Skip to main content

Showing 1–21 of 21 results for author: Sulaiman, R

.
  1. Cement Dust Exposure and Risk of Hyperglycemia and Overweight among Artisans and Residents Close to a Cement Factory in Sokoto, Nigeria

    Authors: T Yahaya, KA Sani, E Oladele, E Yawa, M Musa, M Abubakar, R Sulaiman, M Bilyaminu

    Abstract: The potential health risks of cement dust exposure are increasingly raising concern worldwide as the cement industry expands in response to rising cement demand. This necessitates the need to determine the nature of the risks in order to develop appropriate measures. This study determined the effects of cement dust exposure on the weight and blood glucose levels of people residing or working aroun… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: accept

  2. arXiv:2405.14875  [pdf

    eess.IV cs.AI cs.CV

    BloodCell-Net: A lightweight convolutional neural network for the classification of all microscopic blood cell images of the human body

    Authors: Sohag Kumar Mondal, Md. Simul Hasan Talukder, Mohammad Aljaidi, Rejwan Bin Sulaiman, Md Mohiuddin Sarker Tushar, Amjad A Alsuwaylimi

    Abstract: Blood cell classification and counting are vital for the diagnosis of various blood-related diseases, such as anemia, leukemia, and thrombocytopenia. The manual process of blood cell classification and counting is time-consuming, prone to errors, and labor-intensive. Therefore, we have proposed a DL based automated system for blood cell classification and counting from microscopic blood smear imag… ▽ More

    Submitted 1 April, 2024; originally announced May 2024.

    Comments: 24 pages, 7 tables and 13 Figures

  3. arXiv:2404.01345  [pdf

    cs.CL cs.LG

    Enhancing Bangla Fake News Detection Using Bidirectional Gated Recurrent Units and Deep Learning Techniques

    Authors: Utsha Roy, Mst. Sazia Tahosin, Md. Mahedi Hassan, Taminul Islam, Fahim Imtiaz, Md Rezwane Sadik, Yassine Maleh, Rejwan Bin Sulaiman, Md. Simul Hasan Talukder

    Abstract: The rise of fake news has made the need for effective detection methods, including in languages other than English, increasingly important. The study aims to address the challenges of Bangla which is considered a less important language. To this end, a complete dataset containing about 50,000 news items is proposed. Several deep learning models have been tested on this dataset, including the bidir… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted for publication in the 7th International Conference on Networking, Intelligent Systems & Security. The conference Proceedings will be published by ACM International Conference Proceeding Series (ICPS) ISBN N°: 979-8-4007-0019-4. 8 pages, 11 figures

  4. arXiv:2403.02156  [pdf, other

    astro-ph.SR astro-ph.EP astro-ph.GA

    The SPHERE view of the Orion star-forming region

    Authors: P. -G. Valegard, C. Ginski, A. Derkink, A. Garufi, C. Dominik, A. Ribas, J. P. Williams, M. Benisty, T. Birnstiel, S. Facchini, G. Columba, M. Hogerheijde, R. G. Van Holstein, J. Huang, M. Kenworthy, C. F. Manara, P. Pinilla, Ch. Rab, R. Sulaiman, A. Zurlo

    Abstract: We present SPHERE/IRDIS H-band data for a sample of 23 stars in the Orion Star forming region observed within the DESTINYS (Disk Evolution Study Through Imaging of Nearby Young Stars) program. We use polarization differential imaging in order to detect scattered light from circumstellar dust. From the scattered light observations we characterize the disk orientation, radius and contrast. We analys… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Accepted by A&A

  5. arXiv:2310.00769  [pdf

    cs.CR

    Critical Analysis and Countermeasures Tactics, Techniques and Procedures (TTPs) that targeting civilians: A case study On Pegasus

