- IoT and Edge/Fog Computing
- Computational Drug Discovery Methods
- AI in cancer detection
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- COVID-19 diagnosis using AI
- COVID-19 Clinical Research Studies
- Complex Network Analysis Techniques
- IoT-based Smart Home Systems
- Hate Speech and Cyberbullying Detection
- Software-Defined Networks and 5G
- Advanced Image and Video Retrieval Techniques
- Plant Pathogens and Fungal Diseases
- COVID-19 and Mental Health
- Banana Cultivation and Research
- Artificial Intelligence in Healthcare and Education
- Nonlinear Optical Materials Studies
- Plant Pathogenic Bacteria Studies
- Cholinesterase and Neurodegenerative Diseases
- Long-Term Effects of COVID-19
- Time Series Analysis and Forecasting
- Biochemical and Structural Characterization
- SARS-CoV-2 and COVID-19 Research
- Caching and Content Delivery
- Radiomics and Machine Learning in Medical Imaging
University of Rajshahi
2020-2024
Jagannath University
2018-2024
Pediatrics and Genetics
2023
World University of Bangladesh
2021
University of Chittagong
2014-2018
Kumamoto University
2015-2016
University of Dhaka
2007
Insecure and portable devices in the smart city's Internet of Things (IoT) network are increasing at an incredible rate. Various distributed centralized platforms against cyber attacks have been implemented recent years, but these inefficient due to their constrained levels storage, high energy consumption, central point failure, underutilized resources, latency, etc. In addition, current architecture confronts problems scalability, flexibility, complexity, monitoring, managing collecting...
The use of social media has grown exponentially over time with the growth Internet and become most influential networking platform in 21st century. However, enhancement connectivity often creates negative impacts on society that contribute to a couple bad phenomena such as online abuse, harassment cyberbullying, cybercrime trolling. Cyberbullying frequently leads serious mental physical distress, particularly for women children, even sometimes force them attempt suicide. Online attracts...
Social networking platforms give users countless opportunities to share information, collaborate, and communicate positively. The same platform can be extended a fabricated poisonous atmosphere that gives an impersonal, harmful for online misuse assault. Cyberstalking is when someone uses internet system ridicule, torment, insult, criticize, slander, discredit victim while never seeing them. With the growth of social networks, Facebook has become arena bullying. Since effects could result in...
Abstract Financial institutions and businesses face an ongoing challenge from fraudulent transactions, prompting the need for effective detection methods. Detecting credit card fraud is crucial identifying preventing unauthorized transactions. While incidents are relatively rare, they can result in substantial financial losses, particularly due to high monetary value associated with Timely of enables investigators take swift actions mitigate further losses. However, investigation process...
Abstract Anomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted state-of-the-art methods to identify anomaly for ensuring user’s security privacy. The network refers a forum used by groups people express their thoughts, communicate with each other, share content needed. This networks also facilitate abnormal activities, spread fake news, rumours, misinformation, unsolicited messages,...
Bangladesh is a densely populated country with substandard healthcare system and mediocre economic framework. Due to the enormous number of people who have been unaware until now, development COVID-19's second-wave infection has become severe threat. The present investigation aimed characterize clinical socio-demographic characteristics COVID-19 in Bangladesh. A cross-sectional analysis was carried out from all other patients confirmed by RT-PCR undergoing specialized hospital. From March 1...
COVID-19 is a severe respiratory contagious disease that has now spread all over the world. terribly impacted public health, daily lives and global economy. Although some developed countries have advanced well in detecting bearing this coronavirus, most developing are having difficulty cases for mass population. In many countries, there scarcity of testing kits other resources due to increasing rate infections. Therefore, deficit figure encouraged us improve deep learning model aid...
Carbonic anhydrase IX (hCAIX) is a membrane-spanning metalloenzyme, encoded by CA9 gene, which can lead to various carcinomas if upregulated. Due its overexpression in many cancer tissues, hCAIX has become promising target for developing anticancer therapeutics. Furthermore, several classes of small-molecules have shown inhibit the expression. In this study, therefore, we screened (n = 42) plant-derived compounds identify most potent inhibitors and understand their interactions with drug...
The spread of the Dengue virus over world, as well multiple outbreaks different serotypes, has resulted in a large number deaths and medical emergency, no viable medications to treat patients have yet been found. In this paper, we provide an silico virtual screening molecular dynamics-based analysis uncover efficient infection inhibitors. Based on Google search literature mining, phytochemical library was generated employed ligand molecules. investigation, protein target NS2B/NS3 from...
