Change search
Link to record
Permanent link

Direct link
BETA
Alternative names
Publications (10 of 124) Show all publications
Jamil, M. N., Hossain, M. S., Islam, R. U. & Andersson, K. (2019). A Belief Rule Based Expert System for Evaluating Technological Innovation Capability of High-Tech Firms Under Uncertainty. In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV): . Paper presented at Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States. IEEE
Open this publication in new window or tab >>A Belief Rule Based Expert System for Evaluating Technological Innovation Capability of High-Tech Firms Under Uncertainty
2019 (English)In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), IEEE, 2019Conference paper, Published paper (Refereed)
Abstract [en]

Technological innovation capability (TIC) is a complicated and subtle concept which is based on multiple quantitative and qualitative criteria. The cores of a firm’s long-term competitive dominance are defined by technological innovation capability which is the incentive for a firm’s innovation. Various types of uncertainty can be noticed while considering multiple criteria for evaluating TIC. In order to evaluate TIC in a reliable way, a Belief Rule Base (BRB) Expert System can be used to handle both quantitative and qualitative data and their associated uncertainties. In this paper, a RESTful API-based BRB expert system is introduced to evaluate technological innovation capability by taking uncertainties into consideration. This expert system will facilitate firms’ managers to obtain a recapitulation of the TIC evaluation. It will help them to take essential steps to ensure corporate survival and strengthen their weak capabilities continuously to facilitate a competitive advantage. Other users can also use this API to apply BRB for a different domain. However, a comparison between the knowledge-driven approach (BRBES) and several data-driven models has been performed to find out the reliability in evaluating TIC. The result shows that the outcome of BRBES is better than other data-driven approaches.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Technological Innovation Capability, Belief Rule Base, Uncertainty, RESTful API
National Category
Computer Sciences
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-73309 (URN)
Conference
Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251
Available from: 2019-03-25 Created: 2019-03-25 Last updated: 2019-04-02Bibliographically approved
Akter, S., Nahar, N., Hossain, M. S. & Andersson, K. (2019). A New Crossover Technique to Improve Genetic Algorithm and Its Application to TSP. In: Proceedings of 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE): . Paper presented at International Conference on Electrical, Computer and Communication Engineering (ECCE 2019), 07-09 February, 2019, Cox's Bazar, Bangladesh.. IEEE, Article ID 18566123.
Open this publication in new window or tab >>A New Crossover Technique to Improve Genetic Algorithm and Its Application to TSP
2019 (English)In: Proceedings of 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, 2019, article id 18566123Conference paper, Published paper (Refereed)
Abstract [en]

Optimization problem like Travelling Salesman Problem (TSP) can be solved by applying Genetic Algorithm (GA) to obtain perfect approximation in time. In addition, TSP is considered as a NP-hard problem as well as an optimal minimization problem. Selection, crossover and mutation are the three main operators of GA. The algorithm is usually employed to find the optimal minimum total distance to visit all the nodes in a TSP. Therefore, the research presents a new crossover operator for TSP, allowing the further minimization of the total distance. The proposed crossover operator consists of two crossover point selection and new offspring creation by performing cost comparison. The computational results as well as the comparison with available well-developed crossover operators are also presented. It has been found that the new crossover operator produces better results than that of other cross-over operators.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
TSP, GA, crossover operator, offspring, chromosome, substring
National Category
Computer Sciences
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-72626 (URN)10.1109/ECACE.2019.8679367 (DOI)2-s2.0-85064611070 (Scopus ID)978-1-5386-9111-3 (ISBN)
Conference
International Conference on Electrical, Computer and Communication Engineering (ECCE 2019), 07-09 February, 2019, Cox's Bazar, Bangladesh.
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251
Available from: 2019-01-19 Created: 2019-01-19 Last updated: 2019-05-15Bibliographically approved
Hossain, M. S., Sultana, Z., Nahar, L. & Andersson, K. (2019). An Intelligent System to Diagnose Chikungunya under Uncertainty. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 10(2), 37-54
Open this publication in new window or tab >>An Intelligent System to Diagnose Chikungunya under Uncertainty
2019 (English)In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, E-ISSN 2093-5382, Vol. 10, no 2, p. 37-54Article in journal (Refereed) Published
Abstract [en]

