Rejwan Bin Sulaiman

Rejwan Bin Sulaiman
University of Bedfordshire · Department of Computer Science and Technology

Doctor of Philosophy
Cyber Security Lecturer

About

67
Publications
117,826
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
300
Citations
Introduction
I am a PhD research student at the Department of Computing, University of Bedfordshire. My research focuses on combining machine learning algorithms like ANN, deep learning, and federated learning, analysing the performance of different combinations, and proposing the best that works with real-time collaborated data.
Additional affiliations
February 2020 - present
University of Bedfordshire
Position
  • Lecturer
Education
February 2020 - May 2024
University of Bedfordshire
Field of study
  • Computer Science
February 2018 - November 2019
University of Bedfordshire
Field of study
  • Computer Science
January 2014 - January 2018
Wrexham Glyndwr University
Field of study
  • Computer Science

Publications

Publications (67)
Article
Full-text available
Brain tumors are among the most fatal and devastating diseases, and they often result in a significant reduction in life expectancy. The devising of treatment plans that can extend the lives of affected individuals hinges on an accurate diagnosis of these tumors. Identifying and analyzing large volumes of magnetic resonance imaging (MRI) data manua...
Conference Paper
Full-text available
The rise of fake news has made the need for effective detection methods , including in languages other than English, increasingly important. The study aims to address the challenges of Bangla which is considered a less important language. To this end, a complete dataset containing about 50,000 news items is proposed. Several deep learning models ha...
Book
Full-text available
Sound classification is a multifaceted task that necessitates the gathering and processing of vast quantities of data, as well as the construction of machine learning models that can accurately distinguish between various sounds. In our project, we implemented a novel methodology for classifying both musical instruments and environmental sounds, ut...
Research
Full-text available
Sound classification is a multifaceted task that necessitates the gathering and processing of vast quantities of data, as well as the construction of machine learning models that can accurately distinguish between various sounds. In our project, we implemented a novel methodology for classifying both musical instruments and environmental sounds, ut...
Article
Full-text available
Nowadays, credit card transactions are exponentially increasing as a form of online payment. That creates technical pressure on the financial institution to incur losses due to credit card fraud. It is no wonder that credit card fraud is making people feel insecure and unsafe about using the services provided by banks. Data mining reasons on offlin...
Book
Full-text available
Consumer confidence, business credibility, and economic development are all negatively impacted by the prevalence of counterfeit items in circulation. The potential role of blockchain technology in finding a solution to this issue is explored in this chapter. For product authentication, it employs Ethereum, smart contracts, and QR codes to create a...
Chapter
The digitisation of healthcare records continues to expand, and the security and privacy of sensitive patient information become increasingly critical. By leveraging AI technologies, such as machine learning and natural language processing, healthcare organisations can implement advanced security measures that enhance healthcare records’ security a...
Chapter
Full-text available
Consumer confidence, business credibility, and economic development are all negatively impacted by the prevalence of counterfeit items in circulation. The potential role of blockchain technology in finding a solution to this issue is explored in this chapter. For product authentication, it employs Ethereum, smart contracts, and QR codes to create a...
Conference Paper
This study explores how employee skill sets in the retail industry are affected by the Fourth Industrial Revolution (4IR). Traditional retail has a strong need to change as technology rapidly alters consumer expectations. The study examines how workers develop new skill sets to remain competitive in the rapidly evolving 4IR market. Workers need to...
Preprint
Full-text available
The rise of fake news has made the need for effective detection methods, including in languages other than English, increasingly important. The study aims to address the challenges of Bangla which is considered a less important language. To this end, a complete dataset containing about 50,000 news items is proposed. Several deep learning models hav...
Preprint
Full-text available
Blood cell classification and counting are vital for the diagnosis of various blood-related diseases, such as anemia, leukemia, and thrombocytopenia. The manual process of blood cell classification and counting is time-consuming, prone to errors, and labor-intensive. Therefore, we have proposed a DL based automated system for blood cell classificat...
Conference Paper
Full-text available
The blockchain is a revolutionary computing framework that uses a unique data structure to create a record-keeping system that is accessible, communal, and decentralized. It has a wide range of applications in several disciplines. The worldwide implementation of electronic voting systems in public elections is increasing, propelled by the many bene...
Chapter
Full-text available
