Mohammad Zahidur Rahman

ORCID: 0000-0002-0998-569X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Steganography and Watermarking Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Artificial Intelligence in Healthcare
  • ECG Monitoring and Analysis
  • Healthcare Technology and Patient Monitoring
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Machine Learning in Healthcare
  • IoT and Edge/Fog Computing
  • Distributed systems and fault tolerance
  • Advanced Data Storage Technologies
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Blockchain Technology Applications and Security
  • Energy Load and Power Forecasting
  • Hemodynamic Monitoring and Therapy
  • Semantic Web and Ontologies
  • Data Stream Mining Techniques
  • Digital Platforms and Economics
  • Data Mining Algorithms and Applications

Jahangirnagar University
2013-2024

University of Canberra
2017

UNSW Sydney
2017

Jatiya Kabi Kazi Nazrul Islam University
2017

University of Malaya
1999-2001

Information Technology University
2000-2001

In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections keeps false positives at acceptable level different types of attacks, eliminates redundant attributes as well contradictory examples from training data that make the model complex. The proposed also addresses some difficulties mining such handling continuous attribute, dealing with missing attribute values, reducing...

10.5121/ijnsa.2010.2202 article EN International Journal of Network Security & Its Applications 2010-04-12

Recently, research on intrusion detection in computer systems has received much attention to the computational intelligence society. Many learning algorithms applied huge volume of complex and dynamic dataset for construction efficient (IDSs). Despite many advances that have been achieved existing IDSs, there are still some difficulties, such as correct classification large dataset, unbalanced accuracy high speed network traffic, reduce false positives. This paper presents a new approach...

10.4304/jcp.5.1.23-31 article EN Journal of Computers 2009-11-20

In this paper, we introduce a new learning algorithm for adaptive intrusion detection using boosting and naïve Bayesian classifier, which considers series of classifiers combines the votes each individual classifier classifying an unknown or known example.The proposed generates probability set round updates weights training examples based on misclassification error rate that produced by in round.This addresses problem large dataset, improves rates (DR) reduces false positives (FP) at...

10.5120/2932-3883 article EN International Journal of Computer Applications 2011-06-30

Cricket is the most popular sport in south Asian countries and second globally. And T20 cricket attractive version of this game. Businesses have grown enormously based on cricketing sports events from last decade. A large number research been done to predict winner matches or analyze game statistics. These studies are helping investors franchisees decide which team they can invest gain more profit. Also, coaches, analysts, technicians get facts ideas about other teams, help them make...

10.1109/iccci54379.2022.9740867 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2022-01-25

Recent intrusion detection have emerged an important technique for information security systems. Its very that the mechanisms system should be designed to prevent unauthorized access of resources and data. Last few years, many intelligent learning techniques machine applied large volumes complex dynamic audit data construction efficient systems (IDS). This paper presents, theoretical overview a new approach based on adaptive Bayesian algorithm. algorithm correctly classify different types...

10.1109/iccitechn.2008.4803036 article EN 2008-12-01

It is always a good choice to consider multiple sources when analyzing crime. Newspaper can be source of crime analysis as it contains the massive amount data related any particular subject but fact they are not structured enough make definite decision. In this paper, we represent system analyze news from online newspaper using different mining techniques. These techniques help extract useful pieces information about unstructured news. The will provide whether or not, location, similarity...

10.1109/iccitechn.2017.8281798 article EN 2017-12-01

At present telemedicine is widely used in developing countries for its variety of health services. In this paper, we have developed a low cost portable tool kit remote diagnosis patients. Remote patient monitoring one the vital component any We successfully able to collect data from locations by using our kit. research, collected seven signs patient's such as blood pressure, pulse and oxygen blood, glucose level, position falls, body temperature, electrical muscular functions heart through...

10.1109/ccaa.2017.8229817 article EN 2017-05-01

Lung cancer (LC) is a significant global health issue, with smoking as the most common cause. Recent epidemiological studies have suggested that individuals who smoke are more susceptible to COVID-19. In this study, we aimed investigate influence of and COVID-19 on LC using bioinformatics machine learning approaches. We compared differentially expressed genes (DEGs) between LC, smoking, datasets identified 26 down-regulated 37 up-regulated shared 7 6 Integration these resulted in...

10.3390/ijerph21111392 article EN International Journal of Environmental Research and Public Health 2024-10-22

In this paper, we introduce a new approach to the classification of streaming data based on bootstrap aggregation (bagging).The proposed creates an ensemble model by using ID3 classifier, naïve Bayesian and k-Nearest-Neighbor classifier for learning scheme where each gives weighted prediction.ID3, Bayesian, classifiers are very well known mining methods, which have been already used in many real life problems.The addresses practical problems successfully tested number benchmark including...

10.5120/3027-4098 article EN International Journal of Computer Applications 2011-07-31

The World Wide Web (www or w3 commonly known as the web) is largest database available with growth at rate of millions pages a day and presents challenging task for mining web data streams.Currently extraction knowledge from streams getting more complex, because structure doesn't match attribute-values when considering large volume data.In this paper, an ensemble decision tree classifiers presented, which efficient method to obtain proper set rules extracting amount streams.We built server...