Chikungunya is a virus-related disease, bring about by the virus called CHIKV that spreads throughmosquito biting. This virus first found in Tanzania, while blood from patients was isolated. Thecommon signs and symptoms, associated with Chikungunya are considered as fever, joint swelling,joint pain, muscle pain and headache. The examination of these signs and symptoms by the physician constitutes the typical preliminary diagnosis of this disease. However, the physician is unable tomeasure them with accuracy. Therefore, the preliminary diagnosis in most of the cases could sufferfrom inaccuracy, which leads to wrong treatment. Hence, this paper introduces the design and implementation of a belief rule based expert system (BRBES) which is capable to represent uncertainknowledge as well as inference under uncertainty. Here, the knowledge is illustrated by employing belief rule base while deduction is carried out by evidential reasoning. The real patient data of250 have been considered to demonstrate the accuracy and the robustness of the expert system. Acomparison has been performed with the results of BRBES and Fuzzy Logic Based Expert System(FLBES) as well as with the expert judgment. Furthermore, the result of BRBES has been contrastedwith various data-driven machine learning approaches, including ANN (Artificial Neural networks)and SVM (Support Vector Machine). The reliability of BRBESs was found better than those of datadriven machine learning approaches. Therefore, the BRBES presented in this paper could enable thephysician to conduct the analysis of Chikungunya more accurately.

Place, publisher, year, edition, pages
Korea: JoWUA, 2019
Keywords
Belief Rule Base, Uncertainty, Evidential Reasoning, Expert System, Chikungunya
National Category
Computer Sciences Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-75300 (URN)10.22667/JOWUA.2019.06.30.037 (DOI)
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251
Note

Validerad;2019;Nivå 1;2019-08-14 (johcin)

Available from: 2019-07-14 Created: 2019-07-14 Last updated: 2019-08-14Bibliographically approved
Chowdhury, R. R., Hossain, M. S., Islam, R. U., Andersson, K. & Hossain, S. (2019). Bangla Handwritten Character Recognition using Convolutional Neural Network with Data Augmentation. In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV): . Paper presented at Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States.
Open this publication in new window or tab >>Bangla Handwritten Character Recognition using Convolutional Neural Network with Data Augmentation
Show others...
2019 (English)In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 2019Conference paper, Published paper (Refereed)
Abstract [en]

This paper proposes a process of Handwritten Character Recognition to recognize and convert images of individual Bangla handwritten characters into electronically editable format, which will create opportunities for further research and can also have various practical applications. The dataset used in this experiment is the BanglaLekha-Isolated dataset [1]. Using Convolutional Neural Network, this model achieves 91.81% accuracy on the alphabets (50 character classes) on the base dataset, and after expanding the number of images to 200,000 using data augmentation, the accuracy achieved on the test set is 95.25%. The model was hosted on a web server for the ease of testing and interaction with the model. Furthermore, a comparison with other machine learning approaches is presented.

Keywords
Convolutional Neural Network, handwritten character recognition, Bangla handwritten characters, Data augmentation
National Category
Computer Sciences Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-73307 (URN)
Conference
Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251
Available from: 2019-03-25 Created: 2019-03-25 Last updated: 2019-04-02Bibliographically approved
Poirot, V., Ericson, M., Nordberg, M. & Andersson, K. (2019). Energy efficient multi-connectivity algorithms for ultra-dense 5G networks. Wireless networks, 1-16
Open this publication in new window or tab >>Energy efficient multi-connectivity algorithms for ultra-dense 5G networks
2019 (English)In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, p. 1-16Article in journal (Refereed) Epub ahead of print
Abstract [en]

Two radio air interfaces, Evolved-LTE and New Radio, coexist in new 5G systems. New Radio operates in the millimeter band and provides a better bandwidth, but the higher frequencies also imply worse radio conditions. Multi-connectivity, a feature of 5G that allows users to connect to more than one base station simultaneously, can offer the advantages of both interfaces. In this paper, we investigate how multi-connectivity can improve user reliability and the system’s energy efficiency. Five algorithms for secondary cell association are presented and evaluated. We show a decrease in the radio link failure rate of up to 50% at high speeds and improvements of the energy efficiency of up to 20% at low speeds.

