Skip to main content

previous disabled Page of 3
and
  1. Article

    Open Access

    Determinants of low birth weight and its effect on childhood health and nutritional outcomes in Bangladesh

    The high incidence of low birth weight (LBW) is associated with an increased risk of infant mortality, adverse pregnancy outcomes for mothers, and a decline in overall health and well-being. The current study ...

    Md. Zahidul Islam in Journal of Health, Population and Nutrition (2024)

  2. No Access

    Article

    Deep analysis of adsorption isotherm for rapid sorption of Acid Blue 93 and Reactive Red 195 on reactive graphene

    Graphene-based adsorbent was prepared by adopting a green synthetic route via the chemical exfoliation of graphite and low-temperature thermal activation. Prepared reactive graphene (RG) was characterized thro...

    Hridam Deb, Md Khalid Hasan in Environmental Science and Pollution Resear… (2024)

  3. No Access

    Chapter and Conference Paper

    Noise-Aware-Based Texture Descriptor, Evaluation Adjacent Distance Local Ternary Pattern EAdLTP for Image Classification

    This study introduces a new local feature descriptor called evaluation window-based adjacent distance local ternary pattern EAdLTP for image classification. It is created by combining evaluation window EwLBP a...

    Most Marria Akter Misty in Proceedings of the 2nd International Confe… (2024)

  4. No Access

    Chapter and Conference Paper

    Improving Real-Time Object Tracking Through Adaptive Feature Fusion and Resampling in Particle Filters

    This study introduces a sophisticated object tracking system developed to improve the precision and computing efficiency of real-time applications. Our method incorporates adaptive resampling strategies and a ...

    Feroza Naznin, Md. Shoab Alam, Samia Alam Sathi in HCI International 2024 Posters (2024)

  5. No Access

    Chapter and Conference Paper

    A Novel Texture Descriptor Evaluation Window Based Adjacent Distance Local Binary Pattern (EADLBP) for Image Classification

    In this research, we suggested a novel texture descriptor distance-based Adjacent Local Binary Pattern AdLBP based on the adjacent neighbor window and the relationships among the sequential neighbors pixel val...

    Most. Maria Akter Misti, Sajal Mondal in Machine Intelligence and Emerging Technolo… (2023)

  6. No Access

    Article

    GESTCHA: a gesture-based CAPTCHA design for smart devices using angular velocity

    The “Completely Automated Public Turing test to Tell Computers and Human Apart” (CAPTCHA) is a standard security protocol, wildly used to distinguish between human and malicious computer program, known as bot. Th...

    Ahmed Iqbal Pritom, Md. Abdullah Al Mashuk, Somi Ahmed in Multimedia Tools and Applications (2023)

  7. No Access

    Article

    A facile one-pot scalable production of super electromagnetic shielding conductive cotton fabric by hierarchical graphene-composites

    This paper uses the scaleable and commercial in-situ (exhaust) dyeing method to fabricate reduced graphene oxide (rGO)/poly(3,4-ethylenedioxythiophene) polystyrene sulfonate (PEDOT: PSS) hybrids on knitted cot...

    Md Zahidul Islam, Hridam Deb, Md Khalid Hasan in Journal of Materials Science (2022)

  8. No Access

    Chapter and Conference Paper

    Internet of Things and Microservices in Supply Chain: Cybersecurity Challenges, and Research Opportunities

    The livestock sector contributes to agricultural development, poverty reduction, and food security globally. The digitization of the supply chain entails cost savings and improved flexibility, both of which ar...

    Belal Alsinglawi, Lihong Zheng in Advanced Information Networking and Applic… (2022)

  9. No Access

    Protocol

    A Single GUV Method for Revealing the Action of Cell-Penetrating Peptides in Biomembranes

    The mechanism of entry of cell-penetrating peptides (CPPs) into the cytosol of various cells has been studied by examining the interaction of CPPs with lipid bilayers and their entry into lipid vesicle lumens ...

    Md. Mizanur Rahman Moghal, Madhabi Lata Shuma in Cell Penetrating Peptides (2022)

  10. No Access

    Chapter and Conference Paper

    WinDrift: Early Detection of Concept Drift Using Corresponding and Hierarchical Time Windows

    In today’s interconnected society, large volumes of time-series data are usually collected from real-time applications. This data is generally used for data-driven decision-making. With time, changes may emerg...

