Mohammad Arifuzzaman

ORCID: 0000-0002-1280-5813
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Energy Harvesting in Wireless Networks
  • Peer-to-Peer Network Technologies
  • Cooperative Communication and Network Coding
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Green IT and Sustainability
  • Network Security and Intrusion Detection
  • Indoor and Outdoor Localization Technologies
  • Wireless Networks and Protocols
  • Imbalanced Data Classification Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Sentiment Analysis and Opinion Mining
  • Security in Wireless Sensor Networks
  • Robotics and Sensor-Based Localization
  • Data Mining Algorithms and Applications
  • Hate Speech and Cyberbullying Detection
  • Artificial Intelligence in Healthcare
  • Advanced Wireless Network Optimization
  • Advanced Data Storage Technologies
  • Advanced Text Analysis Techniques
  • Anomaly Detection Techniques and Applications

East–West University
2024

East West University
2016-2024

Bangladesh University of Engineering and Technology
2019

Dhaka University of Engineering & Technology
2017

National University of Mongolia
2017

Biomedical Research Foundation
2017

Memorial University of Newfoundland
2015-2016

Waseda University
2011-2015

Advanced metering infrastructure (AMI), as the totality of systems and networks to measure, collect, store, analyze, use energy usage data, is supposed be core component in smart grid. In AMI, there are numerous challenges among which cyber security a major one that needs addressed with priority. The information centric networking (ICN) promising architecture for future Internet disseminates content based on named data instead hosts. congestion control self-security can enable more scalable,...

10.1109/tim.2015.2444238 article EN IEEE Transactions on Instrumentation and Measurement 2015-07-10

Sentiment analysis (SA) is a subset of natural language processing (NLP) research. In the case categorical weighted based dictionary with rule-based sentiment score generation, no work in SA has been done yet Bangla using deep learning (DL) approaches. This paper proposes DL models for on text an extended lexicon data (LDD). We implement method (BTSC) algorithm extracting polarity from large texts. These polarities are then fed into neural network along preprocessed as training samples. The...

10.1016/j.array.2021.100123 article EN cc-by-nc-nd Array 2022-01-01

With the proliferation of Internet's social digital content, sentiment analysis (SA) has gained a wide research interest in natural language processing (NLP).A few significant been done Bangla domain because having intricate grammatical structure on text.This paper focuses SA context language.Firstly, specific domain-based categorical weighted lexicon data dictionary (LDD) is developed for analyzing sentiments Bangla.This LDD by applying concepts normalization, tokenization, and stemming to...

10.2991/nlpr.d.210316.001 article EN cc-by-nc Natural Language Processing Research 2021-01-01

This paper represents Quadcopter (QC) as a low-weight and low-cost autonomous flight capable Unmanned Aerial Vehicle (UAV) for delivering parcel ordered by online using an android device its core on-board processing unit. QC following Google map can locate navigate destination. demonstrates the QCs capability of coming back to starting place. The promising result this method enables future research on parcel.

10.1109/iceeict.2014.6919154 article EN 2014-04-01

In this paper, we present the Intelligent Hybrid MAC (IH-MAC), a novel low power with quality of service guaranteed medium access control protocol for wireless sensor networks (WSNs). The IH-MAC achieves high energy efficiency under wide range traffic load. It ensures shorter latency to critical and delay-sensitive packets. channel utilization during load without compromising efficiency. does it by using strength CSMA TDMA approach intelligence. idea behind is that uses both broadcast...

10.1109/jsen.2013.2252163 article EN IEEE Sensors Journal 2013-03-11

Chronic kidney disease (CKD) represents a significant global health challenge characterized by progressive decline in renal function, leading to the accumulation of waste products and disruptions fluid balance within body. Given its pervasive impact on public health, there is pressing need for effective diagnostic tools enable timely intervention. Our study delves into application cutting-edge transfer learning models early detection CKD. We carefully test performance several models, such as...

