- Energy Efficient Wireless Sensor Networks
- Advanced Wireless Communication Techniques
- Mobile Ad Hoc Networks
- Wireless Communication Networks Research
- Energy Harvesting in Wireless Networks
- Video Surveillance and Tracking Methods
- Hate Speech and Cyberbullying Detection
- Social Robot Interaction and HRI
- Gaze Tracking and Assistive Technology
- Visual Attention and Saliency Detection
- Advanced Data Compression Techniques
- Anomaly Detection Techniques and Applications
- Human Pose and Action Recognition
- Bullying, Victimization, and Aggression
- Adversarial Robustness in Machine Learning
- Explainable Artificial Intelligence (XAI)
- Robotics and Automated Systems
- IoT-based Smart Home Systems
- Advanced Neural Network Applications
- Vehicle License Plate Recognition
- PAPR reduction in OFDM
- Video Analysis and Summarization
- Face and Expression Recognition
- Mental Health Research Topics
- Face recognition and analysis
University of Rajshahi
2012-2024
Technical Research Associates (United States)
2024
Prime University
2011-2023
Rajshahi University of Engineering and Technology
2023
Ahsanullah University of Science and Technology
2018
Saitama University
2014-2016
We propose a human-robot interaction approach for social robots that attracts and controls the attention of target person depending on her/his current visual focus attention. The system detects person's task (attention) estimates level by using "task-related contextual cues" "gaze pattern." is used to determine suitable time attract toward robot. robot interest or willingness interact with it. Then, person, generates awareness establishes communication channel her/him. To evaluate...
Abstract In the era of “big data,” a huge number people, devices, and sensors are connected via digital networks cross‐plays among these entities generate enormous valuable data that facilitate organizations to innovate grow. However, deluge also raises serious privacy concerns which may cause regulatory backlash hinder further organizational innovation. To address challenge information privacy, researchers have explored privacy‐preserving methodologies in past two decades. thorough study...
We develop an energy-efficient routing protocol in order to enhance the stability period of wireless sensor networks.This is called weighted election (WEP).It introduces a scheme combine clustering strategy with chain algorithm for satisfy both energy and stable constrains under heterogeneous environment WSNs.Simulation results show that new one performs better than LEACH, SEP HEARP terms network lifetime.It also found longer strongly depend on higher values extra during its settings.
Cyberbullying includes the repeated and intentional use of digital technology to target another person with threats, harassment, or public humiliation. One techniques is sharing bullying memes on social media, which has increased enormously in recent years. Memes are images texts overlapped sometimes together they present concepts that become dubious if one them absent. Here, we propose a unified deep neural model for detecting media. In proposed architecture, VGG16-BiLSTM, consists VGG16...
This paper focuses on the role of python in dramatic increase productivity and high-level code reuse computational science.The salient features make it an ideal language for scientific computing exposing shortcomings legacy languages prototyping platforms.Python provides a rich collection built-in data types such as strings, lists, dictionaries; dynamic typing binding, modules, classes, exceptions handling, automatic memory management, multiprocessing, parallel capabilities.Python can also...
This paper describes current work toward the design of a guide robot system. We present method to recognize people's interest and intention from their walking trajectories in indoor environments, which enables service proactively approach people provide services them. conducted observational experiments museum as target test environment where participants were asked visit that museum. From these experiments, we have found mainly three kinds trajectory patterns inside depend on exhibits....
Globalization is certainly a blessing for us. Still, this term also brought such things that are constantly not only creating social insecurities but diminishing our mental health, and one of them Cyberbullying. Cyberbullying misuse technology encourages harassment among people. Research on detection has gained increasing attention nowadays in many languages, including Bengali. However, the amount work Bengali language compared to others insignificant. Here we introduce Hybrid ensemble...
This paper introduces a system to track visitors' positions and movement patterns through museum art galleries with the goal of assisting curators other Museum Professionals (MPs) in tedious task analyzing activities, behaviors experiences. We use multiple LIDARs as primary sensing technology supporting our proposed system. also describe how valuable information related visitor can be autonomously collected analyzed using Additionally, we present solution visualize preferences respect...
