I am an Assistant Professor in the Department of Computer Science at West Chester University. Prior to joining WCU, I worked as a software developer for almost 10 years for several companies. I have also held the position of Assistant Professor at Kent State University.
I have completed my Bachelor's Degree in Computer Science from National University. Along with that, I have completed four Master's degrees with my major in Computer Engineering in 2008 from Sejong University, Computer Science in 2011 from Kent State University (also, partly at Korea University) and Technology in 2015, also from Kent State University, and a Master's in Cybersecurity in 2023 from Georgia Institute of Technology. I received my Ph.D. degrees from Kent State University in 2016 (Mathematics Edu), 2019 (Evaluation and Measurement) and 2021 (Computer Science).
In the past, I have worked as a Research Assistant at Sejong University and Korea University. Alongwith that, I gained the opportunity to teach at both National University and Korea University. My research interests include Visual Analytics of urban data, Data Mining, Machine Learning, Deep Learning and Data Hiding.
Year | Type | Publication |
---|---|---|
2024 | Journal | Afia Tasnim, Baivab Das, Md. Rajibul Islam, Md Amiruzzaman, Md. Rashedul Islam, Nadeem Ahmed (2024). Revolutionizing Rose Grading: Real-time Detection and Accurate Assessment with YOLOv8 and Deep Learning Models. SN Computer Science (to appear), , pp. . [Journal] (bib) x @article{afia2024YOLOv8, pages = { }, number = { }, volume = { }, year = { 2024 }, journal = { SN Computer Science (to appear) }, title = { Revolutionizing Rose Grading: Real-time Detection and Accurate Assessment with YOLOv8 and Deep Learning Models }, author = { Afia Tasnim and Baivab Das and Md. Rajibul Islam and Md Amiruzzaman and Md. Rashedul Islam and Nadeem Ahmed }, } |
2024 | Journal | Priyanka Logasubramanian, Md Amiruzzaman, Ashik Ahmed Bhuiyan (2024). Analyzing the Impact of Smoking and Drinking on Health Metrics in Korea: A Data-driven Predictive Approach. Research Briefs on Information and Communication Technology Evolution , 10, pp. 70–81. [doi]. [Journal] (link) (bib) x @article{Priyanka Logasubramanian_Md Amiruzzaman_Ashik Ahmed Bhuiyan_2024, pages = { 70–81 }, month = { Jul. }, year = { 2024 }, author = { Priyanka Logasubramanian and Md Amiruzzaman and Ashik Ahmed Bhuiyan }, journal = { Research Briefs on Information and Communication Technology Evolution }, abstractnote = { <p>This investigation thoroughly explores the effects of smoking and alcohol consumption on health measures within the population of South Korea, using a comprehensive dataset from the National Health Insurance Service of Korea. The study aims to build and validate predictive models by applying logistic regression methodologies, outlier detection, and cross-validation techniques. These models are designed to identify patterns in smoking and drinking behaviors, offering predictive accuracy. The analysis clarifies the relationship between lifestyle choices and key health indicators such as liver enzyme activity, blood fat levels, and heart and blood vessel measurements. The outcomes of this study are ready to significantly contribute to the development of targeted public health strategies, aiming to lessen the risks associated with lifestyle-induced health conditions.</p> }, doi = { 10.69978/rebicte.v10i.190 }, url = { https://rebicte.org/index.php/rebicte/article/view/190 }, volume = { 10 }, title = { Analyzing the Impact of Smoking and Drinking on Health Metrics in Korea: A Data-driven Predictive Approach }, } |
2024 | Journal | Asif Bhat, Rizal Mohd Nor, Md Amiruzzaman, Md. Rajibul Islam, Munleef Quadir (2024). An evaluation of EVM-compatible Blockchain Platforms for Trade Finance. Journal of Advanced Research in Applied Mechanics (to appear), , pp. . [Journal] (bib) x @article{bhat2024TradeFinance, pages = { }, number = { }, volume = { }, year = { 2024 }, journal = { Journal of Advanced Research in Applied Mechanics (to appear) }, title = { An evaluation of EVM-compatible Blockchain Platforms for Trade Finance }, author = { Asif Bhat and Rizal Mohd Nor and Md Amiruzzaman and Md. Rajibul Islam and Munleef Quadir }, } |
2024 | Journal | Jisha Sheela Kumar, Md Amiruzzaman, Ashik Ahmed Bhuiyan, Deepshikha Bhati (2024). Predictive Analytics in Law Enforcement: Unveiling Patterns in NYPD Crime through Machine Learning and Data Mining. Research Briefs on Information and Communication Technology Evolution , 10, pp. 36–59. [doi]. [Journal] (link) (bib) x @article{Jisha2024, pages = { 36–59 }, month = { May }, year = { 2024 }, author = { Jisha Sheela Kumar and Md Amiruzzaman and Ashik Ahmed Bhuiyan and Deepshikha Bhati }, journal = { Research Briefs on Information and Communication Technology Evolution }, abstractnote = { <p>Urban crime poses multifaceted challenges to cities’ socio-economic structures. This study employs machine learning and data mining to bolster predictive policing in New York City. Using a comprehensive NYPD crime dataset spanning 2006 to 2017, the analysis identifies historical patterns and forecasts future crime trends. Rigorous methodologies ensure data fidelity, with algorithms like Random Forest and K-Means clustering parsing the intricate spatio-temporal crime dynamics. Results pinpoint crime hotspots and track criminal activity evolution, informing strategic law enforcement resource allocation and community involvement. Ethical considerations, including data privacy and algorithmic biases, are scrutinized alongside their impacts on community-police relations. The study recommends operational improvements and advocates for ongoing innovation in data-driven public safety strategies, advocating for the integration of new data sources and analytical methods in advancing smart city infrastructures.</p> }, doi = { 10.56801/rebicte.v10i.188 }, url = { https://rebicte.org/index.php/rebicte/article/view/188 }, volume = { 10 }, title = { Predictive Analytics in Law Enforcement: Unveiling Patterns in NYPD Crime through Machine Learning and Data Mining }, } |
2024 | Journal | S M Nuruzzaman Nobel, Omar Faruque Sifat, Md Rajibul Islam, Md Shohel Sayeed, Md Amiruzzaman (2024). Enhancing GI Cancer Radiation Therapy: Advanced Organ Segmentation with ResECA-U-Net Model. Emerging Science Journal, 8(3), pp. 999–1015. [doi]. [Journal] (link) (bib) x @article{nobel2024enhanching, doi = { 10.28991/ESJ-2024-08-03-012 }, url = { https://ijournalse.org/index.php/ESJ/article/view/2186 }, year = { 2024 }, pages = { 999--1015 }, number = { 3 }, volume = { 8 }, journal = { Emerging Science Journal }, author = { S M Nuruzzaman Nobel and Omar Faruque Sifat and Md Rajibul Islam and Md Shohel Sayeed and Md Amiruzzaman }, title = { Enhancing GI Cancer Radiation Therapy: Advanced Organ Segmentation with ResECA-U-Net Model }, } |
2024 | Journal | Tsung Heng Wu, Md Amiruzzaman, Ye Zhao, Deepshikha Bhati, Jing Yang (2024). Visualizing Routes With AI-Discovered Street-View Patterns. IEEE Transactions on Computational Social Systems, pp. IEEE. [doi]. [Journal] (link) (bib) x @article{wu2024visualizing, doi = { 10.1109/TCSS.2024.3382944 }, url = { https://ieeexplore.ieee.org/document/10504858 }, publisher = { IEEE }, year = { 2024 }, journal = { IEEE Transactions on Computational Social Systems }, author = { Wu and Amiruzzaman and Zhao and Bhati and Yang }, title = { Visualizing Routes With AI-Discovered Street-View Patterns }, } |
2023 | Journal | Vijayendra D. Avina, Md Amiruzzaman, Stefanie Amiruzzaman, Linh B. Ngo, M. Ali Akber Dewan (2023). An AI-Based Framework for Translating American Sign Language to English and Vice Versa. Information, 14(10), pp. [doi]. [Journal] (link) (bib) x @article{info14100569, doi = { 10.3390/info14100569 }, abstract = { In this paper, we propose a framework to convert American Sign Language (ASL) to English and English to ASL. Within this framework, we use a deep learning model along with the rolling average prediction that captures image frames from videos and classifies the signs from the image frames. The classified frames are then used to construct ASL words and sentences to support people with hearing impairments. We also use the same deep learning model to capture signs from the people with deaf symptoms and convert them into ASL words and English sentences. Based on this framework, we developed a web-based tool to use in real-life application and we also present the tool as a proof of concept. With the evaluation, we found that the deep learning model converts the image signs into ASL words and sentences with high accuracy. The tool was also found to be very useful for people with hearing impairment and deaf symptoms. The main contribution of this work is the design of a system to convert ASL to English and vice versa. }, issn = { 2078-2489 }, url = { https://www.mdpi.com/2078-2489/14/10/569 }, article-number = { 569 }, number = { 10 }, year = { 2023 }, volume = { 14 }, journal = { Information }, title = { An AI-Based Framework for Translating American Sign Language to English and Vice Versa }, author = { Avina and Amiruzzaman and Amiruzzaman and Ngo and Dewan }, } |
2023 | Journal | Md Amiruzzaman, Ashikahmed Bhuiyan (2023). A Secure Real-Time Multimedia Stream Data Backup by Network-Engine for Resource Constrained Devices. J. Comput. Sci. Coll., 39(3), pp. 133–142. Evansville, IN, USA. Consortium for Computing Sciences in Colleges. [Journal] (bib) x @article{10.5555/3636988.3637012, numpages = { 10 }, pages = { 133–142 }, month = { oct }, journal = { J. Comput. Sci. Coll. }, abstract = { In this study, we implemented a secure network engine for mobile devices. The study focused on faster data communication, the authenticity of the user, data transfer reliability, and data integrity. In addition, we applied advanced security techniques, such as Certification Authority (CA), Message Authentication Code (MAC), logging, and meta-data concepts, to ensure user permission and data access control. Further, a 2-way handshake and real-time data transfer channel were implemented to enhance the communication and data transfer speed. The results of this study show promising results to move forward with high-speed and secure data transfer between mobile devices and server computers. }, issn = { 1937-4771 }, number = { 3 }, volume = { 39 }, address = { Evansville, IN, USA }, publisher = { Consortium for Computing Sciences in Colleges }, issue_date = { October 2023 }, year = { 2023 }, title = { A Secure Real-Time Multimedia Stream Data Backup by Network-Engine for Resource Constrained Devices }, author = { Amiruzzaman and Bhuiyan }, } |
2023 | Journal | S. Konduru, M. Amiruzzaman, V. Avina, M. R. Islam (2023). Plant Disease Detection and Classification Using Deep Learning Models. J. Comput. Sci. Coll., 39(3), pp. 66–75. Evansville, IN, USA. Consortium for Computing Sciences in Colleges. [Journal] (bib) x @article{10.5555/3636988.3637006, numpages = { 10 }, pages = { 66–75 }, month = { oct }, journal = { J. Comput. Sci. Coll. }, abstract = { Detection of diseases in plants at an early stage is crucial to achieving high yields, preserving crop quality, and effective disease management. Existing research focuses mostly on leaf disease detection, despite the fact that disease may develop everywhere on the plant. We developed a new dataset using the PlantVillage dataset and other online sources. We used Convolutional Neural Network (CNN) architectures, Alexnet and MobileNet to analyze and evaluate the performance of the models on the new dataset (i.e., consists of over 50,000 images). The models were trained on the new dataset for 100 epochs. MobileNet outperformed the other two models, attaining 99.69\% training accuracy, 94.37\% validation accuracy, 96\% average precision, 96\% recall, and an F1-score. The MobileNet model predicted diseases that affect portions of the plant other than the leaf better. This work demonstrates detecting plant disease and provides a feasible technique for enhancing crop management. }, issn = { 1937-4771 }, number = { 3 }, volume = { 39 }, address = { Evansville, IN, USA }, publisher = { Consortium for Computing Sciences in Colleges }, issue_date = { October 2023 }, year = { 2023 }, title = { Plant Disease Detection and Classification Using Deep Learning Models }, author = { Konduru and Amiruzzaman and Avina and Islam }, } |
2023 | Journal | Rishita Gadde, Md Amiruzzaman, Richard Burns, Md. Rajibul Islam, Rizal Mohd Nor (2023). Estimate House Price Using Machine Learning. Research Briefs on Information and Communication Technology Evolution , 9, pp. 41–58. [doi]. [Journal] (link) (bib) x @article{Gadde_2023, pages = { 41–58 }, month = { May }, year = { 2023 }, author = { Rishita Gadde and Md Amiruzzaman and Richard Burns and Md. Rajibul Islam and Rizal Mohd Nor }, journal = { Research Briefs on Information and Communication Technology Evolution }, abstractnote = { <p>The House Price Index (HPI) is commonly used to estimate the changes in housing prices. The sale price of the house is correlated with many other factors like geographical location, size of the house, age of the house, the area and population of the neighborhood etc. There has been a considerably large number of datasets released in the literature of various locations to explore the correlation of the sale price of houses with their corresponding features. However, all the features don’t affect the sale price in equal proportion. Some features strongly correlate with each other and, while some features don’t carry any importance or are probably redundant. As a result, to explore various impacts of features on sales prices, we performed a detailed data analysis on the original house dataset. This report also comprehensively validates multiple steps of data analysis with supporting statistics and visualizations to provide an optimistic result of various features and their impact on the sales price of houses.</p> }, doi = { 10.56801/rebicte.v9i.156 }, url = { https://rebicte.org/index.php/rebicte/article/view/156 }, volume = { 9 }, title = { Estimate House Price Using Machine Learning }, } |
2023 | Journal | Asif Bhat, Rizal Mohd. Nor, Md Amiruzzaman (2023). An assessment and comparative analysis of trade finance initiatives utilizing distributed ledger technology. AIP Conference Proceedings, 2608(1), pp. [doi]. [Journal] (link) (bib) x @article{10.1063/5.0127776, eprint = { https://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0127776/17994735/020011\_1\_5.0127776.pdf }, note = { 020011 }, url = { https://doi.org/10.1063/5.0127776 }, doi = { 10.1063/5.0127776 }, issn = { 0094-243X }, abstract = { Distributed Ledger Technology (DLT) has risen to prominence as one of the decade’s most disruptive technologies. It has the potential to fundamentally alter how individuals do business, monitor their goods, and handle their personal data. For decades, trade finance has been experiencing a digital revolution. It is, however, the outcome of an inability to digitize and streamline corporate operations. As a result, trade finance is still primarily a paper-based and labor-intensive enterprise. Additionally, costs continue to be persistently high. This is due in part to rising regulatory constraints. However, the development of new technologies such as blockchain and distributed ledger technology (DLT) has increased the pace of this digital transformation. Numerous distributed ledger technology (DLT) initiatives have sprouted up to assist in connecting diverse key parties and improving trade finance and supply chain finance operations. The platforms must be assessed and rigorously studied to determine their applicability, resilience, and long-term viability. In this article, we conducted a survey of various top DLT platforms for Trade Finance and assessed their capabilities using a qualitative criteria. The comparative analysis offered in this article will assist in selecting the optimal platform for the job. }, month = { 06 }, year = { 2023 }, number = { 1 }, volume = { 2608 }, journal = { AIP Conference Proceedings }, title = { An assessment and comparative analysis of trade finance initiatives utilizing distributed ledger technology }, author = { Bhat and Nor and Amiruzzaman }, } |
2023 | Journal | Fariha Sultana Rini, Somiya Assir Jebin, Merajunnesa Kumkum, Md Rajibul Islam, Nadeem Ahmed, Md Amiruzzaman, Halima Khatun (2023). Predicting Optimum Lockdown Pattern of Epidemic Spread Using AI Techniques. Research Briefs on Information and Communication Technology Evolution, 9, pp. 1–20. [doi]. [Journal] (link) (bib) x @article{rini2023predicting, url = { https://rebicte.org/index.php/rebicte/article/view/153 }, doi = { https://doi.org/10.56801/rebicte.v9i.153 }, year = { 2023 }, pages = { 1--20 }, volume = { 9 }, journal = { Research Briefs on Information and Communication Technology Evolution }, author = { Rini and Jebin and Kumkum and Islam and Ahmed and Amiruzzaman and Khatun }, title = { Predicting Optimum Lockdown Pattern of Epidemic Spread Using AI Techniques }, } |
2023 | Journal | Marhanum Che Mohd Salleh, Rizal Mohd Nor, Faizal Yusof, Md Amiruzzaman (2023). Constructing a Shariah Document Screening Prototype Based on Serverless Architecture. Computers, 12(3), pp. [doi]. [Journal] (link) (bib) x @article{computers12030050, doi = { https://doi.org/10.3390/computers12030050 }, abstract = { The aim of this research is to discuss the groundwork of building an Islamic Banking Document Screening Prototype based on a serverless architecture framework. This research first forms an algorithm for document matching based Vector Space Model (VCM) and adopts Levenshtein Distance for similarity setting. Product proposals will become a query, and policy documents by the central bank will be a corpus or database for document matching. Both the query and corpus went through preprocessing stage prior to similarity analysis. One set of queries with two sets of corpora is tested in this research to compare similarity values. Finally, a prototype of Shariah Document Screening is built based on a serverless architecture framework and ReactJS interface. This research is the first attempt to introduce a Shariah document screening prototype based on a serverless architecture technology that would be useful to the Islamic financial industry towards achieving a Shariah-compliant business. Given the development of Fintech, the output of this research study would be a complement to the existing Fintech applications, which focus on ensuring the Islamic nature of the businesses. }, issn = { 2073-431X }, url = { https://www.mdpi.com/2073-431X/12/3/50 }, article-number = { 50 }, number = { 3 }, year = { 2023 }, volume = { 12 }, journal = { Computers }, title = { Constructing a Shariah Document Screening Prototype Based on Serverless Architecture }, author = { Salleh and Nor and Yusof and Amiruzzaman }, } |