    Authors: Osama Hussien, Usman Butt, Rejwan Bin Sulaiman

    Abstract: Individuals, businesses, and governments all face additional difficulties because of the rise of sophisticated cyberattack attacks. This paper investigates the targeting of journalists and activists by the malware Pegasus. To gain a deeper understanding of the tactics utilized by cybercriminals and the vulnerabilities that facilitate their scope, this research looks on numerous occurrences and ide… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

  6. arXiv:2309.10829  [pdf

    eess.IV cs.CV

    Comparative study of Deep Learning Models for Binary Classification on Combined Pulmonary Chest X-ray Dataset

    Authors: Shabbir Ahmed Shuvo, Md Aminul Islam, Md. Mozammel Hoque, Rejwan Bin Sulaiman

    Abstract: CNN-based deep learning models for disease detection have become popular recently. We compared the binary classification performance of eight prominent deep learning models: DenseNet 121, DenseNet 169, DenseNet 201, EffecientNet b0, EffecientNet lite4, GoogleNet, MobileNet, and ResNet18 for their binary classification performance on combined Pulmonary Chest Xrays dataset. Despite the widespread ap… ▽ More

    Submitted 3 October, 2023; v1 submitted 16 September, 2023; originally announced September 2023.

  7. arXiv:2308.16857  [pdf

    cs.CR cs.AI

    IoMT-Blockchain based Secured Remote Patient Monitoring Framework for Neuro-Stimulation Device

    Authors: Md Sakib Ullah Sourav, Mohammad Sultan Mahmud, Md Simul Hasan Talukder, Rejwan Bin Sulaiman, Abdullah Yasin

    Abstract: Biomedical Engineering's Internet of Medical Things (IoMT) is hel** to improve the accuracy, dependability, and productivity of electronic equipment in the healthcare business. Real-time sensory data from patients may be delivered and subsequently analyzed through rapid development of wearable IoMT devices, such as neuro-stimulation devices with a range of functions. Data from the Internet of Th… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

    Comments: 8 Figures and 2 Tables

  8. arXiv:2308.10294  [pdf

    cs.CE cs.CR

    A review of SolarWinds attack on Orion platform using persistent threat agents and techniques for gaining unauthorized access

    Authors: Antigoni Kruti, Usman Butt, Rejwan Bin Sulaiman

    Abstract: This paper of work examines the SolarWinds attack, designed on Orion Platform security incident. It analyses the persistent threats agents and potential technical attack techniques to gain unauthorized access. In 2020 SolarWinds attack indicates an initial breach disclosure on Orion Platform software by malware distribution on IT and government organizations such as Homeland Security, Microsoft an… ▽ More

    Submitted 4 September, 2023; v1 submitted 20 August, 2023; originally announced August 2023.

    Comments: 6 pages

    ACM Class: F.2.2; I.2.7

  9. arXiv:2308.05765  [pdf

    cs.LG cs.AI

    Unleashing the Power of Extra-Tree Feature Selection and Random Forest Classifier for Improved Survival Prediction in Heart Failure Patients

    Authors: Md. Simul Hasan Talukder, Rejwan Bin Sulaiman, Mouli Bardhan Paul Angon

    Abstract: Heart failure is a life-threatening condition that affects millions of people worldwide. The ability to accurately predict patient survival can aid in early intervention and improve patient outcomes. In this study, we explore the potential of utilizing data pre-processing techniques and the Extra-Tree (ET) feature selection method in conjunction with the Random Forest (RF) classifier to improve su… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 7 page, 6 Table and 6 Figure

  10. arXiv:2308.05565  [pdf

    cs.CR

    Analysis of the LockBit 3.0 and its infiltration into Advanced's infrastructure crippling NHS services

    Authors: Oladipupo Akinyemi, Rejwan Sulaiman, Nasr Abosata

    Abstract: The LockBit 3.0 ransomware variant is arguably the most threatening of malware in recent times. With no regard for a victim's industry, the ransomware has undergone several evolutions to arrive at an adaptable and evasive variant which has been a menace to governments and organisations, recently infiltrating Advanced Computer Software group. Previous LockBit studies mostly concentrated on measurin… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: 4 pages and 1 table

