-
Cement Dust Exposure and Risk of Hyperglycemia and Overweight among Artisans and Residents Close to a Cement Factory in Sokoto, Nigeria
Authors:
T Yahaya,
KA Sani,
E Oladele,
E Yawa,
M Musa,
M Abubakar,
R Sulaiman,
M Bilyaminu
Abstract:
The potential health risks of cement dust exposure are increasingly raising concern worldwide as the cement industry expands in response to rising cement demand. This necessitates the need to determine the nature of the risks in order to develop appropriate measures. This study determined the effects of cement dust exposure on the weight and blood glucose levels of people residing or working aroun…
▽ More
The potential health risks of cement dust exposure are increasingly raising concern worldwide as the cement industry expands in response to rising cement demand. This necessitates the need to determine the nature of the risks in order to develop appropriate measures. This study determined the effects of cement dust exposure on the weight and blood glucose levels of people residing or working around a cement company in Sokoto, Nigeria. Demographic information was obtained using questionnaires from 72 participants, which included age, gender, educational level, exposure hours, occupation, and lifestyle. The blood glucose levels and body mass index (BMI) were measured using a Fine Test glucometer and a mechanical scale, respectively. The results showed that most of the people living or working around the cement company were middle-aged men (31-40; 42.06%) with a primary (33.33%) or secondary (45.83%) school education. It showed that 30 (41.69%) of the participants were overweight while 5 (6.94%) were obese. Additionally, 52.78% of the participants were diabetic while 31.94% were prediabetic. Participants that were exposed for long hours (> 15 hours per day) were the most diabetic (20% of the participants), followed by smokers (15%), and artisans (7%). It can be concluded that exposure to cement dust from the company increased the risk of overweight, obesity, and hyperglycemia among the participants. These health risks were worsened by daily long hours of exposure, smoking, and artisanal pollutant exposure. Human settlements and artisans should not be located near the cement company, and the company should minimize pollutant emissions.
△ Less
Submitted 29 June, 2024;
originally announced July 2024.
-
BloodCell-Net: A lightweight convolutional neural network for the classification of all microscopic blood cell images of the human body
Authors:
Sohag Kumar Mondal,
Md. Simul Hasan Talukder,
Mohammad Aljaidi,
Rejwan Bin Sulaiman,
Md Mohiuddin Sarker Tushar,
Amjad A Alsuwaylimi
Abstract:
Blood cell classification and counting are vital for the diagnosis of various blood-related diseases, such as anemia, leukemia, and thrombocytopenia. The manual process of blood cell classification and counting is time-consuming, prone to errors, and labor-intensive. Therefore, we have proposed a DL based automated system for blood cell classification and counting from microscopic blood smear imag…
▽ More
Blood cell classification and counting are vital for the diagnosis of various blood-related diseases, such as anemia, leukemia, and thrombocytopenia. The manual process of blood cell classification and counting is time-consuming, prone to errors, and labor-intensive. Therefore, we have proposed a DL based automated system for blood cell classification and counting from microscopic blood smear images. We classify total of nine types of blood cells, including Erythrocyte, Erythroblast, Neutrophil, Basophil, Eosinophil, Lymphocyte, Monocyte, Immature Granulocytes, and Platelet. Several preprocessing steps like image resizing, rescaling, contrast enhancement and augmentation are utilized. To segment the blood cells from the entire microscopic images, we employed the U-Net model. This segmentation technique aids in extracting the region of interest (ROI) by removing complex and noisy background elements. Both pixel-level metrics such as accuracy, precision, and sensitivity, and object-level evaluation metrics like Intersection over Union (IOU) and Dice coefficient are considered to comprehensively evaluate the performance of the U-Net model. The segmentation model achieved impressive performance metrics, including 98.23% accuracy, 98.40% precision, 98.25% sensitivity, 95.97% Intersection over Union (IOU), and 97.92% Dice coefficient. Subsequently, a watershed algorithm is applied to the segmented images to separate overlapped blood cells and extract individual cells. We have proposed a BloodCell-Net approach incorporated with custom light weight convolutional neural network (LWCNN) for classifying individual blood cells into nine types. Comprehensive evaluation of the classifier's performance is conducted using metrics including accuracy, precision, recall, and F1 score. The classifier achieved an average accuracy of 97.10%, precision of 97.19%, recall of 97.01%, and F1 score of 97.10%.
△ Less
Submitted 1 April, 2024;
originally announced May 2024.
