Gahangir Hossain
YOU?
Author Swipe
View article: Cyber Defense through Agentic AI Enabled Automation: An Approach to Reduce Cyber Risk
Cyber Defense through Agentic AI Enabled Automation: An Approach to Reduce Cyber Risk Open
View article: Understanding the Relationship Between Personal Data Privacy Literacy and Data Privacy Information Sharing by University Students
Understanding the Relationship Between Personal Data Privacy Literacy and Data Privacy Information Sharing by University Students Open
With constant threats to the safety of personal data in the United States, privacy literacy has become an increasingly important competency among university students, one that ties intimately to the information sharing behavior of these st…
View article: Challenges and Barriers to Implementing Building Information Modeling (BIM) in the Architectural Practice in Bangladesh
Challenges and Barriers to Implementing Building Information Modeling (BIM) in the Architectural Practice in Bangladesh Open
Bangladesh has experienced rapid urbanization, population growth, and increasing demand for infrastructure development over the past few decades. As urbanization accelerates, the demand for residential, commercial, and public infrastructur…
View article: Cybersecurity Education Podcasts: A Framework for Effective High School Instructional Design
Cybersecurity Education Podcasts: A Framework for Effective High School Instructional Design Open
View article: Facilitating automated fact-checking: a machine learning based weighted ensemble technique for claim detection
Facilitating automated fact-checking: a machine learning based weighted ensemble technique for claim detection Open
The rapid digitization of media, driven by technological advancements, has accelerated the spread of information through online platforms. This has heightened the need for robust fact-checking mechanisms to counter misinformation. The prev…
View article: Reducing Computational Complexity in CNNs: A Focus on VGG19 Pruning and Quantization
Reducing Computational Complexity in CNNs: A Focus on VGG19 Pruning and Quantization Open
View article: SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security
SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security Open
Traditional password-based authentication mechanisms exhibit significant security vulnerabilities, prompting the adoption of Multi-Factor Authentication (MFA) to enhance user verification. However, current MFA methods, such as OffPAD, One-…
View article: Scoping the Landscape of Deep Learning for Alzheimer’s Disease Stage Classification: Methods, Challenges, and Opportunities
Scoping the Landscape of Deep Learning for Alzheimer’s Disease Stage Classification: Methods, Challenges, and Opportunities Open
Deep learning (DL) models have been widely applied for Alzheimer’s disease (AD) stage classification. This scoping review synthesizes recent research to evaluate current performance benchmarks, identify methodological limitations, and high…
View article: Differential Privacy in AI-Driven Health Insurance Analytics: A Systematic Review of Methods, Effectiveness, and Regulatory Compliance
Differential Privacy in AI-Driven Health Insurance Analytics: A Systematic Review of Methods, Effectiveness, and Regulatory Compliance Open
View article: Who Holds the Pen? Caricature and Perspective in LLM Retellings of History
Who Holds the Pen? Caricature and Perspective in LLM Retellings of History Open
View article: Psychological Impact of Internet Blackouts: A Case Study With Machine Learning-Based Stress Analysis
Psychological Impact of Internet Blackouts: A Case Study With Machine Learning-Based Stress Analysis Open
Access to the internet has become a vital part of modern life, especially for communication and essential services. However, during politically sensitive times, internet blackouts can disrupt daily routines, leading to significant psycholo…
View article: Repression, Rejection and Transcendence in a Patriarchal Society: A Psychoanalytic Study of a Woman’s Journey in H
Repression, Rejection and Transcendence in a Patriarchal Society: A Psychoanalytic Study of a Woman’s Journey in H Open
This paper aims to investigate the complicated dynamics of repression, rejection, and transcendence and evaluate the protagonist's transformative journey in the context of patriarchal society as reflected in Han Kang’s novel The Vegetarian…
View article: Editorial: Advances in non-invasive brain stimulation techniques
Editorial: Advances in non-invasive brain stimulation techniques Open
View article: FinBERT-BiLSTM: A Deep Learning Model for Predicting Volatile Cryptocurrency Market Prices Using Market Sentiment Dynamics
FinBERT-BiLSTM: A Deep Learning Model for Predicting Volatile Cryptocurrency Market Prices Using Market Sentiment Dynamics Open
Time series forecasting is a key tool in financial markets, helping to predict asset prices and guide investment decisions. In highly volatile markets, such as cryptocurrencies like Bitcoin (BTC) and Ethereum (ETH), forecasting becomes mor…
View article: Digital Education Revolution: Evaluating LMS-based Learning and Traditional Approaches
Digital Education Revolution: Evaluating LMS-based Learning and Traditional Approaches Open
This paper explores the comparative examination between online learning facilitated by Learning Management Systems (LMS) and conventional learning environments, focusing on accessibility, interactivity, assessment techniques, and resource …
View article: Cognitive Bias in Cyber-Value-at-Risk: Identification and Mitigation Approach
Cognitive Bias in Cyber-Value-at-Risk: Identification and Mitigation Approach Open
