Hossain Shahriar
YOU?
Author Swipe
View article: Reinforcement Learning in Medical Imaging: Taxonomy, LLMs, and Clinical Challenges
Reinforcement Learning in Medical Imaging: Taxonomy, LLMs, and Clinical Challenges Open
Reinforcement learning (RL) is being used more in medical imaging for segmentation, detection, registration, and classification. This survey provides a comprehensive overview of RL techniques applied in this domain, categorizing the litera…
View article: Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8
Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8 Open
Uneven roads pose significant challenges to vehicle stability, passenger comfort, and safety, especially in snowy and mountainous regions. These problems are often complex and challenging to resolve with traditional detection and stabiliza…
View article: Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies
Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies Open
Blockchain technology has emerged as a transformative innovation, providing a transparent, immutable, and decentralized platform that underpins critical applications across industries such as cryptocurrencies, supply chain management, heal…
View article: Leveraging GANs for Synthetic Data Generation to Improve Intrusion Detection Systems
Leveraging GANs for Synthetic Data Generation to Improve Intrusion Detection Systems Open
This research presents a hybrid intrusion detection approach that integrates Generative Adversarial Networks (GANs) for synthetic data generation with Random Forest (RF) as the primary classifier. The study aims to improve detection perfor…
View article: Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach
Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach Open
The plague of cyberbullying on social media exerts a dangerous influence on human lives. Due to the fact that online social networks continue to daily expand, the proliferation of hate speech is also growing. Consequentially, distressing c…
View article: Mind_Matrix at CQs-Gen 2025: Adaptive Generation of Critical Questions for Argumentative Interventions
Mind_Matrix at CQs-Gen 2025: Adaptive Generation of Critical Questions for Argumentative Interventions Open
View article: Exploring the Impact of Digital Tools on Business Communication
Exploring the Impact of Digital Tools on Business Communication Open
This study explores the impact of digital tools on business communication, focusing on key dimensions such as collaboration, employee satisfaction, productivity, and communication overload. Utilizing a survey methodology, data was collecte…
View article: Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks Detection
Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks Detection Open
Large language models (LLMs) are renowned for their exceptional capabilities, and applying to a wide range of applications. However, this widespread use brings significant vulnerabilities. Also, it is well observed that there are huge gap …
View article: ORGANIZATIONAL CULTURE AND ITS INFLUENCE ON EMPLOYEE JOB SATISFACTION
ORGANIZATIONAL CULTURE AND ITS INFLUENCE ON EMPLOYEE JOB SATISFACTION Open
This research paper examines the impact of organizational culture on employee job satisfaction. The study hypothesizes that elements such as pride in the organization, a positive culture, leadership inspiration, motivation, supervisor supp…
View article: Primary Plastic Polymers: Urgently needed upstream reduction
Primary Plastic Polymers: Urgently needed upstream reduction Open
The UN international legally binding instrument on plastic pollution (UNEA resolution 5/14) aims to reduce plastics pollution. However, midstream and downstream assessments show that optimizing waste management, removal technologies, and i…
View article: Analysis and Experimental Comparison of State-Of-The-Art Deep-Learning Classification Techniques for Cyberbullying Detection
Analysis and Experimental Comparison of State-Of-The-Art Deep-Learning Classification Techniques for Cyberbullying Detection Open
View article: A trend analysis of Black American women with cardiovascular disease and chronic medical conditions, sociodemographic factors from NHANES From 2011 to 2020
A trend analysis of Black American women with cardiovascular disease and chronic medical conditions, sociodemographic factors from NHANES From 2011 to 2020 Open
Background Significant racial and gender differences exist in the prevalence of CVD in the United States. The goal of this study is to evaluate the prevalence of CVD among Black American women, the relationship between CVD and some medical…
View article: A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data Open
Social media cyberbullying has a detrimental effect on human life. As online social networking grows daily, the amount of hate speech also increases. Such terrible content can cause depression and actions related to suicide. This paper pro…
View article: Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python Open
The field of DevOps security education necessitates innovative approaches to effectively address the ever-evolving challenges of cybersecurity. In adopting a student-centered ap-proach, there is the need for the design and development of a…
View article: Editorial - 2023 - 1
Editorial - 2023 - 1 Open
View article: ICDH 2023 Committees
ICDH 2023 Committees Open
View article: Title Page iii
Title Page iii Open
View article: Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures
Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures Open
Blockchain technology transformed the digital sphere by providing a transparent, secure, and decentralized platform for data security across a range of industries, including cryptocurrencies and supply chain management. Blockchain's integr…
View article: HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps
HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps Open
The proliferation of mobile health technology, or mHealth apps, has necessitated the paramount importance of safeguarding personal health records. These digital platforms afford individuals the ability to effortlessly monitor and manage th…
View article: BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care
BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care Open
Falls among the elderly are a major health concern, frequently resulting in serious injuries and a reduced quality of life. In this paper, we propose "BlockTheFall," a wearable device-based fall detection framework which detects falls in r…
View article: Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly Open
The higher education management systems first identified and realized the trap of pitting innovation against privacy while first addressing COVID-19 social isolation challenges in 2020. In the age of data sprawl, we observe the situation h…
View article: Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks Open
Neural network approaches are machine learning methods that are widely used in various domains, such as healthcare and cybersecurity. Neural networks are especially renowned for their ability to deal with image datasets. During the trainin…
View article: Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Open
One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code. Every year, more and more software flaws are discovered, either internally in proprietary code or pub…
View article: Title Page iii
Title Page iii Open
View article: Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection Open
Quantum machine learning (QML) is an emerging field of research that leverages quantum computing to improve the classical machine learning approach to solve complex real world problems. QML has the potential to address cybersecurity relate…
View article: Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis Open
The burgeoning fields of machine learning (ML) and quantum machine learning (QML) have shown remarkable potential in tackling complex problems across various domains. However, their susceptibility to adversarial attacks raises concerns whe…
View article: Unraveling a blockchain-based framework towards patient empowerment: A scoping review envisioning future smart health technologies
Unraveling a blockchain-based framework towards patient empowerment: A scoping review envisioning future smart health technologies Open
View article: Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing Open
One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. These flaws are highly likely ex-ploited and lead to system compromise, data leakage, or denial of ser-vic…
View article: AnoMalNet: Outlier Detection based Malaria Cell Image Classification Method Leveraging Deep Autoencoder
AnoMalNet: Outlier Detection based Malaria Cell Image Classification Method Leveraging Deep Autoencoder Open
Class imbalance is a pervasive issue in the field of disease classification from medical images. It is necessary to balance out the class distribution while training a model for decent results. However, in the case of rare medical diseases…