![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessDeterminants of low birth weight and its effect on childhood health and nutritional outcomes in Bangladesh
The high incidence of low birth weight (LBW) is associated with an increased risk of infant mortality, adverse pregnancy outcomes for mothers, and a decline in overall health and well-being. The current study ...
-
Article
Deep analysis of adsorption isotherm for rapid sorption of Acid Blue 93 and Reactive Red 195 on reactive graphene
Graphene-based adsorbent was prepared by adopting a green synthetic route via the chemical exfoliation of graphite and low-temperature thermal activation. Prepared reactive graphene (RG) was characterized thro...
-
Chapter and Conference Paper
Noise-Aware-Based Texture Descriptor, Evaluation Adjacent Distance Local Ternary Pattern EAdLTP for Image Classification
This study introduces a new local feature descriptor called evaluation window-based adjacent distance local ternary pattern EAdLTP for image classification. It is created by combining evaluation window EwLBP a...
-
Chapter and Conference Paper
Improving Real-Time Object Tracking Through Adaptive Feature Fusion and Resampling in Particle Filters
This study introduces a sophisticated object tracking system developed to improve the precision and computing efficiency of real-time applications. Our method incorporates adaptive resampling strategies and a ...
-
Chapter and Conference Paper
A Novel Texture Descriptor Evaluation Window Based Adjacent Distance Local Binary Pattern (EADLBP) for Image Classification
In this research, we suggested a novel texture descriptor distance-based Adjacent Local Binary Pattern AdLBP based on the adjacent neighbor window and the relationships among the sequential neighbors pixel val...
-
Article
GESTCHA: a gesture-based CAPTCHA design for smart devices using angular velocity
The “Completely Automated Public Turing test to Tell Computers and Human Apart” (CAPTCHA) is a standard security protocol, wildly used to distinguish between human and malicious computer program, known as bot. Th...
-
Article
A facile one-pot scalable production of super electromagnetic shielding conductive cotton fabric by hierarchical graphene-composites
This paper uses the scaleable and commercial in-situ (exhaust) dyeing method to fabricate reduced graphene oxide (rGO)/poly(3,4-ethylenedioxythiophene) polystyrene sulfonate (PEDOT: PSS) hybrids on knitted cot...
-
Chapter and Conference Paper
Internet of Things and Microservices in Supply Chain: Cybersecurity Challenges, and Research Opportunities
The livestock sector contributes to agricultural development, poverty reduction, and food security globally. The digitization of the supply chain entails cost savings and improved flexibility, both of which ar...
-
Protocol
A Single GUV Method for Revealing the Action of Cell-Penetrating Peptides in Biomembranes
The mechanism of entry of cell-penetrating peptides (CPPs) into the cytosol of various cells has been studied by examining the interaction of CPPs with lipid bilayers and their entry into lipid vesicle lumens ...
-
Chapter and Conference Paper
WinDrift: Early Detection of Concept Drift Using Corresponding and Hierarchical Time Windows
In today’s interconnected society, large volumes of time-series data are usually collected from real-time applications. This data is generally used for data-driven decision-making. With time, changes may emerg...
-
Chapter and Conference Paper
Image Gradient Based Iris Recognition for Distantly Acquired Face Images Using Distance Classifiers
This paper presents an iris recognition framework to recognize irises from distantly acquired face images using image gradient-based feature extraction and K-Nearest Neighbor with various distance classifiers....
-
Chapter and Conference Paper
Signal Classification Using Smooth Coefficients of Multiple Wavelets to Achieve High Accuracy from Compressed Representation of Signal
Classification of time series signals has become an important construct and has many practical applications. With existing classifiers, we may be able to classify signals accurately; however, that accuracy may...
-
Article
Open AccessImplementing a digital human resources management tool in the government health sector in Bangladesh: a policy content analysis
In Bangladesh, to address the challenges of ensuring adequate human resources for health (HRH), the government began implementing a digital tool for HRH management in 2017. However, evidence suggests instituti...
-
Article
Privacy protection of online social network users, against attribute inference attacks, through the use of a set of exhaustive rules
A malicious data miner can infer users’ private information in online social networks (OSNs) by data mining the users’ disclosed information. By exploring the public information about a target user (i.e. an indiv...
-
Article
Detecting autism spectrum disorder using machine learning techniques
Autism Spectrum Disorder (ASD), which is a neuro development disorder, is often accompanied by sensory issues such an over sensitivity or under sensitivity to sounds and smells or touch. Although its main caus...
-
Article
A knowledge discovery and visualisation method for unearthing emotional states from physiological data
In this paper we propose a knowledge discovery and visualisation method for unearthing emotional states from physiological data typically available from wearable devices. In addition we investigate the viabili...
-
Article
Open AccessStature estimation from handprint measurements: an application to the medicolegal investigation
The estimation of the stature of human beings is a major part of medicolegal investigation when only body parts are found. The study aimed to estimate the stature from different handprint measurements in a Ban...
-
Chapter and Conference Paper
An Approach for Multi-human Pose Recognition and Classification Using Multiclass SVM
The aim of this paper is to recognize human activities and classify their activity using multi class support vector machine (SVM). There are many ways to predict human activity either vision based or wearable ...
-
Chapter and Conference Paper
PostMatch: A Framework for Efficient Address Matching
Matching lists of addresses is an increasingly common task executed by business and governments alike. However, due to security issues, this task cannot always be performed using cloud computing. Moreover, add...
-
Chapter and Conference Paper
Development of a Tangent Based Robust Speech Feature Extraction Model
An accurate speech recognition system requires close observation of the selection of an error-free speech feature extraction model. This paper describes a prominent solution to obtain robust features from the ...