Skip to main content

Showing 1–24 of 24 results for author: Kabir, M H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.14255  [pdf, other

    eess.IV cs.CV

    AttResDU-Net: Medical Image Segmentation Using Attention-based Residual Double U-Net

    Authors: Akib Mohammed Khan, Alif Ashrafee, Fahim Shahriar Khan, Md. Bakhtiar Hasan, Md. Hasanul Kabir

    Abstract: Manually inspecting polyps from a colonoscopy for colorectal cancer or performing a biopsy on skin lesions for skin cancer are time-consuming, laborious, and complex procedures. Automatic medical image segmentation aims to expedite this diagnosis process. However, numerous challenges exist due to significant variations in the appearance and sizes of objects with no distinct boundaries. This paper… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

    Comments: Accepted in 2023 International Joint Conference on Neural Networks (IJCNN 2023)

  2. Interpretable Multi Labeled Bengali Toxic Comments Classification using Deep Learning

    Authors: Tanveer Ahmed Belal, G. M. Shahariar, Md. Hasanul Kabir

    Abstract: This paper presents a deep learning-based pipeline for categorizing Bengali toxic comments, in which at first a binary classification model is used to determine whether a comment is toxic or not, and then a multi-label classifier is employed to determine which toxicity type the comment belongs to. For this purpose, we have prepared a manually labeled dataset consisting of 16,073 instances among wh… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

    Journal ref: 2023 International Conference on Electrical, Computer and Communication Engineering (ECCE)

  3. arXiv:2212.11211  [pdf, other

    cs.CV

    Land Cover and Land Use Detection using Semi-Supervised Learning

    Authors: Fahmida Tasnim Lisa, Md. Zarif Hossain, Sharmin Naj Mou, Shahriar Ivan, Md. Hasanul Kabir

    Abstract: Semi-supervised learning (SSL) has made significant strides in the field of remote sensing. Finding a large number of labeled datasets for SSL methods is uncommon, and manually labeling datasets is expensive and time-consuming. Furthermore, accurately identifying remote sensing satellite images is more complicated than it is for conventional images. Class-imbalanced datasets are another prevalent… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  4. Performance Analysis of YOLO-based Architectures for Vehicle Detection from Traffic Images in Bangladesh

    Authors: Refaat Mohammad Alamgir, Ali Abir Shuvro, Mueeze Al Mushabbir, Mohammed Ashfaq Raiyan, Nusrat Jahan Rani, Md. Mushfiqur Rahman, Md. Hasanul Kabir, Sabbir Ahmed

    Abstract: The task of locating and classifying different types of vehicles has become a vital element in numerous applications of automation and intelligent systems ranging from traffic surveillance to vehicle identification and many more. In recent times, Deep Learning models have been dominating the field of vehicle detection. Yet, Bangladeshi vehicle detection has remained a relatively unexplored area. O… ▽ More

    Submitted 24 December, 2022; v1 submitted 18 December, 2022; originally announced December 2022.

    Comments: Accepted in 25th ICCIT (6 pages, 5 figures, 1 table)

    Report number: 10055758

    Journal ref: 2022 25th International Conference on Computer and Information Technology (ICCIT)

  5. Huruf: An Application for Arabic Handwritten Character Recognition Using Deep Learning

    Authors: Minhaz Kamal, Fairuz Shaiara, Chowdhury Mohammad Abdullah, Sabbir Ahmed, Tasnim Ahmed, Md. Hasanul Kabir

    Abstract: Handwriting Recognition has been a field of great interest in the Artificial Intelligence domain. Due to its broad use cases in real life, research has been conducted widely on it. Prominent work has been done in this field focusing mainly on Latin characters. However, the domain of Arabic handwritten character recognition is still relatively unexplored. The inherent cursive nature of the Arabic c… ▽ More

    Submitted 24 December, 2022; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: Accepted in 25th ICCIT (6 pages, 4 tables, 4 figures)

    Report number: 10054769

    Journal ref: 2022 25th International Conference on Computer and Information Technology (ICCIT)