2023 | Journal | Md. Rajibul Islam, Md. Asif Mahmod Tusher Siddique, Md Amiruzzaman, M. Abdullah-Al-Wadud, Shah Murtaza Rashid Al Masud, Aloke Kumar Saha (2023). An Efficient Technique for Recognizing Tomato Leaf Disease Based on the Most Effective Deep CNN Hyperparameters. Annals of Emerging Technologies in Computing (AETiC), 7(1), pp. 1-14. International Association for Educators and Researchers (IAER). [doi]. [Journal] (link) (bib) x @article{rajibulislam2022hyperparameters, publisher = { International Association for Educators and Researchers (IAER) }, year = { 2023 }, url = { http://aetic.theiaer.org/archive/v7/v7n1/p1.html }, doi = { https://doi.org/10.33166/AETiC.2023.01.001 }, pages = { 1-14 }, number = { 1 }, volume = { 7 }, journal = { Annals of Emerging Technologies in Computing (AETiC) }, author = { Md. Rajibul Islam and Md. Asif Mahmod Tusher Siddique and Md Amiruzzaman and M. Abdullah-Al-Wadud and Shah Murtaza Rashid Al Masud and Aloke Kumar Saha }, title = { An Efficient Technique for Recognizing Tomato Leaf Disease Based on the Most Effective Deep CNN Hyperparameters }, } |
2023 | Journal | Md Amiruzzaman, Ye Zhao, Stefanie Amiruzzaman, Aryn C Karpinski, Tsung Heng Wu (2023). An AI-based framework for studying visual diversity of urban neighborhoods and its relationship with socio-demographic variables. Journal of Computational Social Science, 6, pp. 315-337. Springer. [doi]. [Journal] (bib) x @article{amiruzzaman2022ai, publisher = { Springer }, doi = { https://doi.org/10.1007/s42001-022-00197-1 }, year = { 2023 }, pages = { 315-337 }, volume = { 6 }, journal = { Journal of Computational Social Science }, author = { Amiruzzaman and Zhao and Amiruzzaman and Karpinski and Wu }, title = { An AI-based framework for studying visual diversity of urban neighborhoods and its relationship with socio-demographic variables }, } |
2022 | Journal | Md Amiruzzaman, Mahnaz Rafia Islam, Md. Rajibul Islam, Rizal Mohd Nor (2022). Analysis of COVID-19: An infectious disease spread. Journal of Internet Services and Information Security (JISIS), 12(3), pp. 1–15. [doi]. [Journal] (link) (bib) x @article{jisis22-12-3-01, doi = { 10.22667/JISIS.2022.08.31.001 }, url = { http://dx.doi.org/10.22667/JISIS.2022.08.31.001 }, issn = { 2182-2077 }, pages = { 1--15 }, month = { August }, year = { 2022 }, number = { 3 }, volume = { 12 }, journal = { Journal of Internet Services and Information Security (JISIS) }, title = { Analysis of COVID-19: An infectious disease spread }, author = { Md Amiruzzaman and Mahnaz Rafia Islam and Md. Rajibul Islam and Rizal Mohd Nor }, } |
2022 | Journal | Stefanie Amiruzzaman, Md Amiruzzaman (2022). Use of Twitter among College Students for Academics: A Mixed-Methods Approach. Social Sciences, 11(9), pp. [doi]. [Journal] (link) (bib) x @article{socsci11090404, doi = { 10.3390/socsci11090404 }, abstract = { For almost a decade, Twitter use and its impact on students’ academic performance have been explored by many researchers. Despite growing scholarly interest, studies have been mostly quantitative in nature. The findings of previous studies are conflicting; thus, an in-depth study is needed to determine how and what impacts college students’ academic performance (i.e., GPA) when they spend time on Twitter. The purpose of this study was to understand the effects of Twitter use on college students’ academic performance. The present study shows that individual analysis techniques, such as quantitative or qualitative tools, are not enough to understand the underlying relationship. Therefore, a mixed-method approach (i.e., correlation and discourse analysis) was used to analyze the research data. Undergraduate students responded (N = 498) to a set of items along with some open-ended questions (n = 121). The results of this study indicate that how students use Twitter matters more than the amount of time they spend using it for their studies. }, issn = { 2076-0760 }, url = { https://www.mdpi.com/2076-0760/11/9/404 }, article-number = { 404 }, number = { 9 }, year = { 2022 }, volume = { 11 }, journal = { Social Sciences }, title = { Use of Twitter among College Students for Academics: A Mixed-Methods Approach }, author = { Amiruzzaman and Amiruzzaman }, } |
2022 | Journal | Md Amiruzzaman (2022). A Survey on Steganography and Steganalysis Techniques in Secret Communication. Reasearch Briefs on Informationm & Communication Technology Evolution , 8(7), pp. 1–17. [doi]. [Journal] (link) (bib) x @article{Amiruzzaman2022ReBiCTE, url = { http://dx.doi.org/10.22667/ReBiCTE.2022.08.31.007 }, doi = { 10.22667/ReBiCTE.2022.08.31.007 }, issn = { 2383-9201 }, pages = { 1--17 }, number = { 7 }, volume = { 8 }, year = { 2022 }, journal = { Reasearch Briefs on Informationm & Communication Technology Evolution }, title = { A Survey on Steganography and Steganalysis Techniques in Secret Communication }, author = { Amiruzzaman }, } |
2022 | Journal | Asif Bhat, Rizal Mohd Nor, Md Amiruzzaman, Md. Rajibul Islam (2022). Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application. International Journal on Perceptive and Cognitive Computing (IJPCC), 8(2), pp. 37–42. [doi]. [Journal] (link) (bib) x @article{asif2022methodology, doi = { https://doi.org/10.31436/ijpcc.v8i2 }, url = { https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/313 }, issn = { 2462-229X }, month = { July }, pages = { 37--42 }, number = { 2 }, volume = { 8 }, year = { 2022 }, journal = { International Journal on Perceptive and Cognitive Computing (IJPCC) }, title = { Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application }, author = { Asif Bhat and Rizal Mohd Nor and Md Amiruzzaman and Md. Rajibul Islam }, } |
2022 | Journal | Md Amiruzzaman, Rashik Rahman, Md. Rajibul Islam, Rizal Mohd Nor (2022). Logical analysis of Built-in DBSCAN Functions in Popular Data Science Programming Languages. MIST International Journal of Science and Technology (MIJST), 10(1), pp. 25–32. [doi]. [Journal] (link) (bib) x @article{amiruzzaman2022dbscanmist, doi = { https://doi.org/10.47981/j.mijst.10(01)2022.349(25-32) }, url = { https://mijst.mist.ac.bd/mijst/index.php/mijst/index }, issn = { 2224-2007 }, month = { May }, pages = { 25--32 }, number = { 1 }, volume = { 10 }, year = { 2022 }, journal = { MIST International Journal of Science and Technology (MIJST) }, title = { Logical analysis of Built-in DBSCAN Functions in Popular Data Science Programming Languages }, author = { Amiruzzaman and Rahman and Islam and Nor }, } |
2022 | Journal | Suphanut Jamonnak, Deepshikha Bhati, Md Amiruzzaman, Ye Zhao, Xinyue Ye, Andrew Curtis (2022). VisualCommunity: a platform for archiving and studying communities. Journal of computational social science, pp. Springer. [doi]. [Journal] (link) (bib) x @article{Jamonnak2022VisualCommunity, publisher = { Springer }, url = { https://link.springer.com/article/10.1007/s42001-022-00170-y }, doi = { https://doi.org/10.1007/s42001-022-00170-y }, year = { 2022 }, journal = { Journal of computational social science }, author = { Jamonnak and Bhati and Amiruzzaman and Zhao and Ye and Curtis }, title = { VisualCommunity: a platform for archiving and studying communities }, } |
2022 | Journal | Suphanut Jamonnak, Ye Zhao, Xinyi Huang, Md Amiruzzaman (2022). Geo-Context Aware Study of Vision-Based Autonomous Driving Models and Spatial Video Data. IEEE Transactions on Visualization and Computer Graphics, 28(1), pp. 1019-1029. IEEE. [doi]. [Journal] (link) (bib) x @article{9555830, month = { Jan }, issn = { 1941-0506 }, publisher = { IEEE }, url = { https://ieeexplore.ieee.org/document/9555830 }, doi = { 10.1109/TVCG.2021.3114853 }, keywords = { }, abstract = { Vision-based deep learning (DL) methods have made great progress in learning autonomous driving models from large-scale crowd-sourced video datasets. They are trained to predict instantaneous driving behaviors from video data captured by on-vehicle cameras. In this paper, we develop a geo-context aware visualization system for the study of Autonomous Driving Model (ADM) predictions together with large-scale ADM video data. The visual study is seamlessly integrated with the geographical environment by combining DL model performance with geospatial visualization techniques. Model performance measures can be studied together with a set of geospatial attributes over map views. Users can also discover and compare prediction behaviors of multiple DL models in both city-wide and street-level analysis, together with road images and video contents. Therefore, the system provides a new visual exploration platform for DL model designers in autonomous driving. Use cases and domain expert evaluation show the utility and effectiveness of the visualization system. }, pages = { 1019-1029 }, number = { 1 }, volume = { 28 }, year = { 2022 }, title = { Geo-Context Aware Study of Vision-Based Autonomous Driving Models and Spatial Video Data }, journal = { IEEE Transactions on Visualization and Computer Graphics }, author = { Jamonnak and Zhao and Huang and Amiruzzaman }, } |
2022 | Conference | Stefanie Amiruzzaman, Md Amiruzzaman (2022). Explore the Relationships Between Students’ Academic Performance, Use of Twitter, and Academic Majors using Hierarchical Linear Modeling. In 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 1-6. IEEE Computer Society. [doi]. [Conference] (link) (bib) x @inproceedings{9927881, publisher = { IEEE Computer Society }, month = { Sep. }, issn = { }, url = { https://ieeexplore.ieee.org/document/9927881 }, doi = { 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927881 }, keywords = { }, abstract = { Social media use among students is increasing day by day, and so does its effects on students’ academic achievement (i.e., Grade Point Average). The relationship between students’ GPA and the use of social media (e.g., Twitter) is not straightforward, because of the hierarchical nature of the data. There is a gap in research that explores the relationship between students’ academic achievement considering hierarchical perspectives. This study attempts to find the relationship between students’ use of Twitter and their GPA. In addition, how their major is related to their use of Twitter. The results suggest that the relationship between Twitter use and students’ academic majors is related. Students from STEM majors have a positive effect than students from social sciences. }, pages = { 1-6 }, number = { }, volume = { }, year = { 2022 }, title = { Explore the Relationships Between Students’ Academic Performance, Use of Twitter, and Academic Majors using Hierarchical Linear Modeling }, booktitle = { 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) }, author = { Amiruzzaman and Amiruzzaman }, } |
2022 | Conference | David Sheets, Md Amiruzzaman, D. Blake Stringer, Brian Neff, Ye Zhao (2022). AVES: A data-driven approach for airman certification. In AIAA AVIATION 2022 Forum, pp. 1–14. [doi]. [Conference] (link) (bib) x @inproceedings{doi:10.2514/6.2022-3416, abstract = { View Video Presentation: https://doi.org/10.2514/6.2022-3416.vidAirman certification training relies on post-flight debriefing conducted between flight instructor and student, which is a review of the flight using observations from hand-written notes and the collective memory of the two persons on board. Data-driven visualizations have yet to be fully incorporated into the flight training process. The Airman Visual Evaluation System (AVES) applies a data-driven approach to support airman certification training by processing data recorded from common avionics systems such as the Garmin G1000. Maneuvers, e.g. steep turns, are decomposed into a hierarchical definition including task, sub-task, and related components according to available data. Each level in the hierarchy defines a related event detectable within the data. At the top-level of the hierarchy are points where an instructor may wish to review with a student while lower levels of the hierarchy support the review with additional information. Performance measurements are associated with each event to be captured from the data. Visual analytics approaches are applied to convey the events and related performance information including 2D and 3D views of flight replay, event timelines, performance related visualizations. The visualizations are provided in an interactive application to convey the information. User studies are conducted to identify and measure value within airman certification programs. }, presentation = { https://doi.org/10.2514/6.2022-3416.vid }, eprint = { https://arc.aiaa.org/doi/pdf/10.2514/6.2022-3416 }, url = { https://arc.aiaa.org/doi/abs/10.2514/6.2022-3416 }, doi = { 10.2514/6.2022-3416 }, pages = { 1--14 }, chapter = { }, year = { 2022 }, booktitle = { AIAA AVIATION 2022 Forum }, title = { AVES: A data-driven approach for airman certification }, author = { David Sheets and Md Amiruzzaman and D. Blake Stringer and Brian Neff and Ye Zhao }, } |
2022 | Conference | Deepshikha Bhati, Md Amiruzzaman, Suphanut Jamonnak, Ye Zhao (2022). Interactive Visualization and Capture of Geo-Coded Multimedia Data on Mobile Devices. In Intelligent Human Computer Interaction, pp. 260–271, Cham. Springer International Publishing. [doi]. [Conference] (link) (bib) x @inproceedings{dbhati2021mobile, url = { https://link.springer.com/chapter/10.1007/978-3-030-98404-5_25 }, doi = { https://doi.org/10.1007/978-3-030-98404-5_25 }, isbn = { 978-3-030-98404-5 }, abstract = { In digital community applications, geo-coded multimedia data including spatial videos, speech, and geo-narratives are collected and utilized by community users and researchers from multiple fields. It is often preferred that these data can be captured, visualized, and explored directly on mobile phones and tablets interactively. In this paper, we present a Geo-Video Mobile Application (GVM App) that collects geo-coded multimedia data for experts to process and analyze over an interactive visual exploration. This mobile App integrates user interactivity, AI-based semantic image segmentation, and audio transcription for effective data extraction and utilization. Then visualization functions are designed to quickly present geographical, semantic, and street view visual information for knowledge discovery. The users of this tool can include community workers, teachers, and tourists, and also span across multiple social disciplines in digital humanity studies. }, pages = { 260--271 }, address = { Cham }, publisher = { Springer International Publishing }, year = { 2022 }, booktitle = { Intelligent Human Computer Interaction }, title = { Interactive Visualization and Capture of Geo-Coded Multimedia Data on Mobile Devices }, editor = { [object Object],[object Object],[object Object],[object Object],[object Object],[object Object] }, author = { Bhati and Amiruzzaman and Jamonnak and Zhao }, } |
2021 | PhD Thesis | Md Amiruzzaman (2021). Studying geospatial urban visual appearance and diversity to understand social phenomena. Kent State University. [Ph.D. dissertation] (link) (bib) x @phdthesis{amiruzzaman2021studying, url = { http://rave.ohiolink.edu/etdc/view?acc_num=kent1618904789316283 }, school = { Kent State University }, year = { 2021 }, author = { Amiruzzaman }, title = { Studying geospatial urban visual appearance and diversity to understand social phenomena }, } |
2021 | Journal | Asif Bhat, Rizal Mohd Nor, Md Amiruzzaman (2021). Blockchain letter of credit: A transaction-level analysis. Journal of Engineering Science and Technology, pp. 120–136. School of Engineering, Taylor's University. [Journal] (link) (bib) x @article{bhatblockchain, url = { http://jestec.taylors.edu.my/Special%20Issue%20I%20ACSAT%202021.htm }, publisher = { School of Engineering, Taylor's University }, year = { 2021 }, pages = { 120--136 }, journal = { Journal of Engineering Science and Technology }, author = { Bhat and Nor and Amiruzzaman }, title = { Blockchain letter of credit: A transaction-level analysis }, } |
2021 | Journal | Md Amiruzzaman, Andrew Curtis, Ye Zhao, Suphanut Jamonnak, Xinyue Ye (2021). Classifying crime places by neighborhood visual appearance and police geonarratives: a machine learning approach. Journal of computational social science, 4, pp. 813–-837. Springer. [doi]. [Journal] (link) (bib) x @article{amiruzzaman2021classifying, publisher = { Springer }, url = { https://link.springer.com/article/10.1007/s42001-021-00107-x }, doi = { https://doi.org/10.1007/s42001-021-00107-x }, year = { 2021 }, pages = { 813–-837 }, volume = { 4 }, journal = { Journal of computational social science }, author = { Amiruzzaman and Curtis and Zhao and Jamonnak and Ye }, title = { Classifying crime places by neighborhood visual appearance and police geonarratives: a machine learning approach }, } |
