Mamun Bin Ibne Reaz
YOU?
Author Swipe
View article: Resource-constrained hybrid attention-driven approach for enhanced interpretability and scalability in multi-event livestock condition classification and monitoring
Resource-constrained hybrid attention-driven approach for enhanced interpretability and scalability in multi-event livestock condition classification and monitoring Open
Precision Livestock Farming (PLF) enhances dairy farming by integrating artificial intelligence (AI) and sensor technologies for health, productivity, and welfare monitoring. However, existing methods remain resource-intensive, difficult t…
View article: Synergistic Use of Convolutional Neural Networks and Support Vector Machines for Mango Leaf Disease Diagnosis
Synergistic Use of Convolutional Neural Networks and Support Vector Machines for Mango Leaf Disease Diagnosis Open
Even in the age of digitalisation and capitalism, agriculture still plays a significant role in many economies, such as in certain Asian countries where mangoes have become an important export commodity. However, plant diseases put serious…
View article: A Review of Different Blockchain-Based Mechanisms Incorporated for Enhancing Data Security in Digital Forensic Images
A Review of Different Blockchain-Based Mechanisms Incorporated for Enhancing Data Security in Digital Forensic Images Open
Digital forensics plays a crucial role in criminal investigations, cybersecurity, and legal proceedings. Ensuring the integrity and authenticity of digital forensic images is paramount to maintaining evidentiary value. Traditional methods …
View article: Privacy and Security of IOT Devices for Monitoring Vulnerable People
Privacy and Security of IOT Devices for Monitoring Vulnerable People Open
This project presents a real-time IoT-based health monitoring system developed using the ESP32 Uno microcontroller. The system integrates multiple sensors—including a DHT11 sensor (for temperature and humidity), a pulse sensor (for heart r…
View article: Real Time Security Monitoring with ML And Sending Alerts
Real Time Security Monitoring with ML And Sending Alerts Open
In the era of increasing security challenges, traditional surveillance systems are often limited by manual monitoring and delayed response. This project, AlertCam, presents a smart security solution that leverages machine learning to enabl…
View article: DATA PRIVACY AND SECURITY MEASURES IN LOGISTICS: ENSURING COMPLIANCE IN A DIGITAL AGE
DATA PRIVACY AND SECURITY MEASURES IN LOGISTICS: ENSURING COMPLIANCE IN A DIGITAL AGE Open
In the fast-changing digital logistics environment in today's times, data security and privacy are now a necessity to ensure operational integrity. Businesses are more vulnerable to data breaches, illegal usage, and regulatory noncomplianc…
View article: Crop Recommendation System Using Machine Learning Algorithms
Crop Recommendation System Using Machine Learning Algorithms Open
In the face of a growing global population and increasingly erratic climate patterns, optimizing agricultural practices has become paramount. One promising avenue lies in precision agriculture, a data- driven approach that leverages techno…
View article: Underwater Data Transmission using LI-FI
Underwater Data Transmission using LI-FI Open
— Underwater communication has traditionally been challenging due to the limitations of radio and acoustic wave propagation in water. Light Fidelity (Li- Fi), a visible light communication (VLC) technology, presents a promising solution fo…
View article: Resource-Conscious Secure Storage Model for Ethereum-Based Decentralized Clouds
Resource-Conscious Secure Storage Model for Ethereum-Based Decentralized Clouds Open
As statistics is the backbone of the digital financial system dependence on centralized cloud storage structures makes users prone to troubles concerning statistics breaches operational price and lack of control this paper examines the dep…
View article: Blockchain Security Framework for Ransomware in IOT Healthcare
Blockchain Security Framework for Ransomware in IOT Healthcare Open
Ransomware is a malicious software or program that encrypts the data on a hard disc and denies the users access to it unless an amount is paid. Ransomware attacks majorly target the majority of the organizations like financial institutions…
View article: Exploration of Factors Influencing Functional Capacity of Stroke Survivors
Exploration of Factors Influencing Functional Capacity of Stroke Survivors Open
A stroke is a lifechanging event for stroke victims and their caregivers. Family members must care for stroke victims at home after they receive emergency care in the hospital. Prognosis of a stroke patient depends on many factors. Objec…
View article: Real-Time Analytics in Python: A Dashboard for Business Insights.