-
Enhancing Bangla Fake News Detection Using Bidirectional Gated Recurrent Units and Deep Learning Techniques
Authors:
Utsha Roy,
Mst. Sazia Tahosin,
Md. Mahedi Hassan,
Taminul Islam,
Fahim Imtiaz,
Md Rezwane Sadik,
Yassine Maleh,
Rejwan Bin Sulaiman,
Md. Simul Hasan Talukder
Abstract:
The rise of fake news has made the need for effective detection methods, including in languages other than English, increasingly important. The study aims to address the challenges of Bangla which is considered a less important language. To this end, a complete dataset containing about 50,000 news items is proposed. Several deep learning models have been tested on this dataset, including the bidir…
▽ More
The rise of fake news has made the need for effective detection methods, including in languages other than English, increasingly important. The study aims to address the challenges of Bangla which is considered a less important language. To this end, a complete dataset containing about 50,000 news items is proposed. Several deep learning models have been tested on this dataset, including the bidirectional gated recurrent unit (GRU), the long short-term memory (LSTM), the 1D convolutional neural network (CNN), and hybrid architectures. For this research, we assessed the efficacy of the model utilizing a range of useful measures, including recall, precision, F1 score, and accuracy. This was done by employing a big application. We carry out comprehensive trials to show the effectiveness of these models in identifying bogus news in Bangla, with the Bidirectional GRU model having a stunning accuracy of 99.16%. Our analysis highlights the importance of dataset balance and the need for continual improvement efforts to a substantial degree. This study makes a major contribution to the creation of Bangla fake news detecting systems with limited resources, thereby setting the stage for future improvements in the detection process.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
The SPHERE view of the Orion star-forming region
Authors:
P. -G. Valegard,
C. Ginski,
A. Derkink,
A. Garufi,
C. Dominik,
A. Ribas,
J. P. Williams,
M. Benisty,
T. Birnstiel,
S. Facchini,
G. Columba,
M. Hogerheijde,
R. G. Van Holstein,
J. Huang,
M. Kenworthy,
C. F. Manara,
P. Pinilla,
Ch. Rab,
R. Sulaiman,
A. Zurlo
Abstract:
We present SPHERE/IRDIS H-band data for a sample of 23 stars in the Orion Star forming region observed within the DESTINYS (Disk Evolution Study Through Imaging of Nearby Young Stars) program. We use polarization differential imaging in order to detect scattered light from circumstellar dust. From the scattered light observations we characterize the disk orientation, radius and contrast. We analys…
▽ More
We present SPHERE/IRDIS H-band data for a sample of 23 stars in the Orion Star forming region observed within the DESTINYS (Disk Evolution Study Through Imaging of Nearby Young Stars) program. We use polarization differential imaging in order to detect scattered light from circumstellar dust. From the scattered light observations we characterize the disk orientation, radius and contrast. We analyse the disks in context of the stellar parameters and the environment of the Orion star-forming region. We use ancillary X-shooter spectroscopic observations to characterize the central stars in the systems. We furthermore use a combination of new and archival ALMA mm-continuum observations to characterize the dust masses present in the circumstellar disks. Within our sample we detect extended circumstellar disks in 10 of 23 systems. Of these, three are exceptionally extended (V351 Ori, V599 Ori and V1012 Ori) and show scattered light asymmetries which may indicate perturbations by embedded planets or (in the case of V599 Ori) by an outer stellar companion. Our high resolution imaging observations are also sensitive to close (sub)stellar companions and we detect 9 such objects in our sample of which 5 were previously unknown. We find in particular a possible sub-stellar companion (either a very low mass star or a high mass brown dwarf) 137 au from the star RY Ori. We find a strong anti-correlation between disk detection and multiplicity, with only 2 of our 10 disk detections located in stellar multiple systems. We also find a correlation between scattered light contrast and the millimetre flux suggesting that disks that have a high dust content are typically bright in near-infrared scattered light. Conversely we do not find significant correlations between scattered light contrast of the disks and the stellar mass or age.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Critical Analysis and Countermeasures Tactics, Techniques and Procedures (TTPs) that targeting civilians: A case study On Pegasus
Authors:
Osama Hussien,
Usman Butt,
Rejwan Bin Sulaiman
Abstract:
Individuals, businesses, and governments all face additional difficulties because of the rise of sophisticated cyberattack attacks. This paper investigates the targeting of journalists and activists by the malware Pegasus. To gain a deeper understanding of the tactics utilized by cybercriminals and the vulnerabilities that facilitate their scope, this research looks on numerous occurrences and ide…
▽ More
Individuals, businesses, and governments all face additional difficulties because of the rise of sophisticated cyberattack attacks. This paper investigates the targeting of journalists and activists by the malware Pegasus. To gain a deeper understanding of the tactics utilized by cybercriminals and the vulnerabilities that facilitate their scope, this research looks on numerous occurrences and identifies recurring patterns in the strategies, methods, and practices employed. In this paper, a comprehensive analysis is conducted on the far-reaching consequences of these attacks for cybersecurity policy, encompassing the pressing need for enhanced threat intelligence sharing mechanisms, the implementation of more resilient incident response protocols, and the allocation of greater financial resources towards the advancement of cybersecurity research and development initiatives. The research also discusses how Pegasus will affect SCADA systems and critical infrastructure, and it describes some of the most important tactics that businesses may use to reduce the danger of cyberattacks and safeguard themselves against the 21st century's growing threats. The extent of Pegasus spyware, which can access various data and communications on mobile devices running iOS and Android potentially jeopardise the civil rights and privacy of journalists, activists, and political leaders throughout the world, was found to be worrying
△ Less
Submitted 1 October, 2023;
originally announced October 2023.
