- Misinformation and Its Impacts
- Personal Information Management and User Behavior
- Context-Aware Activity Recognition Systems
- COVID-19 diagnosis using AI
- Human Mobility and Location-Based Analysis
- Mobile Health and mHealth Applications
- Advanced Text Analysis Techniques
- Diabetic Foot Ulcer Assessment and Management
- Blockchain Technology Applications and Security
- Sentiment Analysis and Opinion Mining
- Service-Oriented Architecture and Web Services
- Opportunistic and Delay-Tolerant Networks
- Food Supply Chain Traceability
- Smart Agriculture and AI
- Text and Document Classification Technologies
- Digital Mental Health Interventions
- Complex Network Analysis Techniques
- Radiomics and Machine Learning in Medical Imaging
- Spam and Phishing Detection
- Software Engineering Research
- Video Analysis and Summarization
- IoT and Edge/Fog Computing
- COVID-19 and Mental Health
- Innovative Human-Technology Interaction
- Mobile Agent-Based Network Management
Charles Sturt University
2016-2025
University of Chittagong
2020
Swinburne University of Technology
2010-2018
Pusan National University
2008
The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals because its market worth and rapid growth. These devices have limited computational capabilities, which ensure minimum power absorption. Moreover, the manufacturers use simplified architecture offer a competitive price in market. As result, IoMTs cannot employ advanced security algorithms defend against cyber-attacks. IoMT easy prey for due access valuable data rapidly expanding market, as well being...
In recent times, Bitcoin has gained special attention both from industry and academia. The underlying technology that enables (or more generally crypto-currency) is called blockchain. At the core of blockchain a data structure keeps record transactions in network. feature distinguishes it existing its immutability stored records. To achieve immutability, uses consensus cryptographic mechanisms. As distributed nodes this also termed as "Distributed Ledger Technology (DLT)". many researchers...
Mobile phones can record individual's daily behavioral data as a time-series. In this paper, we present an effective time-series segmentation technique that extracts optimal time segments of similar characteristics utilizing their mobile phone data. One the determinants behavior is various activities undertaken at times-of-the-day and days-of-the-week. many cases, such will follow temporal patterns. Currently, researchers use either equal or unequal interval-based for mining users' behavior....
The COVID-19 pandemic continues to severely undermine the prosperity of global health system. To combat this pandemic, effective screening techniques for infected patients are indispensable. There is no doubt that use chest X-ray images radiological assessment one essential techniques. Some early studies revealed patient's showed abnormalities, which natural with COVID-19. In paper, we proposed a parallel-dilated convolutional neural network (CNN) based detection system from images, named as...
Smart Home automation is increasingly gaining popularity among current applications of Internet Things (IoT) due to the convenience and facilities it provides home owners. Sensors are employed within appliances via wireless connectivity be accessible remotely by owners operate these devices. With exponential increase smart IoT devices in marketplace such as door locks, light bulbs, power switches etc, numerous security concerns arising limited storage processing devices, making vulnerable...
The goal of this research is to develop and implement a highly effective deep learning model for detecting COVID-19. To achieve goal, in paper, we propose an ensemble Convolutional Neural Network (CNN) based on EfficientNet, named ECOVNet, detect COVID-19 from chest X-rays. make the proposed more robust, have used one largest open-access X-ray data sets COVIDx containing three classes—COVID-19, normal, pneumonia. For feature extraction, applied CNN structure, namely with ImageNet...
The dark web is a section of the Internet that not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network anonymity pave way for illegal activities help cybercriminals execute well-planned, coordinated, malicious cyberattacks. Cyber security experts agree online criminal are increasing exponentially, they also becoming more rampant intensified. These cyber include various destructive crimes may target single person or whole nation, example, data...
In this technologically advanced era, with the proliferation of artificial intelligence, many mobile apps are available for plant disease detection, diagnosis, and treatment, each a variety features. These need to be categorized reviewed following proper framework that ensures their quality. This study aims present an approach evaluating detection apps, includes providing ratings distinct features insights into exploitation intelligence used in detection. For purpose, were searched three...
Diabetes is a chronic disease caused by persistently high blood sugar level, causing other diseases, including cardiovascular, kidney, eye, and nerve damage. Prompt detection plays vital role in reducing the risk severity associated with diabetes, identifying key factors can help individuals become more mindful of their lifestyles. In this study, we conducted questionnaire-based survey utilizing standard diabetes variables to examine prevalence Bangladesh. To enable prompt compared different...
Soil colour is a key indicator of soil health and the associated properties. In agriculture, provides farmers advises with visual guide to interpret functions performance. Munsell charts have been used determine for many years, but process fallible, as it depends on user’s perception. As smartphones are widely come high-quality cameras, popular one was capturing images this study. This study aims predict (MSC) from book (MSCB) by using deep learning techniques mobile-captured images. MSCB...
Convolutional Neural Networks (CNNs) have drawn researchers' attention to identifying cattle using muzzle images. However, CNNs often fail capture long-range dependencies within the complex patterns of muzzle. The transformers handle these challenges. This inspired us fuse strengths and in muzzle-based identification. Addition concatenation been most commonly used techniques for feature fusion. addition fails preserve discriminative information, while results an increase dimensionality. Both...
The skin, as the largest organ of human body, is vulnerable to a diverse array conditions collectively known skin lesions, which encompass various dermatoses. Diagnosing these lesions presents significant challenges for medical practitioners due subtle visual differences that are often imperceptible naked eye. While not all life-threatening, certain types can act early indicators severe diseases, including cancers, underscoring critical need timely and accurate diagnostic methods. Deep...
Personal data such as electronic medical records and academic are critical sensitive private information. These personal information is usually hosted across many data-custodian systems. Data Store (PDS) a service that lets an individual store, manage deploy their key in highly secure structured way. It also gives the user central point of control for One inherent problems digital it can be easily forged. Therefore, data-consumer(with whom shared) often needs to verify authenticity shared...
Precise Soil Moisture (SM) assessment is essential in agriculture. By understanding the level of SM, we can improve yield irrigation scheduling which significantly impacts food production and other needs global population. The advancements smartphone technologies computer vision have demonstrated a non-destructive nature soil properties, including SM. study aims to analyze existing Machine Learning (ML) techniques for estimating SM from images understand moisture accuracy using different...
Autism Spectrum Disorder (ASD) is a neurological impairment condition that severely impairs cognitive, linguistic, object recognition, interpersonal, and communication skills. Its main cause genetic, early treatment identification can reduce the patient’s expensive medical costs lengthy examinations. We developed machine learning (ML) architecture capable of effectively analysing autistic children’s datasets accurately classifying identifying ASD traits. considered screening dataset toddlers...
Knowledge graph is useful for many different domains like search result ranking, recommendation, exploratory search, etc. It integrates structural information of concepts across multiple sources, and links these together. The extraction domain specific relation triples (subject, verb phrase, object) one the important techniques knowledge construction. In this research, an automatic method named HDSKG proposed to discover their from content webpages. We incorporate dependency parser with...
The spread of 'fake' health news is a big problem with even bigger consequences. In this study, we examine collection health-related articles published by reliable and unreliable media outlets. Our analysis shows that there are structural, topical, semantic patterns which different in contents from Using machine learning, leverage these build classification models to identify the source (reliable or unreliable) article. model can predict an article F-measure 96%. We argue findings study will...