    ACM Class: K.6.5

  11. arXiv:2308.05179  [pdf

    cs.CV

    JutePestDetect: An Intelligent Approach for Jute Pest Identification Using Fine-Tuned Transfer Learning

    Authors: Md. Simul Hasan Talukder, Mohammad Raziuddin Chowdhury, Md Sakib Ullah Sourav, Abdullah Al Rakin, Shabbir Ahmed Shuvo, Rejwan Bin Sulaiman, Musarrat Saberin Nipun, Muntarin Islam, Mst Rumpa Islam, Md Aminul Islam, Zubaer Haque

    Abstract: In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, challenging, and somewhat imprecise, which poses a subs… ▽ More

    Submitted 28 May, 2023; originally announced August 2023.

    Comments: 29 Pages, 7 Tables, 7 Figures, 5 Appendix

  12. arXiv:2308.05176  [pdf

    eess.SP cs.AI cs.LG

    Comparative Analysis of Epileptic Seizure Prediction: Exploring Diverse Pre-Processing Techniques and Machine Learning Models

    Authors: Md. Simul Hasan Talukder, Rejwan Bin Sulaiman

    Abstract: Epilepsy is a prevalent neurological disorder characterized by recurrent and unpredictable seizures, necessitating accurate prediction for effective management and patient care. Application of machine learning (ML) on electroencephalogram (EEG) recordings, along with its ability to provide valuable insights into brain activity during seizures, is able to make accurate and robust seizure prediction… ▽ More

    Submitted 6 August, 2023; originally announced August 2023.

    Comments: 14 pages, 4 Tables and 5 Figures

  13. arXiv:2306.06206  [pdf

    cs.CV cs.LG

    PotatoPestNet: A CTInceptionV3-RS-Based Neural Network for Accurate Identification of Potato Pests

    Authors: Md. Simul Hasan Talukder, Rejwan Bin Sulaiman, Mohammad Raziuddin Chowdhury, Musarrat Saberin Nipun, Taminul Islam

    Abstract: Potatoes are the third-largest food crop globally, but their production frequently encounters difficulties because of aggressive pest infestations. The aim of this study is to investigate the various types and characteristics of these pests and propose an efficient PotatoPestNet AI-based automatic potato pest identification system. To accomplish this, we curated a reliable dataset consisting of ei… ▽ More

    Submitted 15 July, 2023; v1 submitted 27 May, 2023; originally announced June 2023.

  14. arXiv:2302.10277  [pdf

    cs.CV cs.AI cs.LG

    A Comparative Analysis of CNN-Based Pretrained Models for the Detection and Prediction of Monkeypox

    Authors: Sourav Saha, Trina Chakraborty, Rejwan Bin Sulaiman, Tithi Paul

    Abstract: Monkeypox is a rare disease that raised concern among medical specialists following the convi-19 pandemic. It's concerning since monkeypox is difficult to diagnose early on because of symptoms that are similar to chickenpox and measles. Furthermore, because this is a rare condition, there is a knowledge gap among healthcare professionals. As a result, there is an urgent need for a novel technique… ▽ More

    Submitted 20 January, 2023; originally announced February 2023.

  15. arXiv:2301.10012  [pdf

    cs.CY cs.AI

    The Role of Digital Agriculture in Transforming Rural Areas into Smart Villages

    Authors: Mohammad Raziuddin Chowdhury, Md Sakib Ullah Sourav, Rejwan Bin Sulaiman

    Abstract: From the perspective of any nation, rural areas generally present a comparable set of problems, such as a lack of proper health care, education, living conditions, wages, and market opportunities. Some nations have created and developed the concept of smart villages during the previous few decades, which effectively addresses these issues. The landscape of traditional agriculture has been radicall… ▽ More

    Submitted 7 January, 2023; originally announced January 2023.