-
Comparative study of Deep Learning Models for Binary Classification on Combined Pulmonary Chest X-ray Dataset
Authors:
Shabbir Ahmed Shuvo,
Md Aminul Islam,
Md. Mozammel Hoque,
Rejwan Bin Sulaiman
Abstract:
CNN-based deep learning models for disease detection have become popular recently. We compared the binary classification performance of eight prominent deep learning models: DenseNet 121, DenseNet 169, DenseNet 201, EffecientNet b0, EffecientNet lite4, GoogleNet, MobileNet, and ResNet18 for their binary classification performance on combined Pulmonary Chest Xrays dataset. Despite the widespread ap…
▽ More
CNN-based deep learning models for disease detection have become popular recently. We compared the binary classification performance of eight prominent deep learning models: DenseNet 121, DenseNet 169, DenseNet 201, EffecientNet b0, EffecientNet lite4, GoogleNet, MobileNet, and ResNet18 for their binary classification performance on combined Pulmonary Chest Xrays dataset. Despite the widespread application in different fields in medical images, there remains a knowledge gap in determining their relative performance when applied to the same dataset, a gap this study aimed to address. The dataset combined Shenzhen, China (CH) and Montgomery, USA (MC) data. We trained our model for binary classification, calculated different parameters of the mentioned models, and compared them. The models were trained to keep in mind all following the same training parameters to maintain a controlled comparison environment. End of the study, we found a distinct difference in performance among the other models when applied to the pulmonary chest Xray image dataset, where DenseNet169 performed with 89.38 percent and MobileNet with 92.2 percent precision.
Keywords: Pulmonary, Deep Learning, Tuberculosis, Disease detection, Xray
△ Less
Submitted 3 October, 2023; v1 submitted 16 September, 2023;
originally announced September 2023.
-
IoMT-Blockchain based Secured Remote Patient Monitoring Framework for Neuro-Stimulation Device
Authors:
Md Sakib Ullah Sourav,
Mohammad Sultan Mahmud,
Md Simul Hasan Talukder,
Rejwan Bin Sulaiman,
Abdullah Yasin
Abstract:
Biomedical Engineering's Internet of Medical Things (IoMT) is hel** to improve the accuracy, dependability, and productivity of electronic equipment in the healthcare business. Real-time sensory data from patients may be delivered and subsequently analyzed through rapid development of wearable IoMT devices, such as neuro-stimulation devices with a range of functions. Data from the Internet of Th…
▽ More
Biomedical Engineering's Internet of Medical Things (IoMT) is hel** to improve the accuracy, dependability, and productivity of electronic equipment in the healthcare business. Real-time sensory data from patients may be delivered and subsequently analyzed through rapid development of wearable IoMT devices, such as neuro-stimulation devices with a range of functions. Data from the Internet of Things is gathered, analyzed, and stored in a single location. However, single-point failure, data manipulation, privacy difficulties, and other challenges might arise as a result of centralization. Due to its decentralized nature, blockchain (BC) can alleviate these issues. The viability of establishing a non-invasive remote neurostimulation system employing IoMT-based transcranial Direct Current Stimulation is investigated in this work (tDCS). A hardware-based prototype tDCS device has been developed that can be operated over the internet using an android application. Our suggested framework addresses the problems of IoMTBC-based systems, meets the criteria of real-time remote patient monitoring systems, and incorporates literature best practices in the relevant fields.
