {Conference} on {Imaging}, {Vision} \\& {Pattern} {Recognition} ({icIVPR})},\n\tauthor = {Mamun, Shamim Al and Ali, Sarwar and Fukuda, Hisato and Lam, Antony and Kobayashi, Yoshinori and Kuno, Yoshinori},\n\tmonth = jun,\n\tyear = {2018},\n\tkeywords = {Laser modes, Measurement by laser beam, Mobile robots, Robot sensing systems, Two dimensional displays, Wheelchairs},\n\tpages = {174--179},\n}\n\n
\n
\n\n\n
\n In the last decade, several robotic wheelchairs possessing user-friendly interfaces and/or autonomous functions for reaching a goal have been proposed to meet the needs in aging societies. Moreover, it is vital to consider for the researchers, how to reduce the companion's load and support their activities like bus boarding and disembarkation. In this paper, we propose an autonomous bus boarding wheelchair system that can give freedom of movement to wheelchair users by following its companion side by side or in front-behind positions and simultaneously scan the environment to move smoothly in outside terrain. Additionally, our bus boarding wheelchair is able to detect buses and bus doors with precise measurements of the doorstep's height and width to board and disembark the bus. Our experiments show the effectiveness and applicability of our system in moving around urban areas in using community bus services.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Smart Robotic Wheelchair for Bus Boarding Using CNN Combined with Hough Transforms.\n \n \n \n\n\n \n Ali, S.; Al Mamun, S.; Fukuda, H.; Lam, A.; Kobayashi, Y.; and Kuno, Y.\n\n\n \n\n\n\n In Huang, D.; Gromiha, M. M.; Han, K.; and Hussain, A., editor(s), Intelligent Computing Methodologies, of Lecture Notes in Computer Science, pages 163–172, Cham, 2018. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{ali_smart_2018,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Smart {Robotic} {Wheelchair} for {Bus} {Boarding} {Using} {CNN} {Combined} with {Hough} {Transforms}},\n\tisbn = {978-3-319-95957-3},\n\tdoi = {10.1007/978-3-319-95957-3_18},\n\tabstract = {In recent times, several smart robotic wheelchair research studies have been conducted for the sake of providing a safe and comfortable ride for the user with real-time autonomous operations like object recognition. Further reliability support is essential for such wheelchairs to perform in real-time, common actions like boarding buses or trains. In this paper, we propose a smart wheelchair that can detect buses and precisely recognize bus doors and whether they are opened or closed for automated boarding. We use a modified simple CNN algorithm (i.e. modified Tiny-YOLO) as a base network on the CPU for fast detection of buses and bus doors. After that, we feed the detected information of our Hough line transform based method for accurate localization information of open bus doors. This information is indispensable for our bus-boarding robotic wheelchair to board buses. To evaluate the performance of our proposed method, we also compare the accuracy of our modified Tiny-YOLO and our proposed combined detection method with the original ground truth.},\n\tlanguage = {en},\n\tbooktitle = {Intelligent {Computing} {Methodologies}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Ali, Sarwar and Al Mamun, Shamim and Fukuda, Hisato and Lam, Antony and Kobayashi, Yoshinori and Kuno, Yoshonori},\n\teditor = {Huang, De-Shuang and Gromiha, M. Michael and Han, Kyungsook and Hussain, Abir},\n\tyear = {2018},\n\tkeywords = {Bus door detection, CNN, Hough transformation},\n\tpages = {163--172},\n}\n\n
\n
\n\n\n
\n In recent times, several smart robotic wheelchair research studies have been conducted for the sake of providing a safe and comfortable ride for the user with real-time autonomous operations like object recognition. Further reliability support is essential for such wheelchairs to perform in real-time, common actions like boarding buses or trains. In this paper, we propose a smart wheelchair that can detect buses and precisely recognize bus doors and whether they are opened or closed for automated boarding. We use a modified simple CNN algorithm (i.e. modified Tiny-YOLO) as a base network on the CPU for fast detection of buses and bus doors. After that, we feed the detected information of our Hough line transform based method for accurate localization information of open bus doors. This information is indispensable for our bus-boarding robotic wheelchair to board buses. To evaluate the performance of our proposed method, we also compare the accuracy of our modified Tiny-YOLO and our proposed combined detection method with the original ground truth.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Autonomous Bus Boarding Robotic Wheelchair Using Bidirectional Sensing Systems.\n \n \n \n\n\n \n Al Mamun, S.; Fukuda, H.; Lam, A.; Kobayashi, Y.; and Kuno, Y.\n\n\n \n\n\n\n In Bebis, G.; Boyle, R.; Parvin, B.; Koracin, D.; Turek, M.; Ramalingam, S.; Xu, K.; Lin, S.; Alsallakh, B.; Yang, J.; Cuervo, E.; and Ventura, J., editor(s), Advances in Visual Computing, of Lecture Notes in Computer Science, pages 737–747, Cham, 2018. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{al_mamun_autonomous_2018,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Autonomous {Bus} {Boarding} {Robotic} {Wheelchair} {Using} {Bidirectional} {Sensing} {Systems}},\n\tisbn = {978-3-030-03801-4},\n\tdoi = {10.1007/978-3-030-03801-4_64},\n\tabstract = {Research interest in robotic wheelchairs is driven in part by their potential for improving the independence and quality-of-life of persons with disabilities and the elderly. Moreover, smart wheelchair systems aim to reduce the workload of the caregiver. In this paper, we propose a novel technique for 3D sensing using a conventional Laser Range Finder (LRF). We mounted two sensing systems onto our new six-wheeled robotic bus boarding wheelchair to locate the bus door and its determine its dimensions. Additionally, we have implemented a Single Shot Multibox Detector (SSD) to detect the bus doorsteps to allow for boarding. For precise movements, we successfully measure the height of the bus doorsteps and door width of the bus. Our step measurements and bus doorsteps detection technique for the wheelchair also enables the wheelchair to autonomously board a bus. Our experiments show the effectiveness and applicability of our system to real world robotic wheelchair freedom of movement.},\n\tlanguage = {en},\n\tbooktitle = {Advances in {Visual} {Computing}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Al Mamun, Shamim and Fukuda, Hisato and Lam, Antony and Kobayashi, Yoshinori and Kuno, Yoshinori},\n\teditor = {Bebis, George and Boyle, Richard and Parvin, Bahram and Koracin, Darko and Turek, Matt and Ramalingam, Srikumar and Xu, Kai and Lin, Stephen and Alsallakh, Bilal and Yang, Jing and Cuervo, Eduardo and Ventura, Jonathan},\n\tyear = {2018},\n\tkeywords = {Bidirectional sensing, Lager range sensor, Robotic wheelchair},\n\tpages = {737--747},\n}\n\n
\n
\n\n\n
\n Research interest in robotic wheelchairs is driven in part by their potential for improving the independence and quality-of-life of persons with disabilities and the elderly. Moreover, smart wheelchair systems aim to reduce the workload of the caregiver. In this paper, we propose a novel technique for 3D sensing using a conventional Laser Range Finder (LRF). We mounted two sensing systems onto our new six-wheeled robotic bus boarding wheelchair to locate the bus door and its determine its dimensions. Additionally, we have implemented a Single Shot Multibox Detector (SSD) to detect the bus doorsteps to allow for boarding. For precise movements, we successfully measure the height of the bus doorsteps and door width of the bus. Our step measurements and bus doorsteps detection technique for the wheelchair also enables the wheelchair to autonomously board a bus. Our experiments show the effectiveness and applicability of our system to real world robotic wheelchair freedom of movement.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications.\n \n \n \n \n\n\n \n Mahmud, M.; Kaiser, M. S.; Rahman, M. M.; Rahman, M. A.; Shabut, A.; Al-Mamun, S.; and Hussain, A.\n\n\n \n\n\n\n Cognitive Computation, 10(5): 864–873. October 2018.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{mahmud_brain-inspired_2018,\n\ttitle = {A {Brain}-{Inspired} {Trust} {Management} {Model} to {Assure} {Security} in a {Cloud} {Based} {IoT} {Framework} for {Neuroscience} {Applications}},\n\tvolume = {10},\n\tissn = {1866-9964},\n\turl = {https://doi.org/10.1007/s12559-018-9543-3},\n\tdoi = {10.1007/s12559-018-9543-3},\n\tabstract = {Rapid advancement of Internet of Things (IoT) and cloud computing enables neuroscientists to collect multilevel and multichannel brain data to better understand brain functions, diagnose diseases, and devise treatments. To ensure secure and reliable data communication between end-to-end (E2E) devices supported by current IoT and cloud infrastructures, trust management is needed at the IoT and user ends. This paper introduces an adaptive neuro-fuzzy inference system (ANFIS) brain-inspired trust management model (TMM) to secure IoT devices and relay nodes, and to ensure data reliability. The proposed TMM utilizes both node behavioral trust and data trust, which are estimated using ANFIS, and weighted additive methods respectively, to assess the nodes trustworthiness. In contrast to existing fuzzy based TMMs, simulation results confirm the robustness and accuracy of our proposed TMM in identifying malicious nodes in the communication network. With growing usage of cloud based IoT frameworks in Neuroscience research, integrating the proposed TMM into existing infrastructure will assure secure and reliable data communication among E2E devices.},\n\tlanguage = {en},\n\tnumber = {5},\n\turldate = {2022-09-11},\n\tjournal = {Cognitive Computation},\n\tauthor = {Mahmud, Mufti and Kaiser, M. Shamim and Rahman, M. Mostafizur and Rahman, M. Arifur and Shabut, Antesar and Al-Mamun, Shamim and Hussain, Amir},\n\tmonth = oct,\n\tyear = {2018},\n\tkeywords = {ANFIS, Behavioral trust, Brain research, Cybersecurity, Data trust, Neuro-fuzzy system, Neuroscience big data, Quality of service},\n\tpages = {864--873},\n}\n
\n
\n\n\n