  16. Efficient approach of using CNN based pretrained model in Bangla handwritten digit recognition

    Authors: Muntarin Islam, Shabbir Ahmed Shuvo, Musarrat Saberin Nipun, Rejwan Bin Sulaiman, Jannatul Nayeem, Zubaer Haque, Md Mostak Shaikh, Md Sakib Ullah Sourav

    Abstract: Due to digitalization in everyday life, the need for automatically recognizing handwritten digits is increasing. Handwritten digit recognition is essential for numerous applications in various industries. Bengali ranks the fifth largest language in the world with 265 million speakers (Native and non-native combined) and 4 percent of the world population speaks Bengali. Due to the complexity of Ben… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: Computational Vision and Bio-Inspired Computing. Advances in Intelligent Systems and Computing, vol 1439.(2023)

  17. arXiv:2209.08633  [pdf

    cs.CV cs.AI

    CNN based Intelligent Streetlight Management Using Smart CCTV Camera and Semantic Segmentation

    Authors: Md Sakib Ullah Sourav, Huidong Wang, Mohammad Raziuddin Chowdhury, Rejwan Bin Sulaiman

    Abstract: One of the most neglected sources of energy loss is streetlights which generate too much light in areas where it is not required. Energy waste has enormous economic and environmental effects. In addition, due to the conventional manual nature of the operation, streetlights are frequently seen being turned ON during the day and OFF in the evening, which is regrettable even in the twenty-first centu… ▽ More

    Submitted 27 March, 2023; v1 submitted 18 September, 2022; originally announced September 2022.

  18. arXiv:2207.10573  [pdf

    cs.CL

    AI Based Chatbot: An Approach of Utilizing On Customer Service Assistance

    Authors: Rejwan Bin Sulaiman

    Abstract: Providing the best customer experience is one of the primary concerns for the firms that are based online. The advancement of machine learning is revolutionising the company's attitude towards the client through improving the service quality by implementing chatbot solutions, which gives the user instant and satisfactory answers to their enquiries. The acceptance of this technology is increasing w… ▽ More

    Submitted 17 June, 2022; originally announced July 2022.

  19. arXiv:2206.12415  [pdf

    cs.LG cs.AI

    A novel approach to increase scalability while training machine learning algorithms using Bfloat 16 in credit card fraud detection

    Authors: Bushra Yousuf, Rejwan Bin Sulaiman, Musarrat Saberin Nipun

    Abstract: The use of credit cards has become quite common these days as digital banking has become the norm. With this increase, fraud in credit cards also has a huge problem and loss to the banks and customers alike. Normal fraud detection systems, are not able to detect the fraud since fraudsters emerge with new techniques to commit fraud. This creates the need to use machine learning-based software to de… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

  20. arXiv:2206.05842  [pdf

    cs.CV cs.AI

    Efficiency Comparison of AI classification algorithms for Image Detection and Recognition in Real-time

    Authors: Musarrat Saberin Nipun, Rejwan Bin Sulaiman, Amer Kareem

    Abstract: Face detection and identification is the most difficult and often used task in Artificial Intelligence systems. The goal of this study is to present and compare the results of several face detection and recognition algorithms used in the system. This system begins with a training image of a human, then continues on to the test image, identifying the face, comparing it to the trained face, and fina… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

  21. An Automated Size Recognition Technique for Acetabular Implant in Total Hip Replacement

    Authors: Azrulhizam Shapi'i, Riza Sulaiman, Mohammad Khatim Hasan, Abdul Yazid Mohd Kassim

    Abstract: Preoperative templating in Total Hip Replacement (THR) is a method to estimate the optimal size and position of the implant. Today, observational (manual) size recognition techniques are still used to find a suitable implant for the patient. Therefore, a digital and automated technique should be developed so that the implant size recognition process can be effectively implemented. For this purpose… ▽ More

    Submitted 30 April, 2011; originally announced May 2011.

    Journal ref: International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 2, April 2011