Muhammad Ashad Kabir

ORCID: 0000-0002-6798-6535
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Misinformation and Its Impacts
  • Personal Information Management and User Behavior
  • Context-Aware Activity Recognition Systems
  • COVID-19 diagnosis using AI
  • Human Mobility and Location-Based Analysis
  • Mobile Health and mHealth Applications
  • Advanced Text Analysis Techniques
  • Diabetic Foot Ulcer Assessment and Management
  • Blockchain Technology Applications and Security
  • Sentiment Analysis and Opinion Mining
  • Service-Oriented Architecture and Web Services
  • Opportunistic and Delay-Tolerant Networks
  • Food Supply Chain Traceability
  • Smart Agriculture and AI
  • Text and Document Classification Technologies
  • Digital Mental Health Interventions
  • Complex Network Analysis Techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Spam and Phishing Detection
  • Software Engineering Research
  • Video Analysis and Summarization
  • IoT and Edge/Fog Computing
  • COVID-19 and Mental Health
  • Innovative Human-Technology Interaction
  • Mobile Agent-Based Network Management

Charles Sturt University
2016-2025

University of Chittagong
2020

Swinburne University of Technology
2010-2018

Pusan National University
2008

The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals because its market worth and rapid growth. These devices have limited computational capabilities, which ensure minimum power absorption. Moreover, the manufacturers use simplified architecture offer a competitive price in market. As result, IoMTs cannot employ advanced security algorithms defend against cyber-attacks. IoMT easy prey for due access valuable data rapidly expanding market, as well being...

10.3390/electronics12173541 article EN Electronics 2023-08-22

In recent times, Bitcoin has gained special attention both from industry and academia. The underlying technology that enables (or more generally crypto-currency) is called blockchain. At the core of blockchain a data structure keeps record transactions in network. feature distinguishes it existing its immutability stored records. To achieve immutability, uses consensus cryptographic mechanisms. As distributed nodes this also termed as "Distributed Ledger Technology (DLT)". many researchers...

10.1109/trustcom/bigdatase.2018.00186 article EN 2018-08-01

Mobile phones can record individual's daily behavioral data as a time-series. In this paper, we present an effective time-series segmentation technique that extracts optimal time segments of similar characteristics utilizing their mobile phone data. One the determinants behavior is various activities undertaken at times-of-the-day and days-of-the-week. many cases, such will follow temporal patterns. Currently, researchers use either equal or unequal interval-based for mining users' behavior....

10.1093/comjnl/bxx082 article EN The Computer Journal 2017-08-28

The COVID-19 pandemic continues to severely undermine the prosperity of global health system. To combat this pandemic, effective screening techniques for infected patients are indispensable. There is no doubt that use chest X-ray images radiological assessment one essential techniques. Some early studies revealed patient's showed abnormalities, which natural with COVID-19. In paper, we proposed a parallel-dilated convolutional neural network (CNN) based detection system from images, named as...

10.1007/s13755-020-00119-3 article EN other-oa Health Information Science and Systems 2020-09-21

Smart Home automation is increasingly gaining popularity among current applications of Internet Things (IoT) due to the convenience and facilities it provides home owners. Sensors are employed within appliances via wireless connectivity be accessible remotely by owners operate these devices. With exponential increase smart IoT devices in marketplace such as door locks, light bulbs, power switches etc, numerous security concerns arising limited storage processing devices, making vulnerable...

10.1109/access.2020.3004662 article EN cc-by IEEE Access 2020-01-01

The goal of this research is to develop and implement a highly effective deep learning model for detecting COVID-19. To achieve goal, in paper, we propose an ensemble Convolutional Neural Network (CNN) based on EfficientNet, named ECOVNet, detect COVID-19 from chest X-rays. make the proposed more robust, have used one largest open-access X-ray data sets COVIDx containing three classes—COVID-19, normal, pneumonia. For feature extraction, applied CNN structure, namely with ImageNet...

10.7717/peerj-cs.551 article EN cc-by PeerJ Computer Science 2021-05-26

The dark web is a section of the Internet that not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network anonymity pave way for illegal activities help cybercriminals execute well-planned, coordinated, malicious cyberattacks. Cyber security experts agree online criminal are increasing exponentially, they also becoming more rampant intensified. These cyber include various destructive crimes may target single person or whole nation, example, data...