\n Rapid advancement of Internet of Things (IoT) and cloud computing enables neuroscientists to collect multilevel and multichannel brain data to better understand brain functions, diagnose diseases, and devise treatments. To ensure secure and reliable data communication between end-to-end (E2E) devices supported by current IoT and cloud infrastructures, trust management is needed at the IoT and user ends. This paper introduces an adaptive neuro-fuzzy inference system (ANFIS) brain-inspired trust management model (TMM) to secure IoT devices and relay nodes, and to ensure data reliability. The proposed TMM utilizes both node behavioral trust and data trust, which are estimated using ANFIS, and weighted additive methods respectively, to assess the nodes trustworthiness. In contrast to existing fuzzy based TMMs, simulation results confirm the robustness and accuracy of our proposed TMM in identifying malicious nodes in the communication network. With growing usage of cloud based IoT frameworks in Neuroscience research, integrating the proposed TMM into existing infrastructure will assure secure and reliable data communication among E2E devices.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Single Laser Bidirectional Sensing for Robotic Wheelchair Step Detection and Measurement.\n \n \n \n\n\n \n Mamun, S. A.; Lam, A.; Kobayashi, Y.; and Kuno, Y.\n\n\n \n\n\n\n In Huang, D.; Hussain, A.; Han, K.; and Gromiha, M. M., editor(s), Intelligent Computing Methodologies, of Lecture Notes in Computer Science, pages 37–47, Cham, 2017. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mamun_single_2017,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Single {Laser} {Bidirectional} {Sensing} for {Robotic} {Wheelchair} {Step} {Detection} and {Measurement}},\n\tisbn = {978-3-319-63315-2},\n\tdoi = {10.1007/978-3-319-63315-2_4},\n\tabstract = {Research interest in robotic wheelchairs is driven in part by their potential for improving the independence and quality-of-life of persons with disabilities and the elderly. Moreover, smart wheelchair systems aim to reduce the workload of the caregiver. In this paper, we propose a novel technique for 3D sensing of the terrain using a conventional Laser Range Finder (LRF). We mounted this sensing system onto our new six-wheeled robotic step-climbing wheelchair and propose a new step measurement technique using the histogram distribution of the laser data. We successfully measure the height of stair steps in a railway station. Our step measurement technique for the wheelchair also enables the wheelchair to autonomously board a bus. Our experiments show the effectiveness and its applicability to real world robotic wheelchair navigation.},\n\tlanguage = {en},\n\tbooktitle = {Intelligent {Computing} {Methodologies}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Mamun, Shamim Al and Lam, Antony and Kobayashi, Yoshinori and Kuno, Yoshinori},\n\teditor = {Huang, De-Shuang and Hussain, Abir and Han, Kyungsook and Gromiha, M. Michael},\n\tyear = {2017},\n\tkeywords = {Histogram, LRF, Step detection},\n\tpages = {37--47},\n}\n\n
\n
\n\n\n
\n Research interest in robotic wheelchairs is driven in part by their potential for improving the independence and quality-of-life of persons with disabilities and the elderly. Moreover, smart wheelchair systems aim to reduce the workload of the caregiver. In this paper, we propose a novel technique for 3D sensing of the terrain using a conventional Laser Range Finder (LRF). We mounted this sensing system onto our new six-wheeled robotic step-climbing wheelchair and propose a new step measurement technique using the histogram distribution of the laser data. We successfully measure the height of stair steps in a railway station. Our step measurement technique for the wheelchair also enables the wheelchair to autonomously board a bus. Our experiments show the effectiveness and its applicability to real world robotic wheelchair navigation.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Terrain Recognition for Smart Wheelchair.\n \n \n \n\n\n \n Mamun, S. A.; Suzuki, R.; Lam, A.; Kobayashi, Y.; and Kuno, Y.\n\n\n \n\n\n\n In Huang, D.; Han, K.; and Hussain, A., editor(s), Intelligent Computing Methodologies, of Lecture Notes in Computer Science, pages 461–470, Cham, 2016. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mamun_terrain_2016,\n\taddress = {Cham},\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Terrain {Recognition} for {Smart} {Wheelchair}},\n\tisbn = {978-3-319-42297-8},\n\tdoi = {10.1007/978-3-319-42297-8_43},\n\tabstract = {Research interest in robotic wheelchairs is driven in part by their potential for improving the independence and quality-of-life of persons with disabilities and the elderly. However the large majority of research to date has focused on indoor operations. In this paper, we aim to develop a smart wheelchair robot system that moves independently in outdoor terrain smoothly. To achive this, we propose a robotic wheelchair system that is able to classify the type of outdoor terrain according to their roughness for the comfort of the user and also control the wheelchair movements to avoid drop-off and watery areas on the road. An artificial neural network based classifier is constructed to classify the patterns and features extracted from the Laser Range Sensor (LRS) intensity and distance data. The overall classification accuracy is 97.24 \\% using extracted features from the intensity and distance data. These classification results can in turn be used to control the motor of the smart wheelchair.},\n\tlanguage = {en},\n\tbooktitle = {Intelligent {Computing} {Methodologies}},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Mamun, Shamim Al and Suzuki, Ryota and Lam, Antony and Kobayashi, Yoshinori and Kuno, Yoshinori},\n\teditor = {Huang, De-Shuang and Han, Kyungsook and Hussain, Abir},\n\tyear = {2016},\n\tkeywords = {ANFIS, Classification, Feature extraction, LRS, Surface},\n\tpages = {461--470},\n}\n\n
\n
\n\n\n
\n Research interest in robotic wheelchairs is driven in part by their potential for improving the independence and quality-of-life of persons with disabilities and the elderly. However the large majority of research to date has focused on indoor operations. In this paper, we aim to develop a smart wheelchair robot system that moves independently in outdoor terrain smoothly. To achive this, we propose a robotic wheelchair system that is able to classify the type of outdoor terrain according to their roughness for the comfort of the user and also control the wheelchair movements to avoid drop-off and watery areas on the road. An artificial neural network based classifier is constructed to classify the patterns and features extracted from the Laser Range Sensor (LRS) intensity and distance data. The overall classification accuracy is 97.24 % using extracted features from the intensity and distance data. These classification results can in turn be used to control the motor of the smart wheelchair.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Attack detection and prevention in the Cyber Physical System.\n \n \n \n\n\n \n Nurjahan; Nizam, F.; Chaki, S.; Al Mamun, S.; and Kaiser, M. S.\n\n\n \n\n\n\n In 2016 International Conference on Computer Communication and Informatics (ICCCI), pages 1–6, January 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{nurjahan_attack_2016,\n\ttitle = {Attack detection and prevention in the {Cyber} {Physical} {System}},\n\tdoi = {10.1109/ICCCI.2016.7480022},\n\tabstract = {This paper proposes cyber-attack detection and prevention of Cyber Physical System. The Chi square detector and Fuzzy logic based attack classifier (FLAC) were used to identify distributed denial of service and False data injection attacks. The fuzzy attributes for selecting the mentioned attacks are activity profiling, average packet rate, change point detection algorithm, cusum algorithm, unexpired session of users, injected incomplete information, reuse of session key. An example scenario has been created using OpNET Simulator. Simulation results depict that the use of Chi-square detector and FLAC are able to detect the mentioned cyber physical attacks with high accuracy. Compared to existing Fuzzy logic based attack detector, the proposed model outperforms the traditional distributed denial of service and false data detector.},\n\tbooktitle = {2016 {International} {Conference} on {Computer} {Communication} and {Informatics} ({ICCCI})},\n\tauthor = {{Nurjahan} and Nizam, Farhana and Chaki, Shudarshon and Al Mamun, Shamim and Kaiser, M. Shamim},\n\tmonth = jan,\n\tyear = {2016},\n\tkeywords = {Cryptography, Jamming, Protocols},\n\tpages = {1--6},\n}\n\n
\n
\n\n\n
\n This paper proposes cyber-attack detection and prevention of Cyber Physical System. The Chi square detector and Fuzzy logic based attack classifier (FLAC) were used to identify distributed denial of service and False data injection attacks. The fuzzy attributes for selecting the mentioned attacks are activity profiling, average packet rate, change point detection algorithm, cusum algorithm, unexpired session of users, injected incomplete information, reuse of session key. An example scenario has been created using OpNET Simulator. Simulation results depict that the use of Chi-square detector and FLAC are able to detect the mentioned cyber physical attacks with high accuracy. Compared to existing Fuzzy logic based attack detector, the proposed model outperforms the traditional distributed denial of service and false data detector.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Techno-financial analysis and design of on-board intelligent-assisting system for a hybrid solar–DEG-powered boat.\n \n \n \n \n\n\n \n Mamun, S. A.; Chowdhury, Z. I.; Kaiser, M. S.; and Islam, M. S.\n\n\n \n\n\n\n International Journal of Energy and Environmental Engineering, 7(4): 361–376. December 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Techno-financialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{mamun_techno-financial_2016,\n\ttitle = {Techno-financial analysis and design of on-board intelligent-assisting system for a hybrid solar–{DEG}-powered boat},\n\tvolume = {7},\n\tissn = {2251-6832},\n\turl = {https://doi.org/10.1007/s40095-016-0218-0},\n\tdoi = {10.1007/s40095-016-0218-0},\n\tabstract = {In this paper, we present a financial feasibility analysis and design of an on-board-assisting system for a hybrid solar–diesel-powered boat. The major components of this boat are solar panel, battery bank, speed and direction controller for dc motor, brushless dc motor, diesel engine generator (DEG), and intelligent-assisting system (IAS) to assist the sailor. A DEG is considered to maintain the ability to run the system even during night-time, cloudy, and partially cloudy days. The energy demand posed by the electrical system requires maintaining an appropriate balance between the energy sources-done by an on-board-processing element which facilitates the system to run automatically. The capacity of the battery bank is considered large enough to satisfy electrical power requirement of the system for a whole day during non-charging periods. The optimal configuration for the hybrid system is selected from HOMER simulation results, whereas a financial feasibility analysis of the proposed hybrid solar and DEG-powered boat is performed using a clean energy management software called RETScreen. The IAS also provides solutions to the common naval hazards, such as over-weight and inclement weather by employing depth of submergence detector and GSM network interface. Financial analysis reveals that the proposed system is financially feasible, while tests showed that IAS successfully provides navigational supports to sailors.},\n\tlanguage = {en},\n\tnumber = {4},\n\turldate = {2022-09-13},\n\tjournal = {International Journal of Energy and Environmental Engineering},\n\tauthor = {Mamun, Shamim Al and Chowdhury, Zamshed Iqbal and Kaiser, M. Shamim and Islam, Mohammad Shahidul},\n\tmonth = dec,\n\tyear = {2016},\n\tkeywords = {Boat, Depth of submergence, Diesel, GPS, Hybrid, Intelligent-assisting system, Over-weight, Solar, Weather information},\n\tpages = {361--376},\n}\n\n