Place, publisher, year, edition, pages
Springer, 2019
Keywords
Multi connectivity, Energy efficiency, Ultra dense network, 5G, Multi-RAT
National Category
Computer Sciences
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-75301 (URN)10.1007/s11276-019-02056-w (DOI)
Available from: 2019-07-14 Created: 2019-07-14 Last updated: 2019-07-22
Uddin Ahmed, T., Hossain, S., Hossain, M. S., Islam, R. U. & Andersson, K. (2019). Facial Expression Recognition using Convolutional Neural Network with Data Augmentation. In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV): . Paper presented at Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States.
Open this publication in new window or tab >>Facial Expression Recognition using Convolutional Neural Network with Data Augmentation
Show others...
2019 (English)In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 2019Conference paper, Published paper (Refereed)
Abstract [en]

Detecting emotion from facial expression has become an urgent need because of its immense applications in artificial intelligence such as human-computer collaboration, data-driven animation, human-robot communication etc. Since it is a demanding and interesting problem in computer vision, several works had been conducted regarding this topic. The objective of this research is to develop a facial expression recognition system based on convolutional neural network with data augmentation. This approach enables to classify seven basic emotions consist of angry, disgust, fear, happy, neutral, sad and surprise from image data. Convolutional neural network with data augmentation leads to higher validation accuracy than the other existing models (which is 96.24%) as well as helps to overcome their limitations.

Keywords
Convolutional neural network, data augmentation, validation accuracy, emotion detection
National Category
Computer Sciences
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-73310 (URN)
Conference
Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251
Available from: 2019-03-25 Created: 2019-03-25 Last updated: 2019-04-02Bibliographically approved
Islam, R. U., Andersson, K. & Hossain, M. S. (2019). Network Intelligence for Enhanced Multi-Access Edge Computing (MEC) in 5G. In: : . Paper presented at 15th Swedish National Computer Networking Workshop (SNCNW 2019), Luleå, June 4-5, 2019 (pp. 13-17).
Open this publication in new window or tab >>Network Intelligence for Enhanced Multi-Access Edge Computing (MEC) in 5G
2019 (English)Conference paper, Oral presentation only (Other academic)
Abstract [en]

5G networks will enable people and machines to communicate at high speeds and very low latencies, in a reliable way. This opens up opportunities for totally new usage patterns and the fully connected Industry 4.0-enabled enterprise covering the entire value chain from design, production, deployment, to usage of products. 5G will be rolled out across the whole world, including Sweden where the first 5G test network was launched late 2018. One important new feature in 5G is the emerging edge computing capabilities, where users can easily offload computational tasks to the network’s edge very close to the user. At the same time, computational tasks traditionally performed in central nodes can be offloaded from remotely located data centres to the network’s edge. Multi-access Edge Computing (MEC) is a promising network architecture delivering solutions along these lines offering a platform for applications with requirements on low latencies and high reliability. This paper targets this environment with a novel Belief-rule-based (BRB) unsupervised learning algorithm for clustering helping 5G applications to take intelligent decisions on software deployment. The scenarios consist of different combinations of numbers of users and connections and mobility patterns. The target environment is built up using a three-tier structure with a container-based solution where software components can easily be spread around the network.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ltu:diva-74031 (URN)
Conference
15th Swedish National Computer Networking Workshop (SNCNW 2019), Luleå, June 4-5, 2019
Available from: 2019-05-24 Created: 2019-05-24 Last updated: 2019-08-12
Andersson, K., You, I., Rahmani, R. & Sharma, V. (2019). Secure Computation on 4G/5G Enabled Internet-of-Things. Wireless Communications & Mobile Computing, 2019, Article ID 3978193.
Open this publication in new window or tab >>Secure Computation on 4G/5G Enabled Internet-of-Things
2019 (English)In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2019, article id 3978193Article in journal, Editorial material (Refereed) Published
Abstract [en]

The rapid development of Internet-of-Things (IoT) techniques in 4G/5G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through 4G and 5G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.

