Skip to main content

and
  1. No Access

    Article

    A hybrid deep learning framework for daily living human activity recognition with cluster-based video summarization

    In assisted living facilities or nursing homes, residents’ movements or actions can be monitored using Human Activity Recognition (HAR), ensuring they receive proper care and attention. The significance of HAR...

    Shihab Hossain, Kaushik Deb, Saadman Sakib in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions

    The Internet of Things (IoT) is one of the most widely used technologies today, and it has a significant effect on our lives in a variety of ways, including social, commercial, and economic aspects. In terms o...

    Iqbal H. Sarker, Asif Irshad Khan, Yoosef B. Abushark in Mobile Networks and Applications (2023)

  3. No Access

    Chapter and Conference Paper

    A Stacked Ensemble Spyware Detection Model Using Hyper-Parameter Tuned Tree Based Classifiers

    Spyware is a type of malware that is designed to infiltrate a device or steal personal information. Over the last decade, the number of people facing such dangers has risen from 12.4 million to 812.67 million....

    Nowshin Tasnim, Md. Musfique Anwar in Machine Intelligence and Emerging Technolo… (2023)

  4. No Access

    Chapter and Conference Paper

    Diagnosis and Classification of Fetal Health Based on CTG Data Using Machine Learning Techniques

    Cardiotocograms (CTGs) is a simple and inexpensive way for healthcare providers to monitor fetal health, allowing them to take step to lessen infant as well as mother died. The technology operates by emitting ...

    Md. Monirul Islam, Md. Rokunojjaman, Al Amin in Machine Intelligence and Emerging Technolo… (2023)

  5. No Access

    Chapter and Conference Paper

    Cyber-Attack Detection Through Ensemble-Based Machine Learning Classifier

    In this fourth industrial revolution era, cyber-attacks are constantly increasing. A method called network traffic monitoring blueprint has been used to detect these unusual suspicious activities in the system...

    Mohammad Amaz Uddin in Machine Intelligence and Emerging Technolo… (2023)

  6. No Access

    Chapter and Conference Paper

    Aspect Based Sentiment Analysis of COVID-19 Tweets Using Blending Ensemble of Deep Learning Models

    This paper takes into account the aspect-based sentiment analysis of COVID-19 tweets, in order to understand human emotions and provide decision support to policymakers. People these days use social media to shar...

    Khandaker Tayef Shahriar, Md Musfique Anwar in Machine Intelligence and Emerging Technolo… (2023)

  7. Article

    Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions

    Artificial intelligence (AI) techniques have grown rapidly in recent years in the context of computing with smart mobile phones that typically allows the devices to function in an intelligent manner. Popular A...

    Iqbal H. Sarker, Mohammed Moshiul Hoque in Mobile Networks and Applications (2021)

  8. No Access

    Article

    BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model

    This paper formulates the problem of building a context-aware predictive model based on user diverse behavioral activities with smartphones. In the area of machine learning and data science, a tree-like model as ...

    Iqbal H. Sarker, Alan Colman, Jun Han, Asif Irshad Khan in Mobile Networks and Applications (2020)

  9. Chapter and Conference Paper

    Cyber Intrusion Detection Using Machine Learning Classification Techniques

    As the alarming growth of connectivity of computers and the significant number of computer-related applications increase in recent years, the challenge of fulfilling cyber-security is increasing consistently. ...

    Hamed Alqahtani, Iqbal H. Sarker, Asra Kalim in Computing Science, Communication and Secur… (2020)

  10. Chapter and Conference Paper

    Crime Prediction Using Spatio-Temporal Data

    A crime is an action which constitutes a punishable offence by law. It is harmful for society so as to prevent the criminal activity, it is important to understand crime. Data driven researches are useful to prev...

    Sohrab Hossain, Ahmed Abtahee, Imran Kashem in Computing Science, Communication and Secur… (2020)

  11. Chapter and Conference Paper

    A Rule-Based Expert System to Assess Coronary Artery Disease Under Uncertainty

    The coronary artery disease (CAD) occurs from the narrowing and damaging of major blood vessels or arteries. It has become the most life-threatening disease in the world, especially in the South Asian region. ...

    Sohrab Hossain, Dhiman Sarma in Computing Science, Communication and Secur… (2020)