\n
\n\n\n
\n In this paper, we present a financial feasibility analysis and design of an on-board-assisting system for a hybrid solar–diesel-powered boat. The major components of this boat are solar panel, battery bank, speed and direction controller for dc motor, brushless dc motor, diesel engine generator (DEG), and intelligent-assisting system (IAS) to assist the sailor. A DEG is considered to maintain the ability to run the system even during night-time, cloudy, and partially cloudy days. The energy demand posed by the electrical system requires maintaining an appropriate balance between the energy sources-done by an on-board-processing element which facilitates the system to run automatically. The capacity of the battery bank is considered large enough to satisfy electrical power requirement of the system for a whole day during non-charging periods. The optimal configuration for the hybrid system is selected from HOMER simulation results, whereas a financial feasibility analysis of the proposed hybrid solar and DEG-powered boat is performed using a clean energy management software called RETScreen. The IAS also provides solutions to the common naval hazards, such as over-weight and inclement weather by employing depth of submergence detector and GSM network interface. Financial analysis reveals that the proposed system is financially feasible, while tests showed that IAS successfully provides navigational supports to sailors.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n PHY/MAC layer attack detection system using neuro-fuzzy algorithm for IoT network.\n \n \n \n\n\n \n Rahman, S.; Mamun, S. A.; Ahmed, M. U.; and Kaiser, M. S.\n\n\n \n\n\n\n In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pages 2531–2536, March 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{rahman_phymac_2016,\n\ttitle = {{PHY}/{MAC} layer attack detection system using neuro-fuzzy algorithm for {IoT} network},\n\tdoi = {10.1109/ICEEOT.2016.7755150},\n\tabstract = {The Internet of Things (IoT) has become a novel paradigm that includes globally identifiable physical objects, integrated with the internet. This work presents an attack detection model using Artificial Neuro-Fuzzy Interface System (ANFIS) for IoT networks. Based on the input-output profile, ANFIS adapts its rules and membership parameters using hybrid back propagation and learning algorithm. In this paper, Sugeno type ANFIS has been considered. The ANFIS model can take dynamic information such as traffic flow, energy level, packet size, packet rate, source-destination address, source-destination ports, etc. as input profiles, and generate the current network security state as an output profile. The performance of the ANFIS attack detection model can be compared with fuzzy logic, neural networks, and pattern recognition based attack detection models. Performance evaluation shows that the proposed model is more reliable than other approaches based on confusion matrix, mean square error and accuracy measurement.},\n\tbooktitle = {2016 {International} {Conference} on {Electrical}, {Electronics}, and {Optimization} {Techniques} ({ICEEOT})},\n\tauthor = {Rahman, Saoreen and Mamun, Shamim Al and Ahmed, Mahtab Uddin and Kaiser, M. Shamim},\n\tmonth = mar,\n\tyear = {2016},\n\tkeywords = {ANFIS, Adaptation models, Computer crime, Feature extraction, Internet of Things, IoT, Mathematical model, Neuro-Fuzzy Approach, Noise measurement, PHY/MAC Layer Security},\n\tpages = {2531--2536},\n}\n\n
\n
\n\n\n
\n The Internet of Things (IoT) has become a novel paradigm that includes globally identifiable physical objects, integrated with the internet. This work presents an attack detection model using Artificial Neuro-Fuzzy Interface System (ANFIS) for IoT networks. Based on the input-output profile, ANFIS adapts its rules and membership parameters using hybrid back propagation and learning algorithm. In this paper, Sugeno type ANFIS has been considered. The ANFIS model can take dynamic information such as traffic flow, energy level, packet size, packet rate, source-destination address, source-destination ports, etc. as input profiles, and generate the current network security state as an output profile. The performance of the ANFIS attack detection model can be compared with fuzzy logic, neural networks, and pattern recognition based attack detection models. Performance evaluation shows that the proposed model is more reliable than other approaches based on confusion matrix, mean square error and accuracy measurement.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A neuro-fuzzy control system based on feature extraction of surface electromyogram signal for solar-powered wheelchair.\n \n \n \n\n\n \n Kaiser, M. S.; Chowdhury, Z. I.; Mamun, S. A.; Hussain, A.; and Mahmud, M.\n\n\n \n\n\n\n Cognitive Computation, 8(5): 946–954. 2016.\n Publisher: Springer\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kaiser_neuro-fuzzy_2016,\n\ttitle = {A neuro-fuzzy control system based on feature extraction of surface electromyogram signal for solar-powered wheelchair},\n\tvolume = {8},\n\tnumber = {5},\n\tjournal = {Cognitive Computation},\n\tauthor = {Kaiser, M. Shamim and Chowdhury, Zamshed Iqbal and Mamun, Shamim Al and Hussain, Amir and Mahmud, Mufti},\n\tyear = {2016},\n\tnote = {Publisher: Springer},\n\tpages = {946--954},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Solar Powered Wheel Chair for Physically Challenged People Using Surface EMG Signal.\n \n \n \n\n\n \n Kaiser, M. S.; Chowdhury, Z.; Al Mamun, S.; Hussain, A.; and Mahmud, M.\n\n\n \n\n\n\n December 2015.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@book{kaiser_solar_2015,\n\ttitle = {Solar {Powered} {Wheel} {Chair} for {Physically} {Challenged} {People} {Using} {Surface} {EMG} {Signal}},\n\tabstract = {This paper presents the design of low cost solar powered wheel chair for physically challenged people. The signals necessary to maneuver the wheel chair are acquired from different muscles of the hand using surface Electromyography (sEMG) technique. The raw sEMG signals collected from upper limb muscles are processed to extract the desired direction of movement for the wheel chair. The accuracy of the extracted EMG signals is found to be relatively high. A prototype is developed and tests verified the objective functionalities. The analysis of life cycle cost of the solar powered wheel chair is presented. It is found that the proposed wheel chair is financially feasible for developing countries.},\n\tauthor = {Kaiser, M. Shamim and Chowdhury, Zamshed and Al Mamun, Shamim and Hussain, Amir and Mahmud, Mufti},\n\tmonth = dec,\n\tyear = {2015},\n\tdoi = {10.1109/SSCI.2015.123},\n}\n\n
\n
\n\n\n
\n This paper presents the design of low cost solar powered wheel chair for physically challenged people. The signals necessary to maneuver the wheel chair are acquired from different muscles of the hand using surface Electromyography (sEMG) technique. The raw sEMG signals collected from upper limb muscles are processed to extract the desired direction of movement for the wheel chair. The accuracy of the extracted EMG signals is found to be relatively high. A prototype is developed and tests verified the objective functionalities. The analysis of life cycle cost of the solar powered wheel chair is presented. It is found that the proposed wheel chair is financially feasible for developing countries.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Trust and energy aware Cluster modeling and spectrum handoff for cognitive radio ad-hoc network.\n \n \n \n\n\n \n Afsana, F.; Jahan, N.; Sunny, F. A.; Kaiser, M. S.; and Mamun, S. A.\n\n\n \n\n\n\n In 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pages 1–6, May 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{afsana_trust_2015,\n\ttitle = {Trust and energy aware {Cluster} modeling and spectrum handoff for cognitive radio ad-hoc network},\n\tdoi = {10.1109/ICEEICT.2015.7307489},\n\tabstract = {This paper presents an energy aware cluster based architecture where trust aware model is used to improve energy efficiency and spectrum handoff framework is used to reduce handoff rate and thereby improve throughput. The main objectives are trustworthy node selection, cluster head detection, transmission power reduction and increasing successful data transmission by performing handoff. A set of cognitive radio nodes form a cluster based on minimum normalized distance and sensed common free channels. Cluster Head Election Cost (CHEC) is used to determine Cluster Head and Secondary Cluster Head. It also reduces delay for different network sizes compared to random handoff process. The performance of the proposed model has been evaluated through numerical simulations. Simulation results show that the proposed scheme can effectively maximize the throughput of the Secondary User and reduce average handoff probability.},\n\tbooktitle = {2015 {International} {Conference} on {Electrical} {Engineering} and {Information} {Communication} {Technology} ({ICEEICT})},\n\tauthor = {Afsana, Fariha and Jahan, Nusrat and Sunny, Farhana A. and Kaiser, M. S. and Mamun, S. A.},\n\tmonth = may,\n\tyear = {2015},\n\tkeywords = {Cluster, Cognitive Radio Ad-hoc Network, Cognitive radio, Energy, Portable computers, Radio transmitters, Robustness, Smart phones, Spectrum handoff, TV, Throughput, Trust},\n\tpages = {1--6},\n}\n\n
\n
\n\n\n