Credit card fraud is a significant threat to customers and financial institutions worldwide, causing billions of dollars in losses each year. Machine learning algorithms are used to detect fraudulent patterns, but the issue is that the datasets are imbalanced, and banks cannot share their customers' transaction data for privacy reasons. The primary...
Article
Full-text available
The issue of credit card fraud poses a significant concern for users of online transactions, necessitating the implementation of effective fraud detection mechanisms. Fraud detection is often done using machine learning algorithms. Practitioners can compare and analyse algorithms to get the best one for their credit card fraud detection scenario. T...
Article
Full-text available
Fake products have become a common term in business, especially in the consumer market. Due to the fake products, companies are going through a lot of financial losses, hampering the brand name, and at the end of the day, every day, they are losing customers. Product counterfeiting is rampant in the modern economy, and it is difficult to detect whe...
Article
Full-text available
Credit card fraud has increased vulnerability effects due to the large usage functions for customers due to innovative technologies and communication patterns. This article presents a review and important analysis of credit card fraud detection and prediction of fraudulent transactions based on cutting-edge research. The study provides a limited in...
Conference Paper
Full-text available
Precise prediction and detection of epilepsy, a common neurological condition marked by sporadic and repeated seizures, is necessary for efficient management and patient care. To do accurate and reliable seizure detection, machine learning (ML) on electroencephalogram (EEG) recordings is a good choice because of its capacity to provide insightful i...
Chapter
One of the most neglected sources of energy loss is streetlights that generate too much light in areas where it is not required. Energy waste has enormous economic and environmental effects. In addition, due to the conventional manual nature of operation, streetlights are frequently seen being turned ‘ON’ during the day and ‘OFF’ in the evening, wh...
Chapter
From the perspective of any nation, rural areas generally present a comparable set of problems, such as a lack of proper healthcare, education, living conditions, wages and market opportunities. Some nations have created and developed the concept of smart villages during the previous few decades, which effectively addresses these issues. The landsc...
Preprint
Full-text available
Biomedical Engineering's Internet of Medical Things (IoMT) is helping to improve the accuracy, dependability, and productivity of electronic equipment in the healthcare business. Real-time sensory data from patients may be delivered and subsequently analyzed through rapid development of wearable IoMT devices, such as neuro-stimulation devices with...
Preprint
Full-text available
This paper of work examines the SolarWinds attack, designed on Orion Platform security incident. It analyses the persistent threats agents and potential technical attack techniques to gain unauthorized access. In 2020 SolarWinds attack indicates an initial breach disclosure on Orion Platform software by malware distribution on IT and government org...
Preprint
Full-text available
The LockBit 3.0 ransomware variant is arguably the most threatening of malware in recent times. With no regard for a victim's industry, the ransomware has undergone several evolutions to arrive at an adaptable and evasive variant which has been a menace to governments and organisations, recently infiltrating Advanced Computer Software group. Previo...
Preprint
Full-text available
Heart failure is a life-threatening condition that affects millions of people worldwide. The ability to accurately predict patient survival can aid in early intervention and improve patient outcomes. In this study, we explore the potential of utilizing data pre-processing techniques and the Extra-Tree (ET) feature selection method in conjunction wi...
Preprint
Full-text available
Epilepsy is a prevalent neurological disorder characterized by recurrent and unpredictable seizures, necessitating accurate prediction for effective management and patient care. Application of machine learning (ML) on electroencephalogram (EEG) recordings, along with its ability to provide valuable insights into brain activity during seizures, is a...
Preprint
Full-text available
Potatoes are the third-largest food crop globally, but their production frequently encounters difficulties because of aggressive pest infestations. Early classification those potato pests plays an important role in the detection and prevention of their notorious attack. The aim of this study is to investigate the various types and characteristics o...
Article
Full-text available
In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, chall...
Article
Full-text available
Potatoes are the third-largest food crop globally, but their production frequently encounters difficulties because of aggressive pest infestations. Early classification those potato pests plays an important role in the detection and prevention of their notorious attack. The aim of this study is to investigate the various types and characteristics o...
Chapter
Full-text available
Artificial Intelligence (AI) is an emerging field that seeks to replicate or emulate human-like cognitive abilities using artificial means. As the world changes, the development and application of AI tools and technologies in areas such as agriculture, medicine, healthcare, and education are growing at an unprecedented pace. This chapter presents a...
