Kamruddin Nur

ORCID: 0000-0002-4504-6649
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Data Compression Techniques
  • Advanced Malware Detection Techniques
  • Traffic Prediction and Management Techniques
  • Topic Modeling
  • Speech and Audio Processing
  • Advanced Steganography and Watermarking Techniques
  • Advanced Text Analysis Techniques
  • Context-Aware Activity Recognition Systems
  • Algorithms and Data Compression
  • Speech Recognition and Synthesis
  • QR Code Applications and Technologies
  • User Authentication and Security Systems
  • Interactive and Immersive Displays
  • Indoor and Outdoor Localization Technologies
  • Blockchain Technology Applications and Security
  • Poxvirus research and outbreaks
  • Image Retrieval and Classification Techniques
  • Smart Agriculture and AI
  • AI in cancer detection
  • COVID-19 diagnosis using AI
  • Image and Signal Denoising Methods
  • Digital Imaging for Blood Diseases
  • Sentiment Analysis and Opinion Mining
  • Network Security and Intrusion Detection
  • Speech and dialogue systems

American International University-Bangladesh
2019-2025

Weatherford College
2024

International University
2023

Bangladesh University of Professionals
2019

United International University
2011-2017

Stamford University Bangladesh
2012-2017

Universitat Pompeu Fabra
2013-2016

University of Dhaka
2012

Marymount University
2012

Northern University Bangladesh
2012

With the evolution of Internet and multimedia technology, amount text data has increased exponentially. This volume is a precious source information knowledge that needs to be efficiently summarized. Text summarization method reduce into compact variant, preserving its actual meaning. Here we thoroughly investigate automatic (ATS) summarize widely recognized ATS architectures. paper outlines extractive abstractive technologies provides deep taxonomy domain. The presents classical algorithms...

10.1109/access.2021.3129786 article EN cc-by IEEE Access 2021-01-01

Offensive messages on social media, have recently been frequently used to harass and criticize people. In recent studies, many promising algorithms developed identify offensive texts. Most analyze text in a unidirectional manner, where bidirectional method can maximize performance results capture semantic contextual information sentences. addition, there are separate models for identifying texts based monolingual multilingual, but few that detect both multilingual-based this study, detection...

10.32604/csse.2023.027841 article EN cc-by Computer Systems Science and Engineering 2022-06-15

10.12720/jait.13.6.604-613 article EN Journal of Advances in Information Technology 2022-01-01

The transportation industry contributes significantly to climate change through carbon dioxide ( $$\hbox {CO}_{2}$$ ) emissions, intensifying global warming and leading more frequent severe weather phenomena such as flooding, drought, heat waves, glacier melting, rising sea levels. This study proposes a comprehensive approach for predicting emissions from vehicles using deep learning techniques enhanced by eXplainable Artificial Intelligence (XAI) methods. Utilizing dataset the Canadian...

10.1038/s41598-025-87233-y article EN cc-by-nc-nd Scientific Reports 2025-01-29

Acute lymphoblastic leukaemia (ALL) is a severe disease requiring invasive, expensive, and time-consuming diagnostic tests for definitive diagnosis. Initial diagnosis using blood smear pictures (BSP) crucial but challenging due to the similar indications symptoms of ALL, often leading misdiagnoses. This study presents custom approach Convolutional Neural Networks (CNNs) detect all cases categorize subtypes. Utilizing publicly available databases, includes 3562 images from 89 patients. The...

10.11591/ijeecs.v38.i2.pp950-959 article EN Indonesian Journal of Electrical Engineering and Computer Science 2025-02-27

RFID can be used to obtain information about objects present in a physical space, including their approximate location. Handheld readers, smart shelves, zenithal antennas, and autonomous robots additional with varying time space resolutions. The authors system that projects this on panoramic view of retail store, allowing users virtually navigate the quasi-real-time products as they actually are store. For example, when user clicks image shelf panorama, product appears at or near position...

10.1109/mis.2015.90 article EN IEEE Intelligent Systems 2015-11-01

To lift the revenue boundary and stay ahead of competitors it is important to understand customer's purchase behavior. Different business industries proposed different policies explore potentiality a customer based on statistical analysis. In this paper, we rather propose machine learning approach identify potential customers for retail superstore. The paper an engineered classify customer, previously recorded Using classification as ground truth, then apply algorithms find pattern predict...

10.1109/icrest.2019.8644458 article EN 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST) 2019-01-01

Banks provide ATM cards to customer avail the services like cash withdrawal, PIN change, balance inquiry etc. But physical have some problems. It can be stolen, skimmed, cloned, hijacked, damaged or expired. Due this problem, we need think an alternate way better security. Many researchers are thinking about cardless transaction through ATM. Iyabode et. al. [1] proposed a conceptual model for Electronic which do inquiry, fund transfer We analyzed their protocol and found flaws on this. This...