• Proposing a CNN based deep learning system to diagnosis Covid-19 from Chest X-Ray images. The aim of this paper is help radiologists and medical experts identify pneumonia X-Rays which critical task for human being it could be overlooked as both the disease have almost similar pixel features on X-Ray. Besides this, there shortage testing kits RT-PCR test takes time infection status. To overcome we try design using computer aided less make decisions thus helps hold up spreading virus....
The pandemic of coronavirus disease 2019 (COVID-19) has cost numerous lives and induced tremendous mental stress among people. purpose this research was to determine anxiety depression levels, clinical features, the connections between demographic variables prevalence as well reported COVID-19 cases in Bangladesh.For data collection, an online cross-sectional survey carried out from May 26 June 27, 2020, utilizing a Google adapted preformed questionnaire. form shared with short overview...
Adenanthera pavonina is a medicinal plant with numerous potential secondary metabolites showing significant level of antidiabetic activity. The objective the current study was to identify phytochemicals from methanolic leaf extract as therapeutic agents against diabetes mellitus using GC-MS and in silico methods. analysis revealed total 17 phytochemicals. Molecular docking performed these phytochemicals, targeting mutated insulin receptor tyrosine kinase (5hhw), which inhibits glucose uptake...
This study proposes a new parasitic resonator-based diamond-shaped microstrip patch antenna for ultra-wideband microwave imaging applications. The consists of radiating patch, partial ground plane, and four-star shape elements. use elements improves the performance in terms bandwidth gain. proposed prototype has compact dimension 30 × 25 1.6 mm3. achieves an overall (S11<-10dB) 7.6 GHz (2.7–10.3 GHz) with more than 4 dBi realized gain 80% efficiency across bandwidth. modified structures...
Though all brain tumors are not cancerous but they caused a critical disease produced by irrepressible and unusual dividing of cells. For the case Medical diagnostics many diseases, health industry needs help, current development in arena deep learning has assisted to detect diseases. In recent years medical image classification gained remarkable attention. The most well-known neural network model for problems is Convolutional Neural Network (CNN). CNN frequently employed machine-learning...
The electronic voting system is introduced in most countries to prevent vote tampering. infrastructure of the current not transparent and it can easily be manipulated by political power corruption. To avoid this kind circumstance, paper proposing an algorithmic model-based scheme for using blockchain technology votes from number blocks will define security strength scheme. This also reduce complexity hassle which voters face during election. Every single precious must need secured. every...
Financial institutions and businesses face an ongoing challenge from fraudulent transactions, prompting the need for effective detection methods. Detecting credit card fraud is crucial identifying preventing unauthorized transactions.Timely of enables investigators to take swift actions mitigate further losses. However, investigation process often time-consuming, limiting number alerts that can be thoroughly examined each day. Therefore, primary objective a model provide accurate while...
The newly emerged human coronavirus, SARS-CoV-2, had begun to spread last year and sparked worldwide. In this study, molecular docking is utilized test some previously approved drugs against the SARS-CoV-2 nonstructural protein 15 (Nsp15). We screened 23 drugs, from which three (saquinavir, valrubicin aprepitant) show a paramount predicted binding affinity (-9.1, -9.6 -9.2 kcal/mol, respectively) Nsp15. Moreover, saquinavir aprepitant make nonbonded interactions with Leu201 in active site...
Following the first outbreak of COVID-19 in China, various continents became serious and aware to combat against it, though degraded dramatically preventing due its unique transmission strategy. On March 8, 2020, Bangladesh confirmed cases with three people being infected death was reported on 18, until June 29, total number deaths reached 141,801 1783, respectively. has strengthened efforts improve health care system's ability, including diagnosis prevent crisis, following discovery 100 at...
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax a computer programming language. helps developers and researchers represent their using human-readable Generally, can convert pseudo-code into source code different conversion techniques. The efficiency such methods is measured based on converted algorithm's correctness. Researchers have already explored diverse technologies devise with higher accuracy. This paper proposes novel learning...
Abstract: Insecure and portable devices in the smart city&rsquo;s Internet of Things (IoT) network are increasing at an incredible rate. Various distributed centralized platforms against cyber-attacks have been implemented recent years, but these inefficient due to their constrained levels storage, high energy consumption, central point failure, underutilized resources, latency, etc. In addition, current architecture confronts problems scalability, flexibility, complexity, monitoring,...