10.5120/ijais12-450112 article EN International Journal of Applied Information Systems 2012-01-23

Cardiovascular diseases such as; heart attack (coronary thrombosis, myocardial infarction), hypertension, stroke, coronary artery disease (CAD), congestive failure, peripheral (PAD) and diabetes create a new concern worldwide due to its harmness. In Bangladesh where majority live in rural areas that lack specialist care, we envision the need for much larger Internet-based telemedicine systems would enable large pool of doctors hospitals collectively provide healthcare services entire...

10.1109/iccitechn.2014.6997381 article EN 2014-03-01

In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive naïve Bayesian tree, which not only reduce the (FP) at acceptable level, but also scale up detection rates (DR) different types of network intrusions. Due to tremendous growth network-based services, has emerged as an important technique security. Recently data mining are applied traffic and host-based program behaviors...

10.48550/arxiv.1005.0919 preprint EN cc-by-nc-sa arXiv (Cornell University) 2010-01-01

The pediatric cardiac intensive care unit (ICU) is a specialized section for children with heart diseases. patients admitted to the ICU are in very critical condition. data each day were collected hourly basis. So, time-series prediction might be beneficial physicians medication process of whose lives danger. This paper proposes multivariate time series where multiple features respect timestamps predicted using deep learning methods order assist doctors decision making tensed moment....

10.1109/icitiit51526.2021.9399593 article EN 2021-02-11

OBJECTIVES: Telemedicine based healthcare service faces different difficulties especially in the remote people of Bangladesh. The objective this study was to implement an advanced telemedicine model order provide services for rural METHODS: We devel oped using ardunio low cost portable tool kit by interfacing android application. Then we collected ECG, blood pressure, temperature, concentration glucose blood, SPO2, body position, airflow, height and weight through our developed model....

10.3233/thc-171101 article EN Technology and Health Care 2018-01-12

Cyber-Physical Systems (CPS) requires big data communications as well integration from several distributed sources. This can usually be interconnected with physical applications, such power grids or SCADA systems. In addition, it publicly accessible for using by third party users scientists. Therefore, becomes imperative to ensure that this is secured. Microaggregation an widely used technique protect a dataset through anonymity in order prevent exposure of person's identity. disclosure may...

10.1109/icdcsw.2017.65 article EN 2017-06-01

Load Forecasting has an important role in load generation, scheduling, planning etc. power system. Different computational intelligent techniques are used Short Term (STLF) to make it more effective. Neural Networks (NN) is effective mapping algorithm that can map complex input-output relationships, which technique do STLF having existing dataset. Usually a proper NN sufficient achieve accepted level of performance. But different dataset may bear some irregular nature demand scenario due...

10.1109/icelce.2010.5700794 article EN 2010-12-01

In this paper we have developed a Telemedicine model with portable tool kit for remote patients to collect vital signs of which are used services. This system is low cost, portable, and easily maintainable can be integrated any complex health system. We the GNU where local doctors communicate cost terminal. Expert also take part through terminal deliver treatment patients. The patient's medical history stored in database accessed from successfully designed collected data. Through our android...

10.1109/iciset.2016.7856513 article EN 2022 International Conference on Innovations in Science, Engineering and Technology (ICISET) 2016-10-01

Healthcare systems capture patients' data using different medical equipment and store it in the databases with a continual increase volume. The continuous processing sharing of this massive are rising concerns live transferring over networks. Sending patient to distant remote user without proper compressing format requires high latency communication channels. Any alternation transmitted via medium may also cause issues assuring authentication integrity. For solving problems, watermarking...

10.1016/j.heliyon.2022.e10788 article EN cc-by-nc-nd Heliyon 2022-09-29

Security and privacy have become crucial factors in auction design. Various schemes to ensure the safe conduction of sealed bid auctions been proposed recently. We propose a secure protocol. introduce new standard for auctions, that prevents extraction information despite any collusion participants. Present cryptographic protocol which is realization an electronic being component e-government or e-commerce system. Our provide non-reputation correctness.

10.1109/iccitechn.2008.4803092 article EN 2008-12-01

This paper presents the development of an Artificial Neural Networks and Particle Swarm Optimization (ANN-PSO) based short-term load forecasting model with improved generalization technique for Regional Power Control Center Saudi Electricity Company, Western Operation Area (SEC-WOA). Weather, demand, wind speed, direction, heat, sunlight, etc. are quite different in a desert land than other places. Thus this is from typical considering inputs outputs. In research two steps have been...

10.1109/iccit.2009.5407122 article EN 2009-12-01

Road traffic congestion remains a global phenomenon that causes great problems in the cities of world; especially developing countries, resulting massive delay, unpredictable travel times, increased fuel consumption, man-hour and monetary loss. In order to get better solution, one preposition is divert less congested route. One solution collecting road condition crowd sourcing. We proposed sourcing information will change network graph city according result. Based on this updated graph,...

10.1109/iccitechn.2016.7860235 article EN 2016-12-01
Coming Soon ...