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
A review of SolarWinds attack on Orion platform using persistent threat agents and techniques for gaining unauthorized access
Authors:
Antigoni Kruti,
Usman Butt,
Rejwan Bin Sulaiman
Abstract:
This paper of work examines the SolarWinds attack, designed on Orion Platform security incident. It analyses the persistent threats agents and potential technical attack techniques to gain unauthorized access. In 2020 SolarWinds attack indicates an initial breach disclosure on Orion Platform software by malware distribution on IT and government organizations such as Homeland Security, Microsoft an…
▽ More
This paper of work examines the SolarWinds attack, designed on Orion Platform security incident. It analyses the persistent threats agents and potential technical attack techniques to gain unauthorized access. In 2020 SolarWinds attack indicates an initial breach disclosure on Orion Platform software by malware distribution on IT and government organizations such as Homeland Security, Microsoft and Intel associated with supply chains leaks consequences from small loopholes in security systems. Hackers increased the number of infected company and businesses networks during the supply-chain attack, hackers were capable to propagate the attack by using a VMware exploit. On the special way they started to target command injections, privilege escalations, and use after free platforms of VMware. In this way, they gained access to Virtual Machines and in the east way pivot other servers. This literature review aim to analyze the security gap regarding to SolarWinds incident on Orion Platform, the impact on industry and financial sectors involving the elements of incident response plan. Therefore, this research paper ensures specifications of proper solutions for possible defense security systems by analyzing a SolarWinds attack case study via system evaluation and monitoring. It concludes with necessary remediation actions on cyber hygiene countermeasures, common vulnerabilities and exposure analysis and solutions.
△ Less
Submitted 4 September, 2023; v1 submitted 20 August, 2023;
originally announced August 2023.
-
Unleashing the Power of Extra-Tree Feature Selection and Random Forest Classifier for Improved Survival Prediction in Heart Failure Patients
Authors:
Md. Simul Hasan Talukder,
Rejwan Bin Sulaiman,
Mouli Bardhan Paul Angon
Abstract:
Heart failure is a life-threatening condition that affects millions of people worldwide. The ability to accurately predict patient survival can aid in early intervention and improve patient outcomes. In this study, we explore the potential of utilizing data pre-processing techniques and the Extra-Tree (ET) feature selection method in conjunction with the Random Forest (RF) classifier to improve su…
▽ More
Heart failure is a life-threatening condition that affects millions of people worldwide. The ability to accurately predict patient survival can aid in early intervention and improve patient outcomes. In this study, we explore the potential of utilizing data pre-processing techniques and the Extra-Tree (ET) feature selection method in conjunction with the Random Forest (RF) classifier to improve survival prediction in heart failure patients. By leveraging the strengths of ET feature selection, we aim to identify the most significant predictors associated with heart failure survival. Using the public UCL Heart failure (HF) survival dataset, we employ the ET feature selection algorithm to identify the most informative features. These features are then used as input for grid search of RF. Finally, the tuned RF Model was trained and evaluated using different matrices. The approach was achieved 98.33% accuracy that is the highest over the exiting work.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Analysis of the LockBit 3.0 and its infiltration into Advanced's infrastructure crippling NHS services
Authors:
Oladipupo Akinyemi,
Rejwan Sulaiman,
Nasr Abosata
Abstract:
The LockBit 3.0 ransomware variant is arguably the most threatening of malware in recent times. With no regard for a victim's industry, the ransomware has undergone several evolutions to arrive at an adaptable and evasive variant which has been a menace to governments and organisations, recently infiltrating Advanced Computer Software group. Previous LockBit studies mostly concentrated on measurin…
▽ More
