Shamim Akhter

ORCID: 0000-0003-1408-9133
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Low-power high-performance VLSI design
  • Numerical Methods and Algorithms
  • Traffic Prediction and Management Techniques
  • Distributed and Parallel Computing Systems
  • Advancements in Semiconductor Devices and Circuit Design
  • Industrial Vision Systems and Defect Detection
  • Analog and Mixed-Signal Circuit Design
  • VLSI and FPGA Design Techniques
  • Semiconductor materials and devices
  • Digital Filter Design and Implementation
  • Transportation Planning and Optimization
  • Coding theory and cryptography
  • VLSI and Analog Circuit Testing
  • Smart Agriculture and AI
  • Greenhouse Technology and Climate Control
  • Embedded Systems Design Techniques
  • Quantum-Dot Cellular Automata
  • Cryptography and Residue Arithmetic
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Gaze Tracking and Assistive Technology
  • Infrastructure Maintenance and Monitoring
  • Remote Sensing and Land Use
  • Soil Moisture and Remote Sensing
  • Advanced Data Compression Techniques
  • Hand Gesture Recognition Systems

Bangabandhu Sheikh Mujib Medical University
2025

University of Dhaka
2025

Jaypee Institute of Information Technology
2015-2024

Ahsanullah University of Science and Technology
2023-2024

Minhaj University Lahore
2023

Pir Mehr Ali Shah Arid Agriculture University
2019-2023

International University of Business Agriculture and Technology
2019-2022

Stamford University Bangladesh
2022

East West University
2008-2020

Rajshahi University of Engineering and Technology
2020

The activities of many primary sectors depend on the weather for production, e.g. farming. climate is changing at a drastic rate nowadays, which makes old prediction methods less effective and more hectic. To overcome these difficulties, improved reliable are required. These predictions affect nation's economy lives people. develop forecasting system that can be used in remote areas main motivation this work. data analytics machine learning algorithms, such as random forest classification,...

10.1109/icsc45622.2019.8938211 article EN 2019-03-01

Steel is one of the most important building materials modern times and production process flat sheet steel complicated. Before shipping or delivering steel, sheets need to undergo a careful inspection procedure avoid defects thus localizing classifying surface on crucial. In this study, we advance defect methods by designing machine learning models that aim detect multi-level from sample images classify them according their corresponding classes. We explore two (2) deep including U-NET Deep...

10.1109/tensymp50017.2020.9230863 article EN 2017 IEEE Region 10 Symposium (TENSYMP) 2020-01-01

A novel technique for digital multiplication is presented that quite different from the conventional method of like add and shift (D. Crawley G. Amaratunga, 1996). This also gives chances modular design where smaller block can be used to bigger one. will help in designing multiplier VHDL, as its give effective utilization structural modeling (Hwang Kai, 1979). In this paper general NxN proposed. less computation time calculating result bit.

10.1109/ecctd.2007.4529635 article EN 2007-08-01

Traffic Management System (TMS) is used to improve traffic flow by integrating information from different data repositories and online sensors, detecting incidents taking actions on routing. In general, two decision making systems-weights updating forecasting are integrated inside the TMS. The models need numerous sets for appropriate decisions. To determine dynamic road weights in TMS, four (4) environmental attributes considered, which directly or indirectly related increase jam– rain...

10.14569/ijacsa.2017.080337 article EN cc-by International Journal of Advanced Computer Science and Applications 2017-01-01

The ear is a visible organ with unique structure for each person.As result, it can be used as biometric to circumvent the constraints of person identification.Deep learning methods like You Only Look Once (YOLO) and MobileNet have recently significantly aided real-time recognition.As in this paper, we approach identifying using YOLOV3, YOLOV5, MobileNet-SSDV1, MobileNet-SSDV2 deep algorithms their biometrics.The standard dataset (EarVN1.0Dataset) from 164 individuals total 27,592 images.We...

10.12785/ijcds/150189 article EN cc-by-nc-nd International Journal of Computing and Digital Systems 2024-03-10

Objective: This study aimed to compare the early outcomes of atrial septal defect (ASD) surgeries performed using minimally invasive (MI) thoracotomy versus conventional median sternotomy (MS). Materials and methods: Fifty patients with ASD were included in this conducted at Bangabandhu Sheikh Mujib Medical University, Dhaka. Fifteen underwent MI (Group A), while 35 MS B). Eligible over 16 years old a single ASD, those requiring additional interventions excluded. Demographic data, surgical...

10.7759/cureus.77898 article EN Cureus 2025-01-23

This paper presents a modified binary multiplier using Vedic mathematics. The proposes modification in the previously published circuit. suggested multiplication technique is more efficient terms of delay and area. proposed circuit implemented VHDL. Mentor Graphics ModelSim tool used for HDL simulation, Xilinx ISE Design Suite 14.1 synthesis. simulation done 4-bit, 8-bit, 16-bit operations. In this paper, waveforms are shown only 4-bit operation based on technique. method can be extended...