2021 | Conference | Stefanie Amiruzzaman, Md Amiruzzaman (2021). Students' Academic Performance Multitasking and Digital Social-Networking using Twitter. In 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 863-866, Los Alamitos, CA, USA. IEEE Computer Society. [doi]. [Conference] (link) (bib) x @inproceedings{9730236, month = { oct }, address = { Los Alamitos, CA, USA }, publisher = { IEEE Computer Society }, url = { https://doi.ieeecomputersociety.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00143 }, doi = { 10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00143 }, keywords = { social networking (online);blogs;big data;multitasking;reliability }, abstract = { For almost a decade, Twitter use and its impact on academic achievement has been explored by many researchers. Despite the growing scholarly interest, studies have been correlational and exploratory in nature. The purpose of this study is to develop the Twitter and Scholastic Synchronicity Scale (TSSS) and the Twitter and Scholastic Apportionment Assessment (TSAA) to measure the impact of perceived Twitter use on students' scholastic achievement. Undergraduate and graduate students ( |
2021 | Conference | Asif Bhat, Rizal Mohd. Nor, Hafizah Mansor, Md Amiruzzaman (2021). Leveraging Decentralized Internet of Things (IoT) and Blockchain Technology in International Trade. In 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 1-6. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{9706544, month = { Dec }, issn = { }, publisher = { IEEE }, url = { https://ieeexplore.ieee.org/document/9706544 }, doi = { 10.1109/ICSIoT55070.2021.00010 }, keywords = { }, abstract = { Supply chains in the modern era have developed into very complex value networks and have become a critical source of competitive advantage. Verifying the origin of raw materials and maintaining visibility of goods and merchandise as they move through the value chain network is difficult. The Internet of Things (IoT) application may assist businesses in observing, tracking, and monitoring items, activities, and processes inside their value chain networks. Both blockchain and Internet of Things technologies have the potential to accelerate the implementation of Industry 4.0 and transform foreign trade procedures. Integrated technology utilization may be a component of the answer to this future. This paper’s contribution is to demonstrate how the marriage of Blockchain technology with IoT infrastructure may simplify and enhance contemporary supply chains in a variety of ways. Such as increasing scalability, security, immutability, and auditing, as well as information flows, traceability, and interoperability, and quality, using Ping Asset devices and Chainlink, and so setting the groundwork for future research projects. }, pages = { 1-6 }, number = { }, volume = { }, year = { 2021 }, title = { Leveraging Decentralized Internet of Things (IoT) and Blockchain Technology in International Trade }, booktitle = { 2021 International Conference on Cyber Security and Internet of Things (ICSIoT) }, author = { Bhat and Nor and Mansor and Amiruzzaman }, } |
2021 | Conference | Md Amiruzzaman, Rashik Rahman, Md. Rajibul Islam, Rizal Mohd Nor (2021). Evaluation of DBSCAN algorithm on different programming languages: An exploratory study. In 2021 5th International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pp. 1-6. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{9667925, month = { Nov }, issn = { }, publisher = { IEEE }, url = { https://ieeexplore.ieee.org/document/9667925 }, doi = { 10.1109/ICEEICT53905.2021.9667925 }, keywords = { }, abstract = { DBSCAN is a well-known clustering algorithm that is often used to find associations and structures in large spatial data. Due to its popularity, built-in functions for DBSCAN have been implemented on top of many different programming languages. Researchers and practitioners (i.e., data scientists) have been using these built-in functions to cluster and analyze a prolific area of research in data science. Due to the many implementations of DBSCAN and its utilization in many different languages, the output of each built-in DBSCAN function is assumed to be identical. In this paper, we present a systematic approach to evaluate the built-in functions of DBSCAN algorithms and to identify discrepancies in their output. The evidence from the study shows that there are some discrepancies and recommends caution in dealing with built-in functions. }, pages = { 1-6 }, number = { }, volume = { }, year = { 2021 }, title = { Evaluation of DBSCAN algorithm on different programming languages: An exploratory study }, booktitle = { 2021 5th International Conference on Electrical Engineering and Information Communication Technology (ICEEICT) }, author = { Amiruzzaman and Rahman and Islam and Nor }, } |
2021 | Conference | Mahnaz Rafia Islam, Israt Jahan Jenny, Moniruzzaman Nayon, Md. Rajibul Islam, Md Amiruzzaman, M. Abdullah-Al-Wadud (2021). Clustering Algorithms to Analyze the Road Traffic Crashes. In 2021 International Conference on Science Contemporary Technologies (ICSCT), pp. 1–6. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{9642542, month = { Aug }, issn = { }, publisher = { IEEE }, url = { https://ieeexplore.ieee.org/document/9642542 }, doi = { 10.1109/ICSCT53883.2021.9642542 }, keywords = { }, abstract = { Selecting an appropriate clustering method as well as an optimal number of clusters in road accident data is at times confusing and difficult. This paper analyzes shortcomings of different existing techniques applied to cluster accident-prone areas and recommends using Density-Based Spatial Clustering of Applications with Noise (DBSCAN) and Ordering Points To Identify the Clustering Structure (OPTICS) to overcome them. Comparative performance analysis based on real-life data on the recorded cases of road accidents in North Carolina also show more effectiveness and efficiency achieved by these algorithms. }, pages = { 1--6 }, number = { }, volume = { }, year = { 2021 }, title = { Clustering Algorithms to Analyze the Road Traffic Crashes }, booktitle = { 2021 International Conference on Science Contemporary Technologies (ICSCT) }, author = { Islam and Jenny and Nayon and Islam and Amiruzzaman and Abdullah-Al-Wadud }, } |
2021 | Conference | Md. Mashfiq Rizvee, Md Amiruzzaman, Md. Rajibul Islam (2021). Data Mining and Visualization to Understand Accident-Prone Areas. In Proceedings of International Joint Conference on Advances in Computational Intelligence, pp. 143–154, Singapore. Springer Singapore. [doi]. [Conference] (bib) x @inproceedings{10.1007/978-981-16-0586-4_12, isbn = { 978-981-16-0586-4 }, abstract = { In this study, we present both data mining and information visualization techniques to identify accident-prone areas, most accident-prone time, day, and month. Also, we surveyed among volunteers to understand which visualization techniques help non-expert users to understand the findings better. Findings of this study suggest that most accidents occur in the dusk (i.e., between 6 and 7 pm), and on Fridays. Results also suggest that most accidents occurred in October, which is a popular month for tourism. These findings are consistent with social information and can help policymakers, residents, tourists, and other law enforcement agencies. This study can be extended to draw broader implications. }, doi = { 10.1007/978-981-16-0586-4_12 }, pages = { 143--154 }, address = { Singapore }, publisher = { Springer Singapore }, year = { 2021 }, booktitle = { Proceedings of International Joint Conference on Advances in Computational Intelligence }, title = { Data Mining and Visualization to Understand Accident-Prone Areas }, editor = { [object Object],[object Object] }, author = { Md. Mashfiq Rizvee and Md Amiruzzaman and Md. Rajibul Islam }, } |
2021 | Misc | Asif Bhat, Rizal Mohd Nor, Md Amiruzzaman, Md Islam, others (2021). Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application. . ArXiv [Misc/Preprint] (link) (bib) x @misc{bhat2021methodology, publisher = { ArXiv }, url = { https://arxiv.org/abs/2107.14140 }, year = { 2021 }, journal = { arXiv preprint arXiv:2107.14140 }, author = { Bhat and Nor and Amiruzzaman and Islam and others }, title = { Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application }, } |
2021 | Misc | Hassnain ul hassan, Rizal Mohd Nor, Md Amiruzzaman, Sharyar Wani, Md. Rajibul Islam (2021). DNS attack mitigation Using OpenStack Isolation. . ArXiv [Misc/Preprint] (link) (bib) x @misc{DBLP:journals/corr/abs-2106-04575, publisher = { ArXiv }, bibsource = { dblp computer science bibliography, https://dblp.org }, biburl = { https://dblp.org/rec/journals/corr/abs-2106-04575.bib }, timestamp = { Tue, 15 Jun 2021 16:35:15 +0200 }, eprint = { 2106.04575 }, archiveprefix = { arXiv }, url = { https://arxiv.org/abs/2106.04575 }, year = { 2021 }, volume = { abs/2106.04575 }, journal = { CoRR }, title = { {DNS} attack mitigation Using OpenStack Isolation }, author = { Hassnain ul hassan and Rizal Mohd Nor and Md Amiruzzaman and Sharyar Wani and Md. Rajibul Islam }, } |
2020 | Journal | Chao Ma, Ye Zhao, Shamal AL-Dohuki, Jing Yang, Xinyue Ye, Farah Kamw, Md Amiruzzaman (2020). GTMapLens: Interactive Lens for Geo-Text Data Browsing on Map. Computer Graphics Forum, 39(3), pp. 469-481. Wiley. [doi]. [Journal] (link) (bib) x @article{https://doi.org/10.1111/cgf.13995, publisher = { Wiley }, year = { 2020 }, abstract = { Abstract Data containing geospatial semantics, such as geotagged tweets, travel blogs, and crime reports, associates natural language texts with geographical locations. This paper presents a lens-based visual interaction technique, GTMapLens, to flexibly browse the geo-text data on a map. It allows users to perform dynamic focus+context exploration by using movable lenses to browse geographical regions, find locations of interest, and perform comparative and drill-down studies. Geo-text data is visualized in a way that users can easily perceive the underlying geospatial semantics along with lens moving. Based on a requirement analysis with a cohort of multidisciplinary domain experts, a set of lens interaction techniques are developed including keywords control, path management, context visualization, and snapshot anchors. They allow users to achieve a guided and controllable exploration of geo-text data. A hierarchical data model enables the interactive lens operations by accelerated data retrieval from a geo-text database. Evaluation with real-world datasets is presented to show the usability and effectiveness of GTMapLens. }, eprint = { https://onlinelibrary.wiley.com/doi/pdf/10.1111/cgf.13995 }, url = { https://onlinelibrary.wiley.com/doi/abs/10.1111/cgf.13995 }, doi = { https://doi.org/10.1111/cgf.13995 }, keywords = { CCS Concepts, • Information Systems → Information Interfaces and Presentation; Information Systems Applications }, pages = { 469-481 }, number = { 3 }, volume = { 39 }, journal = { Computer Graphics Forum }, title = { GTMapLens: Interactive Lens for Geo-Text Data Browsing on Map }, author = { Ma and Zhao and AL-Dohuki and Yang and Ye and Kamw and Amiruzzaman }, } |
2020 | Journal | Rasel Ahmed Bhuiyan, Nadeem Ahmed, Md Amiruzzaman, Md Rashedul Islam (2020). A Robust Feature Extraction Model for Human Activity Characterization Using 3-Axis Accelerometer and Gyroscope Data. Sensors, 20(23), pp. MDPI. [doi]. [Journal] (link) (bib) x @article{s20236990, publisher = { MDPI }, doi = { 10.3390/s20236990 }, abstract = { Human Activity Recognition (HAR) using embedded sensors in smartphones and smartwatch has gained popularity in extensive applications in health care monitoring of elderly people, security purpose, robotics, monitoring employees in the industry, and others. However, human behavior analysis using the accelerometer and gyroscope data are typically grounded on supervised classification techniques, where models are showing sub-optimal performance for qualitative and quantitative features. Considering this factor, this paper proposes an efficient and reduce dimension feature extraction model for human activity recognition. In this feature extraction technique, the Enveloped Power Spectrum (EPS) is used for extracting impulse components of the signal using frequency domain analysis which is more robust and noise insensitive. The Linear Discriminant Analysis (LDA) is used as dimensionality reduction procedure to extract the minimum number of discriminant features from envelop spectrum for human activity recognition (HAR). The extracted features are used for human activity recognition using Multi-class Support Vector Machine (MCSVM). The proposed model was evaluated by using two benchmark datasets, i.e., the UCI-HAR and DU-MD datasets. This model is compared with other state-of-the-art methods and the model is outperformed. }, issn = { 1424-8220 }, url = { https://www.mdpi.com/1424-8220/20/23/6990 }, article-number = { 6990 }, number = { 23 }, year = { 2020 }, volume = { 20 }, journal = { Sensors }, title = { A Robust Feature Extraction Model for Human Activity Characterization Using 3-Axis Accelerometer and Gyroscope Data }, author = { Ahmed Bhuiyan and Ahmed and Amiruzzaman and Islam }, } |
2020 | Journal | Md Rashedul Islam, Md Amiruzzaman, Shahriar Nasim, Jungpil Shin (2020). Smoke Object Segmentation and the Dynamic Growth Feature Model for Video-Based Smoke Detection Systems. Symmetry, 12(7), pp. MDPI. [doi]. [Journal] (link) (bib) x @article{sym12071075, publisher = { MDPI }, doi = { 10.3390/sym12071075 }, abstract = { This article concerns smoke detection in the early stages of a fire. Using the computer-aided system, the efficient and early detection of smoke may stop a massive fire incident. Without considering the multiple moving objects on background and smoke particles analysis (i.e., pattern recognition), smoke detection models show suboptimal performance. To address this, this paper proposes a hybrid smoke segmentation and an efficient symmetrical simulation model of dynamic smoke to extract a smoke growth feature based on temporal frames from a video. In this model, smoke is segmented from the multi-moving object on the complex background using the Gaussian’s Mixture Model (GMM) and HSV (hue-saturation-value) color segmentation to encounter the candidate smoke and non-smoke regions in the preprocessing stage. The preprocessed temporal frames with moving smoke are analyzed by the dynamic smoke growth analysis and spatial-temporal frame energy feature extraction model. In dynamic smoke growth analysis, the temporal frames are segmented in blocks and the smoke growth representations are formulated from corresponding blocks. Finally, the classifier was trained using the extracted features to classify and detect smoke using a Radial Basis Function (RBF) non-linear Gaussian kernel-based binary Support Vector Machine (SVM). For validating the proposed smoke detection model, multi-conditional video clips are used. The experimental results suggest that the proposed model outperforms state-of-the-art algorithms. }, issn = { 2073-8994 }, url = { https://www.mdpi.com/2073-8994/12/7/1075 }, article-number = { 1075 }, number = { 7 }, year = { 2020 }, volume = { 12 }, journal = { Symmetry }, title = { Smoke Object Segmentation and the Dynamic Growth Feature Model for Video-Based Smoke Detection Systems }, author = { Islam and Amiruzzaman and Nasim and Shin }, } |
2020 | Journal | Md Amiruzzaman, M Abdullah-Al-Wadud, Rizal Mohd Nor, Normaziah A Aziz (2020). Evaluation of the effectiveness of movement control order to limit the spread of COVID-19. Annals of Emerging Technologies in Computing (AETiC), 4(4), pp. 1-9. International Association for Educators and Researchers (IAER). [doi]. [Journal] (link) (bib) x @article{amiruzzaman2021evaluation, publisher = { International Association for Educators and Researchers (IAER) }, year = { 2020 }, url = { http://aetic.theiaer.org/archive/v4/v4n4/p1.html }, doi = { https://doi.org/10.33166/AETiC.2020.04.00 }, pages = { 1-9 }, number = { 4 }, volume = { 4 }, journal = { Annals of Emerging Technologies in Computing (AETiC) }, author = { Amiruzzaman and Abdullah-Al-Wadud and Nor and Aziz }, title = { Evaluation of the effectiveness of movement control order to limit the spread of COVID-19 }, } |
2020 | Conference | Tsung Heng Wu, Ye Zhao, Md Amiruzzaman (2020). Interactive Visualization of AI-based Speech Recognition Texts. In EuroVis Workshop on Visual Analytics (EuroVA), pp. The Eurographics Association. [doi]. [Conference] (link) (bib) x @inproceedings{wu2020interactive, url = { https://diglib.eg.org/handle/10.2312/eurova20201091 }, doi = { 10.2312/eurova.20201091 }, isbn = { 978-3-03868-116-8 }, issn = { 2664-4487 }, publisher = { The Eurographics Association }, year = { 2020 }, author = { Wu and Zhao and Amiruzzaman }, title = { Interactive Visualization of AI-based Speech Recognition Texts }, editor = { [object Object],[object Object] }, booktitle = { EuroVis Workshop on Visual Analytics (EuroVA) }, } |
2020 | Conference | Md Amiruzzaman, Rizal Mohd Nor (2020). Hide Secret Information in Blocks: Minimum Distortion Embedding. In 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 107-112. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{9071138, month = { Feb }, issn = { 2688-769X }, url = { https://ieeexplore.ieee.org/abstract/document/9071138 }, publisher = { IEEE }, doi = { 10.1109/SPIN48934.2020.9071138 }, keywords = { }, abstract = { In this paper, a new steganographic method is presented that provides minimum distortion in the stego image. The proposed encoding algorithm focused on DCT rounding error and optimized that in a way to reduce distortion in the stego image, and the proposed algorithm produces less distortion than existing methods (e.g., F5 algorithm). The proposed method is based on DCT rounding error which helped to lower distortion and higher embedding capacity. }, pages = { 107-112 }, number = { }, volume = { }, year = { 2020 }, title = { Hide Secret Information in Blocks: Minimum Distortion Embedding }, booktitle = { 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN) }, author = { Amiruzzaman and Nor }, } |