    Naureen Naqvi, Sabih Ur Rehman, Md Zahidul Islam in Data Mining (2022)

  11. No Access

    Chapter and Conference Paper

    Image Gradient Based Iris Recognition for Distantly Acquired Face Images Using Distance Classifiers

    This paper presents an iris recognition framework to recognize irises from distantly acquired face images using image gradient-based feature extraction and K-Nearest Neighbor with various distance classifiers....

    Arnab Mukherjee, Kazi Shah Nawaz Ripon in Computational Science and Its Applications… (2022)

  12. No Access

    Chapter and Conference Paper

    Signal Classification Using Smooth Coefficients of Multiple Wavelets to Achieve High Accuracy from Compressed Representation of Signal

    Classification of time series signals has become an important construct and has many practical applications. With existing classifiers, we may be able to classify signals accurately; however, that accuracy may...

    Paul Grant, Md. Zahidul Islam in Advanced Data Mining and Applications (2022)

  13. Article

    Open Access

    Implementing a digital human resources management tool in the government health sector in Bangladesh: a policy content analysis

    In Bangladesh, to address the challenges of ensuring adequate human resources for health (HRH), the government began implementing a digital tool for HRH management in 2017. However, evidence suggests instituti...

    Dipika Shankar Bhattacharyya, Goutam Kumar Dutta in BMC Health Services Research (2021)

  14. No Access

    Article

    Privacy protection of online social network users, against attribute inference attacks, through the use of a set of exhaustive rules

    A malicious data miner can infer users’ private information in online social networks (OSNs) by data mining the users’ disclosed information. By exploring the public information about a target user (i.e. an indiv...

    Khondker Jahid Reza, Md Zahidul Islam in Neural Computing and Applications (2021)

  15. No Access

    Article

    Detecting autism spectrum disorder using machine learning techniques

    Autism Spectrum Disorder (ASD), which is a neuro development disorder, is often accompanied by sensory issues such an over sensitivity or under sensitivity to sounds and smells or touch. Although its main caus...

    Md Delowar Hossain, Muhammad Ashad Kabir in Health Information Science and Systems (2021)

  16. No Access

    Article

    A knowledge discovery and visualisation method for unearthing emotional states from physiological data

    In this paper we propose a knowledge discovery and visualisation method for unearthing emotional states from physiological data typically available from wearable devices. In addition we investigate the viabili...

    Nectarios Costadopoulos, Md Zahidul Islam in International Journal of Machine Learning … (2021)

  17. Article

    Open Access

    Stature estimation from handprint measurements: an application to the medicolegal investigation

    The estimation of the stature of human beings is a major part of medicolegal investigation when only body parts are found. The study aimed to estimate the stature from different handprint measurements in a Ban...

    Md. Asadujjaman, Md. Golzer Hossain in Egyptian Journal of Forensic Sciences (2021)

  18. No Access

    Chapter and Conference Paper

    An Approach for Multi-human Pose Recognition and Classification Using Multiclass SVM

    The aim of this paper is to recognize human activities and classify their activity using multi class support vector machine (SVM). There are many ways to predict human activity either vision based or wearable ...

    Sheikh Md. Razibul Hasan Raj, Sultana Jahan Mukta in Intelligent Computing and Optimization (2021)

  19. No Access

    Chapter and Conference Paper

    PostMatch: A Framework for Efficient Address Matching

    Matching lists of addresses is an increasingly common task executed by business and governments alike. However, due to security issues, this task cannot always be performed using cloud computing. Moreover, add...

    Darren Yates, Md Zahidul Islam, Yanchang Zhao, Richi Nayak in Data Mining (2021)

  20. No Access

    Chapter and Conference Paper

    Development of a Tangent Based Robust Speech Feature Extraction Model

    An accurate speech recognition system requires close observation of the selection of an error-free speech feature extraction model. This paper describes a prominent solution to obtain robust features from the ...

    Mohammad Tareq Hosain, Abdullah Al Arif in Cyber Security and Computer Science (2020)

previous disabled Page of 3