The LockBit 3.0 ransomware variant is arguably the most threatening of malware in recent times. With no regard for a victim's industry, the ransomware has undergone several evolutions to arrive at an adaptable and evasive variant which has been a menace to governments and organisations, recently infiltrating Advanced Computer Software group. Previous LockBit studies mostly concentrated on measuring the impact of the ransomware attack, prevention, encryption detection, decryption, or data recovery, thereby providing little or no benefit to the less tech savvy populace as a detailed breakdown of the mode of attack is rarely examined. This article analyses the LockBit 3.0 attack techniques with a contextual illustration of the attack on Advanced Computer Software group. With the NHS being a major client of the organisation, and its services alongside 15 other clients being crippled for hours during the attack, attention is drawn to how dreadful such disruption may be in critical organisations. We observed that the upgrade of Lockbit based on releasing newer versions is in a bid to continuously ensure the malware's efficiency - a virtue that keeps it at the zenith - by staying ahead of improved defenses. Our study highlights social engineering as a vibrant portal to Lockbit's maliciousness and indicates an investment in detection systems may profit more than in prevention systems. Therefore, further research should consider improving detection systems against Lockbit 3.0.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
JutePestDetect: An Intelligent Approach for Jute Pest Identification Using Fine-Tuned Transfer Learning
Authors:
Md. Simul Hasan Talukder,
Mohammad Raziuddin Chowdhury,
Md Sakib Ullah Sourav,
Abdullah Al Rakin,
Shabbir Ahmed Shuvo,
Rejwan Bin Sulaiman,
Musarrat Saberin Nipun,
Muntarin Islam,
Mst Rumpa Islam,
Md Aminul Islam,
Zubaer Haque
Abstract:
In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, challenging, and somewhat imprecise, which poses a subs…
▽ More
In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, challenging, and somewhat imprecise, which poses a substantial financial risk. To address this issue, the study proposes a high-performing and resilient transfer learning (TL) based JutePestDetect model to identify jute pests at the early stage. Firstly, we prepared jute pest dataset containing 17 classes and around 380 photos per pest class, which were evaluated after manual and automatic pre-processing and cleaning, such as background removal and resizing. Subsequently, five prominent pre-trained models -DenseNet201, InceptionV3, MobileNetV2, VGG19, and ResNet50 were selected from a previous study to design the JutePestDetect model. Each model was revised by replacing the classification layer with a global average pooling layer and incorporating a dropout layer for regularization. To evaluate the models performance, various metrics such as precision, recall, F1 score, ROC curve, and confusion matrix were employed. These analyses provided additional insights for determining the efficacy of the models. Among them, the customized regularized DenseNet201-based proposed JutePestDetect model outperformed the others, achieving an impressive accuracy of 99%. As a result, our proposed method and strategy offer an enhanced approach to pest identification in the case of Jute, which can significantly benefit farmers worldwide.
△ Less
Submitted 28 May, 2023;
originally announced August 2023.
-
Comparative Analysis of Epileptic Seizure Prediction: Exploring Diverse Pre-Processing Techniques and Machine Learning Models
Authors:
Md. Simul Hasan Talukder,
Rejwan Bin Sulaiman
Abstract:
Epilepsy is a prevalent neurological disorder characterized by recurrent and unpredictable seizures, necessitating accurate prediction for effective management and patient care. Application of machine learning (ML) on electroencephalogram (EEG) recordings, along with its ability to provide valuable insights into brain activity during seizures, is able to make accurate and robust seizure prediction…
▽ More
Epilepsy is a prevalent neurological disorder characterized by recurrent and unpredictable seizures, necessitating accurate prediction for effective management and patient care. Application of machine learning (ML) on electroencephalogram (EEG) recordings, along with its ability to provide valuable insights into brain activity during seizures, is able to make accurate and robust seizure prediction an indispensable component in relevant studies. In this research, we present a comprehensive comparative analysis of five machine learning models - Random Forest (RF), Decision Tree (DT), Extra Trees (ET), Logistic Regression (LR), and Gradient Boosting (GB) - for the prediction of epileptic seizures using EEG data. The dataset underwent meticulous preprocessing, including cleaning, normalization, outlier handling, and oversampling, ensuring data quality and facilitating accurate model training. These preprocessing techniques played a crucial role in enhancing the models' performance. The results of our analysis demonstrate the performance of each model in terms of accuracy. The LR classifier achieved an accuracy of 56.95%, while GB and DT both attained 97.17% accuracy. RT achieved a higher accuracy of 98.99%, while the ET model exhibited the best performance with an accuracy of 99.29%. Our findings reveal that the ET model outperformed not only the other models in the comparative analysis but also surpassed the state-of-the-art results from previous research. The superior performance of the ET model makes it a compelling choice for accurate and robust epileptic seizure prediction using EEG data.
△ Less
Submitted 6 August, 2023;
originally announced August 2023.