2020 | Conference | Md Amiruzzaman, Suphanut Jamonnak (2020). Multi-dimensional Skyline Query to Find Best Shopping Mall for Customers. In 2020 6th Conference on Data Science and Machine Learning Applications (CDMA), pp. 71-76. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{9044257, month = { March }, issn = { }, url = { https://ieeexplore.ieee.org/abstract/document/9044257 }, publisher = { IEEE }, doi = { 10.1109/CDMA47397.2020.00018 }, keywords = { }, abstract = { This paper presents a new application for multidimensional Skyline query. The idea presented in this paper can be used to find best shopping malls based on users requirements. A web-based application was used to simulate the problem and proposed solution. Also, a mathematical definition was developed to define the problem and show how multi-dimensional Skyline query can be used to solve complex problems, such as, finding shopping malls using multiple different criteria. The idea of this paper can be used in other fields, where different criteria should be considered. }, pages = { 71-76 }, number = { }, volume = { }, year = { 2020 }, title = { Multi-dimensional Skyline Query to Find Best Shopping Mall for Customers }, booktitle = { 2020 6th Conference on Data Science and Machine Learning Applications (CDMA) }, author = { Amiruzzaman and Jamonnak }, } |
2020 | Conference | Rasel Ahmed Bhuiyan, Md Amiruzzaman, Nadeem Ahmed, MD Rashedul Islam (2020). Efficient Frequency Domain Feature Extraction Model using EPS and LDA for Human Activity Recognition. In 2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII), pp. 344-347. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{9318786, month = { Aug }, issn = { }, url = { https://ieeexplore.ieee.org/abstract/document/9318786 }, publisher = { IEEE }, doi = { 10.1109/ICKII50300.2020.9318786 }, keywords = { }, abstract = { Activity identification based on machine learning for human computing aims to understand or capture the state of human behavior, its environment, and integrate user by exploiting distinct types of sensors to give adjustment to the exogenous computing system. The ascent of universal computing systems requires our environment a solid requirement for novel methodologies of Human Computer Interaction (HCI). The recognition of human activities, commonly known as HAR can play a vital task in this regard. HAR has an appealing use in the health-care system and monitoring of Daily Living Activities (DLA) of elderly people by offering the input for the development of more interactive and cognitive environments. This paper is presenting a model for the recognition of Human Activities. In this proposed model, the Enveloped Power Spectrum (EPS) is used for extracting impulse components of the signal, and the Linear Discriminant Analysis (LDA) is used as a dimensionality reduction procedure to extract the discriminant features for human daily activity recognition. After completing EPS feature extraction techniques, LDA is performed on those extracted spectra for extracting features using the dimension reduction technique. Finally, the discriminant vocabulary vector is trained by the Multiclass Support Vector Machine (MCSVM) to classify human activities. For validating the proposed scheme, UCI-HAR datasets have been implemented which demonstrates higher recognition accuracy which has been acknowledged. }, pages = { 344-347 }, number = { }, volume = { }, year = { 2020 }, title = { Efficient Frequency Domain Feature Extraction Model using EPS and LDA for Human Activity Recognition }, booktitle = { 2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII) }, author = { Bhuiyan and Amiruzzaman and Ahmed and Islam }, } |
2020 | Conference | Md. Azim Hossain Akash, Nasima Begum, Sayma Rahman, Jungpil Shin, Md Amiruzzaman, Md Rashedul Islam (2020). User Authentication Through Pen Tablet Data Using Imputation and Flatten Function. In 2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII), pp. 208-211. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{9318975, month = { Aug }, issn = { }, url = { https://ieeexplore.ieee.org/abstract/document/9318975 }, publisher = { IEEE }, doi = { 10.1109/ICKII50300.2020.9318975 }, keywords = { }, abstract = { Identifying a user or a person through handwriting-data is a popular technique. Many researches have been done in this area most of which are image or pattern-based analysis. The accuracy level depends on the quality of the image or pattern. In this paper, we proposed user authentication system using an individual's pen tablet handwriting data. The proposed system is concerned with the numerical value of a person handwriting data getting from the digital pen and tablet device. Hence, user authentication through pen tablet data ensures more accuracy by working with user's real time handwritten data. In the proposed system, 24 persons writing samples(1262 .csv files and 23 class)are used for extracting features to identify a user based on their handwriting attributes. Six completely separated features are extracted after data analysis and pre-processing. The extracted features are mainly concerned with the vital attributes of a user's handwriting. The extracted features are used for classification. With this concern, we utilized different classification algorithms such as Support Vector Machine (SVM), Logistic Regression (LR), Linear Discriminant Analysis (LDA) and Random Forest (RF) classifier. From the implementation, different algorithms show different accuracy level. The testing accuracy rate of SVM, LR, LDA and RF is 87%, 85%, 76% and 77% respectively. The experimental analysis shows that we got more robust and satisfactory results which ensure the practicality of our system. }, pages = { 208-211 }, number = { }, volume = { }, year = { 2020 }, title = { User Authentication Through Pen Tablet Data Using Imputation and Flatten Function }, booktitle = { 2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII) }, author = { Akash and Begum and Rahman and Shin and Amiruzzaman and Islam }, } |
2019 | PhD Thesis | Md Amiruzzaman (2019). Assessing the psychometric properties of newly developed behavior and attitude Twitter scales: A validity and reliability study. Kent State University. [Ph.D. dissertation] (link) (bib) x @phdthesis{amiruzzaman2019assessing, url = { http://rave.ohiolink.edu/etdc/view?acc_num=kent1572861573752847 }, school = { Kent State University }, year = { 2019 }, author = { Amiruzzaman }, title = { Assessing the psychometric properties of newly developed behavior and attitude Twitter scales: A validity and reliability study }, } |
2019 | Conference | Md Amiruzzaman (2019). Prediction of Traffic-Violation Using Data Mining Techniques. In Proceedings of the Future Technologies Conference (FTC) 2018, pp. 283–297, Cham. Springer International Publishing. [doi]. [Conference] (bib) x @inproceedings{10.1007/978-3-030-02686-8_23, doi = { 10.1007/978-3-030-02686-8_23 }, isbn = { 978-3-030-02686-8 }, abstract = { This paper presents the prediction of traffic-violations using data mining techniques, more specifically, when most likely a traffic-violation may happen. Also, the contributing factors that may cause more damages (e.g., personal injury, property damage, etc.) are discussed in this paper. The national database for traffic-violation was considered for the mining and analyzed results indicated that a few specific times are probable for traffic-violations. Moreover, most accidents happened on specific days and times. The findings of this work could help prevent some traffic-violations or reduce the chance of occurrence. These results can be used to increase cautions and traffic-safety tips. }, pages = { 283--297 }, address = { Cham }, publisher = { Springer International Publishing }, year = { 2019 }, booktitle = { Proceedings of the Future Technologies Conference (FTC) 2018 }, title = { Prediction of Traffic-Violation Using Data Mining Techniques }, editor = { [object Object],[object Object],[object Object] }, author = { Amiruzzaman }, } |
2018 | In Collection | Karl W Kosko, Lauren Sobolewski-McMahon, Md Amiruzzaman (2018). Growing in number: Research on mathematical teaching and learning in the online setting. In Kathryn Kennedy, Richard E. Ferdig, editor, Handbook of research on K-12 online and blended learning, pp. 289–302. [doi]. [Book chapter] (bib) x @incollection{kosko2018grow, editor = { [object Object],[object Object] }, isbn = { 9781387704156 }, doi = { https://www.doi.org/10.1184/R1/6686813 }, publisher = { Pittsburgh, PA: ETC Press }, year = { 2018 }, pages = { 289--302 }, booktitle = { Handbook of research on K-12 online and blended learning }, author = { Kosko and Sobolewski-McMahon and Amiruzzaman }, title = { Growing in number: Research on mathematical teaching and learning in the online setting }, } |
2017 | Conference | Md Amiruzzaman, Karl W. Kosko, Stefanie Amiruzzaman (2017). Preservice mathematics teachers understanding of mode. In Proceedings of the 39th annual meeting of the North American Chapter of the International Group for the Psychology of Mathematics Education, pp. PMENA. [Conference] (bib) x @inproceedings{Amiruzzaman2020PreserviceMT, publisher = { PMENA }, year = { 2017 }, booktitle = { Proceedings of the 39th annual meeting of the North American Chapter of the International Group for the Psychology of Mathematics Education }, author = { Md Amiruzzaman and Karl W. Kosko and Stefanie Amiruzzaman }, title = { Preservice mathematics teachers understanding of mode }, } |
2016 | PhD Thesis | Md Amiruzzaman (2016). Exploring preservice teachers' understanding of measures of central tendency. Kent State University. [Ph.D. dissertation] (link) (bib) x @phdthesis{amiruzzaman2016exploring, url = { http://rave.ohiolink.edu/etdc/view?acc_num=kent1618904789316283 }, school = { Kent State University }, year = { 2016 }, author = { Amiruzzaman }, title = { Exploring preservice teachers' understanding of measures of central tendency }, } |
2016 | Conference | Md Amiruzzaman, Karl W. Kosko (2016). Exploring students' understanding of median. In Proceedings of the 38th annual meeting of the North American Chapter of the International Group for the Psychology of Mathematics Education, pp. PMENA. [Conference] (bib) x @inproceedings{Amiruzzaman2020ExploringSU, publisher = { PMENA }, year = { 2016 }, booktitle = { Proceedings of the 38th annual meeting of the North American Chapter of the International Group for the Psychology of Mathematics Education }, author = { Md Amiruzzaman and Karl W. Kosko }, title = { Exploring students' understanding of median }, } |
2014 | In Collection | Karl W Kosko, Lauren Sobolewski-McMahon, Md Amiruzzaman (2014). Few in number: Research on mathematical teaching and learning in the online setting. In Richard E. Ferdig, Kathryn Kennedy, editor, Handbook of research on K-12 online and blended learning, pp. 163–177. [doi]. [Book chapter] (bib) x @incollection{kosko2014few, editor = { [object Object],[object Object] }, isbn = { 9781312587083 }, doi = { https://www.doi.org/10.1184/R1/6686810 }, publisher = { Pittsburgh, PA: ETC Press }, year = { 2014 }, pages = { 163--177 }, booktitle = { Handbook of research on K-12 online and blended learning }, author = { Kosko and Sobolewski-McMahon and Amiruzzaman }, title = { Few in number: Research on mathematical teaching and learning in the online setting }, } |
2011 | MS Thesis | Md Amiruzzaman (2011). Steganographic covert communication channels and their detection. Kent State University. [MS thesis] (link) (bib) x @mastersthesis{amiruzzaman2011steganographic, url = { http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218 }, school = { Kent State University }, year = { 2011 }, author = { Amiruzzaman }, title = { Steganographic covert communication channels and their detection }, } |
2010 | Journal | Md Amiruzzaman, Hassan Peyravi, M Abdullah-Al-Wadud, Yoojin Chung (2010). Covert Channel Communication by Betterment Steganography. International Journal of Multimedia and Ubiquitous Engineering, 5(3), pp. 1–14. [Journal] (pdf) (bib) x @article{md2010covert, url = { https://gvpress.com/journals/IJMUE/vol5_no3/1.pdf }, year = { 2010 }, pages = { 1--14 }, number = { 3 }, volume = { 5 }, journal = { International Journal of Multimedia and Ubiquitous Engineering }, author = { Amiruzzaman and Peyravi and Abdullah-Al-Wadud and Chung }, title = { Covert Channel Communication by Betterment Steganography }, } |
2010 | Conference | Md Amiruzzaman, Hassan Peyravi, M. Abdullah-Al-Wadud, Yoojin Chung (2010). Concurrent Covert Communication Channels. In Advances in Computer Science and Information Technology, pp. 203–213, Berlin, Heidelberg. Springer Berlin Heidelberg. [doi]. [Conference] (bib) x @inproceedings{10.1007/978-3-642-13577-4_18, doi = { 10.1007/978-3-642-13577-4_18 }, isbn = { 978-3-642-13577-4 }, abstract = { This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8{\texttimes}8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a single bit of information. A receiver can decode its independent hidden data using its dedicated key. The distortion of the covert channel data is controlled by minimizing the round-off error of the JPEG image. The method tries to keep the coefficients of the original histogram intact while carrying hidden bits. The method is immune against first order statistical detection. }, pages = { 203--213 }, address = { Berlin, Heidelberg }, publisher = { Springer Berlin Heidelberg }, year = { 2010 }, booktitle = { Advances in Computer Science and Information Technology }, title = { Concurrent Covert Communication Channels }, editor = { [object Object],[object Object] }, author = { Amiruzzaman and Peyravi and Abdullah-Al-Wadud and Chung }, } |
2010 | Conference | Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoojin Chung (2010). An Analysis of Syndrome Coding. In Information Security and Assurance, pp. 37–50, Berlin, Heidelberg. Springer Berlin Heidelberg. [doi]. [Conference] (bib) x @inproceedings{10.1007/978-3-642-13365-7_5, doi = { 10.1007/978-3-642-13365-7_5 }, isbn = { 978-3-642-13365-7 }, abstract = { In this paper a detail analysis is presented based on BCH syndrome coding for covert channel data hiding methods. The experimented technique is nothing but a syndrome coding algorithm with a coset based approach, analyzed results are showing that the examined method has more flexibility to choose coset, also providing less modification distortion caused by data hiding. Analyzed method presented by clear mathematical way. As it is mathematical equation dependent, hence analyzed results are showing that the analyzed method has fast computation ability and find perfect roots for modification. }, pages = { 37--50 }, address = { Berlin, Heidelberg }, publisher = { Springer Berlin Heidelberg }, year = { 2010 }, booktitle = { Information Security and Assurance }, title = { An Analysis of Syndrome Coding }, editor = { [object Object],[object Object],[object Object],[object Object] }, author = { Amiruzzaman and Abdullah-Al-Wadud and Chung }, } |
2010 | Conference | Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoojin Chung (2010). Minimum Distortion Data Hiding. In Advances in Software Engineering, pp. 151–163, Berlin, Heidelberg. Springer Berlin Heidelberg. [doi]. [Conference] (bib) x @inproceedings{10.1007/978-3-642-17578-7_16, doi = { 10.1007/978-3-642-17578-7_16 }, isbn = { 978-3-642-17578-7 }, abstract = { In this paper a new steganographic method is presented with minimum distortion, and better resistance against steganalysis. There are two ways to control detectability of stego message: one is less distortion, and another is less modification. Concerning the less distortion, this paper focuses on DCT rounding error, and optimizes the rounding error in a very easy way, resulting stego image has less distortion than other existing methods. The proposed method compared with other existing popular steganographic algorithms, and the proposed method achieved better performance. This paper considered the DCT rounding error for lower distortion with possibly higher embedding capacity. }, pages = { 151--163 }, address = { Berlin, Heidelberg }, publisher = { Springer Berlin Heidelberg }, year = { 2010 }, booktitle = { Advances in Software Engineering }, title = { Minimum Distortion Data Hiding }, editor = { [object Object] }, author = { Amiruzzaman and Abdullah-Al-Wadud and Chung }, } |
2009 | Conference | Md Amiruzzaman, Hassan Peyravi, M. Abdullah-Al-Wadud, Yoojin Chung (2009). An Improved Steganography Covert Channel. In Advances in Software Engineering, pp. 176–187, Berlin, Heidelberg. Springer Berlin Heidelberg. [doi]. [Conference] (bib) x @inproceedings{10.1007/978-3-642-10619-4_22, doi = { 10.1007/978-3-642-10619-4_22 }, isbn = { 978-3-642-10619-4 }, abstract = { An improved steganographic method is proposed in this paper. Two distinct methods are combined to achieve possibly high data hiding capability with high visual quality. The proposed method shifts the last n nonzero AC coefficients from S JPEG block, and changes the magnitude values of the first n nonzero AC coefficients from T JPEG blocks. S and T blocks are determined by the number of nonzero JPEG coefficients in the block. Zero run-length modification method improves the robustness against statistical attack based on magnitude histogram. Magnitude modification method improves the visual quality. This combination complements each other. }, pages = { 176--187 }, address = { Berlin, Heidelberg }, publisher = { Springer Berlin Heidelberg }, year = { 2009 }, booktitle = { Advances in Software Engineering }, title = { An Improved Steganography Covert Channel }, editor = { [object Object],[object Object],[object Object],[object Object],[object Object],[object Object] }, author = { Amiruzzaman and Peyravi and Abdullah-Al-Wadud and Chung }, } |
2008 | Journal | Amiruzzaman Md, Hyoung-Joong Kim (2008). A Study on Steganographic Methods and Its Applications. 한국정보통신설비학회: 학술대회논문집, pp. 193–196. Korea Institute of Information and Telecommunication Facilities Engineering. [Journal] (pdf) (bib) x @article{md2008study, url = { https://www.koreascience.or.kr/article/CFKO200831559920811.pdf }, publisher = { Korea Institute of Information and Telecommunication Facilities Engineering }, year = { 2008 }, pages = { 193--196 }, journal = { 한국정보통신설비학회: 학술대회논문집 }, author = { Md and Kim }, title = { A Study on Steganographic Methods and Its Applications }, } |