10.1109/icrest.2019.8644248 article EN 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST) 2019-01-01

Ensuring the quality of software systems is essential for effective and efficient usage in complex development procedures. A vital component whole procedure early identification forecasting potential defects or issues components. Using NASA-curated JM1 dataset, this study examines prediction accuracy various machine learning techniques, such as Naïve Bayes, Decision Trees, Random Forest, Support Vector Machine, Logistic Regression, Artificial Neural Networks, K-Nearest Neighbors detecting...

10.1109/icaccess61735.2024.10499572 article EN 2024-03-08

Cucumbers are crucial agricultural commodities worldwide, necessitating production enhancements and quality maintenance. However, several diseases can easily hamper cucumber if not classified detected early. This study proposes a modified deep learning approach for identifying classifying at early stages using the Kaggle dataset. We applied data augmentation techniques to enhance robustness of our model. replaced original MobileNetV2 classifier with custom classifiers, including linear...

10.1109/iceeict62016.2024.10534530 article EN 2024-05-02

Elder adults may have some dependence on performing common activities like zapping the television through a remote control (i.e. due to possible hand mobility problems). The Internet of Things (IoT), including Radio Frequency Identification (RFID), interconnects devices provide higher variety services. Together, and by applying intelligence Machine Learning (ML) techniques, advanced applications can be implemented improving people's life. We present Smart Surface system, relying state art...

10.1109/ie.2016.25 article EN 2016-09-01

E-Banking in www is growing exponentially, but here consumer authentication, credential confidentiality, transaction information integrity are concerns.In this research work emphasize the protection of online banking.At first, E-banking analyzed for all kinds vulnerabilities and a practical investigation type attacks carried out.In paper, security-aware architecture introduced to protect from several attacks.The proposed system has secure protocol certificate verification mechanism.The...

10.5120/ijca2017913093 article EN International Journal of Computer Applications 2017-02-15

Employee promotion is an important aspect of the human resource management process. Due to different factors, it refers automatic improvement among employees in organization. Promoting from lower level higher brings a feeling satisfaction employees. It improves their job and motivation by providing more significant income, status, responsibilities. By building up loyalty, reduces employee attrition. Thus, difficult accurately decide, whether should or not be promoted based on current past...

10.53799/ajse.v22i3.781 article EN cc-by-nc-nd AIUB Journal of Science and Engineering (AJSE) 2023-12-20

One of the biggest problem faced by visually impaired people is to navigate from one place another. They always need human support for moving either indoors or outdoors. The unfavourable conditions environment make it more complicated people. A blind person needs be alert get off situations like crashing with obstacles, holes, staircases, slipping down wet territory. Also, in case any emergency, they might want send an message their families friends nearly location. Considering above, this...

10.1109/icsct53883.2021.9642500 article EN 2021-08-05

In this current age both communication and generic file compression technologies are using different kind of efficient data methods massively.This paper surveys a variety methods.The aim is to reduce redundancy in stored or communicated data.Data has important application the area storage distributed system.This will provide an overview several formulate new algorithms that may improve ratio abate error reconstructed data.In work techniques: Huffman, Run-Length, LZW, Shannon-Fano,...

10.5120/ijca2017912416 article EN International Journal of Computer Applications 2017-02-15

The usage of native language through Internet is highly demanding now a day due to rapidly increase based application in daily needs. It important read all information Bangla from the internet. Universal Networking Language (UNL) addressed this issue most languages. helps overcome barrier among people different nations solve problems emerging current globalization trends and geopolitical interdependence. In paper we propose work that aims contribute with morphological analysis those words...

10.14569/ijacsa.2011.020624 article EN cc-by International Journal of Advanced Computer Science and Applications 2011-01-01

10.12720/jait.13.3.240-248 article EN Journal of Advances in Information Technology 2022-01-01

In today's communicative and multimedia computing world, JPEG images play a vast consequential role.The have been able to satisfy the users by fulfilling their demand of preserving numerous digital within considerably less storage space.Although standard offers four different sorts compression mechanism, among them Baseline or Lossy Sequential DCT Mode is most popular since it can store image temporarily removing its psychovisual redundancy thereby offering very space for large image.Again,...

10.5120/8733-2712 article EN International Journal of Computer Applications 2012-10-19

Today's retail consumers' general behavior consists of doing the research for products preferably online while purchasing them offline. Users would like to access stores' inventories before going shop. This paper first identifies challenges that need be addressed navigate within a store and its inventory anytime anywhere without being physically there. Then, it analyzes existing approaches management based on Radio Frequency Identification (RFID). And finally, proposes solution robots. We...

10.1145/2494091.2496011 article EN 2013-09-08

IJCA is a computer science and electronics journal related with Theoretical Informatics, Quantum Computing, Software Testing, Computer Vision, Digital Systems, Pervasive Computational Topology etc.

10.5120/4897-7429 article EN public-domain International Journal of Computer Applications 2012-02-29
Coming Soon ...