Mohammad Shorif Uddin

Mohammad Shorif Uddin
Jahangirnagar University · Department of Computer Science and Engineering

23.05
 · 
Doctor of Engineering

About

113
Publications
27,530
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
511
Citations
Introduction
Skills and Expertise
Research Experience
November 1992 - present
Jahangirnagar University
Position
  • Professor
November 1992 - present
Jahangirnagar University
Position
  • Professor

Publications

Publications (113)
Article
Full-text available
This paper proposes a novel feature selection method utilizing Rényi min-entropy-based algorithm for achieving a highly efficient brain–computer interface (BCI). Usually, wavelet packet transformation (WPT ) is extensively used for feature extraction from electro-encephalogram (EEG) signals. For the case of multiple-class problem, classification ac...
Article
Full-text available
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to...
Article
Full-text available
In the present era, the applications of computer vision is increasing day by day. Computer vision is related to the automatic recognition, exploration and extraction of the necessary information from a particular image or a group of image sets. This paper addresses the method to detect the desired object from an image. Usually, a template of t...
Article
Full-text available
The aim of this research is to develop a fusion concept to component-based face recognition algorithms for features analysis of binary facial components (BFCs), which are invariant to illumination, expression, pose variations and partial occlusion. To analyze the features, using statistical pattern matching concepts, which are the combination of Ch...
Conference Paper
Handwritten Bangla digit recognition is one of the most challenging computer vision problems due to its diverse shapes and writing style. Recently deep learning based convolutional neural network known as deep CNN finds widespread applications in recognizing different objects due to its high accuracy. This paper investigates the performance of some...
Article
Full-text available
This study describes an automated detection of polyp type as it is very important to determine the existence of dys-plasia-a stage leading to the development of gastrointestinal cancer. The polyp-type classification is performed by a multiclass support vector machine from feature-fusion of bi-dimensional empirical mode decomposition (BEMD) and conv...
Chapter
Bangladesh extensively depends on agriculture in terms of economy as well as food security for its huge population. For this reason, it is very important to efficiently grow a plant and enhance its yield. Quantity and quality of fruits can degrade due to various diseases that are very much crucial issues. A little research has been conducted for re...
Chapter
Over the past few years, social networking sites, especially Facebook and Twitter, have emerged as a vital medium to bridge between the suppliers and customers of different products. Ride-sharing service is one of such products greatly influenced by the reactions shared by its users on the social networking platforms. ‘Pathao’ and ‘Uber’ are two wi...
Chapter
It is important to understand the sources of uncertainties in the decision-making process as uncertainties very often lead a decision-maker or a decision support framework to an irrational and flawful solution for a decision problem. Decision scientists have been conducting researches to understand the sources of uncertainties in order to discover...
Chapter
This paper provides a detailed description of the sources of uncertainties in rule-based decision-making approaches. An investigation into different rule-based decision support models under uncertainty is conducted. In addition, constructive criticism of available rule-based decision support frameworks in terms of uncertainty handling capacity is o...
Article
Full-text available
Bangladesh extensively depends on agriculture for the economy as well as food security owing to its huge population. In this connection, it becomes very important to efficiently grow plants and increase their yields. Quantity and quality of fruits can be degraded having attacked by various diseases. It is a matter of fact that not even a single res...
Article
Full-text available
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to m...
Article
Full-text available
Haze is a very common phenomenon that degrades or reduces visibility. It causes various problems where high-quality images are required such as traffic and security monitoring. So haze removal from scenes is an immediate demand for clear vision. Recently, in addition to the conventional dehazing mechanisms, different types of deep generative advers...
Book
This book gathers outstanding research papers presented at the International Joint Conference on Computational Intelligence (IJCCI 2019), held at the University of Liberal Arts Bangladesh (ULAB), Dhaka, on 25–26 October 2019 and jointly organized by the University of Liberal Arts Bangladesh (ULAB), Bangladesh; Jahangirnagar University (JU), Banglad...
Article
Full-text available
Abstract. A signature is a mark or sign which is made by an individual on an in- strument or document to signify knowledge, approval, acceptance or obligation. To authenticate writing or a notice of its source and to bind the individual signing which is written by the provisions contained in the document. Signature verifica- tion is more importan...
Article
Practical brain–computer interface (BCI) demands the learning-based adaptive model that can handle diverse problems. To implement a BCI, usually functional near-infrared spectroscopy (fNIR) is used for measuring functional changes in brain oxygenation and electroencephalography (EEG) for evaluating the neuronal electric potential regarding the psyc...
Article
Full-text available
Over the years little research has been performed for vision-based papaya disease recognition system in order to help distant farmers, most of whom require proper support for cultivation. Due to advancement of vision-based technology we find a good solution to this problem. Papaya disease recognition mainly involves two challenging problems: one is...
Conference Paper
Full-text available
Due to the ever-advancing technology, usage of information technology in modern life is increasing at a fast pace. Hence, ICT based systems have enormous potential providing accessibility and affordability to the urban inhabitants in developing countries. In this paper, a framework for a dynamic vehicle pooling system for Dhaka city is proposed. Co...