2008 | Journal | Rongyue Zhang, Amiruzzaman Md, Hyoung-Joong Kim (2008). A New Steganographic Method with Minimum Distortion. 한국정보통신설비학회: 학술대회논문집, pp. 201–204. Korea Institute of Information and Telecommunication Facilities Engineering. [Journal] (pdf) (bib) x @article{zhang2008new, url = { https://www.koreascience.or.kr/article/CFKO200831559920814.pdf }, publisher = { Korea Institute of Information and Telecommunication Facilities Engineering }, year = { 2008 }, pages = { 201--204 }, journal = { 한국정보통신설비학회: 학술대회논문집 }, author = { Zhang and Md and Kim }, title = { A New Steganographic Method with Minimum Distortion }, } |
2008 | Journal | Md Amiruzzaman (2008). An embedded network-engine. DIU Journal of Science and Technology, 3(2), pp. 13–19. Daffodil International University. [Journal] (link) (bib) x @article{amiruzzaman2008embedded, url = { http://hdl.handle.net/20.500.11948/472 }, issn = { 2408-8498 }, pages = { 13--19 }, number = { 2 }, volume = { 3 }, journal = { DIU Journal of Science and Technology }, publisher = { Daffodil International University }, year = { 2008 }, author = { Amiruzzaman }, title = { An embedded network-engine }, } |
2008 | Journal | M Wadud, Md Amiruzzaman, Oksam Chae (2008). A bottom-up mergesort eliminating recursion. DIU Journal of Science and Technology, 3(1), pp. 59–64. Daffodil International University. [Journal] (link) (bib) x @article{wadud2008bottom, url = { http://hdl.handle.net/20.500.11948/464 }, issn = { 2408-8498 }, pages = { 59--64 }, number = { 1 }, volume = { 3 }, journal = { DIU Journal of Science and Technology }, publisher = { Daffodil International University }, year = { 2008 }, author = { Wadud and Amiruzzaman and Chae }, title = { A bottom-up mergesort eliminating recursion }, } |
2008 | Journal | Amiruzzaman Md, Hyoung-Joong Kim (2008). An Embedded Multi-Agent Based Healthcare Service with Two-way Handshaking Mode. Journal of the Institute of Electronics Engineers of Korea CI, 45(5), pp. 155–161. The Institute of Electronics and Information Engineers. [Journal] (pdf) (bib) x @article{md2008embedded, url = { https://www.koreascience.or.kr/article/JAKO200835054208473.pdf }, publisher = { The Institute of Electronics and Information Engineers }, year = { 2008 }, pages = { 155--161 }, number = { 5 }, volume = { 45 }, journal = { Journal of the Institute of Electronics Engineers of Korea CI }, author = { Md and Kim }, title = { An Embedded Multi-Agent Based Healthcare Service with Two-way Handshaking Mode }, } |
2008 | Conference | Hyoung Joong Kim, So Young Kim, In-Kwon Yeo, Md Amiruzzaman (2008). Mathematical performance evaluation tool for image hash generation functions. In 2008 5th International Conference on Visual Information Engineering (VIE 2008), pp. 221-226. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{4743420, publisher = { IEEE }, url = { https://ieeexplore.ieee.org/document/4743420 }, month = { July }, issn = { 0537-9989 }, doi = { 10.1049/cp:20080312 }, keywords = { }, abstract = { Image hash as a descriptor or identifier can be used to measure similarity in images. Among all image hash functions, a histogram-based method shows better robustness to common signal processing operations and various geometric attacks. In this paper, performance of this method is improved by utilizing histogram generation method. Histogram with equal population improves the performance slightly. In order to compare performance of image hash generation functions, a statistical tool is provided. The proposed tool will help to evaluate the performance of image hash generator functions. }, pages = { 221-226 }, number = { }, volume = { }, year = { 2008 }, title = { Mathematical performance evaluation tool for image hash generation functions }, booktitle = { 2008 5th International Conference on Visual Information Engineering (VIE 2008) }, author = { Hyoung Joong Kim and So Young Kim and In-Kwon Yeo and Md Amiruzzaman }, } |
2008 | Conference | Md Amiruzzaman, Hyoung Joong Kim (2008). Secure steganographic method. In 2008 5th International Conference on Visual Information Engineering (VIE 2008), pp. 141-145. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{4743406, publisher = { IEEE }, url = { https://ieeexplore.ieee.org/document/4743406 }, month = { July }, issn = { 0537-9989 }, doi = { 10.1049/cp:20080298 }, keywords = { }, abstract = { A new data hiding method completely secure against the first-order statistical attack is proposed. This method separates the selective and non-selective blocks first, selects the selective blocks next, and shifts the position of last non-zero AC coefficients to embed secret messages. Even after hiding data, non-zero JPEG coefficients remain unchanged. Since this method does not change the AC coefficients, but changes their positions, the produced histogram of the image after data hiding remains the same as that of original image. }, pages = { 141-145 }, number = { }, volume = { }, year = { 2008 }, title = { Secure steganographic method }, booktitle = { 2008 5th International Conference on Visual Information Engineering (VIE 2008) }, author = { Md Amiruzzaman and Hyoung Joong Kim }, } |
2008 | Conference | Md Amiruzzaman, Hyoung Joong Kim (2008). A Health-Care Service for Mobile Computing. In 2008 Advanced Software Engineering and Its Applications, pp. 190-193. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{4721339, publisher = { IEEE }, url = { https://ieeexplore.ieee.org/document/4721339 }, doi = { 10.1109/ASEA.2008.28 }, pages = { 190-193 }, number = { }, volume = { }, year = { 2008 }, title = { A Health-Care Service for Mobile Computing }, booktitle = { 2008 Advanced Software Engineering and Its Applications }, author = { Amiruzzaman and Kim }, } |
2008 | Conference | Hyoung-Joong Kim, Md Amiruzzaman (2008). An Improved Steganographic Method.. In SIGMAP, pp. 145–150. [doi]. [Conference] (bib) x @inproceedings{kim2008improved, doi = { 10.5220/0001938901450150 }, year = { 2008 }, pages = { 145--150 }, booktitle = { SIGMAP }, author = { Kim and Amiruzzaman }, title = { An Improved Steganographic Method. }, } |
2008 | MS Thesis | Md Amiruzzaman (2008). The design and implementation of the embedded network-engine for Video on Demand (VoD). Sejong University. [MS thesis] (bib) x @mastersthesis{amiruzzaman2008embeddedsejong, url = { }, school = { Sejong University }, year = { 2008 }, author = { Amiruzzaman }, title = { The design and implementation of the embedded network-engine for Video on Demand (VoD) }, } |
2007 | Conference | Md Amiruzzaman, Sung-Ok Son, Jae-Chun No (2007). An Embedded Network-Engine for Video On Demand Service. In Proceedings of the Korean Information Science Society Conference, pp. 145–148. [Conference] (pdf) (bib) x @inproceedings{md2007embedded, url = { https://www.koreascience.or.kr/article/CFKO200724737417225.pdf }, organization = { Korean Institute of Information Scientists and Engineers }, year = { 2007 }, pages = { 145--148 }, booktitle = { Proceedings of the Korean Information Science Society Conference }, author = { Md Amiruzzaman and Son and No }, title = { An Embedded Network-Engine for Video On Demand Service }, } |
2007 | Conference | Sung-Ok Son, Md Amiruzzaman, Jae-Chun No (2007). The Network Engine Research and Development for Wireless based on Online Game. In Proceedings of the Korean Information Science Society Conference, pp. 243–246. [Conference] (pdf) (bib) x @inproceedings{son2007network, url = { https://www.koreascience.or.kr/article/CFKO200724737420271.pdf }, organization = { Korean Institute of Information Scientists and Engineers }, year = { 2007 }, pages = { 243--246 }, booktitle = { Proceedings of the Korean Information Science Society Conference }, author = { Son and Amiruzzaman and No }, title = { The Network Engine Research and Development for Wireless based on Online Game }, } |
2005 | BS Thesis | Md Amiruzzaman (2005). Fingerprint authentication system using neural networks. National University. [Bachelor's thesis] (bib) x @thesis{amiruzzaman2005fingerprintnational, url = { }, school = { National University }, year = { 2005 }, author = { Amiruzzaman }, title = { Fingerprint authentication system using neural networks }, } |
2004 | Conference | N. Hossain, M.G.R. Alma, M. Amiruzzaman, S.M.M. Quadir (2004). An efficient merge sort technique that reduces both times and comparisons. In Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004., pp. 537-538. IEEE. [doi]. [Conference] (link) (bib) x @inproceedings{1307869, month = { April }, publisher = { IEEE }, issn = { }, url = { https://ieeexplore.ieee.org/abstract/document/9318786 }, doi = { 10.1109/ICTTA.2004.1307869 }, keywords = { }, abstract = { We proposed a new but simple and efficient merge sort technique. This method has several advantages on performance over previous merge sort technique. This technique divides the whole data as like divided and conquer method but until two elements in a group instead of one in each group like traditional merge sort by [D. E. Knuth (1973)]. Then solves the divided parts and conquers them. The resulting efficiency of this method is that the division of problem is much less then the previous method, so the recursive call is also less. As a result we have less comparison and less computational time. }, pages = { 537-538 }, number = { }, volume = { }, year = { 2004 }, title = { An efficient merge sort technique that reduces both times and comparisons }, booktitle = { Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004. }, author = { Hossain and Alma and Amiruzzaman and Quadir }, } |
2003 | Conference | Ferdous Ahmed Sohel, M Amiruzzaman (2003). Fingerprint authentication system using back-propagation. In Proceedings of International Conference on Computers and Information technology, ICCIT-03, pp. 722–725. [Conference] (pdf) (bib) x @inproceedings{sohel2003fingerprint, url = { https://researchrepository.murdoch.edu.au/id/eprint/28572/1/fingerprint_authentication.pdf }, organization = { ICCIT }, pages = { 722--725 }, booktitle = { Proceedings of International Conference on Computers and Information technology, ICCIT-03 }, year = { 2003 }, author = { Sohel and Amiruzzaman }, title = { Fingerprint authentication system using back-propagation }, } |
@phdthesis{amiruzzaman2021studying, title={Studying geospatial urban visual appearance and diversity to understand social phenomena}, author={Amiruzzaman, Md}, year={2021}, school={Kent State University}, url = {http://rave.ohiolink.edu/etdc/view?acc_num=kent1618904789316283} } @article{amiruzzaman2021classifying, title={Classifying crime places by neighborhood visual appearance and police geonarratives: a machine learning approach}, author={Amiruzzaman, Md and Curtis, Andrew and Zhao, Ye and Jamonnak, Suphanut and Ye, Xinyue}, journal={Journal of computational social science}, volume = {4}, pages={813–-837}, year={2021}, doi = {https://doi.org/10.1007/s42001-021-00107-x}, url = {https://link.springer.com/article/10.1007/s42001-021-00107-x}, publisher={Springer} } @InProceedings{10.1007/978-981-16-0586-4_12, author="Md. Mashfiq Rizvee and Md Amiruzzaman and Md. Rajibul Islam", editor="Uddin, Mohammad Shorif and Bansal, Jagdish Chand", title="Data Mining and Visualization to Understand Accident-Prone Areas", booktitle="Proceedings of International Joint Conference on Advances in Computational Intelligence", year="2021", publisher={Springer Singapore}, address="Singapore", pages="143--154", doi ="10.1007/978-981-16-0586-4_12", abstract="In this study, we present both data mining and information visualization techniques to identify accident-prone areas, most accident-prone time, day, and month. Also, we surveyed among volunteers to understand which visualization techniques help non-expert users to understand the findings better. Findings of this study suggest that most accidents occur in the dusk (i.e., between 6 and 7 pm), and on Fridays. Results also suggest that most accidents occurred in October, which is a popular month for tourism. These findings are consistent with social information and can help policymakers, residents, tourists, and other law enforcement agencies. This study can be extended to draw broader implications.", isbn="978-981-16-0586-4" } @misc{DBLP:journals/corr/abs-2106-04575, author = {Hassnain ul hassan and Rizal Mohd Nor and Md Amiruzzaman and Sharyar Wani and Md. Rajibul Islam}, title = {{DNS} attack mitigation Using OpenStack Isolation}, journal = {CoRR}, volume = {abs/2106.04575}, year = {2021}, url = {https://arxiv.org/abs/2106.04575}, archivePrefix = {arXiv}, eprint = {2106.04575}, timestamp = {Tue, 15 Jun 2021 16:35:15 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-04575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org}, publisher = {ArXiv} } @article{amiruzzaman2021evaluation, title={Evaluation of the effectiveness of movement control order to limit the spread of COVID-19}, author={Amiruzzaman, Md and Abdullah-Al-Wadud, M and Nor, Rizal Mohd and Aziz, Normaziah A}, journal={Annals of Emerging Technologies in Computing (AETiC)}, volume = {4}, number = {4}, pages={1-9}, doi = {https://doi.org/10.33166/AETiC.2020.04.00}, url = {http://aetic.theiaer.org/archive/v4/v4n4/p1.html}, year={2020}, publisher ={International Association for Educators and Researchers (IAER)} } @INPROCEEDINGS{9318975, author={Akash, Md. Azim Hossain and Begum, Nasima and Rahman, Sayma and Shin, Jungpil and Amiruzzaman, Md and Islam, Md Rashedul}, booktitle={2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII)}, title={User Authentication Through Pen Tablet Data Using Imputation and Flatten Function}, year={2020}, volume={}, number={}, pages={208-211}, abstract={Identifying a user or a person through handwriting-data is a popular technique. Many researches have been done in this area most of which are image or pattern-based analysis. The accuracy level depends on the quality of the image or pattern. In this paper, we proposed user authentication system using an individual's pen tablet handwriting data. The proposed system is concerned with the numerical value of a person handwriting data getting from the digital pen and tablet device. Hence, user authentication through pen tablet data ensures more accuracy by working with user's real time handwritten data. In the proposed system, 24 persons writing samples(1262 .csv files and 23 class)are used for extracting features to identify a user based on their handwriting attributes. Six completely separated features are extracted after data analysis and pre-processing. The extracted features are mainly concerned with the vital attributes of a user's handwriting. The extracted features are used for classification. With this concern, we utilized different classification algorithms such as Support Vector Machine (SVM), Logistic Regression (LR), Linear Discriminant Analysis (LDA) and Random Forest (RF) classifier. From the implementation, different algorithms show different accuracy level. The testing accuracy rate of SVM, LR, LDA and RF is 87%, 85%, 76% and 77% respectively. The experimental analysis shows that we got more robust and satisfactory results which ensure the practicality of our system.}, keywords={}, doi={10.1109/ICKII50300.2020.9318975}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/abstract/document/9318975}, ISSN={}, month={Aug},} @INPROCEEDINGS{9318786, author={Bhuiyan, Rasel Ahmed and Amiruzzaman, Md and Ahmed, Nadeem and Islam, MD Rashedul}, booktitle={2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII)}, title={Efficient Frequency Domain Feature Extraction Model using EPS and LDA for Human Activity Recognition}, year={2020}, volume={}, number={}, pages={344-347}, abstract={Activity identification based on machine learning for human computing aims to understand or capture the state of human behavior, its environment, and integrate user by exploiting distinct types of sensors to give adjustment to the exogenous computing system. The ascent of universal computing systems requires our environment a solid requirement for novel methodologies of Human Computer Interaction (HCI). The recognition of human activities, commonly known as HAR can play a vital task in this regard. HAR has an appealing use in the health-care system and monitoring of Daily Living Activities (DLA) of elderly people by offering the input for the development of more interactive and cognitive environments. This paper is presenting a model for the recognition of Human Activities. In this proposed model, the Enveloped Power Spectrum (EPS) is used for extracting impulse components of the signal, and the Linear Discriminant Analysis (LDA) is used as a dimensionality reduction procedure to extract the discriminant features for human daily activity recognition. After completing EPS feature extraction techniques, LDA is performed on those extracted spectra for extracting features using the dimension reduction technique. Finally, the discriminant vocabulary vector is trained by the Multiclass Support Vector Machine (MCSVM) to classify human activities. For validating the proposed scheme, UCI-HAR datasets have been implemented which demonstrates higher recognition accuracy which has been acknowledged.}, keywords={}, doi={10.1109/ICKII50300.2020.9318786}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/abstract/document/9318786}, ISSN={}, month={Aug},} @Article{sym12071075, AUTHOR = {Islam, Md Rashedul and Amiruzzaman, Md and Nasim, Shahriar and Shin, Jungpil}, TITLE = {Smoke Object Segmentation and the Dynamic Growth Feature Model for Video-Based Smoke Detection Systems}, JOURNAL = {Symmetry}, VOLUME = {12}, YEAR = {2020}, NUMBER = {7}, ARTICLE-NUMBER = {1075}, URL = {https://www.mdpi.com/2073-8994/12/7/1075}, ISSN = {2073-8994}, ABSTRACT = {This article concerns smoke detection in the early stages of a fire. Using the computer-aided system, the efficient and early detection of smoke may stop a massive fire incident. Without considering the multiple moving objects on background and smoke particles analysis (i.e., pattern recognition), smoke detection models show suboptimal performance. To address this, this paper proposes a hybrid smoke segmentation and an efficient symmetrical simulation model of dynamic smoke to extract a smoke growth feature based on temporal frames from a video. In this model, smoke is segmented from the multi-moving object on the complex background using the Gaussian’s Mixture Model (GMM) and HSV (hue-saturation-value) color segmentation to encounter the candidate smoke and non-smoke regions in the preprocessing stage. The preprocessed temporal frames with moving smoke are analyzed by the dynamic smoke growth analysis and spatial-temporal frame energy feature extraction model. In dynamic smoke growth analysis, the temporal frames are segmented in blocks and the smoke growth representations are formulated from corresponding blocks. Finally, the classifier was trained using the extracted features to classify and detect smoke using a Radial Basis Function (RBF) non-linear Gaussian kernel-based binary Support Vector Machine (SVM). For validating the proposed smoke detection model, multi-conditional video clips are used. The experimental results suggest that the proposed model outperforms state-of-the-art algorithms.