Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Enhancing Carbon Sequestration through Afforestation: Evaluating the Impact of Land Use and Cover Changes on Carbon Storage Dynamics

    Carbon sequestration is crucial for achieving net zero emissions and plays a vital role in mitigating climate change. However, changes in forest cover are having a significant impact on the amount of carbon st...

    Muhammad Haseeb, Zainab Tahir, Syed Amer Mehmood in Earth Systems and Environment (2024)

  2. No Access

    Article

    Bengali Stop Word and Phrase Detection Mechanism

    Though plenty of research works have been done on stop word/phrase detection, there is no work done on Bengali stop words and stop phrases. This research innovates the definition and classification of Bengali ...

    Rakib Ul Haque, M. F. Mridha in Arabian Journal for Science and Engineering (2020)

  3. No Access

    Article

    Quantum-behaved bat algorithm for many-objective combined economic emission dispatch problem using cubic criterion function

    In this research, a quantum computing idea based bat algorithm (QBA) is proposed to solve many-objective combined economic emission dispatch (CEED) problem. Here, CEED is represented using cubic criterion func...

    Fahad Parvez Mahdi, Pandian Vasant in Neural Computing and Applications (2019)

  4. Article

    Open Access

    A histogram specification technique for dark image enhancement using a local transformation method

    Traditional image enhancement techniques produce different types of noise such as unnatural effects, over-enhancement, and artifacts, and these drawbacks become more prominent in enhancing dark images. To over...

    Khalid Hussain, Shanto Rahman in IPSJ Transactions on Computer Vision and A… (2018)

  5. No Access

    Chapter and Conference Paper

    Quantum-Behaved Bat Algorithm for Combined Economic Emission Dispatch Problem with Valve-Point Effect

    Combined economic emission dispatch (CEED) is a multi-objective optimization problem that deals with the minimization of total fuel cost and total emission of hazardous gases in thermal power generation system...

    Fahad Parvez Mahdi, Pandian Vasant in AETA 2017 - Recent Advances in Electrical … (2018)

  6. Article

    Open Access

    An adaptive gamma correction for image enhancement

    Due to the limitations of image-capturing devices or the presence of a non-ideal environment, the quality of digital images may get degraded. In spite of much advancement in imaging science, captured images do...

    Shanto Rahman, Md Mostafijur Rahman in EURASIP Journal on Image and Video Process… (2016)

  7. No Access

    Article

    An energy-efficient common control channel selection mechanism for Cognitive Radio Ad Hoc Networks

    A common control channel (CCC) is required in Cognitive Radio Ad Hoc Networks (CRAHNs) for exchanging vital control messages among the cognitive radio users. However, selecting a CCC in CRAHNs is a challenging...

    Md. Nazmus Sakib Miazi, Madiha Tabassum in annals of telecommunications - annales des… (2015)

  8. No Access

    Chapter and Conference Paper

    Hybrid Swarm Intelligence-Based Optimization for Charging Plug-in Hybrid Electric Vehicle

    Plug-in hybrid electric vehicle (PHEV) has the potential to facilitate the energy and environmental aspects of personal transportation, but face a hurdle of access to charging system. The charging infrastructu...

    Imran Rahman, Pandian Vasant in Intelligent Information and Database Syste… (2015)

  9. No Access

    Article

    A fault-tolerant structural health monitoring protocol using wireless sensor networks

    In wireless sensor network-based event detection approaches, when the decision is taken based on the measurements of sensors, sensor-fault and noise-related measurement error should be taken into account. Usin...

    M. Abdullah-Al-Wadud, Md. Abdul Hamid in annals of telecommunications - annales des… (2014)

  10. No Access

    Chapter and Conference Paper

    Facial Expression Classification Based on Dempster-Shafer Theory of Evidence

    Facial expression recognition is a well discussed problem. Several machine learning methods are used in this regard. Among them, Adaboost is popular for its simplicity and considerable accuracy. In Adaboost, d...

    Mohammad Shoyaib, M. Abdullah-Al-Wadud in Belief Functions: Theory and Applications (2012)

  11. No Access

    Chapter and Conference Paper

    Image Enhancement Using a Modified Histogram Equalization

    Image enhancement algorithms based on Histogram equalization (HE) often fall short to maintain the image quality after enhancement due to quantum jump in the cumulative distribution function (CDF) in the histo...

    M. M. Naushad Ali, M. Abdullah-Al-Wadud in Computer Applications for Web, Human Compu… (2012)

  12. No Access

    Chapter and Conference Paper

    Fast Reconstruction Technique for Medical Images Using Graphics Processing Unit

    In many medical imaging modalities, the Fast Fourier Transform (FFT) is being used for the reconstruction of images from acquired raw data. The objective of the paper is to develop FFT and Inverse FT algorithm...

    Mohammad Nazmul Haque, Mohammad Shorif Uddin in Signal Processing, Image Processing and Pa… (2011)

  13. No Access

    Chapter and Conference Paper

    Minimum Distortion Data Hiding

    In this paper a new steganographic method is presented with minimum distortion, and better resistance against steganalysis. There are two ways to control detectability of stego message: one is less distortion,...

    Md. Amiruzzaman, M. Abdullah-Al-Wadud, Yoo** Chung in Advances in Software Engineering (2010)

  14. No Access

    Chapter and Conference Paper

    Concurrent Covert Communication Channels

    This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The metho...

    Md Amiruzzaman, Hassan Peyravi in Advances in Computer Science and Informati… (2010)

  15. No Access

    Chapter and Conference Paper

    An Analysis of Syndrome Coding

    In this paper a detail analysis is presented based on BCH syndrome coding for covert channel data hiding methods. The experimented technique is nothing but a syndrome coding algorithm with a coset based approa...

    Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoo** Chung in Information Security and Assurance (2010)

  16. No Access

    Article

    A robust security scheme for wireless mesh enterprise networks

    In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devi...

    Md. Abdul Hamid, M. Abdullah-Al-Wadud in annals of telecommunications - annales des… (2009)

  17. Article

    Open Access

    A Skin Detection Approach Based on Color Distance Map

    We propose a reliable approach to detect skin regions that can be used in various human-related image processing applications. We use a color distance map, which itself is a grayscale image making the process ...

    M. Abdullah-Al-Wadud, Mohammad Shoyaib in EURASIP Journal on Advances in Signal Proc… (2009)

  18. No Access

    Chapter and Conference Paper

    An Improved Steganography Covert Channel

    An improved steganographic method is proposed in this paper. Two distinct methods are combined to achieve possibly high data hiding capability with high visual quality. The proposed method shifts the last n nonze...

    Md Amiruzzaman, Hassan Peyravi, M. Abdullah-Al-Wadud in Advances in Software Engineering (2009)

  19. No Access

    Chapter and Conference Paper

    A Fast Algorithm to Calculate Powers of a Boolean Matrix for Diameter Computation of Random Graphs

    In this paper, a fast algorithm is proposed to calculate k th power of an n×n Boolean matrix that requires O(kn 3 ...

    Md. Abdur Razzaque, Choong Seon Hong in WALCOM: Algorithms and Computation (2008)

  20. No Access

    Chapter and Conference Paper

    Minimizing the Search Space for Shape Retrieval Algorithms

    To provide satisfactory accuracy and flexibility, most of the existing shape retrieval methods make use of different alignments and translations of the objects that introduce much computational complexity. The...

    M. Abdullah-Al-Wadud, Oksam Chae in Computer and Information Sciences – ISCIS 2006 (2006)

previous disabled Page of 2