Mohammad Kamrul Hasan
YOU?
Author Swipe
View article: A congestion-aware vehicle routing optimization model for sustainable urban supply: An AnyLogic simulation approach
A congestion-aware vehicle routing optimization model for sustainable urban supply: An AnyLogic simulation approach Open
Urban traffic congestion significantly affects the efficiency, cost, and environmental performance of logistics operations. In particular, the selection of distribution routes plays a crucial role in ensuring timely delivery, reducing carb…
View article: An Enhanced Frequency Scaling Model forMillimeter-Wave Rain Attenuation in TropicalSatellite Links with Pseudo-code Implementation
An Enhanced Frequency Scaling Model forMillimeter-Wave Rain Attenuation in TropicalSatellite Links with Pseudo-code Implementation Open
Heavy and frequent tropical rainfall severely degrades millimetre-wave satellite communications (SatCom), particularly for frequencies above10GHz used by modern high-throughput satellites and 5G backhaul. Existingprediction models, such as…
View article: A hybrid filtering and deep learning approach for early Alzheimer’s disease identification
A hybrid filtering and deep learning approach for early Alzheimer’s disease identification Open
Alzheimer’s disease is a progressive neurological disorder that profoundly affects cognitive functions and daily activities. Rapid and precise identification is essential for effective intervention and improved patient outcomes. This resea…
View article: Correction: Saeed et al. Anomaly Detection in 6G Networks Using Machine Learning Methods. Electronics 2023, 12, 3300
Correction: Saeed et al. Anomaly Detection in 6G Networks Using Machine Learning Methods. Electronics 2023, 12, 3300 Open
In the original publication [...]
View article: Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks
Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks Open
View article: False data injection attack dataset for classification, identification, and detection for IIoT in Industry 5.0
False data injection attack dataset for classification, identification, and detection for IIoT in Industry 5.0 Open
View article: Navigating the Ethical Landscape of Artificial Intelligence: A Comprehensive Review
Navigating the Ethical Landscape of Artificial Intelligence: A Comprehensive Review Open
View article: Explainable hybrid forecasting model for a 4-node smart grid stability
Explainable hybrid forecasting model for a 4-node smart grid stability Open
View article: Innovation-Driven E-Commerce Growth, Constraints, and Adoption in Organizational Practices in the 5G Era
Innovation-Driven E-Commerce Growth, Constraints, and Adoption in Organizational Practices in the 5G Era Open
Technology-driven e-commerce innovations have redefined how products and services are purchased and delivered online using the wireless 5G networks. With the transformative shift in e-commerce innovation, the commitment to use advanced 5G …
View article: An Adaptive Simulated Annealing Algorithm for Optimizing Task Scheduling in Internet of Things
An Adaptive Simulated Annealing Algorithm for Optimizing Task Scheduling in Internet of Things Open
View article: Machine Learning-Based Computer Vision for Depth Camera-Based Physiotherapy Movement Assessment: A Systematic Review
Machine Learning-Based Computer Vision for Depth Camera-Based Physiotherapy Movement Assessment: A Systematic Review Open
Machine learning-based computer vision techniques using depth cameras have shown potential in physiotherapy movement assessment. However, a comprehensive understanding of their implementation, effectiveness, and limitations remains needed.…
View article: A Secure and Lightweight Group Mobility Authentication Scheme for 6LoWPAN Networks
A Secure and Lightweight Group Mobility Authentication Scheme for 6LoWPAN Networks Open
The integration of Internet Protocol version 6 over Low-Power Wireless Personal Area Networks (6LoWPANs) provided IP technologies within wireless sensor networks that dramatically increased the Internet of Things (IoT). Therefore, to facil…
View article: Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity Open
As reliance on digital services grows, traditional password-based authentication methods have been increasingly scrutinized due to their susceptibility to cyber-attacks, including phishing and brute force attacks. This has led to a shift t…
View article: FloodNet-Lite: A Lightweight Deep Learning for Flood Mapping Using Remote Sensing Data With Optimized UNet and Edge Deployment Approach in 6G
FloodNet-Lite: A Lightweight Deep Learning for Flood Mapping Using Remote Sensing Data With Optimized UNet and Edge Deployment Approach in 6G Open
Flood mapping using remote sensing data is critical to disaster response, especially in real-time monitoring and edge deployment. However, existing deep-learning (DL) models often face challenges related to computational complexity, latenc…
View article: A Low-Cost AI-Powered System for Early Detection of Diabetic Retinopathy and Ocular Diseases in Resource Limited Settings
A Low-Cost AI-Powered System for Early Detection of Diabetic Retinopathy and Ocular Diseases in Resource Limited Settings Open
Eye Health is a vital yet often neglected aspect of healthcare, especially in distant and deprived regions that are less accessible to specialized diagnostic tools and professionals. This paper introduces an intelligent diabetic retinopath…
View article: Cybersecurity Challenges in Smart Grid Systems: Current and Emerging Attacks, Opportunities, and Recommendations
Cybersecurity Challenges in Smart Grid Systems: Current and Emerging Attacks, Opportunities, and Recommendations Open