Real-Time Analytics in Python: A Dashboard for Business Insights. Open
With the speedy growth of digital transformation, business entities have been forced to make use of real-time analytics in making decisions. Data analysis approaches using conventional means normally cause delay, which compromises the resp…
View article: Stock market Price Prediction Using Machine Learning and Deep learning
Stock market Price Prediction Using Machine Learning and Deep learning Open
This project presents a dynamic Stock Market Price Prediction Website that utilizes Machine Learning (ML) and Deep Learning (DL) techniques to forecast future stock prices based on real-time and historical data. The system is designed with…
View article: Real-Time Data Integration and Analysis for Heart Disease Prediction Using Machine Learning
Real-Time Data Integration and Analysis for Heart Disease Prediction Using Machine Learning Open
The " Heart Disease Risk Assessment Web App" is a cutting-edge web application that uses sophisticated machine learning techniques to deliver individualized cardiovascular risk information. The app uses information from the Behavioral Risk…
View article: Identifying Social Media Deepfake Videos Using Deep Learning Algorithms
Identifying Social Media Deepfake Videos Using Deep Learning Algorithms Open
Deepfake videos are becoming more and more common on social media, endangering privacy, security, and the dissemination of accurate information. The project "Identifying Social Media Deepfake Videos Using Deep Learning Algorithms" attempts…
View article: Revolutionizing Patient Diagnosis with Machine Learning Precision
Revolutionizing Patient Diagnosis with Machine Learning Precision Open
Artificial intelligence is reforming healthcare systems by enabling faster and more accurate diagnoses. However, its true potential remains largely untapped due to challenges in data integration, supervision, and interpretability. This res…
View article: Optimized LSTM Model for Day-Ahead Solar Power Prediction
Optimized LSTM Model for Day-Ahead Solar Power Prediction Open
The effective integration of photovoltaic (PV) systems into the grid which facilitates better planning and resource allocation depends on accurate day-ahead solar power forecasts. This paper proposes a Long Short-Term Memory (LSTM) model f…
View article: Nature’s Library - Plant Identification Made Easy using Machine Learning
Nature’s Library - Plant Identification Made Easy using Machine Learning Open
Plant species identification is essential for botany, agriculture, and environmental preservation. Manual observationbased traditional approaches take a lot of time and are prone to mistakes. The book "Nature's Library: Leaf Identification…
View article: ENHANCING UPI TRANSACTION SECURITY: A DEEP LEARNING APPROACH FOR FRAUD DETECTION
ENHANCING UPI TRANSACTION SECURITY: A DEEP LEARNING APPROACH FOR FRAUD DETECTION Open
UPI fraud has become a major concern in digital payments, with cybercriminals using advancedtechniques to exploit security loopholes. Existing fraud detection systems often fail to accuratelypredict fraudulent transactions due to their evo…
View article: Detecting and forecasting cryptojacking attack trends in Internet of Things and wireless sensor networks devices
Detecting and forecasting cryptojacking attack trends in Internet of Things and wireless sensor networks devices Open
This research addresses the critical issue of cryptojacking attacks, a significant cybersecurity threat where malicious actors covertly exploit computational resources for unauthorized cryptocurrency mining, particularly in wireless sensor…
View article: Correction: Machine learning-based prognostic model for 30-day mortality prediction in Sepsis-3
Correction: Machine learning-based prognostic model for 30-day mortality prediction in Sepsis-3 Open
Background
\nSepsis poses a critical threat to hospitalized patients, particularly those in the Intensive Care Unit (ICU). Rapid identification of Sepsis is crucial for improving survival rates. Machine learning techniques offer advantages…
View article: An exploratory analysis of Community-based Question-Answering Platforms and GPT-3-driven Generative AI: Is it the end of online community-based learning?
An exploratory analysis of Community-based Question-Answering Platforms and GPT-3-driven Generative AI: Is it the end of online community-based learning? Open
Context: The advent of Large Language Model-driven tools like ChatGPT offers software engineers an interactive alternative to community question-answering (CQA) platforms like Stack Overflow. While Stack Overflow provides benefits from the…
View article: Impact of Electrode Position on Forearm Orientation Invariant Hand Gesture Recognition
Impact of Electrode Position on Forearm Orientation Invariant Hand Gesture Recognition Open
Objective: Variation of forearm orientation is one of the crucial factors that drastically degrades the forearm orientation invariant hand gesture recognition performance or the degree of freedom and limits the successful commercialization…