  6. arXiv:2209.04796  [pdf, other

    cs.CV

    Multiple Object Tracking in Recent Times: A Literature Review

    Authors: Mk Bashar, Samia Islam, Kashifa Kawaakib Hussain, Md. Bakhtiar Hasan, A. B. M. Ashikur Rahman, Md. Hasanul Kabir

    Abstract: Multiple object tracking gained a lot of interest from researchers in recent years, and it has become one of the trending problems in computer vision, especially with the recent advancement of autonomous driving. MOT is one of the critical vision tasks for different issues like occlusion in crowded scenes, similar appearance, small object detection difficulty, ID switching, etc. To tackle these ch… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  7. Two Decades of Bengali Handwritten Digit Recognition: A Survey

    Authors: A. B. M. Ashikur Rahman, Md. Bakhtiar Hasan, Sabbir Ahmed, Tasnim Ahmed, Md. Hamjajul Ashmafee, Mohammad Ridwan Kabir, Md. Hasanul Kabir

    Abstract: Handwritten Digit Recognition (HDR) is one of the most challenging tasks in the domain of Optical Character Recognition (OCR). Irrespective of language, there are some inherent challenges of HDR, which mostly arise due to the variations in writing styles across individuals, writing medium and environment, inability to maintain the same strokes while writing any digit repeatedly, etc. In addition t… ▽ More

    Submitted 25 September, 2022; v1 submitted 5 June, 2022; originally announced June 2022.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. 38 pages, 23 figures, 12 tables

  8. HEATGait: Hop-Extracted Adjacency Technique in Graph Convolution based Gait Recognition

    Authors: Md. Bakhtiar Hasan, Tasnim Ahmed, Md. Hasanul Kabir

    Abstract: Biometric authentication using gait has become a promising field due to its unobtrusive nature. Recent approaches in model-based gait recognition techniques utilize spatio-temporal graphs for the elegant extraction of gait features. However, existing methods often rely on multi-scale operators for extracting long-range relationships among joints resulting in biased weighting. In this paper, we pre… ▽ More

    Submitted 21 April, 2022; originally announced April 2022.

    Comments: Accepted in 2022 4th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2022). 6 pages, 4 figures, 2 tables

  9. arXiv:2111.00601  [pdf

    cs.LG cs.CR cs.NI

    Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform

    Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari

    Abstract: Artificial Intelligence (AI) is one of the disruptive technologies that is sha** the future. It has growing applications for data-driven decisions in major smart city solutions, including transportation, education, healthcare, public governance, and power systems. At the same time, it is gaining popularity in protecting critical cyber infrastructure from cyber threats, attacks, damages, or unaut… ▽ More

    Submitted 31 October, 2021; originally announced November 2021.

    Comments: Book_Chapter, Springer Nature

  10. Less is More: Lighter and Faster Deep Neural Architecture for Tomato Leaf Disease Classification

    Authors: Sabbir Ahmed, Md. Bakhtiar Hasan, Tasnim Ahmed, Redwan Karim Sony, Md. Hasanul Kabir

    Abstract: To ensure global food security and the overall profit of stakeholders, the importance of correctly detecting and classifying plant diseases is paramount. In this connection, the emergence of deep learning-based image classification has introduced a substantial number of solutions. However, the applicability of these solutions in low-end devices requires fast, accurate, and computationally inexpens… ▽ More

    Submitted 4 July, 2022; v1 submitted 6 September, 2021; originally announced September 2021.

    Comments: 18 pages, 13 figures, 5 tables, Accepted in IEEE Access

    ACM Class: I.4.9

  11. Efficient Two-Stream Network for Violence Detection Using Separable Convolutional LSTM

    Authors: Zahidul Islam, Mohammad Rukonuzzaman, Raiyan Ahmed, Md. Hasanul Kabir, Moshiur Farazi

    Abstract: Automatically detecting violence from surveillance footage is a subset of activity recognition that deserves special attention because of its wide applicability in unmanned security monitoring systems, internet video filtration, etc. In this work, we propose an efficient two-stream deep learning architecture leveraging Separable Convolutional LSTM (SepConvLSTM) and pre-trained MobileNet where one… ▽ More

    Submitted 20 April, 2021; v1 submitted 21 February, 2021; originally announced February 2021.