\n This paper presents an energy aware cluster based architecture where trust aware model is used to improve energy efficiency and spectrum handoff framework is used to reduce handoff rate and thereby improve throughput. The main objectives are trustworthy node selection, cluster head detection, transmission power reduction and increasing successful data transmission by performing handoff. A set of cognitive radio nodes form a cluster based on minimum normalized distance and sensed common free channels. Cluster Head Election Cost (CHEC) is used to determine Cluster Head and Secondary Cluster Head. It also reduces delay for different network sizes compared to random handoff process. The performance of the proposed model has been evaluated through numerical simulations. Simulation results show that the proposed scheme can effectively maximize the throughput of the Secondary User and reduce average handoff probability.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An energy efficient and reliable cluster-based adaptive MAC protocol for UWSN.\n \n \n \n\n\n \n Zenia, N. Z.; Kaiser, M. S.; Ahmed, M. R.; Mamun, S. A.; and Islam, M. S.\n\n\n \n\n\n\n In 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pages 1–7, May 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{zenia_energy_2015,\n\ttitle = {An energy efficient and reliable cluster-based adaptive {MAC} protocol for {UWSN}},\n\tdoi = {10.1109/ICEEICT.2015.7307468},\n\tabstract = {Now-a-days, underwater sensor network (UWSN) technology is becoming more appealing to researchers because it has introduced a new flux in diversified fields like scientific exploration, commercial exploitation, disaster prevention etc. Since, underwater sensor nodes are battery operated, energy is a fundamental design aspect of UWSN's protocol . Besides, low capacity and high propagation delay introduce large number of packet loss in underwater communication. To, address these issues several medium access control (MAC) protocols have already been proposed. This survey aims to analyze and summarize these protocols and provide a comprehensive overview through comparison and simulation. Moreover, an energy efficient, reliable, cluster based adaptive MAC protocol (ERCAMAC) has been proposed to improve reliability and energy efficiency. Simulation results has proved that the proposed protocol provides superior performance in terms of energy saving and throughput over others.},\n\tbooktitle = {2015 {International} {Conference} on {Electrical} {Engineering} and {Information} {Communication} {Technology} ({ICEEICT})},\n\tauthor = {Zenia, Nusrat Z. and Kaiser, M. S. and Ahmed, M. R. and Mamun, S. A. and Islam, M. S.},\n\tmonth = may,\n\tyear = {2015},\n\tkeywords = {Delays, Mobile communication, Protocols, Schedules},\n\tpages = {1--7},\n}\n\n
\n
\n\n\n
\n Now-a-days, underwater sensor network (UWSN) technology is becoming more appealing to researchers because it has introduced a new flux in diversified fields like scientific exploration, commercial exploitation, disaster prevention etc. Since, underwater sensor nodes are battery operated, energy is a fundamental design aspect of UWSN's protocol . Besides, low capacity and high propagation delay introduce large number of packet loss in underwater communication. To, address these issues several medium access control (MAC) protocols have already been proposed. This survey aims to analyze and summarize these protocols and provide a comprehensive overview through comparison and simulation. Moreover, an energy efficient, reliable, cluster based adaptive MAC protocol (ERCAMAC) has been proposed to improve reliability and energy efficiency. Simulation results has proved that the proposed protocol provides superior performance in terms of energy saving and throughput over others.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Performance evaluation of a portable PABX system through developing new bandwidth optimization technique.\n \n \n \n\n\n \n Rahman, M. T.; Mahi, M. J. N.; Biswas, M.; Kaiser, M. S.; and Al Mamun, S.\n\n\n \n\n\n\n In 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pages 1–5, May 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{rahman_performance_2015,\n\ttitle = {Performance evaluation of a portable {PABX} system through developing new bandwidth optimization technique},\n\tdoi = {10.1109/ICEEICT.2015.7307502},\n\tabstract = {Now is the age of information technology. World is advancing day by day. At present in this progressing world communication from one place to another has become so easy, less costly, and faster. This modern life is almost impossible with the help of these communication technologies. People need to talk, need to share data, need to express their emotion from long distance. So they need to use technologies to communicate with one another. But nowadays people prefer video calling more than voice calling. They often used video calling most instead of voice calling. Some software like Skype, Yahoo, Gtalk, Msn is used for voice and video call. But these software uses high capacity of bandwidth and a big amount of internet speed. Thinking of this, a flexible portable video calling PABX PC to PC and PC through different smart phone system established that operates with local LAN bandwidth consist of three limited equipments- 1)Server 2)Soft phone 3)Web cam through the network nodes. This system can be implemented on telecommunication sectors like call center, mobile phone customer care center etc. It can also be implemented on security issues like CCTV cameras. The system is implemented through new BW optimization technique which is more efficient in terms of time delay, number of packets and memory complexity. After evaluating the simulation, it is assured that this system is better than other existing systems which are available in market.},\n\tbooktitle = {2015 {International} {Conference} on {Electrical} {Engineering} and {Information} {Communication} {Technology} ({ICEEICT})},\n\tauthor = {Rahman, Md. Torikur and Mahi, Md. Julkar Nayeen and Biswas, Milon and Kaiser, M. Shamim and Al Mamun, Shamim},\n\tmonth = may,\n\tyear = {2015},\n\tkeywords = {BW Management, BW Optimization, Bandwidth, Complexity theory, Delays, IAX2, Leaky Bucket, Memory Complexity, PABX, Packet loss, Portability, Publishing, SIP, Token Bucket, Traffic Engineering},\n\tpages = {1--5},\n}\n\n
\n
\n\n\n
\n Now is the age of information technology. World is advancing day by day. At present in this progressing world communication from one place to another has become so easy, less costly, and faster. This modern life is almost impossible with the help of these communication technologies. People need to talk, need to share data, need to express their emotion from long distance. So they need to use technologies to communicate with one another. But nowadays people prefer video calling more than voice calling. They often used video calling most instead of voice calling. Some software like Skype, Yahoo, Gtalk, Msn is used for voice and video call. But these software uses high capacity of bandwidth and a big amount of internet speed. Thinking of this, a flexible portable video calling PABX PC to PC and PC through different smart phone system established that operates with local LAN bandwidth consist of three limited equipments- 1)Server 2)Soft phone 3)Web cam through the network nodes. This system can be implemented on telecommunication sectors like call center, mobile phone customer care center etc. It can also be implemented on security issues like CCTV cameras. The system is implemented through new BW optimization technique which is more efficient in terms of time delay, number of packets and memory complexity. After evaluating the simulation, it is assured that this system is better than other existing systems which are available in market.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Innovative approach in web application effort & cost estimation using functional measurement type.\n \n \n \n\n\n \n Reza, S. M.; Rahman, M. M.; Parvez, M. H.; Kaiser, M. S.; and Al Mamun, S.\n\n\n \n\n\n\n In 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pages 1–7, May 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{reza_innovative_2015,\n\ttitle = {Innovative approach in web application effort \\& cost estimation using functional measurement type},\n\tdoi = {10.1109/ICEEICT.2015.7307462},\n\tabstract = {Software cost models and effort approximations support project supervisors to distribute resources, control budgets and agenda and develop modern practices, leading to projects completed on time and within financial plan. If cost and effort are determined suspicious in software projects, suitable occasions can be missed; whereas expectant predictions can be affected to some resource losing. In the context of web development, these issues are also vital, and very challenging given that web projects have short schedules and very fluidic opportunity. Since software projects are continually changed in nature, earlier projects may not necessarily cover all aspects of a new project when used as a basis for cost estimation. Preliminary software estimation models are constructed on regression analysis or mathematical sources. This paper aims to propose an approach to develop the correctness of software effort and cost estimation using the structure of data set of a web application. All the measures collected, apart from total effort, were introduced using the original web hypermedia applications to ensure that functional measurement types were precisely measured.},\n\tbooktitle = {2015 {International} {Conference} on {Electrical} {Engineering} and {Information} {Communication} {Technology} ({ICEEICT})},\n\tauthor = {Reza, Sayed Mohsin and Rahman, Md. Mahfujur and Parvez, Md. Hasnat and Kaiser, M. Shamim and Al Mamun, Shamim},\n\tmonth = may,\n\tyear = {2015},\n\tkeywords = {Estimation, Functional Measurement Type etc., Software, Software Effort \\& Cost Estimation, Stakeholders, Web Application},\n\tpages = {1--7},\n}\n\n
\n
\n\n\n
\n Software cost models and effort approximations support project supervisors to distribute resources, control budgets and agenda and develop modern practices, leading to projects completed on time and within financial plan. If cost and effort are determined suspicious in software projects, suitable occasions can be missed; whereas expectant predictions can be affected to some resource losing. In the context of web development, these issues are also vital, and very challenging given that web projects have short schedules and very fluidic opportunity. Since software projects are continually changed in nature, earlier projects may not necessarily cover all aspects of a new project when used as a basis for cost estimation. Preliminary software estimation models are constructed on regression analysis or mathematical sources. This paper aims to propose an approach to develop the correctness of software effort and cost estimation using the structure of data set of a web application. All the measures collected, apart from total effort, were introduced using the original web hypermedia applications to ensure that functional measurement types were precisely measured.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Outage capacity analysis of cluster-based forwarding scheme for Body Area Network using nano-electromagnetic communication.\n \n \n \n\n\n \n Afsana, F.; Mamun, S. A.; Kaiser, M. S.; and Ahmed, M. R.\n\n\n \n\n\n\n In 2015 2nd International Conference on Electrical Information and Communication Technologies (EICT), pages 383–388, December 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{afsana_outage_2015,\n\ttitle = {Outage capacity analysis of cluster-based forwarding scheme for {Body} {Area} {Network} using nano-electromagnetic communication},\n\tdoi = {10.1109/EICT.2015.7391981},\n\tabstract = {The emergence of nano-electromagnetic communication becomes appealing for potential applications in nano-scale Body Area Network. In this work a new energy aware communication model for nano-electromagnetic communication in Terahertz Band is developed based on clustering scheme for the performance improvement of BAN. The proposed conceptual network model is used to determine channel capacity. A closed-form expression for outage probability is also derived. The approach is extended to determine outage capacity for maintaining a constant rate with a specified outage probability. Simulation shows that in term of capacity, proposed scheme outperforms the random forwarding scheme.},\n\tbooktitle = {2015 2nd {International} {Conference} on {Electrical} {Information} and {Communication} {Technologies} ({EICT})},\n\tauthor = {Afsana, Fariha and Mamun, S. A. and Kaiser, M. S. and Ahmed, M. R.},\n\tmonth = dec,\n\tyear = {2015},\n\tkeywords = {Logic gates, Transmitters, body area network, cluster, nanotechnology, outage capacity, terahertz},\n\tpages = {383--388},\n}\n\n