This study examines the impact of cognitive biases on assessing cybersecurity risks, using the concept Cyber Value at Risk (CVaR), within organizations. It explores how biases affect decision-making and risk perception, leading to protecti…
View article: Society 5.0 enabled agriculture: Drivers, enabling technologies, architectures, opportunities, and challenges
Society 5.0 enabled agriculture: Drivers, enabling technologies, architectures, opportunities, and challenges Open
The existing agriculture practices faced many challenges and fail to address some of the most critical needs of the growing population. Food insecurity, high initial cost of smart farming, severe farm labor shortage worldwide, economic, so…
View article: Cognitive effort assessment through pupillary responses: Insights from multinomial processing tree modeling and neural interconnections
Cognitive effort assessment through pupillary responses: Insights from multinomial processing tree modeling and neural interconnections Open
The pupillary responses of humans exhibit variations in size, which are mediated by optic and oculomotor cranial nerves. Due to their sensitivity and high resolution of pupillary responses, they are used for a long time as measurement metr…
View article: Cybersecurity Resilience for Low-Income Farmers in Developing Nations: Enhancing Risk Assessment with Bayesian Network
Cybersecurity Resilience for Low-Income Farmers in Developing Nations: Enhancing Risk Assessment with Bayesian Network Open
View article: Recent Advancements of MXene/Nanocellulose‐Based Hydrogel and Aerogel: A Review
Recent Advancements of MXene/Nanocellulose‐Based Hydrogel and Aerogel: A Review Open
MXenes have been highly attractive to researchers owing to their layered nanostructure, excellent electrical conductivity, and abundance of functional groups. Meanwhile, nanocellulose materials, known for their biodegradability, renewabili…
View article: A content analysis of research on technology use for teaching mathematics to students with disabilities: word networks and topic modeling
A content analysis of research on technology use for teaching mathematics to students with disabilities: word networks and topic modeling Open
The purpose of this study was to conduct a content analysis of research on technology use for teaching mathematics to students with disabilities. We applied word networks and structural topic modeling of 488 studies published from 1980 to …
View article: A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method
A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method Open
In digital image processing and steganography, images are often described using edges and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid image steganography method of secret embedding is proposed in thi…
View article: Blink Rate Variability as a Measure of Computer Vision Syndrome
Blink Rate Variability as a Measure of Computer Vision Syndrome Open
Due to the COVID-19 pandemic and working from home with portable devices, we are spending a longtime on the device screen. Prolonged focus on devices like computer screens, tablets, e-readers, and cellphones – Video Display Terminals (VDTs…
View article: Media Addiction Behaviour, Computer Vision Syndrome and Neural Patterns
Media Addiction Behaviour, Computer Vision Syndrome and Neural Patterns Open
These Post-COVID days, seventy percent of businesses have or are working on a digital transformation, which make us to spend more time with media interaction [1]. Media has always existed in much of our history; the shape and function of s…
View article: Media Addiction Behaviour, Computer Vision Syndrome and Neural Patterns
Media Addiction Behaviour, Computer Vision Syndrome and Neural Patterns Open
These Post-COVID days, seventy percent of businesses have or are working on a digital transformation, which make us to spend more time with media interaction [1]. Media has always existed in much of our history; the shape and function of s…
View article: Dual EEG Alignment between Participants During Shared Intentionality Experiments
Dual EEG Alignment between Participants During Shared Intentionality Experiments Open
View article: iRestroom: A Smart Restroom Cyberinfrastructure at Home for Elderly People
iRestroom: A Smart Restroom Cyberinfrastructure at Home for Elderly People Open
View article: Towards Bengali Word Embedding: Corpus Creation, Intrinsic and Extrinsic Evaluations
Towards Bengali Word Embedding: Corpus Creation, Intrinsic and Extrinsic Evaluations Open
Distributional word vector representation orword embedding has become an essential ingredient in many natural language processing (NLP) tasks such as machine translation, document classification, information retrieval andquestion answering…
View article: Learning Patterns in Imaginary Vowels for an Intelligent Brain Computer Interface (BCI) Design
Learning Patterns in Imaginary Vowels for an Intelligent Brain Computer Interface (BCI) Design Open
Technology advancements made it easy to measure non-invasive and high-quality electroencephalograph (EEG) signals from human's brain. Hence, development of robust and high-performance AI algorithms becomes crucial to properly process the E…
View article: Smart home health monitoring system for predicting type 2 diabetes and hypertension
Smart home health monitoring system for predicting type 2 diabetes and hypertension Open
Home health monitoring can facilitate patient monitoring remotely for diabetes and blood pressure patients. Early detection of hypertension and diabetes is extremely important, as these chronic diseases often result in life-threatening com…