10.54364/aaiml.2025.51196 article EN Advances in Artificial Intelligence and Machine Learning 2025-01-01

This research proposes a novel wireless information-centric networking (ICN) architecture, namely, Context-Aware Green ICN Model (CAGIM), which can adapt the power consumption of network nodes to optimized values according associated link utilization. The adaption in is conducted through dynamically adjusting link-rate corresponding content popularity and traffic load reduce wasteful energy consumption. Moreover, we propose smart popularity-based caching strategy, called distinguished scheme...

10.1109/access.2018.2828462 article EN cc-by-nc-nd IEEE Access 2018-01-01

Deep neural networks (DNNs), the integration of (NNs) and deep learning (DL), have proven highly efficient in executing numerous complex tasks, such as data image classification. Because multilayer a nonlinearly separable structure is not transparent, it critical to develop specific classification model from new unexpected dataset. In this paper, we propose novel approach using concepts DNN decision tree (DT) for classifying nonlinear data. We first developed tree-based network (DTBNN)...

10.3390/technologies11010024 article EN cc-by Technologies 2023-02-01

Due to the expansion of social networks and e-commerce websites, sentiment analysis or opinion mining has become a more active study issue in recent years. The objective is identify categorize positive negative expressed piece text. Consumers can submit reviews with specified rating on websites like Amazon.com. As result, our paper, we sought construct related product ratings text utilizing Amazon's dataset. Linear Support Vector Ma-chine, Random Forest, Multinomial Naive Bayes, Bernoulli...

10.1109/icaeee54957.2022.9836420 article EN 2022-02-24

With the increasing number of internet users, cybercrime is at a high rate. Among all cyber- attack, phishing has now confirmed so successful and one attack vector. Throughout our investigation we find that it most uses used many ways to targeted user. Attacks by URL, email websites are very popular way attack. But now-a-days with popularity social media online gaming, attackers targeting this for Machine learning giving new era both users who want prevent In work build twitter spear bot...

10.1109/acmi53878.2021.9528204 article EN 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0 (ACMI) 2021-07-08

The highest invading cancer among the women is breast cancer. Early detection of higher chance patient being treated. In this study, we have proposed an ensemble method named stacking classifier which combines multiple classification techniques and efficaciously classifies benign malignant tumor. "Wisconsin Diagnosis Breast Cancer" dataset culled from UC Irvine Machine Learning Repository has been used for our experiment. We applied different over tuned their parameters to improve accuracy....

10.1109/tensymp50017.2020.9230871 article EN 2017 IEEE Region 10 Symposium (TENSYMP) 2020-01-01

In this article, we construct a concrete model as the prototype of efficient and reliable wireless Information Centric Networking (ICN) within context Intelligent Transport System (ITS). This research proposes novel proactive-caching technique in ICN providing robust effective content delivery to mobile nodes (commuters) for transportation system fitting numerous mobility scenarios thanks our "smart scheduler". We also propose architecture which can adapt power consumption network actual...

10.1109/kaleidoscope.2015.7383641 article EN 2015-12-01

In order to address the energy flaw and enhance efficiency of Information Centric Networking (ICN) Architecture, this research proposes an innovated optimal ICN model with adaptive power consumption ability based on popularity content adapt router link rate its real-time utilization for optimizing operating value interest traffic server select working mode server/content provider. With dynamic control/adaptive mechanism, proposed architecture can provide higher reliability better...

10.1109/isads.2015.39 article EN 2015-03-01

In Information Centric Networking (ICN), besides Off-path caching, On-path caching is an integrated solution with-in ISP's local network. However, in content cached en-route the backward path towards Interest generator and RENE <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sup> /NRS xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> (in routing through name resolution) or FIB xmlns:xlink="http://www.w3.org/1999/xlink">3</sup> name-based...

10.1109/eucnc.2015.7194111 article EN 2015-06-01

Advanced Metering Infrastructure (AMI), as the totality of systems and networks to measure, collect, store, analyze, use energy usage data, is supposed key component that should be preferentially constructed for smart grid. In meanwhile, content-centric networking (CCN) perceived a promising approach where content itself becomes core communication instead address or location in future internet research. Based on its caching advantage, it widely believed CCN can effectively reduce AMI network...

