About
25
Publications
17,237
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
514
Citations
Introduction
Additional affiliations
November 2015 - April 2016
November 2015 - April 2016
Publications
Publications (25)
The increasing usage of online platforms by children in the fast-changing digital environment has raised worries over potential privacy and security hazards. Despite previous study efforts, there are still significant unresolved concerns, particularly the absence of a methodical and all-encompassing approach to comprehending the social safety conce...
In this study, using interviews and a game-based survey, we explored how children, along with their parents and instructors, might share certain duties and practices to protect them from online safety hazards. Initially, semi-structured interviews were carried out with a limited number of children (n = 48), and based on the findings, survey questio...
Bullying someone online is known as cyberbullying. As social media and the internet have grown in popularity, they have taken a very negative turn. People use the Internet's services to aggressively attack others while hiding behind a screen. It appears in various ways and is typically presented as text on most social networks. Cyberbullying freque...
Improving encoding and decoding time in compression technique is a great demand to modern users. In bit level compression technique, it requires more time to encode or decode every single bit when a binary code is used. In this research, we develop a dictionary-based compression technique where we use a quaternary tree instead of a binary tree for...
Neural machine translation has recently been able to gain state-of-the-art translation quality for many language pairs. However, neural machine translation has been less tested for English-Bangla language pair, two linguistically distant and widely spoken languages. In this paper, we apply neural machine translation to the task of English-Bangla tr...
An efficient and publicly open machine translation system is in dire need to get the maximum benefits of Information and Communication Technology through removing the language barrier in this era of globalization. In this study, we present a Phrase-Based Statistical Machine Translation (PBMT) system between English and Bangla languages in both dire...
This article proposes two dynamic Huffman based code generation algorithms, namely Octanary and Hexanary algorithm, for data compression. Faster encoding and decoding process is very important in data compression area. We propose tribit-based (Octanary) and quadbitbased (Hexanary) algorithm and compare the performance with the existing widely used...
In this paper, we focus on the use of quaternary tree instead of binary tree to speed up the decoding time for Huffman codes. It is usually difficult to achieve a balance between speed and memory usage using variable-length binary Huffman code. Quaternary tree is used here to produce optimal codeword that speeds up the way of searching. We analyzed...
Road sign recognition plays an exigent role for easy, immune and suitable driving. In this paper, a road sign detection system is developed to automatically recognize Bengali road signs. The proposed method is based on HSV transformation along with a template matching technique to detect and recognize circular, triangular, rectangular and octagonal...
This paper presents a new algorithm to identify Bengali Sign Language (BdSL) for recognizing 46 hand gestures, including 9 gestures for 11 vowels, 28 gestures for 39 consonants and 9 gestures for 9 numerals according to the similarity of pronunciation. The image was first re-sized and then converted to binary format to crop the region of interest b...
The performance of the Computer Aided Detection (CADe) system, to detect breast cancer, can be decreased due to some factors like presence of labels or other artifacts or pectoral muscle. Detection and segmentation of pectoral muscle can also help in image registration for further analysis of breast abnormalities such as bilateral asymmetry. In thi...
Quipper is a recently released quantum programming language. In this report,
we explore Quipper's programming framework by implementing the Deutsch's,
Deutsch-Jozsa's, Simon's, Grover's, and Shor's factoring algorithms. It will
help new quantum programmers in an instructive manner. We choose Quipper
especially for its usability and scalability thou...
Real-time quality inspection of gelatin capsules in pharmaceutical applications is an important issue from the point of view of industry productivity and competitiveness. Computer vision-based automatic quality inspection and controller system is one of the solutions to this problem. In computer-vision based system a digital image obtained by a dig...
In this paper we present an efficient computer aided mass classification method in digitized
mammograms using Artificial Neural Network (ANN), which performs benign-malignant classification on
region of interest (ROI) that contains mass. One of the major mammographic characteristics for mass
classification is texture. ANN exploits this important fa...
Thresholding of a given image into binary image is a necessary step for most image analysis and recognition techniques. In document recognition application, success of OCR mostly depends on the quality of the thresholded image. Non-uniform illumination, low contrast and complex background make it challenging in this application. In this paper, sele...
In this paper we present a computer aided diagnosis (CAD) system for mass detection and classification in digitized mammograms,
which performs mass detection on regions of interest (ROI) followed by the benign-malignant classification on detected masses.
In order to detect mass effectively, a sequence of preprocessing steps are proposed to enhance...
Probability theory is the framework for making decision under uncertainty. In classification, Bayes' rule is used to calculate the probabilities of the classes and it is a big issue how to classify raw data rationally to minimize expected risk. Bayesian theory can roughly be boiled down to one principle: to see the future, one must look at the past...
Machine vision systems provide quality control and real-time feedback for industrial processes, overcoming physical limitations and subjective judgment of humans. In this paper, the image processing techniques for developing low-cost machine vision system for pharmaceutical capsule inspection is explored. By developing image processing techniques,...
The CN Tower is a transmission tower and it is not unexpected that recorded lightning current signals be corrupted by noise. The existence of noise may affect the calculation of current waveform parameters (current peak, 10-90% risetime to current peak, maximum steepness, and pulse width at half value of current peak). But accurate statistics of cu...