10.1109/access.2022.3161547 article EN cc-by IEEE Access 2022-01-01

In this technologically advanced era, with the proliferation of artificial intelligence, many mobile apps are available for plant disease detection, diagnosis, and treatment, each a variety features. These need to be categorized reviewed following proper framework that ensures their quality. This study aims present an approach evaluating detection apps, includes providing ratings distinct features insights into exploitation intelligence used in detection. For purpose, were searched three...

10.3390/agronomy12081869 article EN cc-by Agronomy 2022-08-08

Diabetes is a chronic disease caused by persistently high blood sugar level, causing other diseases, including cardiovascular, kidney, eye, and nerve damage. Prompt detection plays vital role in reducing the risk severity associated with diabetes, identifying key factors can help individuals become more mindful of their lifestyles. In this study, we conducted questionnaire-based survey utilizing standard diabetes variables to examine prevalence Bangladesh. To enable prompt compared different...

10.3390/info14070376 article EN cc-by Information 2023-07-02

Soil colour is a key indicator of soil health and the associated properties. In agriculture, provides farmers advises with visual guide to interpret functions performance. Munsell charts have been used determine for many years, but process fallible, as it depends on user’s perception. As smartphones are widely come high-quality cameras, popular one was capturing images this study. This study aims predict (MSC) from book (MSCB) by using deep learning techniques mobile-captured images. MSCB...

10.3390/s25010287 article EN cc-by Sensors 2025-01-06

Convolutional Neural Networks (CNNs) have drawn researchers' attention to identifying cattle using muzzle images. However, CNNs often fail capture long-range dependencies within the complex patterns of muzzle. The transformers handle these challenges. This inspired us fuse strengths and in muzzle-based identification. Addition concatenation been most commonly used techniques for feature fusion. addition fails preserve discriminative information, while results an increase dimensionality. Both...

10.48550/arxiv.2501.05209 preprint EN arXiv (Cornell University) 2025-01-09

The skin, as the largest organ of human body, is vulnerable to a diverse array conditions collectively known skin lesions, which encompass various dermatoses. Diagnosing these lesions presents significant challenges for medical practitioners due subtle visual differences that are often imperceptible naked eye. While not all life-threatening, certain types can act early indicators severe diseases, including cancers, underscoring critical need timely and accurate diagnostic methods. Deep...

10.48550/arxiv.2501.05991 preprint EN arXiv (Cornell University) 2025-01-10

Personal data such as electronic medical records and academic are critical sensitive private information. These personal information is usually hosted across many data-custodian systems. Data Store (PDS) a service that lets an individual store, manage deploy their key in highly secure structured way. It also gives the user central point of control for One inherent problems digital it can be easily forged. Therefore, data-consumer(with whom shared) often needs to verify authenticity shared...

10.1109/trustcom/bigdatase.2018.00183 article EN 2018-08-01

Precise Soil Moisture (SM) assessment is essential in agriculture. By understanding the level of SM, we can improve yield irrigation scheduling which significantly impacts food production and other needs global population. The advancements smartphone technologies computer vision have demonstrated a non-destructive nature soil properties, including SM. study aims to analyze existing Machine Learning (ML) techniques for estimating SM from images understand moisture accuracy using different...

10.3390/agriculture13030574 article EN cc-by Agriculture 2023-02-27

Autism Spectrum Disorder (ASD) is a neurological impairment condition that severely impairs cognitive, linguistic, object recognition, interpersonal, and communication skills. Its main cause genetic, early treatment identification can reduce the patient’s expensive medical costs lengthy examinations. We developed machine learning (ML) architecture capable of effectively analysing autistic children’s datasets accurately classifying identifying ASD traits. considered screening dataset toddlers...

10.3390/computers12050092 article EN cc-by Computers 2023-04-30

Knowledge graph is useful for many different domains like search result ranking, recommendation, exploratory search, etc. It integrates structural information of concepts across multiple sources, and links these together. The extraction domain specific relation triples (subject, verb phrase, object) one the important techniques knowledge construction. In this research, an automatic method named HDSKG proposed to discover their from content webpages. We incorporate dependency parser with...

10.1109/saner.2017.7884609 article EN 2017-02-01

The spread of 'fake' health news is a big problem with even bigger consequences. In this study, we examine collection health-related articles published by reliable and unreliable media outlets. Our analysis shows that there are structural, topical, semantic patterns which different in contents from Using machine learning, leverage these build classification models to identify the source (reliable or unreliable) article. model can predict an article F-measure 96%. We argue findings study will...

10.1145/3308560.3316741 article EN 2019-05-13
Coming Soon ...