Md Samiur Rahman - Academia.edu (original) (raw)
Uploads
Papers by Md Samiur Rahman
Entropy, 2020
Accurate blood smear quantification with various blood cell samples is of great clinical importan... more Accurate blood smear quantification with various blood cell samples is of great clinical importance. The conventional manual process of blood smear quantification is quite time consuming and is prone to errors. Therefore, this paper presents automatic detection of the most frequently occurring condition in human blood—microcytic hyperchromic anemia—which is the cause of various life-threatening diseases. This task has been done with segmentation of blood contents, i.e., Red Blood Cells (RBCs), White Blood Cells (WBCs), and platelets, in the first step. Then, the most influential features like geometric shape descriptors, Gray Level Co-occurrence Matrix (GLCM), Gray Level Run Length Matrix (GLRLM), and Gabor features (mean squared energy and mean amplitude) are extracted from each of the RBCs. To discriminate the cells as hypochromic microcytes among other RBC classes, scanning is done at angles (0∘, 45∘, 90∘, and 135∘). To achieve high-level accuracy, Adaptive Synthetic (AdaSyn) sam...
Radar Sensor Technology XXI
This paper discusses the micro-Doppler signatures of small UAVs obtained from a millimeter-wave r... more This paper discusses the micro-Doppler signatures of small UAVs obtained from a millimeter-wave radar system. At first, simulation results are shown to demonstrate the theoretical concept. It is illustrated that whilst the propeller rotation rate of the small UAVs is quite high, millimeter-wave radar systems are capable of capturing the full micro-Doppler spread. Measurements of small UAVs have been performed with both CW and FMCW radars operating at 94 GHz. The CW radar was used for obtaining micro-Doppler signatures of individual propellers. The field test data of a flying small UAV was collected with the FMCW radar and was processed to extract micro-Doppler signatures. The high fidelity results clearly reveal features such as blade flashes and propeller rotation modulation lines which can be used to classify targets. This work confirms that millimeter-wave radar is suitable for the detection and classification of small UAVs at usefully long ranges.
Journal of Physics: Conference Series, 2021
Obstacle detection can improve the mobility as well as the safety of visually impaired people. In... more Obstacle detection can improve the mobility as well as the safety of visually impaired people. In this paper, we present a system using mobile camera for visually impaired people. The proposed algorithm works in indoor environment and it uses a very simp le technique of using few p restored floor images. In indoor environ ment all unique floor types are considered and a single image is stored for each unique floor type. These floor images are considered as reference images. The algorithm acquires an input image frame and then a region of interest is selected and is scanned for obstacle using pre-stored floor images. The algorithm compares the present frame and the next frame and co mpute mean square error of the two frames. If mean square error is less than a threshold value α then it means that there is no obstacle in the next frame. If mean square error is greater than α then there are t wo possibilit ies; either there is an obstacle or the floor type is changed. In order to check if the floor is changed, the algorithm co mputes mean square error of next frame and all stored floor types. If minimu m of mean square error is less than a threshold value α then flour is changed otherwise there exist an obstacle. The proposed algorithm works in real-time and 96% accuracy has been achieved. Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
In 2014 Ieee Radar Conference, 2014
This paper describes an on-line e-voting system security implementation to reduce attacks with th... more This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that require high security. The system represents security analysis against large-scale attacks performed by rationally thinking attackers. Electronic Voting promises a lot of advantages; it is not only fast and very convenient to use, but it also features additional security properties that cannot be achieved with traditional voting, such as individual or universal verifiability. However, due to the sensitive and critical nature of voting protocols, it is crucial to formally guarantee their correctness with respect to certain intended security properties. We develop a model for describing the real life environment where voting takes place and analyze the behavior of rational adversaries. The system also eliminates the voting process of non-eligible vot...
This paper describes an on-line e-voting system security implementation to reduce attacks with th... more This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that require high security. The system represents security analysis against large-scale attacks performed by rationally thinking attackers. Electronic Voting promises a lot of advantages; it is not only fast and very convenient to use, but it also features additional security properties that cannot be achieved with traditional voting, such as individual or universal verifiability. However, due to the sensitive and critical nature of voting protocols, it is crucial to formally guarantee their correctness with respect to certain intended security properties. We develop a model for describing the real life environment where voting takes place and analyze the behavior of rational adversaries. The system also eliminates the voting process of non-eligible vot...