-
PotatoPestNet: A CTInceptionV3-RS-Based Neural Network for Accurate Identification of Potato Pests
Authors:
Md. Simul Hasan Talukder,
Rejwan Bin Sulaiman,
Mohammad Raziuddin Chowdhury,
Musarrat Saberin Nipun,
Taminul Islam
Abstract:
Potatoes are the third-largest food crop globally, but their production frequently encounters difficulties because of aggressive pest infestations. The aim of this study is to investigate the various types and characteristics of these pests and propose an efficient PotatoPestNet AI-based automatic potato pest identification system. To accomplish this, we curated a reliable dataset consisting of ei…
▽ More
Potatoes are the third-largest food crop globally, but their production frequently encounters difficulties because of aggressive pest infestations. The aim of this study is to investigate the various types and characteristics of these pests and propose an efficient PotatoPestNet AI-based automatic potato pest identification system. To accomplish this, we curated a reliable dataset consisting of eight types of potato pests. We leveraged the power of transfer learning by employing five customized, pre-trained transfer learning models: CMobileNetV2, CNASLargeNet, CXception, CDenseNet201, and CInceptionV3, in proposing a robust PotatoPestNet model to accurately classify potato pests. To improve the models' performance, we applied various augmentation techniques, incorporated a global average pooling layer, and implemented proper regularization methods. To further enhance the performance of the models, we utilized random search (RS) optimization for hyperparameter tuning. This optimization technique played a significant role in fine-tuning the models and achieving improved performance. We evaluated the models both visually and quantitatively, utilizing different evaluation metrics. The robustness of the models in handling imbalanced datasets was assessed using the Receiver Operating Characteristic (ROC) curve. Among the models, the Customized Tuned Inception V3 (CTInceptionV3) model, optimized through random search, demonstrated outstanding performance. It achieved the highest accuracy (91%), precision (91%), recall (91%), and F1-score (91%), showcasing its superior ability to accurately identify and classify potato pests.
△ Less
Submitted 15 July, 2023; v1 submitted 27 May, 2023;
originally announced June 2023.
-
A Comparative Analysis of CNN-Based Pretrained Models for the Detection and Prediction of Monkeypox
Authors:
Sourav Saha,
Trina Chakraborty,
Rejwan Bin Sulaiman,
Tithi Paul
Abstract:
Monkeypox is a rare disease that raised concern among medical specialists following the convi-19 pandemic. It's concerning since monkeypox is difficult to diagnose early on because of symptoms that are similar to chickenpox and measles. Furthermore, because this is a rare condition, there is a knowledge gap among healthcare professionals. As a result, there is an urgent need for a novel technique…
▽ More
Monkeypox is a rare disease that raised concern among medical specialists following the convi-19 pandemic. It's concerning since monkeypox is difficult to diagnose early on because of symptoms that are similar to chickenpox and measles. Furthermore, because this is a rare condition, there is a knowledge gap among healthcare professionals. As a result, there is an urgent need for a novel technique to combat and anticipate the disease in the early phases of individual virus infection. Multiple CNN-based pre-trained models, including VGG-16, VGG-19, Restnet50, Inception-V3, Densnet, Xception, MobileNetV2, Alexnet, Lenet, and majority Voting, were employed in classification in this study. For this study, multiple data sets were combined, such as monkeypox vs chickenpox, monkeypox versus measles, monkeypox versus normal, and monkeypox versus all diseases. Majority voting performed 97% in monkeypox vs chickenpox, Xception achieved 79% in monkeypox against measles, MobileNetV2 scored 96% in monkeypox vs normal, and Lenet performed 80% in monkeypox versus all.
△ Less
Submitted 20 January, 2023;
originally announced February 2023.
-
The Role of Digital Agriculture in Transforming Rural Areas into Smart Villages
Authors:
Mohammad Raziuddin Chowdhury,
Md Sakib Ullah Sourav,
Rejwan Bin Sulaiman
Abstract:
From the perspective of any nation, rural areas generally present a comparable set of problems, such as a lack of proper health care, education, living conditions, wages, and market opportunities. Some nations have created and developed the concept of smart villages during the previous few decades, which effectively addresses these issues. The landscape of traditional agriculture has been radicall…
▽ More
From the perspective of any nation, rural areas generally present a comparable set of problems, such as a lack of proper health care, education, living conditions, wages, and market opportunities. Some nations have created and developed the concept of smart villages during the previous few decades, which effectively addresses these issues. The landscape of traditional agriculture has been radically altered by digital agriculture, which has also had a positive economic impact on farmers and those who live in rural regions by ensuring an increase in agricultural production. We explored current issues in rural areas, and the consequences of smart village applications, and then illustrate our concept of smart village from recent examples of how emerging digital agriculture trends contribute to improving agricultural production in this chapter.