\n
\n\n\n
\n The emergence of nano-electromagnetic communication becomes appealing for potential applications in nano-scale Body Area Network. In this work a new energy aware communication model for nano-electromagnetic communication in Terahertz Band is developed based on clustering scheme for the performance improvement of BAN. The proposed conceptual network model is used to determine channel capacity. A closed-form expression for outage probability is also derived. The approach is extended to determine outage capacity for maintaining a constant rate with a specified outage probability. Simulation shows that in term of capacity, proposed scheme outperforms the random forwarding scheme.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Applying Ant Colony Optimization in software testing to generate prioritized optimal path and test data.\n \n \n \n\n\n \n Biswas, S.; Kaiser, M. S.; and Mamun, S. A.\n\n\n \n\n\n\n In 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pages 1–6, May 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{biswas_applying_2015,\n\ttitle = {Applying {Ant} {Colony} {Optimization} in software testing to generate prioritized optimal path and test data},\n\tdoi = {10.1109/ICEEICT.2015.7307500},\n\tabstract = {Software testing is one of the most important parts of software development lifecycle. Among various types of software testing approaches structural testing is widely used. Structural testing can be improved largely by traversing all possible code paths of the software. Genetic algorithm is the most used search technique to automate path testing and test case generation. Recently, different novel search based optimization techniques such as Ant Colony Optimization (ACO), Artificial Bee Colony (ABC), Artificial Immune System (AIS), Particle Swarm Optimization (PSO) have been applied to generate optimal path to complete software coverage. In this paper, ant colony optimization (ACO) based algorithm has been proposed which will generate set of optimal paths and prioritize the paths. Additionally, the approach generates test data sequence within the domain to use as inputs of the generated paths. Proposed approach guarantees full software coverage with minimum redundancy. This paper also demonstrates the proposed approach applying it in a program module.},\n\tbooktitle = {2015 {International} {Conference} on {Electrical} {Engineering} and {Information} {Communication} {Technology} ({ICEEICT})},\n\tauthor = {Biswas, Sumon and Kaiser, M. S. and Mamun, S. A.},\n\tmonth = may,\n\tyear = {2015},\n\tkeywords = {Ant Colony Optimization (ACO), Control Flow Graph (CFG), Path testing, Software testing, Test data generation, Testing},\n\tpages = {1--6},\n}\n\n
\n
\n\n\n
\n Software testing is one of the most important parts of software development lifecycle. Among various types of software testing approaches structural testing is widely used. Structural testing can be improved largely by traversing all possible code paths of the software. Genetic algorithm is the most used search technique to automate path testing and test case generation. Recently, different novel search based optimization techniques such as Ant Colony Optimization (ACO), Artificial Bee Colony (ABC), Artificial Immune System (AIS), Particle Swarm Optimization (PSO) have been applied to generate optimal path to complete software coverage. In this paper, ant colony optimization (ACO) based algorithm has been proposed which will generate set of optimal paths and prioritize the paths. Additionally, the approach generates test data sequence within the domain to use as inputs of the generated paths. Proposed approach guarantees full software coverage with minimum redundancy. This paper also demonstrates the proposed approach applying it in a program module.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n BER analysis of optical wireless communication system employing neuro-fuzzy based spot-diffusing techniques.\n \n \n \n\n\n \n Mamun, S. A.; Kaiser, M. S.; Ahmed, M. R.; and Islam, M. I.\n\n\n \n\n\n\n In 2013 International Conference on Electrical Information and Communication Technology (EICT), pages 1–5, February 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mamun_ber_2014,\n\ttitle = {{BER} analysis of optical wireless communication system employing neuro-fuzzy based spot-diffusing techniques},\n\tdoi = {10.1109/EICT.2014.6777842},\n\tabstract = {This paper presents financial feasibility analysis of a micro-controller based solar powered tricycle or rickshaw for Bangladesh. The main components of the Rickshaw are: rickshaw structure, a photovoltaic array, a battery bank, a battery charge controller, PIC micro-controllers and a DC motor. Here PIC micro-controllers are used to control the duty cycle and speed of the DC motor. The financial feasibility analysis have been done using standard methods of engineering econometrics such as Net Present Worth (NPW), Benefit-to-Cost Ratio (BCR) and Payback Periods (PP) methods. From the numerical analysis, it has been found that the proposed micro-controller based solar power rickshaw is financially feasible and Life cycle unit cost of the system is lowest compared to grid powered battery driven auto rickshaw.},\n\tbooktitle = {2013 {International} {Conference} on {Electrical} {Information} and {Communication} {Technology} ({EICT})},\n\tauthor = {Mamun, Shamim Al and Kaiser, M. Shamim and Ahmed, Muhammad R. and Islam, Md. Imdadul},\n\tmonth = feb,\n\tyear = {2014},\n\tkeywords = {Adaptation models, Delays, Noise measurement, Optical transmitters, Receivers, Signal to noise ratio, Solar energy, Wireless communication, battery operated rickshaw, economic analysis, microcontroller},\n\tpages = {1--5},\n}\n\n
\n
\n\n\n
\n This paper presents financial feasibility analysis of a micro-controller based solar powered tricycle or rickshaw for Bangladesh. The main components of the Rickshaw are: rickshaw structure, a photovoltaic array, a battery bank, a battery charge controller, PIC micro-controllers and a DC motor. Here PIC micro-controllers are used to control the duty cycle and speed of the DC motor. The financial feasibility analysis have been done using standard methods of engineering econometrics such as Net Present Worth (NPW), Benefit-to-Cost Ratio (BCR) and Payback Periods (PP) methods. From the numerical analysis, it has been found that the proposed micro-controller based solar power rickshaw is financially feasible and Life cycle unit cost of the system is lowest compared to grid powered battery driven auto rickshaw.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Performance analysis of LDPC coded wireless ad-hoc network for emergency response communications.\n \n \n \n\n\n \n Zenia, N. Z.; Afsana, F.; Kaiser, M. S.; and Mamun, S. A.\n\n\n \n\n\n\n In 2014 17th International Conference on Computer and Information Technology (ICCIT), pages 446–451, December 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{zenia_performance_2014,\n\ttitle = {Performance analysis of {LDPC} coded wireless ad-hoc network for emergency response communications},\n\tdoi = {10.1109/ICCITechn.2014.7073071},\n\tabstract = {In this paper, we present the performance evaluation of coded wireless ad-hoc network for emergency response communication. Due to the limited transmission range, a number of intermediate relaying nodes may exist between source and destination and these convey source transmission using hybrid Amplify-and-forward (AF)/Decode-and-forward (DF) protocol. All nodes contain single antenna and OFDM based Low Density Parity Check (LDPC) coded transmission is considered over Rician fading channel. The closed form bit-error-rate (BER) expression has been deduced for the proposed system. Performance evaluation reveals that BER of the LDPC coded ad-hoc network is better than that of non-coded ad-hoc network.},\n\tbooktitle = {2014 17th {International} {Conference} on {Computer} and {Information} {Technology} ({ICCIT})},\n\tauthor = {Zenia, Nusrat Z. and Afsana, Fariha and Kaiser, M. S. and Mamun, S. A.},\n\tmonth = dec,\n\tyear = {2014},\n\tkeywords = {AF, Ad hoc networks, Bit error rate, DF, Emergency response, Equations, LDPC, Mathematical model, Parity check codes, Relays, Wireless ad-hoc network, Wireless communication},\n\tpages = {446--451},\n}\n\n
\n
\n\n\n
\n In this paper, we present the performance evaluation of coded wireless ad-hoc network for emergency response communication. Due to the limited transmission range, a number of intermediate relaying nodes may exist between source and destination and these convey source transmission using hybrid Amplify-and-forward (AF)/Decode-and-forward (DF) protocol. All nodes contain single antenna and OFDM based Low Density Parity Check (LDPC) coded transmission is considered over Rician fading channel. The closed form bit-error-rate (BER) expression has been deduced for the proposed system. Performance evaluation reveals that BER of the LDPC coded ad-hoc network is better than that of non-coded ad-hoc network.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A new initiative for ERP system architecture with mobile cloud aspects of Bangladesh.\n \n \n \n\n\n \n Rahad, K. A.; Ahmed, F.; and Mamun, S. A.\n\n\n \n\n\n\n In 2014 International Conference on Electrical Engineering and Information & Communication Technology, pages 1–4, April 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{rahad_new_2014,\n\ttitle = {A new initiative for {ERP} system architecture with mobile cloud aspects of {Bangladesh}},\n\tdoi = {10.1109/ICEEICT.2014.6919146},\n\tabstract = {Enterprise Resource Planning (ERP) system in Mobile is a new application mode in the world of Business and Technology. With ERP system one can manage an organization or a company easily. In this paper the ERP system is integrated with mobile cloud. That is why now all resources are on the cloud and people can manage ERP system from their mobile devices. A new method for accessing ERP system regarding with foreign network have been proposed in this paper.},\n\tbooktitle = {2014 {International} {Conference} on {Electrical} {Engineering} and {Information} \\& {Communication} {Technology}},\n\tauthor = {Rahad, Khandoker Abdul and Ahmed, Feroz and Mamun, Shamim Al},\n\tmonth = apr,\n\tyear = {2014},\n\tkeywords = {Authentication, Business, Cloud computing, Computer architecture, ERP system, Mobile cloud computing, Mobile communication, Mobile computing, Mobile handsets, T-3 Architecture for mobile application, a new method for cloud based ERP},\n\tpages = {1--4},\n}\n\n
