Syed Mahbubhur Rahman’s research while affiliated with Southwest Minnesota State University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (61)


A Linguistically Sortable Bengali Coding System and Its Application in Spell Checking
  • Chapter

January 2002

·

1 Read

Syed M. Rahman

·

·

Mahbubur Rahman Syed

·

M. Kaykobad

By developing an inter-scheme text conversion utility, we have established in (Murshed et al., 1998) that use of non-lossy transformation instead of lossy transformation for sorting Bengali texts in linguistic order has some extra benefit. In this paper we discuss another very important application of non-lossy transformation by developing an efficient spell checking application for Bengali texts based on the internal coding scheme with non-lossy transformation. As usual, the handling of compound letters remains the key area where a Bengali text speller differs from its counterparts in other languages. Here we establish that using of the internal coding scheme in designing the dictionary and developing suggestion generating search engine not only provides a spell checking solution which is independent of any specific primary coding scheme but also assists in designing layered solution for efficient modularization and maintenance of coding. This chapter is organized as follows. In the next section we present the basic properties of Bengali script. For the sake of completeness, some results and algorithms on sorting Bengali texts in linguistic order, developed in (Murshed et al., 1998), are given in the third section. In the fourth section, we discuss various issues of developing an efficient primary coding scheme independent spell checking application based on our solution to linguistically sorting Bengali texts. The final section concludes the paper.


A New Encryption Algorithm for High Throughput Multimedia

January 2002

·

4 Reads

·

3 Citations

Syed M. Rahman

·

·

·

[...]

·

Mahbubur Rahman Syed

The security of multimedia data is important for multimedia commerce. The encryption algorithms with high security, such as DES and IDEA, may not be suitable for multimedia applications because of large data sizes and real time constraint. This paper proposes a fast encryption algorithm for high throughput multimedia data, called FEA-M. FEA-M is based on Boolean matrix theory. The plaintext and the ciphertext are 64 ´ 64 Boolean matrices while the secret key is also an 64 ´ 64 matrix. The structure of FEA-M is chosen to provide confusion and diffusion and to facilitate both hardware and software implementation.


Object Based Image Ranking Using Neural Networks

May 2001

·

20 Reads

Lecture Notes in Computer Science

In this paper an object-based image ranking is performed using both supervised and unsupervised neural networks. The features are extracted based on the moment invariants, the run length, and a composite method. This paper also introduces a likeness parameter, namely a similarity measure using the weights of the neural networks. The experimental results show that the performance of image retrieval depends on the method of feature extraction, types of learning, the values of the parameters of the neural networks, and the databases including query set. The best performance is achieved using supervised neural networks for internal query set.


Review of Fuzzy Image Segmentation Techniques

May 2001

·

62 Reads

·

20 Citations

This chapter provides a comprehensive overview of various methods of fuzzy logic-based image segmentation techniques. Fuzzy image segmentation techniques outperform conventional techniques, as they are able to evaluate imprecise data as well as being more robust in noisy environment. Fuzzy clustering methods need to set the number of clusters prior to segmentation and are sensitive to the initialization of cluster centers. Fuzzy rule-based segmentation techniques can incorporate the domain expert knowledge and manipulate numerical as well as linguistic data. It is also capable of drawing partial inference using fuzzy IF-THEN rules. It has been also intensively applied in medical imaging. These rules are, however, application-domain specific and very difficult to define either manually or automatically that can complete the segmentation alone. Fuzzy geometry and thresholding-based image segmentation techniques are suitable only for bimodal images and can be applied in multimodal images, but they don’t produce a good result for the images that contain a significant amount of overlapping pixels between background and foreground regions. A few techniques on image segmentation based on fuzzy integral and soft computing techniques have been published and appear to offer considerable promise.


Web-Based Smart Card Agent Environment and Applications for E-Commerce

January 2001

·

4 Reads

Issues on usability, security, and mobility have always been the main concerns for e-commerce implementations that aim to gain widespread public acceptance. Smart Card Agent Environment is designed to address these issues by using a combination of software agent and smart card technology. In this chapter, a functional overview of the proposed environment is presented to illustrate how these two technologies can be integrated to offer e-commerce services with high usability, security, and mobility. To further demonstrate the concept, a prototype implementation of the environment has been carried out. In this implementation, an on-card agent residing in the smart card is capable of storing critical data securely, providing digital ID and signature, and carrying out user authentication. On the other hand, off-card agent would provide various high-level agent services that can be used to carry out e-commerce activities. Before the end of the chapter, practical considerations for issues on security, technology acceptance, infrastructure availability, and standardization will be discussed.