△ Less
Submitted 7 January, 2023;
originally announced January 2023.
-
Efficient approach of using CNN based pretrained model in Bangla handwritten digit recognition
Authors:
Muntarin Islam,
Shabbir Ahmed Shuvo,
Musarrat Saberin Nipun,
Rejwan Bin Sulaiman,
Jannatul Nayeem,
Zubaer Haque,
Md Mostak Shaikh,
Md Sakib Ullah Sourav
Abstract:
Due to digitalization in everyday life, the need for automatically recognizing handwritten digits is increasing. Handwritten digit recognition is essential for numerous applications in various industries. Bengali ranks the fifth largest language in the world with 265 million speakers (Native and non-native combined) and 4 percent of the world population speaks Bengali. Due to the complexity of Ben…
▽ More
Due to digitalization in everyday life, the need for automatically recognizing handwritten digits is increasing. Handwritten digit recognition is essential for numerous applications in various industries. Bengali ranks the fifth largest language in the world with 265 million speakers (Native and non-native combined) and 4 percent of the world population speaks Bengali. Due to the complexity of Bengali writing in terms of variety in shape, size, and writing style, researchers did not get better accuracy using Supervised machine learning algorithms to date. Moreover, fewer studies have been done on Bangla handwritten digit recognition (BHwDR). In this paper, we proposed a novel CNN-based pre-trained handwritten digit recognition model which includes Resnet-50, Inception-v3, and EfficientNetB0 on NumtaDB dataset of 17 thousand instances with 10 classes.. The Result outperformed the performance of other models to date with 97% accuracy in the 10-digit classes. Furthermore, we have evaluated the result or our model with other research studies while suggesting future study
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
CNN based Intelligent Streetlight Management Using Smart CCTV Camera and Semantic Segmentation
Authors:
Md Sakib Ullah Sourav,
Huidong Wang,
Mohammad Raziuddin Chowdhury,
Rejwan Bin Sulaiman
Abstract:
One of the most neglected sources of energy loss is streetlights which generate too much light in areas where it is not required. Energy waste has enormous economic and environmental effects. In addition, due to the conventional manual nature of the operation, streetlights are frequently seen being turned ON during the day and OFF in the evening, which is regrettable even in the twenty-first centu…
▽ More
One of the most neglected sources of energy loss is streetlights which generate too much light in areas where it is not required. Energy waste has enormous economic and environmental effects. In addition, due to the conventional manual nature of the operation, streetlights are frequently seen being turned ON during the day and OFF in the evening, which is regrettable even in the twenty-first century. These issues require automated streetlight control in order to be resolved. This study aims to develop a novel streetlight controlling method by combining a smart transport monitoring system powered by computer vision technology with a closed circuit television (CCTV) camera that allows the light-emitting diode (LED) streetlight to automatically light up with the appropriate brightness by detecting the presence of pedestrians or vehicles and dimming the streetlight in their absence using semantic image segmentation from the CCTV video streaming. Consequently, our model distinguishes daylight and nighttime, which made it feasible to automate the process of turning the streetlight 'ON' and 'OFF' to save energy consumption costs. According to the aforementioned approach, geolocation sensor data could be utilized to make more informed streetlight management decisions. To complete the tasks, we consider training the U-net model with ResNet-34 as its backbone. The validity of the models is guaranteed with the use of assessment matrices. The suggested concept is straightforward, economical, energy-efficient, long-lasting, and more resilient than conventional alternatives.
△ Less
Submitted 27 March, 2023; v1 submitted 18 September, 2022;
originally announced September 2022.