    Comments: Accepted by the 2021 International Joint Conference on Neural Networks (IJCNN 2021)

    Journal ref: 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1-8

  12. Improving Action Quality Assessment using Weighted Aggregation

    Authors: Shafkat Farabi, Hasibul Himel, Fakhruddin Gazzali, Md. Bakhtiar Hasan, Md. Hasanul Kabir, Moshiur Farazi

    Abstract: Action quality assessment (AQA) aims at automatically judging human action based on a video of the said action and assigning a performance score to it. The majority of works in the existing literature on AQA divide RGB videos into short clips, transform these clips to higher-level representations using Convolutional 3D (C3D) networks, and aggregate them through averaging. These higher-level repres… ▽ More

    Submitted 11 March, 2022; v1 submitted 21 February, 2021; originally announced February 2021.

    Comments: Accepted for presentation at the IbPRIA 2022: 10th Iberian Conference on Pattern Recognition and Image Analysis Aveiro, Portugal. May 4-6, 2022

  13. arXiv:1606.07247  [pdf, ps, other

    cs.HC cs.CV

    Human Computer Interaction Using Marker Based Hand Gesture Recognition

    Authors: Sayem Mohammad Siam, Jahidul Adnan Sakel, Md. Hasanul Kabir

    Abstract: Human Computer Interaction (HCI) has been redefined in this era. People want to interact with their devices in such a way that has physical significance in the real world, in other words, they want ergonomic input devices. In this paper, we propose a new method of interaction with computing devices having a consumer grade camera, that uses two colored markers (red and green) worn on tips of the fi… ▽ More

    Submitted 23 June, 2016; originally announced June 2016.

    Comments: 8 Pages, didn't submit to any conference yet

  14. arXiv:1411.3049  [pdf

    cs.IT cs.ET

    Enhanced Modulation Technique for Molecular Communication: OOMoSK

    Authors: Md. Humaun Kabir, Kyung Sup Kwak

    Abstract: Molecular communication in nanonetworks is an emerging communication paradigm where molecules are used as information carriers. Concentration Shift Keying (CSK) and Molecule Shift Keying (MoSK) are being studied extensively for the short and medium range molecular nanonetworks. It is observed that MoSK outperforms CSK. However, MoSK requires different types of molecules for encoding which render t… ▽ More

    Submitted 11 November, 2014; originally announced November 2014.

  15. arXiv:1208.0995  [pdf, other

    cs.AR

    Design and implementation of a digital clock showing digits in Bangla font using microcontroller AT89C4051

    Authors: Nasif Muslim, Md. Tanvir Adnan, Mohammad Zahidul Kabir, Md. Humayun Kabir, Sheikh Mominul Islam

    Abstract: In this paper, a digital clock is designed where the microcontroller is used for timing controller and the font of the Bangla digits are designed, and programmed within the microcontroller. The design is cost effective, simple and easy for maintenance.

    Submitted 5 August, 2012; originally announced August 2012.

  16. Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti STBC in Different Modulation Schemes

    Authors: Rifat Ara Shams, M. Hasnat Kabir, Sheikh Enayet Ullah

    Abstract: In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on the performance of wavelet based MC-CDMA wireless communication system with the implementation of Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Journal ref: International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012, 23-33

  17. WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network

    Authors: Md. Golam Rashed, M. Hasnat Kabir, Shaikh Enayet Ullah

    Abstract: We develop an energy-efficient routing protocol in order to enhance the stability period of wireless sensor networks. This protocol is called weighted election protocol (WEP). It introduces a scheme to combine clustering strategy with chain routing algorithm for satisfy both energy and stable period constrains under heterogeneous environment in WSNs. Simulation results show that new one performs b… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Comments: 7 Pages

    Journal ref: International Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.2, March 2011, 54-60

  18. arXiv:1207.3876  [pdf

    cs.NI cs.PF

    Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    Authors: Md. Golam Rashed, M. Hasnat Kabir, Muhammad Sajjadur Rahim, Shaikh Enayet Ullah

    Abstract: The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. Th… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Comments: International Journal of Computer and Network Security(IJCNS), Vol. 2, No. 5, May 2010

