Salekul Islam - IEEE Xplore Author Profile

Showing 1-25 of 64 results

Results

Worldwide, the market for reconditioned cars suffers due to an inconclusive and forged record storage system. Most of the vehicle information systems fail to prevent information manipulation as the data authentication system is absent or flawed. Fabrication of information is being committed without trace in reconditioned automobiles. Our proposed decentralized, blockchain-based vehicle information...Show More
General Self-Efficacy (GSE) is a vital attribute of human psychology that describes one’s belief about his own ability to succeed in specific situations. GSE is composed of cognitive, social, and behavioral skills of an individual. In this research, we first develop a GSE classification model by using Facebook content (i.e., profile photos and statuses). We collect data from a total of 435 Faceboo...Show More
Our most recent findings on multi-hop LoRa networks imply that earlier developed multi-hop routing methods, such as our previously suggested Extended-DRESG scheme, had overlooked some essential information. Although the researchers employed uniform node distributions for their multi-hop models, a full capacity LoRa network may be treated as a Gaussian distribution. Extended-DRESG performs better w...Show More
The classification of plant species, particularly medicinal ones, has gained much research attention due to challenges in manual identification and the urgency to protect endangered species. The growing need for automated identification of medicinal plants has led to a focus on using leaf images, which provide abundant information and are easily accessible. The importance of medicinal plants in he...Show More
The reconfigurable intelligent surface (RIS) is widely recognized as an effective solution for enhancing security in wireless communications, owing to its passive reflective components and the ability to adjust signal phases. In light of this, this study investigates the physical layer security issues for a dual-hop RIS-aided system that makes use of both radio frequency (RF) and free space optica...Show More
Software-Defined Networking (SDN) has revolutionized the networking landscape by offering programmable control and optimization of network resources. However, SDN architecture’s inherent flexibility and centralized control expose it to new security risks. In this paper, we have presented a comprehensive study focused on the security implications associated with the control plane of SDN, which serv...Show More
Although LoRa (radio) technology offers customization of different physical layer transmission parameters such as bandwidth, spreading factor (SF), transmission power, and coding rate to obtain the desired data rate and coverage, the currently preferred single-hop transmission mode cannot simultaneously achieve both. The LoRaWAN community is therefore focusing on multi-hop networks to increase net...Show More
Recently, Blockchain-based applications have become immensely popular because of limited reliance on a single entity, unlike a centralized system. However, reaching a consensus among blockchain networks is a challenging and vital aspect of blockchain-based applications. There are various types of blockchain networks for different kinds of application scenarios. Among all of them, the consensus alg...Show More
Social media profile photos can demonstrate a variety of information about a person, including her personality, behavior, preference, individuality, and gender. Prediction of gender from social media photos has a number of real life applications such as gender marketing and identification of camouflaged profile photos. Numerous techniques can be applied for determining gender from a user’s profile...Show More
Malaria, a life-threatening disease worldwide, can be diagnosed using antigen tests and microscopy tests. However, both of them are erroneous and time-consuming. Therefore, a trustworthy and fast early malaria prognosis infrastructure is required. In this age of machine learning (ML), there are several ML-based methods to do the task. This paper proposes an unorthodox method for malaria prognosis ...Show More
Nowadays, the increasing number of vehicles and shortage of parking spaces have become an inescapable condition in big cities across the world. Car parking problem is not a new phenomenon, especially in a crowded city such as Dhaka, Bangladesh. Shortage of parking spaces leads to several problems such as road congestion, illegal parking on the streets, and fuel waste in searching for a free parkin...Show More
As the world is still trying to rebuild from the destruction caused by the widespread reach of the COVID-19 virus, and the recent alarming surge of human monkeypox outbreaks in numerous countries threatens to become a new global pandemic too. Human monkeypox disease symptoms are quite similar to chickenpox, and measles classic symptoms, with very intricate differences such as skin blisters, which ...Show More
Traditional Machine Learning (ML) models are generally preferred for classification tasks on tabular datasets, which often produce unsatisfactory results in complex tabular datasets. Recent works, using Convolutional Neural Networks (CNN) with embedding techniques, outperform the traditional classifiers on tabular dataset. However, these embedding techniques fail to use an automated approach after...Show More
Identity Management System (IDMS) refers to how users or individuals are identified and authorized to use organizational systems and services. Since traditional identity management and authentication systems rely heavily on a trusted central authority, they cannot mitigate the effects of single points of failure. As a decentralized and distributed public ledger in a peer-to- peer (P2P) network, Bl...Show More
In the era of industry 4.0, safety, efficiency and reliability of industrial machinery is an elementary concern in trade sectors. The accurate remaining useful life (RUL) prediction of an equipment in due time allows us to effectively plan the maintenance operation and mitigate the downtime to raise the revenue of business. In the past decade, data driven based RUL prognostic methods had gained a ...Show More
Packet transmission in LoRaWAN implements the use of the unslotted ALOHA protocol, which leads to a high probability of interference, and thus, degrades the system performance. Reliability and scalability are affected by interference too. Different forms of studies, including experimental, analytical and simulation models, have been carried to find out how to minimize the effects of interference a...Show More
Leukemia is not only fatal in nature, it is also extremely expensive to treat. However, leukemia detection at early stage can save lives and money of the affected people, specially children among whom leukemia as a cancer type is very common. In this paper, we propose an explainable supervised machine learning model that accurately predicts the likelihood of early-stage leukemia based on symptoms ...Show More
In healthcare services, application development is considered the most complex and time-consuming phase. As it is difficult to plan and time-intense, it requires high maintenance. Healthcare applications need strict compliance and the scope of application is immense along with associates, classes in services, and classified system. Application designing in healthcare with the help of traditional a...Show More
Nanoscale devices, also called nanomachines, form communication networks and cooperate with each other so that they can be used to perform complicated tasks. Such networks of nanodevices, named nanonetworks, envisioned to serve the functionality and performance of today’s Internet. This paper presents a comparative review of the state-of-the-art electromagnetic (EM) nanonetworks highlighting their...Show More
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the...Show More
This paper exploits the extreme learning machine (ELM) approach to address diabetic retinopathy (DR), a medical condition in which impairment occurs to the retina caused by diabetes. DR, a leading cause of blindness worldwide, is a sort of swelling leakage due to excessive blood sugar in the retina vessels. An early-stage diagnosis is therefore beneficial to prevent diabetes patients from losing t...Show More
A spell and grammar checker is profoundly essential for diverse publications especially for Bangla language in particular as it is spoken by millions of native speakers around the world. Considering the lack of research efforts, we demonstrate the development of a comprehensive Bangla spell and grammar checker with necessary resources. At first, a full-fledged and generalised Bangla monolingual co...Show More
Events conceived as facts which are fine grained entities that happen around us such as completing graduation, birthday celebration, and death of an individual. Events are regarded as happening in a certain place, during a particular interval of time which can be occurred planned or unplanned way. Social media is a platform where users share their attending events with others. In this paper, we pr...Show More
As the latest pandemic spreads, the world’s governing bodies have been forced to impose strict social distancing measures. This has impacted businesses and manufacturing industries worldwide, including Bangladesh’s RMG sector. To aid in the rapid spread of this infectious disease, this paper illustrates a simulation of an IoT system centered on wristbands specifically designed to detect early symp...Show More
Web service plays an important role in the new paradigm of distributed computing over the Internet. Web service allows to combine different publicly available services together to create new functionalities. Many public web services can be used at free of cost. Two important elements of web services are Web Services Description Language (WSDL) used for describing and locating web services and Simp...Show More