Article
Full-text available
Automatic grammatical verification of sentences is an essential task in natural language processing. There has been a scarcity of resources in Bangla for such tasks. To address this issue this paper presents a new n-gram based statistical approach to check the syntactic and semantic correctness of sentences in Bangla. An n-gram frequency count-base...
Conference Paper
Full-text available
In this paper, we propose a method to detect and recognize different types of drinks with a view to estimate its nutrient values using vision based algorithms. We use visual saliency and thresholding techniques to segment out the drink region from the image. After detection, both speed up robust features and color based visual features are used to...
Conference Paper
Full-text available
Recently it receives a great attention to reduce road accident and controlling traffic by limiting the speed of vehicles. Moving vehicle speed is usually determined by using Radar, Photo Radar, Drone Radar, LIDAR Speedometer Clocks, Average Speed Computers, Aircraft or Video frame methods, etc. Most of these methods are very expensive and also thei...
Conference Paper
Full-text available
MySQL is an open-source very popular RDBMS to store and manage data. But it faces difficulties of prolonged response time to handle big data. On the other hand, cloud is a perfect solution for managing and querying big data but it is not suitable to process small data due to delayed response time. In this paper, we propose a cloud-based solution th...
Conference Paper
Full-text available
The method of joining images to make a panorama is known as image stitching. It is an enthusiastic research area in image processing and computer vision but still a challenging problem for panoramic images. A good number of researches had been carried out to develop different algorithms for image stitching in the last few years. Image stitching app...
Article
Full-text available
In a mobile cellular network there are two user groups: users inside the cell responsible for newly originating call and users enter the cell from surrounding cells responsible for handover call. In this paper we assume that the number of users inside a microcell is far larger than the handover users therefore the PCT-I (Pure Chance Traffic I) traf...
Conference Paper
Full-text available
Heart disease is considered as one of the major causes of death throughout the world. It cannot be easily predicted by the medical practitioners as it is a difficult task which demands expertise and higher knowledge for prediction. This paper addresses the issue of prediction of heart disease according to input attributes on the basis of data minin...
Article
Full-text available
To ensure good traffic handling, channel allocation is one of the important mobile communication resources for quality of service. Usually, three types of channel allocations are widely used: fixed channel allocation, borrowing radio channels from surrounding calls and dynamic channel allocations. In this paper instead conventional channel allocati...
Article
Full-text available
Structome analysis is a useful tool for identification of unknown microorganisms that cannot be cultured. In 2012, we discovered a unique deep-sea microorganism with a cell structure intermediate between those of prokaryotes and eukaryotes and described its features using freeze-substitution electron microscopy and structome analysis (quantitative...
Conference Paper
Full-text available
Currency duplication also known as counterfeit currency is a vulnerable threat on economy. It is now a common phenomenon due to advanced printing and scanning technology. Bangladesh has been facing serious problem by the increasing rate of fake notes in the market. To get rid of this problem various fake note detection methods are available around...
Conference Paper
Full-text available
Social media is now playing a vital role in influencing people's sentiment in favor or against a government or an organization. Therefore, to understand the sentiment of any posting in social media, an efficient method is an ultimate necessity. We have analyzed some facebook postings to understand political sentiments. In any politically motivated...
Article
Full-text available
Diseases in fruits and vegetables cause significant production and economic losses in agricultural industry worldwide. Continuous monitoring and detection of defects in fruits and vegetables is critical for sustainable agricultural production. Thus, in recent years image processing and vision based techniques have been applied increasingly for frui...
Article
Full-text available
Now a days Empirical Mode Decomposition (EMD) is an important tool for image analyzing. Optimizing threshold value of Bidimensional Intrinsic Mode Function (BIMF) is one of the important tasks in speckle noise reduction in the Bidimensional Empirical Mode Decomposition (BEMD) domain. Without proper selection of threshold value image information may...
Article
Full-text available
Noise can be easily induced in images during acquisition and transmission. Therefore, it is a basic requirement to remove noise from an image while keeping its features intact for better understanding and recognition. Gaussian and impulse are two very common types of noise. Tremendous research initiatives are being taken for removing these noises....
Article
Full-text available
Vehicle classification plays an important role in a variety of applications like surveillance, security system, traffic congestion avoidance and accidents prevention etc. However, this is difficult for computer vision to achieve due to variations in shapes and colors of vehicles. In this paper, we present a vision-based vehicle classification metho...
Article
Full-text available
In this paper, a method based on adaptive fuzzy filter is used to denoise image corrupted by impulse noise. The algorithm is proposed for restoration of grayscale as well as color images which are highly corrupted by salt and pepper noise. The algorithm detects level of corruption for each pixel using triangular fuzzy membership function to ensure...
Article
Full-text available
This paper presents a learning algorithm for adaptive network intrusion detection based on clustering and naïve Bayesian classifier, which induces a hybridization of unsupervised and supervised learning processes. The proposed approach scales up the balance detection rates for different types of network intrusions, and keeps the false positives at...