\n
\n\n\n
\n Enterprise Resource Planning (ERP) system in Mobile is a new application mode in the world of Business and Technology. With ERP system one can manage an organization or a company easily. In this paper the ERP system is integrated with mobile cloud. That is why now all resources are on the cloud and people can manage ERP system from their mobile devices. A new method for accessing ERP system regarding with foreign network have been proposed in this paper.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-priority and trusted multi-path selection algorithm for ad-hoc network.\n \n \n \n\n\n \n Afsana, F.; Zenia, N. Z.; Islam, N.; Sunny, F. A.; Kaiser, M. S.; and Mamun, S. A.\n\n\n \n\n\n\n In 2014 International Conference on Electrical Engineering and Information & Communication Technology, pages 1–6, April 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{afsana_multi-priority_2014,\n\ttitle = {Multi-priority and trusted multi-path selection algorithm for ad-hoc network},\n\tdoi = {10.1109/ICEEICT.2014.6919144},\n\tabstract = {This paper presents a multi-priority and multi-path selection algorithm for heterogeneous traffic for wireless ad-hoc networks. The main objectives are achieving higher throughput, better resource utilization through load balancing and relinquish network congestion. The proposed algorithm has considered signal-to-interference plus noise ratio (SINR), available link bandwidth, link delay (transmission delay and queuing delay), trust value of a node and traffic class (such as real time and non-real time traffic) to select optimal path. The performance of the proposed Multi-Priority and Trusted Multi-Path Selection (MTMS) algorithm has been evaluated by OPNET Modeler 14.5 simulator. It is found that in terms of average throughput (bit/second) and link delay proposed MTMS algorithm outperforms ad-hoc on-demand distant vector (AODV) and dynamic source routing (DSR).},\n\tbooktitle = {2014 {International} {Conference} on {Electrical} {Engineering} and {Information} \\& {Communication} {Technology}},\n\tauthor = {Afsana, Fariha and Zenia, Nusrat Z. and Islam, Nazia and Sunny, Farhana A. and Kaiser, M. S. and Mamun, S. A.},\n\tmonth = apr,\n\tyear = {2014},\n\tkeywords = {Ad hoc networks, Bandwidth, Delays, Interference, Load modeling, Real-time systems, Throughput, Wireless ad-hoc network, load balancing, outage probability, traffic class, trust},\n\tpages = {1--6},\n}\n\n
\n
\n\n\n
\n This paper presents a multi-priority and multi-path selection algorithm for heterogeneous traffic for wireless ad-hoc networks. The main objectives are achieving higher throughput, better resource utilization through load balancing and relinquish network congestion. The proposed algorithm has considered signal-to-interference plus noise ratio (SINR), available link bandwidth, link delay (transmission delay and queuing delay), trust value of a node and traffic class (such as real time and non-real time traffic) to select optimal path. The performance of the proposed Multi-Priority and Trusted Multi-Path Selection (MTMS) algorithm has been evaluated by OPNET Modeler 14.5 simulator. It is found that in terms of average throughput (bit/second) and link delay proposed MTMS algorithm outperforms ad-hoc on-demand distant vector (AODV) and dynamic source routing (DSR).\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A new approach for road networks - A vehicle XML device collaboration with big data.\n \n \n \n\n\n \n Reza, S. M.; Rahman, M. M.; and Mamun, S. A.\n\n\n \n\n\n\n In 2014 International Conference on Electrical Engineering and Information & Communication Technology, pages 1–5, April 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{reza_new_2014,\n\ttitle = {A new approach for road networks - {A} vehicle {XML} device collaboration with big data},\n\tdoi = {10.1109/ICEEICT.2014.6919153},\n\tabstract = {Large amount of money is lost to manipulate traffic system or road congestion worldwide every year. By providing the travel time for a specific road, traffic congestion can be minimized. Many approaches has been taken such Automatic Vehicle Identification, Loop Detectors etc. But this methods are costly. In this paper, A system is proposed that provides traffic intensity level information to the user according to recent traffic data analysis. To minimize the traffic congestion, the paper proposal is to use big data concept in this arena. This proposal develops a structure of a simple XML device which is installed on a vehicle to trace and provide information of traffic intensity. It can estimate travel times in a road network accurately. Further, according to this system anyone can develop application for business process development and increase information transfer to the local user.},\n\tbooktitle = {2014 {International} {Conference} on {Electrical} {Engineering} and {Information} \\& {Communication} {Technology}},\n\tauthor = {Reza, Sayed Mohsin and Rahman, Md. Mahfujur and Mamun, Shamim Al},\n\tmonth = apr,\n\tyear = {2014},\n\tkeywords = {Big Data, Big data, Congestion, Data acquisition, Data transfer, Intensity, Road Networks, Roads, Servers, Traffic, Vehicles, XML, XML device, travel times etc},\n\tpages = {1--5},\n}\n\n
\n
\n\n\n
\n Large amount of money is lost to manipulate traffic system or road congestion worldwide every year. By providing the travel time for a specific road, traffic congestion can be minimized. Many approaches has been taken such Automatic Vehicle Identification, Loop Detectors etc. But this methods are costly. In this paper, A system is proposed that provides traffic intensity level information to the user according to recent traffic data analysis. To minimize the traffic congestion, the paper proposal is to use big data concept in this arena. This proposal develops a structure of a simple XML device which is installed on a vehicle to trace and provide information of traffic intensity. It can estimate travel times in a road network accurately. Further, according to this system anyone can develop application for business process development and increase information transfer to the local user.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Improvement of RFID tag detection using smart antenna for tag based school monitoring system.\n \n \n \n\n\n \n Khanam, S.; Mahbub, M.; Mandal, A.; Kaiser, M. S.; and Mamun, S. A.\n\n\n \n\n\n\n In 2014 International Conference on Electrical Engineering and Information & Communication Technology, pages 1–6, April 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{khanam_improvement_2014,\n\ttitle = {Improvement of {RFID} tag detection using smart antenna for tag based school monitoring system},\n\tdoi = {10.1109/ICEEICT.2014.6919149},\n\tabstract = {Radio Frequency Identification (RFID) technology has attracted much attention due to its variety of applications in different fields e.g. military, sports, security, airline, inventory control, object tracking etc. Comparing to other tracking and detecting system such as barcode or smart card systems, RFID is faster and efficient. In this paper we present an efficient method of RFID tag detection for monitoring school going kids, by implementing smart antenna technology along with providing the updates to their parents. While this is an effective approach for the security and management of school going kids, we have to consider the coverage area and efficient tag detection issues. One important problem in RFID systems is to optimize the power allocation to the tag with respect to their distance from the reader which results in efficient tag detection and distance coverage. In this paper, we proposed an efficient and improved approach to fulfill these requirements for efficient tag detection. Results from mathematical analysis and extensive simulation demonstrate that our scheme shows a significant improvement over the traditional approaches of tag detection and power allocation techniques.},\n\tbooktitle = {2014 {International} {Conference} on {Electrical} {Engineering} and {Information} \\& {Communication} {Technology}},\n\tauthor = {Khanam, Sabira and Mahbub, Maliha and Mandal, Anuradha and Kaiser, M. Shamim and Mamun, Shamim Al},\n\tmonth = apr,\n\tyear = {2014},\n\tkeywords = {Educational institutions, Monitoring, Radiofrequency identification, Receiving antennas, Security, Transmitting antennas},\n\tpages = {1--6},\n}\n\n
\n
\n\n\n
\n Radio Frequency Identification (RFID) technology has attracted much attention due to its variety of applications in different fields e.g. military, sports, security, airline, inventory control, object tracking etc. Comparing to other tracking and detecting system such as barcode or smart card systems, RFID is faster and efficient. In this paper we present an efficient method of RFID tag detection for monitoring school going kids, by implementing smart antenna technology along with providing the updates to their parents. While this is an effective approach for the security and management of school going kids, we have to consider the coverage area and efficient tag detection issues. One important problem in RFID systems is to optimize the power allocation to the tag with respect to their distance from the reader which results in efficient tag detection and distance coverage. In this paper, we proposed an efficient and improved approach to fulfill these requirements for efficient tag detection. Results from mathematical analysis and extensive simulation demonstrate that our scheme shows a significant improvement over the traditional approaches of tag detection and power allocation techniques.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Cloud based healthcare application architecture and electronic medical record mining: An integrated approach to improve healthcare system.\n \n \n \n\n\n \n Biswas, S.; Anisuzzaman; Akhter, T.; Kaiser, M. S.; and Mamun, S. A.\n\n\n \n\n\n\n In 2014 17th International Conference on Computer and Information Technology (ICCIT), pages 286–291, December 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{biswas_cloud_2014,\n\ttitle = {Cloud based healthcare application architecture and electronic medical record mining: {An} integrated approach to improve healthcare system},\n\tshorttitle = {Cloud based healthcare application architecture and electronic medical record mining},\n\tdoi = {10.1109/ICCITechn.2014.7073139},\n\tabstract = {Healthcare system can be enhanced vastly with the use of modern information technology. Still now in underdeveloped and developing countries, traditional paper based system is being used in healthcare. Although very few organizations use computer based system, they could not establish a ubiquitous network among patients, physicians and government. Cloud computing is the emerging technology which can be used to develop a heterogeneous network to improve the system. In this article, a three tier cloud based application “eHealth Cloud” has been developed which will involve different parties to improve old-fashioned healthcare system. RIA (Rich Internet Application) based client, SimpleDB based server and a logic layer have been designed to build an easily accessible network. By using the “eHealth Cloud”, enormous electronic medical record (EMR) will be stored everyday. This huge size of data can lead us with new research opportunities. Data mining from the large amount of EMR has been proposed. The process of data mining, a standard for exchanging data and a mining model is described. Finally, the challenges and future research options are directed.},\n\tbooktitle = {2014 17th {International} {Conference} on {Computer} and {Information} {Technology} ({ICCIT})},\n\tauthor = {Biswas, Sumon and {Anisuzzaman} and Akhter, Tanjina and Kaiser, M. S. and Mamun, S. A.},\n\tmonth = dec,\n\tyear = {2014},\n\tkeywords = {Cloud computing, Data mining, Databases, EMR, Government, Medical diagnostic imaging, Medical services, Servers, cloud computing, data mining, healthcare},\n\tpages = {286--291},\n}\n\n