Entropy, 2020
Accurate blood smear quantification with various blood cell samples is of great clinical importan... more Accurate blood smear quantification with various blood cell samples is of great clinical importance. The conventional manual process of blood smear quantification is quite time consuming and is prone to errors. Therefore, this paper presents automatic detection of the most frequently occurring condition in human blood—microcytic hyperchromic anemia—which is the cause of various life-threatening diseases. This task has been done with segmentation of blood contents, i.e., Red Blood Cells (RBCs), White Blood Cells (WBCs), and platelets, in the first step. Then, the most influential features like geometric shape descriptors, Gray Level Co-occurrence Matrix (GLCM), Gray Level Run Length Matrix (GLRLM), and Gabor features (mean squared energy and mean amplitude) are extracted from each of the RBCs. To discriminate the cells as hypochromic microcytes among other RBC classes, scanning is done at angles (0∘, 45∘, 90∘, and 135∘). To achieve high-level accuracy, Adaptive Synthetic (AdaSyn) sam...
Radar Sensor Technology XXI
This paper discusses the micro-Doppler signatures of small UAVs obtained from a millimeter-wave r... more This paper discusses the micro-Doppler signatures of small UAVs obtained from a millimeter-wave radar system. At first, simulation results are shown to demonstrate the theoretical concept. It is illustrated that whilst the propeller rotation rate of the small UAVs is quite high, millimeter-wave radar systems are capable of capturing the full micro-Doppler spread. Measurements of small UAVs have been performed with both CW and FMCW radars operating at 94 GHz. The CW radar was used for obtaining micro-Doppler signatures of individual propellers. The field test data of a flying small UAV was collected with the FMCW radar and was processed to extract micro-Doppler signatures. The high fidelity results clearly reveal features such as blade flashes and propeller rotation modulation lines which can be used to classify targets. This work confirms that millimeter-wave radar is suitable for the detection and classification of small UAVs at usefully long ranges.
Journal of Physics: Conference Series, 2021
Obstacle detection can improve the mobility as well as the safety of visually impaired people. In... more Obstacle detection can improve the mobility as well as the safety of visually impaired people. In this paper, we present a system using mobile camera for visually impaired people. The proposed algorithm works in indoor environment and it uses a very simp le technique of using few p restored floor images. In indoor environ ment all unique floor types are considered and a single image is stored for each unique floor type. These floor images are considered as reference images. The algorithm acquires an input image frame and then a region of interest is selected and is scanned for obstacle using pre-stored floor images. The algorithm compares the present frame and the next frame and co mpute mean square error of the two frames. If mean square error is less than a threshold value α then it means that there is no obstacle in the next frame. If mean square error is greater than α then there are t wo possibilit ies; either there is an obstacle or the floor type is changed. In order to check if the floor is changed, the algorithm co mputes mean square error of next frame and all stored floor types. If minimu m of mean square error is less than a threshold value α then flour is changed otherwise there exist an obstacle. The proposed algorithm works in real-time and 96% accuracy has been achieved. Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
In 2014 Ieee Radar Conference, 2014
This paper describes an on-line e-voting system security implementation to reduce attacks with th... more This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that require high security. The system represents security analysis against large-scale attacks performed by rationally thinking attackers. Electronic Voting promises a lot of advantages; it is not only fast and very convenient to use, but it also features additional security properties that cannot be achieved with traditional voting, such as individual or universal verifiability. However, due to the sensitive and critical nature of voting protocols, it is crucial to formally guarantee their correctness with respect to certain intended security properties. We develop a model for describing the real life environment where voting takes place and analyze the behavior of rational adversaries. The system also eliminates the voting process of non-eligible vot...
This paper describes an on-line e-voting system security implementation to reduce attacks with th... more This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that require high security. The system represents security analysis against large-scale attacks performed by rationally thinking attackers. Electronic Voting promises a lot of advantages; it is not only fast and very convenient to use, but it also features additional security properties that cannot be achieved with traditional voting, such as individual or universal verifiability. However, due to the sensitive and critical nature of voting protocols, it is crucial to formally guarantee their correctness with respect to certain intended security properties. We develop a model for describing the real life environment where voting takes place and analyze the behavior of rational adversaries. The system also eliminates the voting process of non-eligible vot...