An Enterprise Viewpoint of Wireless Virtual Communities and the Associated Uses of Software Agents

January 2001

·

3 Reads

·

6 Citations

We envision the integration of the concepts of virtual communities, electronic markets, and ubiquitous wireless services into agent-enhanced mobile virtual communities which we call AMV-communities, a set of which form the AMV-community-space. We present concepts for an AMV-community modelled with RM-ODP Enterprise Viewpoint concepts, and outline an architecture of AMV-communities using software agents attached to roles. We also illustrate how we cope with disconnected computing by using agents and meta-policy rules. Purchase this chapter to continue reading all 24 pages >


Agent Technologies and Business Models for Electronic Commerce

January 2001

·

9 Reads

·

3 Citations

Agent technologies have proved to provide adequate solutions to some of the challenges posed by the new business models that are arising in the field of electronic commerce. In this chapter, we present some of the key challenges in turning agents’ research into commercial applications, provide an overview of the electronic commerce business models, and discuss how they can benefit from the new developments in agent technologies. We illustrate the discussion with examples of the work that is being developed by projects from the IST research program of the European Union.


Deploying Internet Commerce in Lottery Businesses

January 2001

·

4 Reads

Commerce is essentially the exchange of goods and services in various forms between sellers and buyers, together with associated financial transactions. Electronic Commerce (EC) is the process of conducing commerce through electronic means, including any electronic commercial activity supported by IT (information technology) (Adam and Yesha, 1996; Kambil, 1997; Yen, 1998). In this sense, EC is not totally new. Industries have used various EC platforms such as advertising on TV and ordering by telephone or fax. Internet Commerce (IC), or Web Commerce, is a specific type of EC (Maddox, 1998; Minoli D. and Minoli E., 1997). While some traditional EC platforms such as TV and telephone have been used to build “TV-gambling” and “telephone-betting” systems for conducting lottery business, Internet Lottery Commerce (ILC) has been assessed as the most promising type of EC in the foreseeable future. There are many social and moral issues relating to the conduct of lottery business on-line. However, this chapter does not debate these but deals only with business and technology issues. The purpose of this chapter is to provide a structured guide to senior executives and strategic planners who are planning on, or interested in, ILC deployment and operation. The guide consists of several stages: (1) an explanation of the industry segment’s traits, value chain, and current status; (2) an analysis of the competition and business issues in the Internet era and an evaluation of the strategic resources; (3) a planning framework that addresses major infrastructure issues; and (4) recommendations comprising the construction of an ILC model, suggested principles, and an approach to strategic deployment. The chapter demonstrates the case for applying the proposed guideline within the lottery business. Faced with a quickly changing technological context, it pays special attention to constructing a conceptual framework that addresses the key components of an ILC model. ILC fulfils the major activities in a lottery commerce value chain—advertising, selling and delivering products, collecting payments for tickets, and paying prizes. Although the guideline has been devised for lottery businesses, it can be applied to many other industry sectors.


Consumer Trust and Confidence in Internet Commerce

January 2001

·

11 Reads

The Internet network is rapidly becoming more and more popular among companies as an avenue to do business. It has made it easy for them to advertise, market their products and services, and communicate with their customers. Advertising and marketing on the Internet offers the promise of huge profits. Sellers, though, are not the only ones to reap benefits from the Internet. Purchasing products over the Net has also become extremely beneficial. It is faster than the traditional process of mail ordering, and various on-line support forums provide advice that is not found in manuals, catalogs, or brochures. Over the last few years, retail and computer experts have called the Internet the hottest marketing trend and the new consumer market. There are a number of benefits which Internet commerce could potentially deliver to consumers—convenience, wide choice of products, better product information, new types of products and services, and even lower prices. Nevertheless, the actual volume of consumer buying on the Internet is still small, a tiny fraction of worldwide consumer purchases. At the heart of this phenomenon of Internet commerce are the most essential concerns of the consumer—trust, confidence, and protection. Trust, itself, represents an evaluation of information, an analysis that requires decisions about the value of specific information in terms of several factors. Methodologies are being constructed to evaluate information more systematically, to generate decisions about increasingly complex and sophisticated relationships. In turn these methodologies about information and trust will strongly influence the growth of the Internet as a medium for commerce. In this new business environment, consumers find themselves increasingly in the driver’s seat, holding a tremendous amount of purchasing power over providers and sellers. They are empowered because they now have access to a worldwide assortment of suppliers—the Web gives them the power to buy from anyone, anywhere, anytime. The consumers, therefore, want to have control over the collection and use of their personal data and to have appropriate redress mechanisms available in the event of a problem.


Business-to-Business Electronic Commerce

January 2001

·

11 Reads

·

3 Citations

While there are many proposals to automate the buying and selling process, there has been no actual attempt to automate the tendering process (sealed auction). This chapter contributes toward the steps to move in this direction. In this chapter, the benefits of an on-line tendering system are clarified, the tendering process is analyzed, the current attempts are surveyed, the competency of EDI and on-line auctions approach is criticized, and a framework solution is proposed. Purchase this chapter to continue reading all 20 pages >


Citations (15)


... Our methodology allowed analysing a much larger number of websites, minimizing time constraints, and reducing time cost, as well as eliminating subjective approaches due to multipleobserver evaluations. (Goi, 2007) The MICA model, first developed to evaluate the websites of the metal manufacturing industry in Australia, was characterized as an instrument that identifies the position of an organization or industry on the Internet commerce roadmap and explains the processes by which it has arrived at that position (Cooper & Burgess, 2000). The model suggests that, in the development of commercial websites, businesses often start with a simple website and this presence gradually grows more complex, incorporating new processes as the business builds up experience and knowledge of ICT utilization ). ...