10.1109/amps.2014.6947719 article EN 2014-09-01

Abstract The use of information and communication technologies to engage in bullying behavior is known as cyberbullying. Today's society facing a major growing challenge cyberbullying result the misuse inappropriate usage social media. A few significant researches have been done Artificial Intelligence (AI) inspired cyber bulling detection domain because not having related dataset. This paper focuses on AI based context networking sites Facebook, Twitter, Instagram, TikTok YouTube English...

10.21203/rs.3.rs-4031554/v1 preprint EN cc-by Research Square (Research Square) 2024-03-12

The contributions of this paper are twofold. Firstly, we analyze the decision making problem caching contents by network players Information Centric Networking (ICN) from a game theoretic perspective. We also mention possible content distribution model for ICN. By our proposed theory, different can find optimality taking into consideration which benefits them with optimum revenue. Secondly, present solution Live Streaming Media broadcast in ICN and economic part tree. believe, clearly shows...

10.1109/kaleidoscope.2014.6858467 article EN 2014-06-01

In this paper, we propose a novel joint routing and medium access control (MAC) protocol with traffic differentiation, based on quality of service (QoS) for wireless sensor networks (WSNs). This is referred to as MAC (JRM) protocol. By leveraging the classical layered approach combining layer functions, proposed JRM achieves solution energy efficiency in WSNs. also ensures low latency prioritized traffic. There are three major advantages Firstly, instantaneous network information (e.g.,...

10.1109/glocom.2016.7841933 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

At present classification of imbalanced data is a major concern. Machine learning algorithm fails to achieve expected result when imbalance. Major challenge imbalance dataset that sometimes minority classes are useful but machine algorithms tended be biased towards the majority and ignore classes. To better from our we need train using relevant in such way makes those machines more talented can give accurate decision by itself for an unknown result. Here propose SMOTE approach predicting...

10.1109/times-icon47539.2019.9024630 article EN 2019-12-01

In order to address the energy issue and enhance feasibility of Information-Centric Networking (ICN) in case access networks, this research proposes a novel Green ICN design which can adapt power consumption network devices their optimized real-time link-utilizations based on content popularity levels. We utilize dynamic ALR (Adaptive Link Rate) scheme for nodes provide efficient delivery as realistic approach economically viable green also develop game-theoretical model study interaction...

10.1109/cscn.2017.8088611 article EN 2017-09-01

The Advanced Metering Infrastructure (AMI) is the core component in Smart Grid. cyber security one of major concerns and challenges should be prior considered. Information Centric Networking (ICN) a promising architecture for future Internet that disseminates content based on named data instead hosts. It will involved into Grid because its excellent congestion control self-security can enable more scalable, secure, collaborative pervasive networking. This paper aims at proposing an AMI...

10.1109/powercon.2014.6993993 article EN 2014-10-01

In this paper, we present a novel low power medium access control protocol for wireless sensor networks (WSNs). The proposed protocol, EP-MAC (Efficient MAC with Parallel Transmission) achieves high energy efficiency and packet delivery ratio under different traffic load. is basically based on the Time Division Multiple Access (TDMA) approach. of Carrier Sense (CSMA) used in order to offset fundamental problems that stand-alone TDMA method suffers from, i.e., such as lack scalability,...

10.3390/jsan1020111 article EN cc-by Journal of Sensor and Actuator Networks 2012-08-27

Email users are increasing at a high rate and huge number of people's privacy is getting risked by spam email it also kills valuable time people most often. Spam can be malicious as well commercial use in for marketing which not desirable to us. Hence, detecting filtering emails from several must work do. There enormous machine learning (ML) algorithms some them used detect analyze unwanted emails. In this paper, we the supervised ML technique on an existing classification dataset where...

10.1109/acmi53878.2021.9528108 article EN 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0 (ACMI) 2021-07-08
Coming Soon ...