\n
\n\n\n
\n Healthcare system can be enhanced vastly with the use of modern information technology. Still now in underdeveloped and developing countries, traditional paper based system is being used in healthcare. Although very few organizations use computer based system, they could not establish a ubiquitous network among patients, physicians and government. Cloud computing is the emerging technology which can be used to develop a heterogeneous network to improve the system. In this article, a three tier cloud based application “eHealth Cloud” has been developed which will involve different parties to improve old-fashioned healthcare system. RIA (Rich Internet Application) based client, SimpleDB based server and a logic layer have been designed to build an easily accessible network. By using the “eHealth Cloud”, enormous electronic medical record (EMR) will be stored everyday. This huge size of data can lead us with new research opportunities. Data mining from the large amount of EMR has been proposed. The process of data mining, a standard for exchanging data and a mining model is described. Finally, the challenges and future research options are directed.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Performance Analysis of Optical Wireless Communication System Employing Neuro-Fuzzy Based Spot-Diffusing Techniques.\n \n \n \n \n\n\n \n Mamun, S. A.; Kaiser, M. S.; Ahmed, M. R; Islam, M. S.; and Islam, M. I.\n\n\n \n\n\n\n Communications and Network, 05(03): 260–265. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"PerformancePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mamun_performance_2013,\n\ttitle = {Performance {Analysis} of {Optical} {Wireless} {Communication} {System} {Employing} {Neuro}-{Fuzzy} {Based} {Spot}-{Diffusing} {Techniques}},\n\tvolume = {05},\n\tissn = {1949-2421, 1947-3826},\n\turl = {http://www.scirp.org/journal/doi.aspx?DOI=10.4236/cn.2013.53B2048},\n\tdoi = {10.4236/cn.2013.53B2048},\n\tabstract = {The spot-diffusing technique provides better performance compared to conventional diffuse system for indoor optical-wireless communication (OWC) system. In this paper, the performance of an OW spot-diffusing communication system using Neuro-Fuzzy (NF) adaptive multi-beam transmitter configuration has been proposed. The multi-beam transmitter generates multiple spots pointed in different directions, hence, forming a matrix of diffusing spots based on position of the receiver and receiver mobility. Regardless of the position of the transmitter and receiver, NF controller target the spots adaptively at the best locations and allocates optimal power to the spots and beam angle are adapted in order to achieve better signal-to-noise plus interference ratio (SNIR). Maximum ratio combining (MRC) is used in the imaging receiver. The proposed OW spot-diffusing communication system is compared with other spot-beam diffusion methods proposed in literature. Performance evaluation revels that the proposed NF based OW spot-diffusing communication system outperforms other spot-beam diffusion methods.},\n\tlanguage = {en},\n\tnumber = {03},\n\turldate = {2022-09-13},\n\tjournal = {Communications and Network},\n\tauthor = {Mamun, Shamim Al and Kaiser, M. Shamim and Ahmed, Muhammad R and Islam, Md. Shafiqul and Islam, Md. Imdadul},\n\tyear = {2013},\n\tpages = {260--265},\n}\n\n
\n
\n\n\n
\n The spot-diffusing technique provides better performance compared to conventional diffuse system for indoor optical-wireless communication (OWC) system. In this paper, the performance of an OW spot-diffusing communication system using Neuro-Fuzzy (NF) adaptive multi-beam transmitter configuration has been proposed. The multi-beam transmitter generates multiple spots pointed in different directions, hence, forming a matrix of diffusing spots based on position of the receiver and receiver mobility. Regardless of the position of the transmitter and receiver, NF controller target the spots adaptively at the best locations and allocates optimal power to the spots and beam angle are adapted in order to achieve better signal-to-noise plus interference ratio (SNIR). Maximum ratio combining (MRC) is used in the imaging receiver. The proposed OW spot-diffusing communication system is compared with other spot-beam diffusion methods proposed in literature. Performance evaluation revels that the proposed NF based OW spot-diffusing communication system outperforms other spot-beam diffusion methods.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Performance Analysis of Optical Wireless Communication System Employing Neuro-Fuzzy Based Spot-Diffusing Techniques.\n \n \n \n \n\n\n \n Mamun, S. A.; Kaiser, M. S.; Ahmed, M. R.; Islam, M. S.; and Islam, M. I.\n\n\n \n\n\n\n Communications and Network, 05(03): 260. September 2013.\n Number: 03 Publisher: Scientific Research Publishing\n\n\n\n
\n\n\n\n \n \n \"PerformancePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mamun_performance_2013-1,\n\ttitle = {Performance {Analysis} of {Optical} {Wireless} {Communication} {System} {Employing} {Neuro}-{Fuzzy} {Based} {Spot}-{Diffusing} {Techniques}},\n\tvolume = {05},\n\turl = {http://www.scirp.org/journal/PaperInformation.aspx?PaperID=39354&#abstract},\n\tdoi = {10.4236/cn.2013.53B2048},\n\tabstract = {The spot-diffusing technique provides better performance compared to conventional diffuse system for indoor optical-wireless communication (OWC) system. In this paper, the performance of an OW spot-diffusing communication system using Neuro-Fuzzy (NF) adaptive multi-beam transmitter configuration has been proposed. The multi-beam transmitter generates multiple spots pointed in different directions, hence, forming a matrix of diffusing spots based on position of the receiver and receiver mobility. Regardless of the position of the transmitter and receiver, NF controller target the spots adaptively at the best locations and allocates optimal power to the spots and beam angle are adapted in order to achieve better signal-to-noise plus interference ratio (SNIR). Maximum ratio combining (MRC) is used in the imaging receiver. The proposed OW spot-diffusing communication system is compared with other spot-beam diffusion methods proposed in literature. Performance evaluation revels that the proposed NF based OW spot-diffusing communication system outperforms other spot-beam diffusion methods.},\n\tlanguage = {en},\n\tnumber = {03},\n\turldate = {2022-09-13},\n\tjournal = {Communications and Network},\n\tauthor = {Mamun, Shamim Al and Kaiser, M. Shamim and Ahmed, Muhammad R. and Islam, Md Shafiqul and Islam, Md Imdadul},\n\tmonth = sep,\n\tyear = {2013},\n\tnote = {Number: 03\nPublisher: Scientific Research Publishing},\n\tpages = {260},\n}\n\n
\n
\n\n\n
\n The spot-diffusing technique provides better performance compared to conventional diffuse system for indoor optical-wireless communication (OWC) system. In this paper, the performance of an OW spot-diffusing communication system using Neuro-Fuzzy (NF) adaptive multi-beam transmitter configuration has been proposed. The multi-beam transmitter generates multiple spots pointed in different directions, hence, forming a matrix of diffusing spots based on position of the receiver and receiver mobility. Regardless of the position of the transmitter and receiver, NF controller target the spots adaptively at the best locations and allocates optimal power to the spots and beam angle are adapted in order to achieve better signal-to-noise plus interference ratio (SNIR). Maximum ratio combining (MRC) is used in the imaging receiver. The proposed OW spot-diffusing communication system is compared with other spot-beam diffusion methods proposed in literature. Performance evaluation revels that the proposed NF based OW spot-diffusing communication system outperforms other spot-beam diffusion methods.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Performance analysis of ANC based MIMO cooperative relaying network over Nakagami-m fading channel.\n \n \n \n\n\n \n Kaiser, M. S.; Mamun, S. A.; and Ahmed, K. M.\n\n\n \n\n\n\n In 2012 7th International Conference on Electrical and Computer Engineering, pages 393–396, December 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{kaiser_performance_2012,\n\ttitle = {Performance analysis of {ANC} based {MIMO} cooperative relaying network over {Nakagami}-m fading channel},\n\tdoi = {10.1109/ICECE.2012.6471570},\n\tabstract = {In this paper, we evaluate performance of ANC based MIMO cooperative relaying network over Nakagami-m fading channel. In the considered scenario, a source terminal transmits symbols with the help of one or multiple intermediate relays to a destination. The source and destination nodes contain one antenna whereas relay terminals contain two antennas. Relay terminals operate in amplify-and-forward (AF) relaying mode. Alamouti coding scheme is also used at the relays to improve the overall system performance. All the received symbols are combined at the destination using maximal ratio combining (MRC) technique. Moment generating function (MGF) based approach is followed to deduce the closed form symbol-error-rate (SER) expression. We investigate the performance of the system in terms of SER over Nakagami-m fading environment. A closed matched is observed in the analytical and simulation results.},\n\tbooktitle = {2012 7th {International} {Conference} on {Electrical} and {Computer} {Engineering}},\n\tauthor = {Kaiser, M. Shamim and Mamun, Shamim Al and Ahmed, Kazi M.},\n\tmonth = dec,\n\tyear = {2012},\n\tkeywords = {Encoding, Equations, Fading, MIMO, Mathematical model, Relays, Signal to noise ratio},\n\tpages = {393--396},\n}\n\n
\n
\n\n\n