Traditional power grids are transforming into Smart Grids (SGs) to address challenges such as unidirectional information flow, increasing energy demand, energy waste, and issues related to availability and security. This evolution is facil…
View article: Revolutionizing FANETs With Reinforcement Learning: Optimized Data Forwarding and Real-Time Adaptability
Revolutionizing FANETs With Reinforcement Learning: Optimized Data Forwarding and Real-Time Adaptability Open
Uncrewed Aerial Vehicles (UAVs), commonly known as drones, have significantly advanced wireless communication frameworks by enabling the formation of Flying Ad-Hoc Networks (FANETs). FANETs facilitate autonomous collaboration among UAVs th…
View article: Real-Time Data Reconstruction-based Joint Estimation of State-of-Charge and State-of-Health of Lithium-Ion Batteries Using Quantitative Feature Informed Deep Learning Framework
Real-Time Data Reconstruction-based Joint Estimation of State-of-Charge and State-of-Health of Lithium-Ion Batteries Using Quantitative Feature Informed Deep Learning Framework Open
View article: Batrix-Net: X-Supervision Guided Battery Agnostic Memory Attention-Driven Network with Dynamic Data Reconstruction for Real-Time Joint Estimation of SOC and Soh
Batrix-Net: X-Supervision Guided Battery Agnostic Memory Attention-Driven Network with Dynamic Data Reconstruction for Real-Time Joint Estimation of SOC and Soh Open
View article: Multi-Population Kidney-Inspired Algorithm With Migration Policy Selections for Feature Selection Problems
Multi-Population Kidney-Inspired Algorithm With Migration Policy Selections for Feature Selection Problems Open
Optimization algorithms often encounter challenges in effectively managing the trade-off between exploration and exploitation, usually leading to less-than-optimal outcomes. This study introduces two novel migration policies in multi-popul…
View article: Machine Learning-Based Computer Vision for Depth Camera-Based Physiotherapy Movement Assessment: A Systematic Review
Machine Learning-Based Computer Vision for Depth Camera-Based Physiotherapy Movement Assessment: A Systematic Review Open
Background: Machine learning-based computer vision techniques using depth cameras have shown potential in physiotherapy movement assessment. However, a comprehensive understanding of their implementation, effectiveness, and limitations rem…
View article: Optimizing UAV-assisted IoT sensor networks: A multi-objective approach to data collection and routing
Optimizing UAV-assisted IoT sensor networks: A multi-objective approach to data collection and routing Open
Unmanned Aerial Vehicles (UAVs) are powerful tools for data gathering in IoT sensor networks, enhancing efficiency in challenging environments. This research proposes an optimized UAV deployment and data routing approach, addressing energy…
View article: A related convolutional neural network for cancer diagnosis using microRNA data classification
A related convolutional neural network for cancer diagnosis using microRNA data classification Open
This paper develops a method for cancer classification from microRNA data using a convolutional neural network (CNN)‐based model optimized by genetic algorithm. The convolutional neural network has performed well in various recognition and…
View article: DiGraph-Enabled Digital Twin and Label-Encoding Machine Learning for SCADA Network’s Cyber Attack Analysis in Industry 5.0
DiGraph-Enabled Digital Twin and Label-Encoding Machine Learning for SCADA Network’s Cyber Attack Analysis in Industry 5.0 Open
False-Data Injection Attack (FDIA), Remote-Tripping Command Injection (RTCI), and System Reconfiguration Attack (SRA) on SCADA (Supervisory Control and Data Acquisition) networks impact industry 5.0 enabled smart grid components such as in…
View article: Implementation of Cyber Network’s Attacks Detection System with Deep Learning Designing Algorithms
Implementation of Cyber Network’s Attacks Detection System with Deep Learning Designing Algorithms Open
The internet has become indispensable for modern communication, playing a vital role in the development of smart cities and communities. However, its effectiveness is contingent upon its security and resilience against interruptions. Intru…
View article: The Relationship between Raised Mean Platelet Volume and Severity of Newly Diagnosed Acute Ischaemic Stroke
The Relationship between Raised Mean Platelet Volume and Severity of Newly Diagnosed Acute Ischaemic Stroke Open
Introduction and Objective: Stroke is one of the leading causes of mortality and long-term disability throughout the world. Mean platelet volume (MPV), a marker of platelet activation, is calculated and provided by automatic blood cell cou…
View article: Similarity and Distance Measures of Picture Fuzzy Sets with Application in Pattern Recognition
Similarity and Distance Measures of Picture Fuzzy Sets with Application in Pattern Recognition Open
Picture fuzzy set is the latest influential conception to conduct ambiguous data effectively. The distance and similarity measures are two dominant concepts to calculate the characteristics between two PFSs. The similarity measure evaluate…
View article: Protecting the Mental Health of Children Affected by Parental Alcohol and Drug Use: A Systematic Review of Resilience Factors
Protecting the Mental Health of Children Affected by Parental Alcohol and Drug Use: A Systematic Review of Resilience Factors Open
View article: Protecting the Mental Health of Children Affected by Parental Alcohol and Drug Use: A Systematic Review of Resilience Factors
Protecting the Mental Health of Children Affected by Parental Alcohol and Drug Use: A Systematic Review of Resilience Factors Open
View article: Mental Health in Focus: A Review of Current Research and Recommendations
Mental Health in Focus: A Review of Current Research and Recommendations Open