Preprint
Full-text available
In certain Asian countries, Jute is one of the primary sources of income and Gross Domestic Product (GDP) for the agricultural sector. Like many other crops, Jute is prone to pest infestations, and its identification is typically made visually in countries like Bangladesh, India, Myanmar, and China. In addition, this method is time-consuming, chall...
Preprint
Full-text available
Potatoes are the third-largest food crop globally, but their production frequently encounters difficulties because of aggressive pest infestations. The aim of this study is to investigate the various types and characteristics of these pests and propose an efficient PotatoPestNet AI-based automatic potato pest identification system. To accomplish th...
Article
Full-text available
Unmanned aerial vehicles (UAVs) have recently attracted numerous regards from researchers and academics. The UAV is useful in heterogeneous applications such as transportation, disaster monitoring, surveillance, etc. Because UAVs have limited internal energy, clustering can effectively balance energy consumption and load. On the other hand, scene c...
Chapter
Full-text available
Due to digitalization in everyday life, the need for automatically recognizing handwritten digits is increasing. Handwritten digit recognition is essential for countless applications in various industries. Bengali ranks the fifth largest dialect in the world, with 265 million speakers (native and non-native combined), occupying 4% of the world popu...
Preprint
Full-text available
Monkeypox is a rare disease that raised concern among medical specialists following the convi-19 pandemic. It's concerning since monkeypox is difficult to diagnose early on because of symptoms that are similar to chickenpox and measles. Furthermore, because this is a rare condition, there is a knowledge gap among healthcare professionals. As a resu...
Preprint
Full-text available
From the perspective of any nation, rural areas generally present a comparable set of problems, such as a lack of proper health care, education, living conditions, wages, and market opportunities. Some nations have created and developed the concept of smart villages during the previous few decades, which effectively addresses these issues. The land...
Preprint
Full-text available
Due to digitalization in everyday life, the need for automatically recognizing handwritten digits is increasing. Handwritten digit recognition is essential for numerous applications in various industries. Bengali ranks the fifth largest language in the world with 265 million speakers (Native and non-native combined) and 4 percent of the world popul...
Preprint
The use of credit cards has become quite common these days as digital banking has become the norm. With this increase, fraud in credit cards also has a huge problem and loss to the banks and customers alike. Normal fraud detection systems, are not able to detect the fraud since fraudsters emerge with new techniques to commit fraud. This creates the...
Preprint
Full-text available
Providing the best customer experience is one of the primary concerns for the firms that are based online. The advancement of machine learning is revolutionising the company's attitude towards the client through improving the service quality by implementing chatbot solutions, which gives the user instant and satisfactory answers to their enquiries....
Preprint
Full-text available
Face detection and identification is the most difficult and often used task in Artificial Intelligence systems. The goal of this study is to present and compare the results of several face detection and recognition algorithms used in the system. This system begins with a training image of a human, then continues on to the test image, identifying th...
Article
Full-text available
Massive usage of credit cards has caused an escalation of fraud. Usage of credit cards has resulted in the growth of online business advancement and ease of the e-payment system. The use of machine learning (methods) are adapted on a larger scale to detect and prevent fraud. ML algorithms play an essential role in analysing customer data. In this r...
Chapter
Full-text available
In this paper, we attempt to verify a hypothesis of informational efficiency of financial markets, known as “random walk” introduced by Fama. Such hypotheses could be considered in relation to financial crises. In our study the hypothesis is tested on data taken from Warsaw Stock Exchange in 2007–2009 years. The hypothesis is tested by predictive m...
Technical Report
Full-text available
The honeypots that are available in the market are very flexible tools for participating in security defence. Of course, these are the tool that is meant to be targeted in order to achieve more knowledge about the attacker, their intentions, and the tools they use to gain access or attack. But, now from that specific definition, they have evolved....
Article
Full-text available
Blockchain is one of the emerging technology of 21 st century. It is getting common to the people helping them by providing better financial services without any centralised medium (banks, agencies etc.). Although it has a strong backbone of cryptography which ensures the data protection, however, security vulnerabilities are still the part of this...
Article
Full-text available
The world is getting into the practice of implementing 5G network on a business scale; there is research work that is covering the limits beyond 5G (B5G) and 6G. 6G network with the concept of more efficiency and better performance. The demand for network efficiency was always heightened, which is followed by the quality of service and availability...