}, DOI = {10.3390/sym12071075}, publisher={MDPI} } @INPROCEEDINGS{9044257, author={Amiruzzaman, Md and Jamonnak, Suphanut}, booktitle={2020 6th Conference on Data Science and Machine Learning Applications (CDMA)}, title={Multi-dimensional Skyline Query to Find Best Shopping Mall for Customers}, year={2020}, volume={}, number={}, pages={71-76}, abstract={This paper presents a new application for multidimensional Skyline query. The idea presented in this paper can be used to find best shopping malls based on users requirements. A web-based application was used to simulate the problem and proposed solution. Also, a mathematical definition was developed to define the problem and show how multi-dimensional Skyline query can be used to solve complex problems, such as, finding shopping malls using multiple different criteria. The idea of this paper can be used in other fields, where different criteria should be considered.}, keywords={}, doi={10.1109/CDMA47397.2020.00018}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/abstract/document/9044257}, ISSN={}, month={March},} @INPROCEEDINGS{9071138, author={Amiruzzaman, Md and Nor, Rizal Mohd}, booktitle={2020 7th International Conference on Signal Processing and Integrated Networks (SPIN)}, title={Hide Secret Information in Blocks: Minimum Distortion Embedding}, year={2020}, volume={}, number={}, pages={107-112}, abstract={In this paper, a new steganographic method is presented that provides minimum distortion in the stego image. The proposed encoding algorithm focused on DCT rounding error and optimized that in a way to reduce distortion in the stego image, and the proposed algorithm produces less distortion than existing methods (e.g., F5 algorithm). The proposed method is based on DCT rounding error which helped to lower distortion and higher embedding capacity.}, keywords={}, doi={10.1109/SPIN48934.2020.9071138}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/abstract/document/9071138}, ISSN={2688-769X}, month={Feb},} @Article{s20236990, AUTHOR = {Ahmed Bhuiyan, Rasel and Ahmed, Nadeem and Amiruzzaman, Md and Islam, Md Rashedul}, TITLE = {A Robust Feature Extraction Model for Human Activity Characterization Using 3-Axis Accelerometer and Gyroscope Data}, JOURNAL = {Sensors}, VOLUME = {20}, YEAR = {2020}, NUMBER = {23}, ARTICLE-NUMBER = {6990}, URL = {https://www.mdpi.com/1424-8220/20/23/6990}, ISSN = {1424-8220}, ABSTRACT = {Human Activity Recognition (HAR) using embedded sensors in smartphones and smartwatch has gained popularity in extensive applications in health care monitoring of elderly people, security purpose, robotics, monitoring employees in the industry, and others. However, human behavior analysis using the accelerometer and gyroscope data are typically grounded on supervised classification techniques, where models are showing sub-optimal performance for qualitative and quantitative features. Considering this factor, this paper proposes an efficient and reduce dimension feature extraction model for human activity recognition. In this feature extraction technique, the Enveloped Power Spectrum (EPS) is used for extracting impulse components of the signal using frequency domain analysis which is more robust and noise insensitive. The Linear Discriminant Analysis (LDA) is used as dimensionality reduction procedure to extract the minimum number of discriminant features from envelop spectrum for human activity recognition (HAR). The extracted features are used for human activity recognition using Multi-class Support Vector Machine (MCSVM). The proposed model was evaluated by using two benchmark datasets, i.e., the UCI-HAR and DU-MD datasets. This model is compared with other state-of-the-art methods and the model is outperformed.}, DOI = {10.3390/s20236990}, publisher ={MDPI} } @article{https://doi.org/10.1111/cgf.13995, author = {Ma, Chao and Zhao, Ye and AL-Dohuki, Shamal and Yang, Jing and Ye, Xinyue and Kamw, Farah and Amiruzzaman, Md}, title = {GTMapLens: Interactive Lens for Geo-Text Data Browsing on Map}, journal = {Computer Graphics Forum}, volume = {39}, number = {3}, pages = {469-481}, keywords = {CCS Concepts, • Information Systems → Information Interfaces and Presentation; Information Systems Applications}, doi = {https://doi.org/10.1111/cgf.13995}, url = {https://onlinelibrary.wiley.com/doi/abs/10.1111/cgf.13995}, eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1111/cgf.13995}, abstract = {Abstract Data containing geospatial semantics, such as geotagged tweets, travel blogs, and crime reports, associates natural language texts with geographical locations. This paper presents a lens-based visual interaction technique, GTMapLens, to flexibly browse the geo-text data on a map. It allows users to perform dynamic focus+context exploration by using movable lenses to browse geographical regions, find locations of interest, and perform comparative and drill-down studies. Geo-text data is visualized in a way that users can easily perceive the underlying geospatial semantics along with lens moving. Based on a requirement analysis with a cohort of multidisciplinary domain experts, a set of lens interaction techniques are developed including keywords control, path management, context visualization, and snapshot anchors. They allow users to achieve a guided and controllable exploration of geo-text data. A hierarchical data model enables the interactive lens operations by accelerated data retrieval from a geo-text database. Evaluation with real-world datasets is presented to show the usability and effectiveness of GTMapLens.}, year = {2020}, publisher="Wiley" } @inproceedings{wu2020interactive, booktitle = {EuroVis Workshop on Visual Analytics (EuroVA)}, editor = {Turkay, Cagatay and Vrotsou, Katerina}, title = {{Interactive Visualization of AI-based Speech Recognition Texts}}, author = {Wu, Tsung Heng and Zhao, Ye and Amiruzzaman, Md}, year = {2020}, publisher = {The Eurographics Association}, ISSN = {2664-4487}, ISBN = {978-3-03868-116-8}, DOI = {10.2312/eurova.20201091}, url = {https://diglib.eg.org/handle/10.2312/eurova20201091} } @phdthesis{amiruzzaman2019assessing, title={Assessing the psychometric properties of newly developed behavior and attitude Twitter scales: A validity and reliability study}, author={Amiruzzaman, Md}, year={2019}, school={Kent State University}, url = {http://rave.ohiolink.edu/etdc/view?acc_num=kent1572861573752847}, } @phdthesis{amiruzzaman2016exploring, title={Exploring preservice teachers' understanding of measures of central tendency}, author={Amiruzzaman, Md}, year={2016}, school={Kent State University}, url = {http://rave.ohiolink.edu/etdc/view?acc_num=kent1618904789316283}, } @InProceedings{10.1007/978-3-030-02686-8_23, author="Amiruzzaman, Md", editor="Arai, Kohei and Bhatia, Rahul and Kapoor, Supriya", title="Prediction of Traffic-Violation Using Data Mining Techniques", booktitle="Proceedings of the Future Technologies Conference (FTC) 2018", year="2019", publisher="Springer International Publishing", address="Cham", pages="283--297", abstract="This paper presents the prediction of traffic-violations using data mining techniques, more specifically, when most likely a traffic-violation may happen. Also, the contributing factors that may cause more damages (e.g., personal injury, property damage, etc.) are discussed in this paper. The national database for traffic-violation was considered for the mining and analyzed results indicated that a few specific times are probable for traffic-violations. Moreover, most accidents happened on specific days and times. The findings of this work could help prevent some traffic-violations or reduce the chance of occurrence. These results can be used to increase cautions and traffic-safety tips.", isbn="978-3-030-02686-8", doi = "10.1007/978-3-030-02686-8_23" } @mastersthesis{amiruzzaman2011steganographic, title={Steganographic covert communication channels and their detection}, author={Amiruzzaman, Md}, year={2011}, school={Kent State University}, url = {http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218} } @Thesis{amiruzzaman2005fingerprintnational, title={Fingerprint authentication system using neural networks}, author={Amiruzzaman, Md}, year={2005}, school={National University}, url = {} } @mastersthesis{amiruzzaman2008embeddedsejong, title={The design and implementation of the embedded network-engine for Video on Demand (VoD)}, author={Amiruzzaman, Md}, year={2008}, school={Sejong University}, url = {} } @InProceedings{10.1007/978-3-642-17578-7_16, author="Amiruzzaman, Md and Abdullah-Al-Wadud, M. and Chung, Yoojin", editor="Kim, Tai-hoon and Kim, Haeng-Kon and Khan, Muhammad Khurram and Kiumi, Akingbehin and Fang, Wai-chi and {\'{S}}l{\k{e}}zak, Dominik", title="Minimum Distortion Data Hiding", booktitle="Advances in Software Engineering", year="2010", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="151--163", abstract="In this paper a new steganographic method is presented with minimum distortion, and better resistance against steganalysis. There are two ways to control detectability of stego message: one is less distortion, and another is less modification. Concerning the less distortion, this paper focuses on DCT rounding error, and optimizes the rounding error in a very easy way, resulting stego image has less distortion than other existing methods. The proposed method compared with other existing popular steganographic algorithms, and the proposed method achieved better performance. This paper considered the DCT rounding error for lower distortion with possibly higher embedding capacity.", isbn="978-3-642-17578-7", doi = "10.1007/978-3-642-17578-7_16" } @INPROCEEDINGS{1307869, author={Hossain, N. and Alma, M.G.R. and Amiruzzaman, M. and Quadir, S.M.M.}, booktitle={Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004.}, title={An efficient merge sort technique that reduces both times and comparisons}, year={2004}, volume={}, number={}, pages={537-538}, abstract={We proposed a new but simple and efficient merge sort technique. This method has several advantages on performance over previous merge sort technique. This technique divides the whole data as like divided and conquer method but until two elements in a group instead of one in each group like traditional merge sort by [D. E. Knuth (1973)]. Then solves the divided parts and conquers them. The resulting efficiency of this method is that the division of problem is much less then the previous method, so the recursive call is also less. As a result we have less comparison and less computational time.}, keywords={}, doi={10.1109/ICTTA.2004.1307869}, publisher = {IEEE}, url = {https://ieeexplore.ieee.org/abstract/document/9318786}, ISSN={}, publisher = {IEEE}, month={April},} @article{md2010covert, title={Covert Channel Communication by Betterment Steganography}, author={Amiruzzaman, Md and Peyravi, Hassan and Abdullah-Al-Wadud, M and Chung, Yoojin}, journal={International Journal of Multimedia and Ubiquitous Engineering}, volume={5}, number={3}, pages={1--14}, year={2010}, url ={https://gvpress.com/journals/IJMUE/vol5_no3/1.pdf} } @InProceedings{10.1007/978-3-642-13365-7_5, author="Amiruzzaman, Md and Abdullah-Al-Wadud, M. and Chung, Yoojin", editor="Bandyopadhyay, Samir Kumar and Adi, Wael and Kim, Tai-hoon and Xiao, Yang", title="An Analysis of Syndrome Coding", booktitle="Information Security and Assurance", year="2010", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="37--50", abstract="In this paper a detail analysis is presented based on BCH syndrome coding for covert channel data hiding methods. The experimented technique is nothing but a syndrome coding algorithm with a coset based approach, analyzed results are showing that the examined method has more flexibility to choose coset, also providing less modification distortion caused by data hiding. Analyzed method presented by clear mathematical way. As it is mathematical equation dependent, hence analyzed results are showing that the analyzed method has fast computation ability and find perfect roots for modification.", isbn="978-3-642-13365-7", doi = "10.1007/978-3-642-13365-7_5" } @InProceedings{10.1007/978-3-642-13577-4_18, author={Amiruzzaman, Md and Peyravi, Hassan and Abdullah-Al-Wadud, M. and Chung, Yoojin}, editor={Kim, Tai-hoon and Adeli, Hojjat}, title={Concurrent Covert Communication Channels}, booktitle={Advances in Computer Science and Information Technology}, year={2010}, publisher={Springer Berlin Heidelberg}, address="Berlin, Heidelberg", pages={203--213}, abstract={This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8{\texttimes}8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a single bit of information. A receiver can decode its independent hidden data using its dedicated key. The distortion of the covert channel data is controlled by minimizing the round-off error of the JPEG image. The method tries to keep the coefficients of the original histogram intact while carrying hidden bits. The method is immune against first order statistical detection.}, isbn={978-3-642-13577-4}, doi = "10.1007/978-3-642-13577-4_18" } @InProceedings{10.1007/978-3-642-10619-4_22, author="Amiruzzaman, Md and Peyravi, Hassan and Abdullah-Al-Wadud, M. and Chung, Yoojin", editor="{\'{S}}l{\k{e}}zak, Dominik and Kim, Tai-hoon and Kiumi, Akingbehin and Jiang, Tao and Verner, June and Abrah{\~a}o, Silvia", title="An Improved Steganography Covert Channel", booktitle="Advances in Software Engineering", year="2009", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="176--187", abstract="An improved steganographic method is proposed in this paper. Two distinct methods are combined to achieve possibly high data hiding capability with high visual quality. The proposed method shifts the last n nonzero AC coefficients from S JPEG block, and changes the magnitude values of the first n nonzero AC coefficients from T JPEG blocks. S and T blocks are determined by the number of nonzero JPEG coefficients in the block. Zero run-length modification method improves the robustness against statistical attack based on magnitude histogram. Magnitude modification method improves the visual quality. This combination complements each other.", isbn="978-3-642-10619-4", doi = "10.1007/978-3-642-10619-4_22" } @inproceedings{kim2008improved, title={An Improved Steganographic Method.}, author={Kim, Hyoung-Joong and Amiruzzaman, Md}, booktitle={SIGMAP}, pages={145--150}, year={2008}, doi = {10.5220/0001938901450150} } @INPROCEEDINGS{4721339, author={Amiruzzaman, Md and Kim, Hyoung Joong}, booktitle={2008 Advanced Software Engineering and Its Applications}, title={A Health-Care Service for Mobile Computing}, year={2008}, volume={}, number={}, pages={190-193}, doi={10.1109/ASEA.2008.28}, url = {https://ieeexplore.ieee.org/document/4721339}, publisher={IEEE} } @INPROCEEDINGS{4743406, author={Md Amiruzzaman and Hyoung Joong Kim}, booktitle={2008 5th International Conference on Visual Information Engineering (VIE 2008)}, title={Secure steganographic method}, year={2008}, volume={}, number={}, pages={141-145}, abstract={A new data hiding method completely secure against the first-order statistical attack is proposed. This method separates the selective and non-selective blocks first, selects the selective blocks next, and shifts the position of last non-zero AC coefficients to embed secret messages. Even after hiding data, non-zero JPEG coefficients remain unchanged. Since this method does not change the AC coefficients, but changes their positions, the produced histogram of the image after data hiding remains the same as that of original image.}, keywords={}, doi={10.1049/cp:20080298}, ISSN={0537-9989}, month={July}, url = {https://ieeexplore.ieee.org/document/4743406}, publisher={IEEE} } @INPROCEEDINGS{4743420, author={Hyoung Joong Kim and So Young Kim and In-Kwon Yeo and Md Amiruzzaman}, booktitle={2008 5th International Conference on Visual Information Engineering (VIE 2008)}, title={Mathematical performance evaluation tool for image hash generation functions}, year={2008}, volume={}, number={}, pages={221-226}, abstract={Image hash as a descriptor or identifier can be used to measure similarity in images. Among all image hash functions, a histogram-based method shows better robustness to common signal processing operations and various geometric attacks. In this paper, performance of this method is improved by utilizing histogram generation method. Histogram with equal population improves the performance slightly. In order to compare performance of image hash generation functions, a statistical tool is provided. The proposed tool will help to evaluate the performance of image hash generator functions.