\n In this paper, we evaluate performance of ANC based MIMO cooperative relaying network over Nakagami-m fading channel. In the considered scenario, a source terminal transmits symbols with the help of one or multiple intermediate relays to a destination. The source and destination nodes contain one antenna whereas relay terminals contain two antennas. Relay terminals operate in amplify-and-forward (AF) relaying mode. Alamouti coding scheme is also used at the relays to improve the overall system performance. All the received symbols are combined at the destination using maximal ratio combining (MRC) technique. Moment generating function (MGF) based approach is followed to deduce the closed form symbol-error-rate (SER) expression. We investigate the performance of the system in terms of SER over Nakagami-m fading environment. A closed matched is observed in the analytical and simulation results.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Effect of chromatic dispersion on four-wave mixing in optical WDM transmission system.\n \n \n \n\n\n \n Al-Mamun, S.; and Islam, M. S.\n\n\n \n\n\n\n In 2011 6th International Conference on Industrial and Information Systems, pages 425–428, August 2011. \n ISSN: 2164-7011\n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{al-mamun_effect_2011,\n\ttitle = {Effect of chromatic dispersion on four-wave mixing in optical {WDM} transmission system},\n\tdoi = {10.1109/ICIINFS.2011.6038106},\n\tabstract = {Crosstalk due to four-wave mixing (FWM) is the dominant nonlinear effect in long-haul multi-channel optical communication systems which can severely limit system performance. In this paper, we have simulated the effect of chromatic dispersion on FWM using equal and unequal channel spacing in terms of input/output spectrum, eye diagram and bit error rate. Results show that the effect of FWM reduces with the increasing dispersion coefficient, but the reduction is more effective for unequal channel spacing than equal channel spacing.},\n\tbooktitle = {2011 6th {International} {Conference} on {Industrial} and {Information} {Systems}},\n\tauthor = {Al-Mamun, S. and Islam, M. S.},\n\tmonth = aug,\n\tyear = {2011},\n\tnote = {ISSN: 2164-7011},\n\tkeywords = {Bit error rate, Channel spacing, Optical fiber dispersion, Optical fibers, Wavelength division multiplexing, bit error rate, chromatic dispersion, eye diagram Four-wave mixing and optical communication},\n\tpages = {425--428},\n}\n\n
\n
\n\n\n
\n Crosstalk due to four-wave mixing (FWM) is the dominant nonlinear effect in long-haul multi-channel optical communication systems which can severely limit system performance. In this paper, we have simulated the effect of chromatic dispersion on FWM using equal and unequal channel spacing in terms of input/output spectrum, eye diagram and bit error rate. Results show that the effect of FWM reduces with the increasing dispersion coefficient, but the reduction is more effective for unequal channel spacing than equal channel spacing.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Advancement of Base Case to the Recursion: A Way to Improve the Running Time of the Traditional Merge Sort Algorithm.\n \n \n \n\n\n \n Talukder, A.; Al Mamun, S.; and Alam, Z.\n\n\n \n\n\n\n Daffodil International University journal of Science and Technology, 2: 46–51. July 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{talukder_advancement_2007,\n\ttitle = {Advancement of {Base} {Case} to the {Recursion}: {A} {Way} to {Improve} the {Running} {Time} of the {Traditional} {Merge} {Sort} {Algorithm}},\n\tvolume = {2},\n\tshorttitle = {Advancement of {Base} {Case} to the {Recursion}},\n\tabstract = {Merge sort is one of the best examples of\ndivide and conquer technique. Divide and conquer\nis inherently recursive by nature. So if the number\nof recursive calls can be decreased, the complexity\nof any recursive algorithm can be improved. This\nnaturally leads to the advancement of base case of\nrecursion. In this research paper, we propose such\na base case-advancement technique. We will apply\nit upon the traditional merge sort and show that it\nimproves the number of recursive calls, the running\ntime as well as the memory requirement},\n\tjournal = {Daffodil International University journal of Science and Technology},\n\tauthor = {Talukder, Ashish and Al Mamun, Shamim and Alam, Zafor},\n\tmonth = jul,\n\tyear = {2007},\n\tpages = {46--51},\n}\n\n
\n
\n\n\n
\n Merge sort is one of the best examples of divide and conquer technique. Divide and conquer is inherently recursive by nature. So if the number of recursive calls can be decreased, the complexity of any recursive algorithm can be improved. This naturally leads to the advancement of base case of recursion. In this research paper, we propose such a base case-advancement technique. We will apply it upon the traditional merge sort and show that it improves the number of recursive calls, the running time as well as the memory requirement\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n An Efficient Approach for Handling Large Arrays in Parallel Computing Environment Using Bitonic Sorting.\n \n \n \n\n\n \n Arefin, A. S.; Rahman, M.; Kabir, M.; Alam, Z.; Al Mamun, S.; and Rahman, M.\n\n\n \n\n\n\n Asian Journal of Information Technology (AJIT), 4: 1027–1030. November 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{arefin_efficient_2005,\n\ttitle = {An {Efficient} {Approach} for {Handling} {Large} {Arrays} in {Parallel} {Computing} {Environment} {Using} {Bitonic} {Sorting}},\n\tvolume = {4},\n\tabstract = {In this study we would like to introduce an efficient variant of Bitonic sorting that can be used with sorting large arrays in distributed computing environment. The problem of sorting a collection of values on a mesh-connected distributed-memory computer using our sort algorithm is considered for the case where the number of values exceeds the number of processors in the machine. In this setting the number of comparisons can be reduced asymptotically if the processors have addressing autonomy (locally indirect addressing) and communication costs can be reduced by careful placement of the data values.},\n\tjournal = {Asian Journal of Information Technology (AJIT)},\n\tauthor = {Arefin, Ahmed Shamsul and Rahman, Muhammad and Kabir, Mohmmad and Alam, Zafor and Al Mamun, Shamim and Rahman, M.},\n\tmonth = nov,\n\tyear = {2005},\n\tpages = {1027--1030},\n}\n\n
\n
\n\n\n
\n In this study we would like to introduce an efficient variant of Bitonic sorting that can be used with sorting large arrays in distributed computing environment. The problem of sorting a collection of values on a mesh-connected distributed-memory computer using our sort algorithm is considered for the case where the number of values exceeds the number of processors in the machine. In this setting the number of comparisons can be reduced asymptotically if the processors have addressing autonomy (locally indirect addressing) and communication costs can be reduced by careful placement of the data values.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n undefined\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Interference Temperature Constraint-based Radio Resource Allocation for the Network Coded Cognitive Cooperative Network (NCCCN).\n \n \n \n\n\n \n Kaiser, M. S.; Mamun, S. A.; and Ahmed, K. M.\n\n\n \n\n\n\n \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{kaiser_interference_nodate,\n\ttitle = {Interference {Temperature} {Constraint}-based {Radio} {Resource} {Allocation} for the {Network} {Coded} {Cognitive} {Cooperative} {Network} ({NCCCN})},\n\tabstract = {Demand for higher data rate wireless applications has led to scarcity in radio frequency spectrum. Spectrum access achieves near-optimal spectrum utilization efficiency with the advent of cognitive radio technology. In cognitive radio network (CRN), each cognitive user, also called secondary user (SU), senses and uses radio spectrum opportunistically while regulating the interference constraint. This article focuses the radio resource allocation considering interference temperature constraints for the network coded cognitive cooperative network (NCCCN). Analog network coded (ANC) Orthogonal-Frequency-Division-Multiplexing (OFDM) improves the capacity of the cognitive cooperative network (CCN). Moreover, CCN enhances the spectrum utilization efficiency. Power allocation optimization problems have been formed that maximize the data transmission rate of NCCCN under the total transmit and peak-interference powers or the total transmit and average-interference powers. The spectral efficiency of the proposed network is compared with the spectral efficiency of CCN without ANC. Simulation results show that the proposed NCCCN enhances spectral efficiency in compared to the CCN without ANC.},\n\tauthor = {Kaiser, M. Shamim and Mamun, Shamim Al and Ahmed, Kazi M.},\n}\n\n
\n
\n\n\n
\n Demand for higher data rate wireless applications has led to scarcity in radio frequency spectrum. Spectrum access achieves near-optimal spectrum utilization efficiency with the advent of cognitive radio technology. In cognitive radio network (CRN), each cognitive user, also called secondary user (SU), senses and uses radio spectrum opportunistically while regulating the interference constraint. This article focuses the radio resource allocation considering interference temperature constraints for the network coded cognitive cooperative network (NCCCN). Analog network coded (ANC) Orthogonal-Frequency-Division-Multiplexing (OFDM) improves the capacity of the cognitive cooperative network (CCN). Moreover, CCN enhances the spectrum utilization efficiency. Power allocation optimization problems have been formed that maximize the data transmission rate of NCCCN under the total transmit and peak-interference powers or the total transmit and average-interference powers. The spectral efficiency of the proposed network is compared with the spectral efficiency of CCN without ANC. Simulation results show that the proposed NCCCN enhances spectral efficiency in compared to the CCN without ANC.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A New Unified Communication Approach to comply Bandwidth Optimization Technique using Dynamic Channel Allocation.\n \n \n \n \n\n\n \n \n\n\n \n\n\n\n \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{noauthor_new_nodate,\n\ttitle = {A {New} {Unified} {Communication} {Approach} to comply {Bandwidth} {Optimization} {Technique} using {Dynamic} {Channel} {Allocation}},\n\turl = {https://137.117.138.59/handle/123456789/1794},\n\turldate = {2022-09-13},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Application of deep learning in detecting neurological disorders from magnetic resonance images: a survey on the detection of Alzheimer’s disease, Parkinson’s disease and schizophrenia \\textbar SpringerLink.\n \n \n \n \n\n\n \n \n\n\n \n\n\n\n \n \n\n\n\n
\n\n\n\n \n \n \"ApplicationPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{noauthor_application_nodate,\n\ttitle = {Application of deep learning in detecting neurological disorders from magnetic resonance images: a survey on the detection of {Alzheimer}’s disease, {Parkinson}’s disease and schizophrenia {\\textbar} {SpringerLink}},\n\turl = {https://link.springer.com/article/10.1186/s40708-020-00112-2},\n\turldate = {2022-09-11},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);