This paper presents a guide robot system which observes people's interest and intention towards paintings in museum scenarios proactively offers guidance to them using robot, if needed. To do that, we utilized multiple USB video camera sensors support the detecting tracking visual focus of attention (VFOA) toward paintings. In this study, consider each person's head orientation profile information compute importance values identify target-person that may be interested particular painting....
With the advancement of wireless technology, based automation is playing an important role in human life. Home a house or living environment that contains technology to allow devices and systems be controlled automatically. The remote control useful keep home comfortable for general people support elderly physically impaired people. In this paper, we propose system will able household appliances remotely. provides ON/OFF voice response via speaker according user command on appliances. We...
This paper propounds an automated Facial Expression Recognition (FER) system based on Histogram of Oriented Gradients (HOG) and Support Vector Machine (SVM). The proposed method recognizes facial expressions for static images real-time applications. Firstly, face parts are detected from the input image. Preprocessing is performed over using histogram equalization image sharpening technique to reduce illumination effect. Then HOG used extract distinctive features regions concatenated into a...
Internet of Things (IoT) provides a platform where devices can be connected, sensed and controlled remotely across network infrastructure. In this paper we propose smart campus model using IoT technology its purpose is to achieve the intelligent management service on campus. After analyzing various research studies, have designed based which incorporates oriented application services. The worked idea three hierarchy as perception layer, layer. Services will provided end users via mobile...
Wireless communications has become one of the fastest growing areas in our modern life and creates enormous impact on nearly every feature daily life.In this paper, performance M-ary modulations schemes (MPSK, MQAM, MFSK) based wireless communication system audio signal transmission over Additive Gaussian Noise (AWGN) channel are analyzed terms bit error probability as a function SNR.Based results obtained present study, MPSK MQAM showing better for lower modulation order whereas these...
The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time wireless network. In this paper, we propose two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce new concept head-set, consists one active cluster head and some other associate heads within cluster. head-set members are responsible control management Results show that reduces consumption quite significantly prolongs network as...
In this paper, we propose a human-robot interaction system in which the robot detects and classifies target human's gaze pattern into either spontaneous looking or scene-relevant looking. If is detected as looking, waits for human without disturbing his/her attention. However, if establishes communication channel with him/her order to explain about scene. We have implemented proposed robot, Robovie-R3 museum guide tested confirm its effectiveness.
In this paper, we investigate the impact of Forward Error Correction (FEC) codes namely Cyclic Redundancy Code and Convolution on performance OFDM wireless communication system for speech signal transmission over both AWGN fading (Rayleigh Rician) channels in term Bit Probability. The simulation has been done conjunction with QPSK digital modulation compared uncoded resultstal modulation. channels, it is found via computer that interleaved based systems outperform than CRC as well channels.
A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper.It an extension of LEACH protocol.We introduce cluster head-set idea for cluster-based where several clusters are formed with the deployed sensors to collect information from target field.On rotation basis, a member receives data neighbor nodes and transmits aggregated results distance base station.This reduces energy consumption quite significantly prolongs life...
This introduces a method which uses LIDAR to identify humans and track their positions, body orientation, movement trajectories in any public space read various types of behavioral responses surroundings. We use network poles, installed at the shoulder level typical adults reduce potential occlusion between persons and/or objects even large-scale social environments. With this arrangement, simple but effective human tracking is proposed that works by combining multiple sensors' data so areas...
In most of the cluster-based routing protocols for wireless sensor networks (WSNs), cluster heads (CHs) are selected from normal sensors which may expire rapidly due to fast energy diminution such an additional workload. As a consequence, network lifetime protocol reduces drastically. To resolve these constraints, in this study, we proposed gateway-based protocol-namely Energy-Aware Gateway Based Routing Protocol (EAGBRP) WSNs. our protocol, deployed nodes WSN were divided into five logical...