Article
Full-text available
Optimizing threshold value of wavelet coefficient is an important task in speckle noise reduction in the wavelet domain. Without proper selection of threshold value image information may be lost, which is unwanted. In this paper we proposed optimum threshold parameter using Fisher Discriminant Analysis (FDA) for determining the optimum threshold va...
Article
Full-text available
Principal Component Analysis (PCA) has emerged as a more efficient approach for extracting features for many pattern classification problems. It has been the standard approach to reduce the high-dimensional original pattern vector space into low-dimensional feature vector space, that removes some of the noisy directions. PCA is an unsupervised tech...
Conference Paper
Full-text available
Low density impulse noise can be successfully denoised by traditional median filter. But the performance badly deteriorates if the noise density is high. Recently fuzzy-based adaptive median filter has been introduced to handle high density noise in grayscale images. To make it more generalized in this paper we develop an adaptive fuzzy median filt...
Conference Paper
Full-text available
Retinopathy is a diabetic-related complication and main cause of vision loss of the diabetic patients. Exudates are the major sign of diabetic retinopathy. This paper presents a morphology-based method for the detection of diabetic retinopathy through exudates from color fundus images. We applied our approach on fundus images and obtained satisfact...
Article
Full-text available
Recognition of handwritten Bangla numerals finds numerous applications in postal system automation, passports and document analysis and even for number plate identification. However, the recognition rate requires high and reliable accuracy for practical applications. This paper delineate a robust hybrid system for recognition of handwritten Bangla...
Conference Paper
Full-text available
Ultrasound imaging plays a crucial roles in medical field to estimate kidney size, position, appearance and helps to detect structural abnormalities as well as the presence of cysts, stones, cancer, congenital anomalies, swelling, blockage of urine flow etc. But presence of speckle noise and low contrast in ultrasound images, detection of kidney is...
Conference Paper
Full-text available
A new effective method for speckle noise reduction in ultrasound imaging is introduced in this paper. The proposed method is based on Extra-Energy Reduction (EER) function in the vector field, which is addressed by vector triangular formula. It is reasonable to decide that the calculated the energy of a pixel by vector triangular formula is less th...
Conference Paper
Full-text available
Traditional median filters perform well in restoring the images corrupted by low density impulse noise, but fail to restore highly corrupted images. Conversely, the advanced adaptive median filters are capable of denoising high density impulse noise but the image details are compromised significantly. In this paper, a new adaptive fuzzy median filt...
Article
Full-text available
Prediction in any field is a complicated, challenging and daunting process. Employing traditional methodsmay not ensure the reliability of the prediction. In this paper, we are reviewing the possibility of applyingtwo well-known techniques neural network and data mining in stock market prediction. As neural networkis able to extract useful informat...
Article
Full-text available
In image processing noise is possibly the most annoying problem. Ultrasound image has been used for effective diagnosis for its non-invasive, harmless, accurate and cost effectiveness. Unfortunately, ultrasound images are degraded by an intrinsic artefact called speckle. Eliminating such speckle noise is an important preprocessing task. For acquiri...
Conference Paper
Full-text available
In this paper we present and evaluate a novel method for an efficient speckle denoising by using principal component analysis (PCA) with bit plane slicing and nonlinear diffusion. We use PCA transformation for generating de-correlated dataset from a noisy image. Then we apply bit plane slicing on the de-correlated dataset and nonlinear diffusion is...
Conference Paper
Full-text available
The identification of an individual finds diverse applications in many fields such as justice, crime scene, voter identification as well as vehicle driver license identification and so on. Several classic methods have already developed for identifying a person, which are complex, expensive and not flexible in many circumstances. Due to emergence an...
Conference Paper
Full-text available
Existing texts play an important role in understanding a scene image. Scene images differ from document images, which are composed of text characters of various size, shape, direction and situation along with complicated backgrounds, such as map, picture or painting, etc. Hence, the extraction of texts in scene images is a difficult as well as chal...
Conference Paper
Full-text available
This paper proposes a novel adaptive technique to extract facial feature points automatically such as eyes corners, nostrils, nose tip, and mouth corners in frontal view faces, which are based on cumulative distribution function approach by varying different threshold values. At first, the method adopts the Viola-Jones face detector to detect the l...
Article
Full-text available
This paper proposes a novel adaptive algorithm to extract facial feature points automatically such as eyebrows corners, eyes corners, nostrils, nose tip, and mouth corners in frontal view faces, which is based on cumulative histogram approach by varying different threshold values. At first, the method adopts the Viola-Jones face detector to detect...
Article
Full-text available
Large image databases find diverse applications in real-life situations. It is essential to develop an efficient technique to grasp required information from these databases. A good number of researchers are involved in developing techniques for object retrieval and recognition using different image features, such as color histogram, distance, and...
Article
Full-text available
Noise is possibly the most annoying problem in the field of image processing. In medical image or ultrasound image processing the speckle noise is arises with a major difficulty. Eliminating such noise is an important preprocessing task. For acquiring a better performance, an optimized anisotropic diffusion techniques for ultrasound images are pres...