-
AI Based Chatbot: An Approach of Utilizing On Customer Service Assistance
Authors:
Rejwan Bin Sulaiman
Abstract:
Providing the best customer experience is one of the primary concerns for the firms that are based online. The advancement of machine learning is revolutionising the company's attitude towards the client through improving the service quality by implementing chatbot solutions, which gives the user instant and satisfactory answers to their enquiries. The acceptance of this technology is increasing w…
▽ More
Providing the best customer experience is one of the primary concerns for the firms that are based online. The advancement of machine learning is revolutionising the company's attitude towards the client through improving the service quality by implementing chatbot solutions, which gives the user instant and satisfactory answers to their enquiries. The acceptance of this technology is increasing with the new improvements and efficiency of the chatbot system. This thesis paper will cover the concept of chatbot system for the company, as a use case we took AK traders Ltd. It involves the research work on various chatbot technologies available and based on research, use them to develop a chatbot system for the company. This system will work based on the text as a conversational agent that can interact with humans by natural language. The main objective project is to develop the chatbot solution that could comply with complex questions and logical output answers in a well-defined approach. The ultimate goal is to give high-quality results (answers) based on user input (question). For the successful implementation of this project, we have undertaken an in-depth analysis of the various machine learning techniques available and followed well-structured implementation to figure out the best solution for the company. The primary concern of this project includes natural language processing (NLP), machine learning and the vector space model (VSM). The outcome of the project shows the problem-solving technique for the implementation of the chatbot system for the company at a reasonable quality level
△ Less
Submitted 17 June, 2022;
originally announced July 2022.
-
A novel approach to increase scalability while training machine learning algorithms using Bfloat 16 in credit card fraud detection
Authors:
Bushra Yousuf,
Rejwan Bin Sulaiman,
Musarrat Saberin Nipun
Abstract:
The use of credit cards has become quite common these days as digital banking has become the norm. With this increase, fraud in credit cards also has a huge problem and loss to the banks and customers alike. Normal fraud detection systems, are not able to detect the fraud since fraudsters emerge with new techniques to commit fraud. This creates the need to use machine learning-based software to de…
▽ More
The use of credit cards has become quite common these days as digital banking has become the norm. With this increase, fraud in credit cards also has a huge problem and loss to the banks and customers alike. Normal fraud detection systems, are not able to detect the fraud since fraudsters emerge with new techniques to commit fraud. This creates the need to use machine learning-based software to detect frauds. Currently, the machine learning softwares that are available focuses only on the accuracy of detecting frauds but does not focus on the cost or time factors to detect. This research focuses on machine learning scalability for banks' credit card fraud detection systems. We have compared the existing machine learning algorithms and methods that are available with the newly proposed technique. The goal is to prove that using fewer bits for training a machine learning algorithm will result in a more scalable system, that will reduce the time and will also be less costly to implement.
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
Efficiency Comparison of AI classification algorithms for Image Detection and Recognition in Real-time
Authors:
Musarrat Saberin Nipun,
Rejwan Bin Sulaiman,
Amer Kareem
Abstract:
Face detection and identification is the most difficult and often used task in Artificial Intelligence systems. The goal of this study is to present and compare the results of several face detection and recognition algorithms used in the system. This system begins with a training image of a human, then continues on to the test image, identifying the face, comparing it to the trained face, and fina…
▽ More
Face detection and identification is the most difficult and often used task in Artificial Intelligence systems. The goal of this study is to present and compare the results of several face detection and recognition algorithms used in the system. This system begins with a training image of a human, then continues on to the test image, identifying the face, comparing it to the trained face, and finally classifying it using OpenCV classifiers. This research will discuss the most effective and successful tactics used in the system, which are implemented using Python, OpenCV, and Matplotlib. It may also be used in locations with CCTV, such as public spaces, shop** malls, and ATM booths.
△ Less
Submitted 12 June, 2022;
originally announced June 2022.
-
An Automated Size Recognition Technique for Acetabular Implant in Total Hip Replacement
Authors:
Azrulhizam Shapi'i,
Riza Sulaiman,
Mohammad Khatim Hasan,
Abdul Yazid Mohd Kassim
Abstract:
Preoperative templating in Total Hip Replacement (THR) is a method to estimate the optimal size and position of the implant. Today, observational (manual) size recognition techniques are still used to find a suitable implant for the patient. Therefore, a digital and automated technique should be developed so that the implant size recognition process can be effectively implemented. For this purpose…
▽ More
Preoperative templating in Total Hip Replacement (THR) is a method to estimate the optimal size and position of the implant. Today, observational (manual) size recognition techniques are still used to find a suitable implant for the patient. Therefore, a digital and automated technique should be developed so that the implant size recognition process can be effectively implemented. For this purpose, we have introduced the new technique for acetabular implant size recognition in THR preoperative planning based on the diameter of acetabulum size. This technique enables the surgeon to recognise a digital acetabular implant size automatically. Ten randomly selected X-rays of unidentified patients were used to test the accuracy and utility of an automated implant size recognition technique. Based on the testing result, the new technique yielded very close results to those obtained by the observational method in nine studies (90%).
△ Less
Submitted 30 April, 2011;
originally announced May 2011.