  19. arXiv:1207.3875  [pdf

    cs.IT cs.PF

    Transmission of Voice Signal: BER Performance Analysis of Different FEC Schemes Based OFDM System over Various Channels

    Authors: Md. Golam Rashed, M. Hasnat Kabir, Md. Selim Reza, Md. Matiqul Islam, Rifat Ara Shams, Saleh Masum, Sheikh Enayet Ullah

    Abstract: In this paper, we investigate the impact of Forward Error Correction (FEC) codes namely Cyclic Redundancy Code and Convolution Code on the performance of OFDM wireless communication system for speech signal transmission over both AWGN and fading (Rayleigh and Rician) channels in term of Bit Error Probability. The simulation has been done in conjunction with QPSK digital modulation and compared wit… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Comments: 12 Pages

    Journal ref: International Journal of Advanced Science and Technology, Vol. 34, September 2011, 89-100

  20. arXiv:1207.3871  [pdf

    cs.IT cs.PF

    Performance Analysis of Wavelet Based MC-CDMA System with Implementation of Various Antenna Diversity Schemes

    Authors: Md. Matiqul Islam, M. Hasnat Kabir, Sk. Enayet Ullah

    Abstract: The impact of using wavelet based technique on the performance of a MC-CDMA wireless communication system has been investigated. The system under proposed study incorporates Walsh Hadamard codes to discriminate the message signal for individual user. A computer program written in Mathlab source code is developed and this simulation study is made with implementation of various antenna diversity sch… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Journal ref: International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 2, April 2011, 271-274

  21. Impact of Different Spreading Codes Using FEC on DWT Based MC-CDMA System

    Authors: Saleh Masum, M. Hasnat Kabir, Md. Matiqul Islam, Rifat Ara Shams, Shaikh Enayet Ullah

    Abstract: The effect of different spreading codes in DWT based MC-CDMA wireless communication system is investigated. In this paper, we present the Bit Error Rate (BER) performance of different spreading codes (Walsh-Hadamard code, Orthogonal gold code and Golay complementary sequences) using Forward Error Correction (FEC) of the proposed system. The data is analyzed and is compared among different spreadin… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Comments: 10 Pages; International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.2, No.3, June 2012

  22. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    Authors: M. G. Rashed, M. Hasnat Kabir, M. Sajjadur Rahim, Sk. Enayet Ullah

    Abstract: A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the… ▽ More

    Submitted 16 July, 2012; originally announced July 2012.

    Comments: 11 pages

    Journal ref: Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.3, August 2011

  23. arXiv:1205.4996  [pdf

    cs.IT

    Ber analysis of iterative turbo encoded miso wireless communication system under implementation of q-ostbc scheme

    Authors: M. Hasnat Kabir, Shaikh Enayet Ullah, Mustari Zaman, Md. Golam Rashed

    Abstract: In this paper, a comprehensive study has been made to evaluate the performance of a MISO wireless communication system. The 4-by-1 spatially multiplexed Turbo encoded system under investigation incorporates Quasi-orthogonal space-time block coding (Q-STBC) and ML signal detection schemes under QPSK, QAM, 16PSK and 16QAM digital modulations. The simulation results elucidate that a significant impro… ▽ More

    Submitted 8 March, 2012; originally announced May 2012.

    Comments: International Journal of Information Technology Convergence and Services (IJITCS), Vol.2, No.1, 2012

  24. arXiv:1203.1778  [pdf

    cs.NI cs.PF

    A Comprehensive Study and Performance Comparison of M-ary Modulation Schemes for an Efficient Wireless Mobile Communication System

    Authors: Md. Emdadul Haque, Md. Golam Rashed, M. Hasnat Kabir

    Abstract: Wireless communications has become one of the fastest growing areas in our modern life and creates enormous impact on nearly every feature of our daily life. In this paper, the performance of M-ary modulations schemes (MPSK, MQAM, MFSK) based wireless communication system on audio signal transmission over Additive Gaussian Noise (AWGN) channel are analyzed in terms of bit error probability as a fu… ▽ More

    Submitted 8 March, 2012; originally announced March 2012.

    Comments: International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.1, No.3, June 2011