Reference:

An Evaluation of Turkish Hotel Websites: A New Perspective For EMICA
A Model of Internet Commerce Adoption (Mica)
  • Citing Chapter
  • January 2000

... @BULLET International cases indicate that telemetry for asset management (particularly for fleet management using remote diagnostics) can decrease in about 15% the harvesting fleet's operating costs, principally due to the increased efficiency and reduced maintenance 12 . The history of e-commerce in Australia goes back to the 1970s, when pharmacies started to order supplies by electronic means [37]. However, the modern era of e-commerce started in the 90s and by 1998 it was well established in banking, airline ticketing, bill payments and other similar applications. ...

Diffusion of Electronic Commerce in Australia
  • Citing Chapter
  • January 2000

... SMEs also contribute to approximately 25% of the country's GDP. About 45% of the additional manufacturing value comes from this sector, while its total contribution to export earnings varies from 75% to 80% (Rahman, 2015). However, the coronavirus disease 2019 pandemic caused approximately 37% unemployment in the SME sector, while about 70% were on the verge of losing their jobs. ...

EDI and Small/Medium Enterprises
  • Citing Chapter
  • January 2000

... Consequently, the traditional encryption algorithms need longer time to directly encrypt the image data, the second, is the decrypted text must be equal to the original text, but this requirement is not necessary for image data. Due to the characteristic of human perception, a decrypted image containing small distortion is usually acceptable [8], [14,15,16]. According to Shujun Li. et al. [6] image encryption techniques try to convert an image to another one that is hard to understand. ...

A New Encryption Algorithm for High Throughput Multimedia
  • Citing Chapter
  • January 2002

... There are many potential benefits of using agent technologies for business. First, agent-based computing allows organizations to reduce product support costs by automating customer service processes (Raisinghani 2000). Many companies have incorporated intelligent auto-response e-mail systems, which automatically read every customer's message, understand its contents, and either provide an intelligent response or forward the request to an appropriate customer service representative. ...

Software Agents in Today's Digital Economy
  • Citing Chapter
  • January 2001

... The research recommended the introduction of technology oriented subjects in schools to educate people on the benefits of mobile commerce and technology to change Kenyans' perception towards technology; passing and strictly enforcing consumer protection laws; implementation of policies and legal frameworks to support the adoption of RFID technology. Kisonzo (2001) studied the effects that electronic commerce had on the different sectors of the Kenyan economy to understand the situation relating to electronic commerce and to make a comparative analysis between Kenya and the rest of the world. While in other countries, statistics existed that helped businesses understand the potentials of e-commerce, none existed in Kenya at the In summary, all the studies reviewed above are concerned with exploring the facilitating and/or militating factors relating to the adoption and usage of e-commerce in Kenya, with the results indicating serious internal and external factors of varying degrees of magnitude. ...

Business-to-Business Electronic Commerce
  • Citing Chapter
  • January 2001

... The open distributed strategy is growing and becoming difficult to manage. Beyond these methods, agent-based system with mobility is becoming a noticeable approach [1]. An agent is a computational process that implements the autonomous (actions without inputs), and communicating functionality of an application [2]. ...

An Enterprise Viewpoint of Wireless Virtual Communities and the Associated Uses of Software Agents
  • Citing Chapter
  • January 2001

... Also some other methods are used in spell checking approach such as Finite State Automaton. Moreover, some studies (S6 [19], S10 [23] and S14 [27]) are based on ad hoc method. ...

A LINGUISTICALLY SORTABLE BENGALI CODING SYSTEM AND ITS APPLICATION IN SPELL CHECKING: A CASE STUDY OF MULTILINGUAL APPLICATIONS
  • Citing Article
  • Full-text available

... The ranking is performed using the actual value of the output node of the neural network [1]. Features were extracted from the objects by utilizing three types of feature extraction methods: the moment invariants [4], the run length [5], and the composite [6] methods. Experiments were conducted to compare the discriminating capability of the features obtained from the composite, the run length and the moment invariants methods. ...

Composite features extraction and object ranking
  • Citing Article

... Digital information can be shared, copied, edited and moved without loss of quality. Copies have the same quality as the original, and hence there is no loss of information (Rahman et al., 1999) unless (and this matters for infrastructure) the file is compressed or becomes corrupted, or cannot be opened or read using available hardware and software. ...

Application of multimedia technology in manufacturing: A review
  • Citing Article
  • January 1999

Computers in Industry