}, keywords={}, doi={10.1049/cp:20080312}, ISSN={0537-9989}, month={July}, url = {https://ieeexplore.ieee.org/document/4743420}, publisher={IEEE} } %%%%%%%%%%%%%%%%%%% @article{md2008embedded, title={An Embedded Multi-Agent Based Healthcare Service with Two-way Handshaking Mode}, author={Md, Amiruzzaman and Kim, Hyoung-Joong}, journal={Journal of the Institute of Electronics Engineers of Korea CI}, volume={45}, number={5}, pages={155--161}, year={2008}, publisher={The Institute of Electronics and Information Engineers}, url = {https://www.koreascience.or.kr/article/JAKO200835054208473.pdf}, } @inproceedings{son2007network, title={The Network Engine Research and Development for Wireless based on Online Game}, author={Son, Sung-Ok and Amiruzzaman, Md and No, Jae-Chun}, booktitle={Proceedings of the Korean Information Science Society Conference}, pages={243--246}, year={2007}, organization={Korean Institute of Information Scientists and Engineers}, url = {https://www.koreascience.or.kr/article/CFKO200724737420271.pdf}, } @inproceedings{md2007embedded, title={An Embedded Network-Engine for Video On Demand Service}, author={Md Amiruzzaman and Son, Sung-Ok and No, Jae-Chun}, booktitle={Proceedings of the Korean Information Science Society Conference}, pages={145--148}, year={2007}, organization={Korean Institute of Information Scientists and Engineers}, url = {https://www.koreascience.or.kr/article/CFKO200724737417225.pdf}, } @article{wadud2008bottom, title={A bottom-up mergesort eliminating recursion}, author={Wadud, M and Amiruzzaman, Md and Chae, Oksam}, year={2008}, publisher={Daffodil International University}, journal = {DIU Journal of Science and Technology}, volume = "3", number = "1", pages = "59--64", issn = {2408-8498}, url = {http://hdl.handle.net/20.500.11948/464} } @article{amiruzzaman2008embedded, title={An embedded network-engine}, author={Amiruzzaman, Md}, year={2008}, publisher={Daffodil International University}, journal = {DIU Journal of Science and Technology}, volume = "3", number = "2", pages = "13--19", issn = {2408-8498}, url = {http://hdl.handle.net/20.500.11948/472} } @article{zhang2008new, title={A New Steganographic Method with Minimum Distortion}, author={Zhang, Rongyue and Md, Amiruzzaman and Kim, Hyoung-Joong}, journal={한국정보통신설비학회: 학술대회논문집}, pages={201--204}, year={2008}, publisher={Korea Institute of Information and Telecommunication Facilities Engineering}, url = {https://www.koreascience.or.kr/article/CFKO200831559920814.pdf}, } @article{md2008study, title={A Study on Steganographic Methods and Its Applications}, author={Md, Amiruzzaman and Kim, Hyoung-Joong}, journal={한국정보통신설비학회: 학술대회논문집}, pages={193--196}, year={2008}, publisher={Korea Institute of Information and Telecommunication Facilities Engineering}, url = {https://www.koreascience.or.kr/article/CFKO200831559920811.pdf}, } @inproceedings{sohel2003fingerprint, title={Fingerprint authentication system using back-propagation}, author={Sohel, Ferdous Ahmed and Amiruzzaman, M}, year={2003}, booktitle={Proceedings of International Conference on Computers and Information technology, ICCIT-03}, pages={722--725}, organization={ICCIT}, url = {https://researchrepository.murdoch.edu.au/id/eprint/28572/1/fingerprint_authentication.pdf}, } @INPROCEEDINGS{9642542, author={Islam, Mahnaz Rafia and Jenny, Israt Jahan and Nayon, Moniruzzaman and Islam, Md. Rajibul and Amiruzzaman, Md and Abdullah-Al-Wadud, M.}, booktitle={2021 International Conference on Science Contemporary Technologies (ICSCT)}, title={Clustering Algorithms to Analyze the Road Traffic Crashes}, year={2021}, volume={}, number={}, pages={1--6}, abstract={Selecting an appropriate clustering method as well as an optimal number of clusters in road accident data is at times confusing and difficult. This paper analyzes shortcomings of different existing techniques applied to cluster accident-prone areas and recommends using Density-Based Spatial Clustering of Applications with Noise (DBSCAN) and Ordering Points To Identify the Clustering Structure (OPTICS) to overcome them. Comparative performance analysis based on real-life data on the recorded cases of road accidents in North Carolina also show more effectiveness and efficiency achieved by these algorithms.}, keywords={}, doi={10.1109/ICSCT53883.2021.9642542}, url = {https://ieeexplore.ieee.org/document/9642542}, publisher={IEEE}, ISSN={}, month={Aug}, } @misc{bhat2021methodology, title={Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application}, author={Bhat, Asif and Nor, Rizal Mohd and Amiruzzaman, Md and Islam, Md and others}, journal={arXiv preprint arXiv:2107.14140}, year={2021}, url = {https://arxiv.org/abs/2107.14140}, publisher = {ArXiv} } @article{bhatblockchain, title={Blockchain letter of credit: A transaction-level analysis}, author={Bhat, Asif and Nor, Rizal Mohd and Amiruzzaman, Md}, journal={Journal of Engineering Science and Technology}, pages={120--136}, year={2021}, publisher={School of Engineering, Taylor's University}, url = {http://jestec.taylors.edu.my/Special%20Issue%20I%20ACSAT%202021.htm}, } @incollection{kosko2018grow, title={Growing in number: Research on mathematical teaching and learning in the online setting}, author={Kosko, Karl W and Sobolewski-McMahon, Lauren and Amiruzzaman, Md}, booktitle={Handbook of research on K-12 online and blended learning}, pages={289--302}, year={2018}, publisher={Pittsburgh, PA: ETC Press}, doi = {https://www.doi.org/10.1184/R1/6686813}, isbn = {9781387704156}, editor = {Kathryn Kennedy and Richard E. Ferdig} } @incollection{kosko2014few, title={Few in number: Research on mathematical teaching and learning in the online setting}, author={Kosko, Karl W and Sobolewski-McMahon, Lauren and Amiruzzaman, Md}, booktitle={Handbook of research on K-12 online and blended learning}, pages={163--177}, year={2014}, publisher={Pittsburgh, PA: ETC Press}, doi = {https://www.doi.org/10.1184/R1/6686810}, isbn = {9781312587083}, editor = {Richard E. Ferdig and Kathryn Kennedy} } @ARTICLE{9555830, author={Jamonnak, Suphanut and Zhao, Ye and Huang, Xinyi and Amiruzzaman, Md}, journal={IEEE Transactions on Visualization and Computer Graphics}, title={Geo-Context Aware Study of Vision-Based Autonomous Driving Models and Spatial Video Data}, year={2022}, volume={28}, number={1}, pages={1019-1029}, abstract={Vision-based deep learning (DL) methods have made great progress in learning autonomous driving models from large-scale crowd-sourced video datasets. They are trained to predict instantaneous driving behaviors from video data captured by on-vehicle cameras. In this paper, we develop a geo-context aware visualization system for the study of Autonomous Driving Model (ADM) predictions together with large-scale ADM video data. The visual study is seamlessly integrated with the geographical environment by combining DL model performance with geospatial visualization techniques. Model performance measures can be studied together with a set of geospatial attributes over map views. Users can also discover and compare prediction behaviors of multiple DL models in both city-wide and street-level analysis, together with road images and video contents. Therefore, the system provides a new visual exploration platform for DL model designers in autonomous driving. Use cases and domain expert evaluation show the utility and effectiveness of the visualization system.}, keywords={}, doi={10.1109/TVCG.2021.3114853}, url = {https://ieeexplore.ieee.org/document/9555830}, publisher={IEEE}, ISSN={1941-0506}, month={Jan},} @INPROCEEDINGS{9667925, author={Amiruzzaman, Md and Rahman, Rashik and Islam, Md. Rajibul and Nor, Rizal Mohd}, booktitle={2021 5th International Conference on Electrical Engineering and Information Communication Technology (ICEEICT)}, title={Evaluation of DBSCAN algorithm on different programming languages: An exploratory study}, year={2021}, volume={}, number={}, pages={1-6}, abstract={DBSCAN is a well-known clustering algorithm that is often used to find associations and structures in large spatial data. Due to its popularity, built-in functions for DBSCAN have been implemented on top of many different programming languages. Researchers and practitioners (i.e., data scientists) have been using these built-in functions to cluster and analyze a prolific area of research in data science. Due to the many implementations of DBSCAN and its utilization in many different languages, the output of each built-in DBSCAN function is assumed to be identical. In this paper, we present a systematic approach to evaluate the built-in functions of DBSCAN algorithms and to identify discrepancies in their output. The evidence from the study shows that there are some discrepancies and recommends caution in dealing with built-in functions.}, keywords={}, doi={10.1109/ICEEICT53905.2021.9667925}, url = {https://ieeexplore.ieee.org/document/9667925}, publisher={IEEE}, ISSN={}, month={Nov},} @INPROCEEDINGS{Amiruzzaman2020PreserviceMT, title={Preservice mathematics teachers understanding of mode}, author={Md Amiruzzaman and Karl W. Kosko and Stefanie Amiruzzaman}, booktitle={Proceedings of the 39th annual meeting of the North American Chapter of the International Group for the Psychology of Mathematics Education}, year={2017}, publisher={PMENA}, } @INPROCEEDINGS{Amiruzzaman2020ExploringSU, title={Exploring students' understanding of median}, author={Md Amiruzzaman and Karl W. Kosko}, booktitle={Proceedings of the 38th annual meeting of the North American Chapter of the International Group for the Psychology of Mathematics Education}, year={2016}, publisher={PMENA}, } @INPROCEEDINGS{9706544, author={Bhat, Asif and Nor, Rizal Mohd. and Mansor, Hafizah and Amiruzzaman, Md}, booktitle={2021 International Conference on Cyber Security and Internet of Things (ICSIoT)}, title={Leveraging Decentralized Internet of Things (IoT) and Blockchain Technology in International Trade}, year={2021}, volume={}, number={}, pages={1-6}, abstract={Supply chains in the modern era have developed into very complex value networks and have become a critical source of competitive advantage. Verifying the origin of raw materials and maintaining visibility of goods and merchandise as they move through the value chain network is difficult. The Internet of Things (IoT) application may assist businesses in observing, tracking, and monitoring items, activities, and processes inside their value chain networks. Both blockchain and Internet of Things technologies have the potential to accelerate the implementation of Industry 4.0 and transform foreign trade procedures. Integrated technology utilization may be a component of the answer to this future. This paper’s contribution is to demonstrate how the marriage of Blockchain technology with IoT infrastructure may simplify and enhance contemporary supply chains in a variety of ways. Such as increasing scalability, security, immutability, and auditing, as well as information flows, traceability, and interoperability, and quality, using Ping Asset devices and Chainlink, and so setting the groundwork for future research projects.}, keywords={}, doi={10.1109/ICSIoT55070.2021.00010}, url = {https://ieeexplore.ieee.org/document/9706544}, publisher={IEEE}, ISSN={}, month={Dec},} @InProceedings{dbhati2021mobile, author="Bhati, Deepshikha and Amiruzzaman, Md and Jamonnak, Suphanut and Zhao, Ye", editor="Kim, Jong-Hoon and Singh, Madhusudan and Khan, Javed and Tiwary, Uma Shanker and Sur, Marigankar and Singh, Dhananjay", title="Interactive Visualization and Capture of Geo-Coded Multimedia Data on Mobile Devices", booktitle="Intelligent Human Computer Interaction", year="2022", publisher="Springer International Publishing", address="Cham", pages="260--271", abstract="In digital community applications, geo-coded multimedia data including spatial videos, speech, and geo-narratives are collected and utilized by community users and researchers from multiple fields. It is often preferred that these data can be captured, visualized, and explored directly on mobile phones and tablets interactively. In this paper, we present a Geo-Video Mobile Application (GVM App) that collects geo-coded multimedia data for experts to process and analyze over an interactive visual exploration. This mobile App integrates user interactivity, AI-based semantic image segmentation, and audio transcription for effective data extraction and utilization. Then visualization functions are designed to quickly present geographical, semantic, and street view visual information for knowledge discovery. The users of this tool can include community workers, teachers, and tourists, and also span across multiple social disciplines in digital humanity studies.", isbn="978-3-030-98404-5", doi={https://doi.org/10.1007/978-3-030-98404-5_25}, url={https://link.springer.com/chapter/10.1007/978-3-030-98404-5_25} } @INPROCEEDINGS{9730236, author={Amiruzzaman, Stefanie and Amiruzzaman, Md}, booktitle={2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)}, title={Students' Academic Performance Multitasking and Digital Social-Networking using Twitter}, year={2021}, volume={}, number={}, pages={863-866}, abstract={For almost a decade, Twitter use and its impact on academic achievement has been explored by many researchers. Despite the growing scholarly interest, studies have been correlational and exploratory in nature. The purpose of this study is to develop the Twitter and Scholastic Synchronicity Scale (TSSS) and the Twitter and Scholastic Apportionment Assessment (TSAA) to measure the impact of perceived Twitter use on students' scholastic achievement. Undergraduate and graduate students ($\mathrm{N}=326$ ) responded to a set of items that was created from qualitative research findings. The descriptive statistics, the factor structure, and internal consistency reliability for the overall measure and subscales were reported. The psychometric results of the scales reported high internal consistency and three- and two-factor structures. This study not only develops the scales to measure the effect of Twitter use among students, but also checks the reliability and validity of the newly developed scales.}, keywords = {social networking (online);blogs;big data;multitasking;reliability}, doi = {10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00143}, url = {https://doi.ieeecomputersociety.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00143}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, month = {oct}} @article{Jamonnak2022VisualCommunity, title={VisualCommunity: a platform for archiving and studying communities}, author={Jamonnak, Suphanut and Bhati, Deepshikha and Amiruzzaman, Md and Zhao, Ye and Ye, Xinyue and Curtis, Andrew}, journal={Journal of computational social science}, year={2022}, doi = {https://doi.org/10.1007/s42001-022-00170-y}, url = {https://link.springer.com/article/10.1007/s42001-022-00170-y}, publisher={Springer} } @article{amiruzzaman2022dbscanmist, author = {Amiruzzaman, Md and Rahman, Rashik and Islam, Md. Rajibul and Nor, Rizal Mohd}, title = {Logical analysis of Built-in DBSCAN Functions in Popular Data Science Programming Languages}, journal = {MIST International Journal of Science and Technology (MIJST)}, year = {2022}, volume = {10}, number = {1}, pages = {25--32}, month = May, issn = {2224-2007}, url = {https://mijst.mist.ac.bd/mijst/index.php/mijst/index}, doi = {https://doi.org/10.47981/j.mijst.10(01)2022.349(25-32)}, } @InProceedings{doi:10.2514/6.2022-3416, author = {David Sheets and Md Amiruzzaman and D. Blake Stringer and Brian Neff and Ye Zhao}, title = {AVES: A data-driven approach for airman certification}, booktitle = {AIAA AVIATION 2022 Forum}, year = {2022}, chapter = {}, pages = {1--14}, doi = {10.2514/6.2022-3416}, URL = {https://arc.aiaa.org/doi/abs/10.2514/6.2022-3416}, eprint = {https://arc.aiaa.org/doi/pdf/10.2514/6.2022-3416}, presentation = {https://doi.org/10.2514/6.2022-3416.vid}, abstract = { View Video Presentation: https://doi.org/10.2514/6.2022-3416.vidAirman certification training relies on post-flight debriefing conducted between flight instructor and student, which is a review of the flight using observations from hand-written notes and the collective memory of the two persons on board. Data-driven visualizations have yet to be fully incorporated into the flight training process. The Airman Visual Evaluation System (AVES) applies a data-driven approach to support airman certification training by processing data recorded from common avionics systems such as the Garmin G1000. Maneuvers, e.g. steep turns, are decomposed into a hierarchical definition including task, sub-task, and related components according to available data. Each level in the hierarchy defines a related event detectable within the data. At the top-level of the hierarchy are points where an instructor may wish to review with a student while lower levels of the hierarchy support the review with additional information. Performance measurements are associated with each event to be captured from the data. Visual analytics approaches are applied to convey the events and related performance information including 2D and 3D views of flight replay, event timelines, performance related visualizations. The visualizations are provided in an interactive application to convey the information. User studies are conducted to identify and measure value within airman certification programs. } } @article{asif2022methodology, author = {Asif Bhat and Rizal Mohd Nor and Md Amiruzzaman and Md. Rajibul Islam}, title = {Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application}, journal = {International Journal on Perceptive and Cognitive Computing (IJPCC)}, year = {2022}, volume = {8}, number = {2}, pages = {37--42}, month = July, issn = {2462-229X}, url = {https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/313}, doi = {https://doi.org/10.31436/ijpcc.v8i2}, } @article{Amiruzzaman2022ReBiCTE, author = "Amiruzzaman, Md", title = "A Survey on Steganography and Steganalysis Techniques in Secret Communication", journal = "Reasearch Briefs on Informationm & Communication Technology Evolution ", year = "2022", volume = "8", number = "7", pages = "1--17", issn = {2383-9201}, doi = "10.22667/ReBiCTE.2022.08.31.007", url = "http://dx.doi.org/10.22667/ReBiCTE.2022.08.31.007" } @Article{socsci11090404, AUTHOR = {Amiruzzaman, Stefanie and Amiruzzaman, Md}, TITLE = {Use of Twitter among College Students for Academics: A Mixed-Methods Approach}, JOURNAL = {Social Sciences}, VOLUME = {11}, YEAR = {2022}, NUMBER = {9}, ARTICLE-NUMBER = {404}, URL = {https://www.mdpi.com/2076-0760/11/9/404}, ISSN = {2076-0760}, ABSTRACT = {For almost a decade, Twitter use and its impact on students’ academic performance have been explored by many researchers. Despite growing scholarly interest, studies have been mostly quantitative in nature. The findings of previous studies are conflicting; thus, an in-depth study is needed to determine how and what impacts college students’ academic performance (i.e., GPA) when they spend time on Twitter. The purpose of this study was to understand the effects of Twitter use on college students’ academic performance. The present study shows that individual analysis techniques, such as quantitative or qualitative tools, are not enough to understand the underlying relationship. Therefore, a mixed-method approach (i.e., correlation and discourse analysis) was used to analyze the research data. Undergraduate students responded (N = 498) to a set of items along with some open-ended questions (n = 121). The results of this study indicate that how students use Twitter matters more than the amount of time they spend using it for their studies.