10.1109/spin.2019.8711583 article EN 2019-03-01

Continuous increments in world population demands transportation with essential vehicle facilities and directly effect on road traffic volume or congestion, mostly metropolitan cities, thus it needs significant investigation, analysis, maintenance. In these regards, an Intelligent Traffic Management System (ITMS) a Deep-Neuro-Fuzzy model was proposed implemented. Dijkstra algorithm is used to select optimum path from source destination the basis of calculated segment weights framework....

10.18178/jtle.8.1.1-5 article EN Journal of Traffic and Logistics Engineering 2020-01-01

In this paper, we present the principles of a low operational-cost but flexible Internet-based traffic management support system. Most past systems were implemented with machine vision (image processing), RFID gateways, aerial surveillance, and/or remote sensors technologies. However, major drawbacks above mentioned are their installation difficulties, maintenance over time, error handling, coverage and cost effectiveness. Nevertheless, they consist unicast/one way communication (client to...

10.1109/cit/iucc/dasc/picom.2015.144 article EN 2015-10-01

Least Development Countries (LDC) like Bangladesh, whose 25% revenue earning is achieved from Textile export, requires producing less defective textile for minimizing production cost and time. Inspection processes done on these industries are mostly manual time consuming. To reduce error identifying fabric defects more automotive accurate inspection process. Considering this lacking, research implements a Defect Recognizer which uses computer vision methodology with the combination of...

10.5281/zenodo.1080145 article EN World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering 2008-01-28

Low-cost, flexible, easily maintainable and secure traffic management support systems are in demand. Internet-based real time bi-directional communication provides significant benefits to monitor road conditions. Dynamic route computation is a vital requirement make the system more realistic reliable. Therefore, an integrated approach with multiple data feeds Backpropagation (BP) Neural Network (NN) Levenberg-Marquardt (LM) optimization applied predict weights. The results indicate that...

10.4018/ijaec.2016100103 article EN International Journal of Applied Evolutionary Computation 2016-10-01

Vedic maths based multiplier is a novel and high speed multiplier. Adder one of the main components used in this technique. Using fast adder will enhance overall performance In work, comparative analysis done using different architectures Synopsis Design Compiler with standard cell libraries at 32/28 nm. Various topologies like Ripple Carry (RCA), Select (CSA), Square Root (SQRT-CSA), Common Boolean Logic (CBL) Binary to Excess Converter (BEC) are compare area, delay power. Designing for...

10.1109/spin.2017.8049938 article EN 2017-02-01

In designing digital filters, Multiply-Accumulate (MAC) unit is used. MAC comprises of multiplier, adder and an accumulator. Faster multiplier circuits are required for high speed unit. But based structures have disadvantages like power dissipation, slow processing etc. The multiplication operation where input data to be multiplied with the fixed coefficients considerably took large place store their temporary data. So, memory technique substitute multipliers reduce area latency system....

10.1109/icacccn.2018.8748322 article EN 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) 2018-10-01

A 16-bit Square Root Carry-Select Adder (SQRT CSA) is implemented and analyzed in this paper. The SQRT CSA an architecture level modification to reduce area power dissipation as compared that of conventional CSA. Conventional with Cin=1 block replaced binary-to-excess-1 converter (BEC) the modified structure. configured into five different stages progressivley increasing data size. In order realize CSA, basic building blocks, e.g., XOR gate, AND 2:1 Mux, half adder (HA) full (FA) are using...

10.1109/spin.2015.7095289 article EN 2015-02-01

Addition usually affects the overall performance of digital systems and an arithmetic function. Adders are most widely used in applications like multipliers, DSP (i.e., FFT, FIR, IIR). In adders, speed addition is constrained by time required to propagate a carry through adder. Various techniques have been proposed design fast adders. We derived architectures for carry-select adder (CSA), Common Boolean Logic (CBL) based ripple (RCA), Carry Look-Ahead Adder (CLA) 8-, 16-, 32-, 64-bit length....

10.1155/2016/1260879 article EN VLSI design 2016-06-08

Road traffic management is an ongoing challenge. Machine vision (image processing), RFID gates, aerial surveillance, and/or remote sensors technologies are usually used to reduce problems. However, their major drawbacks installation difficulties, maintenance over the time, error handling, coverage and cost effectiveness. Thus, low-cost, flexible, easily maintainable secure support systems in demand. Internet-based real time bidirectional communication can be alternation solve most of...

10.1109/icitst.2015.7412080 article EN 2015-12-01

Abstract Parallel prefix adder (PPA) being an indispensable component of processors needs prompt estimation design metrics at the initial stage cycle. However, available commercial tools take significant amount time for process. The prior availability area and power models can greatly reduce time-to-market. Symmetrical construction quick computational ability PPAs make them competent candidates circuits in complex applications. This paper proposes Field Programmable Gate Arrays (FPGA)...

10.1088/2631-8695/ace2ac article EN cc-by-nc-nd Engineering Research Express 2023-06-29
Coming Soon ...