Article
Full-text available
Now a day’s network security is one of the biggest concern and threat to the World. IoT is an emerging technology which is getting common day by day and billions of devices are interconnected to a wide network platform which are creating privacy and security concerns. Massive number of devices being used over internet by individuals and corporates...
Research
Full-text available
Many researchers have invested their time, effort, and energy on the research area of “Vehicular-to-everything” which is also known as V2X in term of security and vulnerabilities. For communications like V2X, the European Telecommunications Standards Institute (ETSI) has been engaged in order to formulate quality standards for these types of the me...
Thesis
Full-text available
Providing the best customer experience is one of the primary concerns for the firms that are based online. The advancement of machine learning is revolutionising the company’s attitude towards the client through improving the service quality by implementing chatbot solutions, which gives the user instant and satisfactory answers to their enquiries....
Article
Full-text available
Many researchers have invested their time, effort, and energy on the research area of “Vehicular-to-everything” which is also known as V2X in term of security and vulnerabilities. For communications like V2X, the European Telecommunications Standards Institute (ETSI) has been engaged in order to formulate quality standards for these types of the me...
Article
Full-text available
The honeypots that are available in the market are very flexible tools for participating in security defence. Of course, these are the tool that is meant to be targeted in order to achieve more knowledge about the attacker, their intentions, and the tools they use to gain access or attack. But, now from that specific definition, they have evolved....
Thesis
Full-text available
Voice Controlled Wireless Home Automation Based on internet/ Bluetooth/ wi-fi is a project that is integrated system with mobile phone (application) to give the facility to the elderly and the disable people, so that they can easily control home utilities fully Based on their phone through voice command. The device is built in such a way that it wi...
Article
Full-text available
This paper will cover the conversion of normal conventional cars into the autonomous car (Driverless car), problems associated with it, objectives, requirements and the expected outcome of this step. It will also cover the standards and give the critical comparison between conventional and driverless cars. This AI based car will cause a huge change...
Article
Full-text available
The Blockchain is an ingenious and remarkable invention. This technology created the backbone of a new type of internet. It was originally designed for the digital currency, Bitcoin, in which you can send digital money to anyone, even a stranger. Originally, it transmits bitcoin. It is considered a revolutionary technology. Blockchain helps in crea...
Article
Full-text available
The paper is prepared for exploring the communication as well as the interaction between two species- humans and robots. The variables like sex, emotion, lust and sex have already been taken in terms of completing the study. The innovation of the technology and its continued impact on future trends and society will be vividly discussed. Robotics Ar...
Article
Full-text available
A city situated in an urban area that aces in different sectors of the economy, people, governing, strength in human capital, the strong infrastructure of ICT, is said to be a smart city. This smart city term is fairly a recent approach to manage the difficulties of the city life that can mark up the efficiency, minimize the expenses and develops t...
Article
Full-text available
Blockchain is one of the emerging technology of 21st century. It is getting common to the people helping them by providing better financial services without any centralised medium (banks, agencies etc.). Although it has a strong backbone of cryptography which ensures the data protection, however, security vulnerabilities are still the part of this...

Questions

Questions (3)
Question
I am working with the Credit card dataset. I am aware of the fact that the Banks and financial institutions do not share the dataset with third-party companies or researchers.
I just need to know the name of the columns that are used in the header of a transaction.
How can I get those data?
Will I try to contact security personals in the banks?
Question
I am new in data Science area, more concisely in machine learning. working with imbalanced credit card data to detect frauds.
I can use matplotlib and some other python tools to get visual graphs and diagrams. But I am curious, what are other tools that are been used in the industry.
Question
Because of GDPR and confidentiality issues, no bank will expose the user's data to third-party researchers, and hence we cannot train our model for real-time fraud detection with real data (What I mean by real data is, that the data has not been modified | changed by any mean). All researchers have worked on a common data set, which is 7 years old, and that might not have all the Features that potentially changed over time.  So, I want to use the federate learning Algorithm to train the model with real dataset to follow GDPR law and access to information while preserving the privacy of users. 

Network

Cited By