}, DOI = {10.3390/socsci11090404} } @ARTICLE{jisis22-12-3-01, Author = {Md Amiruzzaman and Mahnaz Rafia Islam and Md. Rajibul Islam and Rizal Mohd Nor}, title = {Analysis of COVID-19: An infectious disease spread}, journal = {Journal of Internet Services and Information Security (JISIS)}, volume = {12}, number = {3}, year = {2022}, month = {August}, pages = {1--15}, ISSN ={2182-2077}, URL = {http://dx.doi.org/10.22667/JISIS.2022.08.31.001}, DOI = {10.22667/JISIS.2022.08.31.001} } @INPROCEEDINGS{9927881, author={Amiruzzaman, Stefanie and Amiruzzaman, Md}, booktitle={2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)}, title={Explore the Relationships Between Students’ Academic Performance, Use of Twitter, and Academic Majors using Hierarchical Linear Modeling}, year={2022}, volume={}, number={}, pages={1-6}, abstract={Social media use among students is increasing day by day, and so does its effects on students’ academic achievement (i.e., Grade Point Average). The relationship between students’ GPA and the use of social media (e.g., Twitter) is not straightforward, because of the hierarchical nature of the data. There is a gap in research that explores the relationship between students’ academic achievement considering hierarchical perspectives. This study attempts to find the relationship between students’ use of Twitter and their GPA. In addition, how their major is related to their use of Twitter. The results suggest that the relationship between Twitter use and students’ academic majors is related. Students from STEM majors have a positive effect than students from social sciences.}, keywords={}, doi={10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927881}, URL = {https://ieeexplore.ieee.org/document/9927881}, ISSN={}, month={Sep.}, publisher = {IEEE Computer Society}, } @article{amiruzzaman2022ai, title={An AI-based framework for studying visual diversity of urban neighborhoods and its relationship with socio-demographic variables}, author={Amiruzzaman, Md and Zhao, Ye and Amiruzzaman, Stefanie and Karpinski, Aryn C and Wu, Tsung Heng}, journal={Journal of Computational Social Science}, volume = {6}, pages={315-337}, year={2023}, doi = {https://doi.org/10.1007/s42001-022-00197-1}, publisher={Springer} } @article{rajibulislam2022hyperparameters, title={An Efficient Technique for Recognizing Tomato Leaf Disease Based on the Most Effective Deep CNN Hyperparameters}, author={Md. Rajibul Islam and Md. Asif Mahmod Tusher Siddique and Md Amiruzzaman and M. Abdullah-Al-Wadud and Shah Murtaza Rashid Al Masud and Aloke Kumar Saha}, journal={Annals of Emerging Technologies in Computing (AETiC)}, volume = {7}, number = {1}, pages={1-14}, doi = {https://doi.org/10.33166/AETiC.2023.01.001}, url = {http://aetic.theiaer.org/archive/v7/v7n1/p1.html}, year={2023}, publisher ={International Association for Educators and Researchers (IAER)} } @Article{computers12030050, AUTHOR = {Salleh, Marhanum Che Mohd and Nor, Rizal Mohd and Yusof, Faizal and Amiruzzaman, Md}, TITLE = {Constructing a Shariah Document Screening Prototype Based on Serverless Architecture}, JOURNAL = {Computers}, VOLUME = {12}, YEAR = {2023}, NUMBER = {3}, ARTICLE-NUMBER = {50}, doi = {https://doi.org/10.3390/computers12030050}, url = {https://www.mdpi.com/2073-431X/12/3/50}, ISSN = {2073-431X}, ABSTRACT = {The aim of this research is to discuss the groundwork of building an Islamic Banking Document Screening Prototype based on a serverless architecture framework. This research first forms an algorithm for document matching based Vector Space Model (VCM) and adopts Levenshtein Distance for similarity setting. Product proposals will become a query, and policy documents by the central bank will be a corpus or database for document matching. Both the query and corpus went through preprocessing stage prior to similarity analysis. One set of queries with two sets of corpora is tested in this research to compare similarity values. Finally, a prototype of Shariah Document Screening is built based on a serverless architecture framework and ReactJS interface. This research is the first attempt to introduce a Shariah document screening prototype based on a serverless architecture technology that would be useful to the Islamic financial industry towards achieving a Shariah-compliant business. Given the development of Fintech, the output of this research study would be a complement to the existing Fintech applications, which focus on ensuring the Islamic nature of the businesses.}, DOI = {10.3390/computers12030050} } @article{rini2023predicting, title={Predicting Optimum Lockdown Pattern of Epidemic Spread Using AI Techniques}, author={Rini, Fariha Sultana and Jebin, Somiya Assir and Kumkum, Merajunnesa and Islam, Md Rajibul and Ahmed, Nadeem and Amiruzzaman, Md and Khatun, Halima}, journal={Research Briefs on Information and Communication Technology Evolution}, volume={9}, pages={1--20}, year={2023}, doi = {https://doi.org/10.56801/rebicte.v9i.153}, url = {https://rebicte.org/index.php/rebicte/article/view/153}, } @article{10.1063/5.0127776, author = {Bhat, Asif and Nor, Rizal Mohd. and Amiruzzaman, Md}, title = "{An assessment and comparative analysis of trade finance initiatives utilizing distributed ledger technology}", journal = {AIP Conference Proceedings}, volume = {2608}, number = {1}, year = {2023}, month = {06}, abstract = "{Distributed Ledger Technology (DLT) has risen to prominence as one of the decade’s most disruptive technologies. It has the potential to fundamentally alter how individuals do business, monitor their goods, and handle their personal data. For decades, trade finance has been experiencing a digital revolution. It is, however, the outcome of an inability to digitize and streamline corporate operations. As a result, trade finance is still primarily a paper-based and labor-intensive enterprise. Additionally, costs continue to be persistently high. This is due in part to rising regulatory constraints. However, the development of new technologies such as blockchain and distributed ledger technology (DLT) has increased the pace of this digital transformation. Numerous distributed ledger technology (DLT) initiatives have sprouted up to assist in connecting diverse key parties and improving trade finance and supply chain finance operations. The platforms must be assessed and rigorously studied to determine their applicability, resilience, and long-term viability. In this article, we conducted a survey of various top DLT platforms for Trade Finance and assessed their capabilities using a qualitative criteria. The comparative analysis offered in this article will assist in selecting the optimal platform for the job.}", issn = {0094-243X}, doi = {10.1063/5.0127776}, url = {https://doi.org/10.1063/5.0127776}, note = {020011}, eprint = {https://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0127776/17994735/020011\_1\_5.0127776.pdf}, } @article{Gadde_2023, title={Estimate House Price Using Machine Learning}, volume={9}, url={https://rebicte.org/index.php/rebicte/article/view/156}, DOI={10.56801/rebicte.v9i.156}, abstractNote={<p>The House Price Index (HPI) is commonly used to estimate the changes in housing prices. The sale price of the house is correlated with many other factors like geographical location, size of the house, age of the house, the area and population of the neighborhood etc. There has been a considerably large number of datasets released in the literature of various locations to explore the correlation of the sale price of houses with their corresponding features. However, all the features don’t affect the sale price in equal proportion. Some features strongly correlate with each other and, while some features don’t carry any importance or are probably redundant. As a result, to explore various impacts of features on sales prices, we performed a detailed data analysis on the original house dataset. This report also comprehensively validates multiple steps of data analysis with supporting statistics and visualizations to provide an optimistic result of various features and their impact on the sales price of houses.</p>}, journal={Research Briefs on Information and Communication Technology Evolution }, author={Rishita Gadde and Md Amiruzzaman and Richard Burns and Md. Rajibul Islam and Rizal Mohd Nor}, year={2023}, month={May}, pages={41–58} } @article{10.5555/3636988.3637006, author = {Konduru, S. and Amiruzzaman, M. and Avina, V. and Islam, M. R.}, title = {Plant Disease Detection and Classification Using Deep Learning Models}, year = {2023}, issue_date = {October 2023}, publisher = {Consortium for Computing Sciences in Colleges}, address = {Evansville, IN, USA}, volume = {39}, number = {3}, issn = {1937-4771}, abstract = {Detection of diseases in plants at an early stage is crucial to achieving high yields, preserving crop quality, and effective disease management. Existing research focuses mostly on leaf disease detection, despite the fact that disease may develop everywhere on the plant. We developed a new dataset using the PlantVillage dataset and other online sources. We used Convolutional Neural Network (CNN) architectures, Alexnet and MobileNet to analyze and evaluate the performance of the models on the new dataset (i.e., consists of over 50,000 images). The models were trained on the new dataset for 100 epochs. MobileNet outperformed the other two models, attaining 99.69\% training accuracy, 94.37\% validation accuracy, 96\% average precision, 96\% recall, and an F1-score. The MobileNet model predicted diseases that affect portions of the plant other than the leaf better. This work demonstrates detecting plant disease and provides a feasible technique for enhancing crop management.}, journal = {J. Comput. Sci. Coll.}, month = {oct}, pages = {66–75}, numpages = {10} } @article{10.5555/3636988.3637012, author = {Amiruzzaman, Md and Bhuiyan, Ashikahmed}, title = {A Secure Real-Time Multimedia Stream Data Backup by Network-Engine for Resource Constrained Devices}, year = {2023}, issue_date = {October 2023}, publisher = {Consortium for Computing Sciences in Colleges}, address = {Evansville, IN, USA}, volume = {39}, number = {3}, issn = {1937-4771}, abstract = {In this study, we implemented a secure network engine for mobile devices. The study focused on faster data communication, the authenticity of the user, data transfer reliability, and data integrity. In addition, we applied advanced security techniques, such as Certification Authority (CA), Message Authentication Code (MAC), logging, and meta-data concepts, to ensure user permission and data access control. Further, a 2-way handshake and real-time data transfer channel were implemented to enhance the communication and data transfer speed. The results of this study show promising results to move forward with high-speed and secure data transfer between mobile devices and server computers.}, journal = {J. Comput. Sci. Coll.}, month = {oct}, pages = {133–142}, numpages = {10} } @Article{info14100569, AUTHOR = {Avina, Vijayendra D. and Amiruzzaman, Md and Amiruzzaman, Stefanie and Ngo, Linh B. and Dewan, M. Ali Akber}, TITLE = {An AI-Based Framework for Translating American Sign Language to English and Vice Versa}, JOURNAL = {Information}, VOLUME = {14}, YEAR = {2023}, NUMBER = {10}, ARTICLE-NUMBER = {569}, URL = {https://www.mdpi.com/2078-2489/14/10/569}, ISSN = {2078-2489}, ABSTRACT = {In this paper, we propose a framework to convert American Sign Language (ASL) to English and English to ASL. Within this framework, we use a deep learning model along with the rolling average prediction that captures image frames from videos and classifies the signs from the image frames. The classified frames are then used to construct ASL words and sentences to support people with hearing impairments. We also use the same deep learning model to capture signs from the people with deaf symptoms and convert them into ASL words and English sentences. Based on this framework, we developed a web-based tool to use in real-life application and we also present the tool as a proof of concept. With the evaluation, we found that the deep learning model converts the image signs into ASL words and sentences with high accuracy. The tool was also found to be very useful for people with hearing impairment and deaf symptoms. The main contribution of this work is the design of a system to convert ASL to English and vice versa.}, DOI = {10.3390/info14100569} } @article{wu2024visualizing, title={Visualizing Routes With AI-Discovered Street-View Patterns}, author={Wu, Tsung Heng and Amiruzzaman, Md and Zhao, Ye and Bhati, Deepshikha and Yang, Jing}, journal={IEEE Transactions on Computational Social Systems}, year={2024}, publisher={IEEE}, url={https://ieeexplore.ieee.org/document/10504858}, doi ={10.1109/TCSS.2024.3382944} } @article{nobel2024enhanching, title={Enhancing GI Cancer Radiation Therapy: Advanced Organ Segmentation with ResECA-U-Net Model}, author={S M Nuruzzaman Nobel and Omar Faruque Sifat and Md Rajibul Islam and Md Shohel Sayeed and Md Amiruzzaman}, journal={Emerging Science Journal}, volume={8}, number={3}, pages={999--1015}, year={2024}, url={https://ijournalse.org/index.php/ESJ/article/view/2186}, doi ={10.28991/ESJ-2024-08-03-012} } @article{Jisha2024, title={Predictive Analytics in Law Enforcement: Unveiling Patterns in NYPD Crime through Machine Learning and Data Mining}, volume={10}, url={https://rebicte.org/index.php/rebicte/article/view/188}, DOI={10.56801/rebicte.v10i.188}, abstractNote={<p>Urban crime poses multifaceted challenges to cities’ socio-economic structures. This study employs machine learning and data mining to bolster predictive policing in New York City. Using a comprehensive NYPD crime dataset spanning 2006 to 2017, the analysis identifies historical patterns and forecasts future crime trends. Rigorous methodologies ensure data fidelity, with algorithms like Random Forest and K-Means clustering parsing the intricate spatio-temporal crime dynamics. Results pinpoint crime hotspots and track criminal activity evolution, informing strategic law enforcement resource allocation and community involvement. Ethical considerations, including data privacy and algorithmic biases, are scrutinized alongside their impacts on community-police relations. The study recommends operational improvements and advocates for ongoing innovation in data-driven public safety strategies, advocating for the integration of new data sources and analytical methods in advancing smart city infrastructures.</p>}, journal={Research Briefs on Information and Communication Technology Evolution }, author={Jisha Sheela Kumar and Md Amiruzzaman and Ashik Ahmed Bhuiyan and Deepshikha Bhati}, year={2024}, month={May}, pages={36–59} } @article{bhat2024TradeFinance, author = "Asif Bhat and Rizal Mohd Nor and Md Amiruzzaman and Md. Rajibul Islam and Munleef Quadir", title = "An evaluation of EVM-compatible Blockchain Platforms for Trade Finance", journal = "Journal of Advanced Research in Applied Mechanics (to appear)", year = 2024, volume = "", number = "", pages = "" } @article{Priyanka Logasubramanian_Md Amiruzzaman_Ashik Ahmed Bhuiyan_2024, title={Analyzing the Impact of Smoking and Drinking on Health Metrics in Korea: A Data-driven Predictive Approach}, volume={10}, url={https://rebicte.org/index.php/rebicte/article/view/190}, DOI={10.69978/rebicte.v10i.190}, abstractNote={<p>This investigation thoroughly explores the effects of smoking and alcohol consumption on health measures within the population of South Korea, using a comprehensive dataset from the National Health Insurance Service of Korea. The study aims to build and validate predictive models by applying logistic regression methodologies, outlier detection, and cross-validation techniques. These models are designed to identify patterns in smoking and drinking behaviors, offering predictive accuracy. The analysis clarifies the relationship between lifestyle choices and key health indicators such as liver enzyme activity, blood fat levels, and heart and blood vessel measurements. The outcomes of this study are ready to significantly contribute to the development of targeted public health strategies, aiming to lessen the risks associated with lifestyle-induced health conditions.</p>}, journal={Research Briefs on Information and Communication Technology Evolution }, author={Priyanka Logasubramanian and Md Amiruzzaman and Ashik Ahmed Bhuiyan}, year={2024}, month={Jul.}, pages={70–81} } @article{afia2024YOLOv8, author = "Afia Tasnim and Baivab Das and Md. Rajibul Islam and Md Amiruzzaman and Md. Rashedul Islam and Nadeem Ahmed", title = {Revolutionizing Rose Grading: Real-time Detection and Accurate Assessment with YOLOv8 and Deep Learning Models}, journal = "SN Computer Science (to appear)", year = 2024, volume = "", number = "", pages = "" }