Data privacy in a distributed environment like IoT can be attained through secure multiparty computation. An emerging area of potential applications for secure computation is to address privacy concerns in data aggregation and analysis to match the explosive growth of the amount of IoT data. However, the inherent complexity of IoT systems really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. As a result, there is an increasing demand for the development of new secure computation methods and tools which can fill in the gap between security and practical usage in IoT.

The scope of this special issue is in line with recent contributions from academia and industry on the recent activities that tackle the technical challenges making computing secure on 4G/5G enabled Internet-of-Things. For the current issue, we are pleased to introduce a collection of papers covering a range of topics such as securely verifiable remote erasure schemes, multiuser identification algorithms, privacy-preserving shared storage, situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks in 5G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based encryption, and Secure Storage and Retrieval of IoT Data.

Place, publisher, year, edition, pages
Hindawi Publishing Corporation, 2019
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-75177 (URN)10.1155/2019/3978193 (DOI)000471953500001 ()
Available from: 2019-07-01 Created: 2019-07-01 Last updated: 2019-07-01Bibliographically approved
Islam, M. Z. Z., Hossain, M. S., Islam, R. U. & Andersson, K. (2019). Static Hand Gesture Recognition using Convolutional Neural Network with Data Augmentation. In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV): . Paper presented at Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States. IEEE
Open this publication in new window or tab >>Static Hand Gesture Recognition using Convolutional Neural Network with Data Augmentation
2019 (English)In: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), IEEE, 2019Conference paper, Published paper (Refereed)
Abstract [en]

Computer is a part and parcel in our day to day life and used in various fields. The interaction of human and computer is accomplished by traditional input devices like mouse, keyboard etc. Hand gestures can be a useful medium of human-computer interaction and can make the interaction easier. Gestures vary in orientation and shape from person to person. So, non-linearity exists in this problem. Recent research has proved the supremacy of Convolutional Neural Network (CNN) for image representation and classification. Since, CNN can learn complex and non-linear relationships among images, in this paper, a static hand gesture recognition method using CNN was proposed. Data augmentation like re-scaling, zooming, shearing, rotation, width and height shifting was applied to the dataset. The model was trained on 8000 images and tested on 1600 images which were divided into 10 classes. The model with augmented data achieved accuracy 97.12% which is nearly 4% higher than the model without augmentation (92.87%).

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Convolutional Neural Network, Static hand gestures recognition, Data augmentation.
National Category
Computer Sciences Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-73308 (URN)
Conference
Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 26 - 29 April 2019, Spokane, United States
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251
Available from: 2019-03-25 Created: 2019-03-25 Last updated: 2019-04-02Bibliographically approved
Hossain, M. S., Al Hasan, A., Guha, S. & Andersson, K. (2018). A Belief Rule Based Expert System to Predict Earthquake under Uncertainty. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(2), 26-41
Open this publication in new window or tab >>A Belief Rule Based Expert System to Predict Earthquake under Uncertainty
2018 (English)In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, E-ISSN 2093-5382, Vol. 9, no 2, p. 26-41Article in journal (Refereed) Published
Abstract [en]

The impact of earthquake is devastating, which has the capability to stop the socio-economic activities of a region within a short span of time. Therefore, an earlier prediction of earthquake could play an important role to save human lives as well as socio-economic activities. The signs of animal behavior along with environmental and chemical changes in nature could be considered as a way to predict the earthquake. These factors cannot be determined accurately because of the presence of different categories of uncertainties. Therefore, this article presents a belief rule based expert system (BRBES) which has the capability to predict earthquake under uncertainty. Historical data of various earthquakes of the world with specific reference to animal behavior as well as environmental and chemical changes have been considered in validating the BRBES. The reliability of our proposed BRBES’s output is measured in comparison with Fuzzy Logic Based Expert System (FLBES) and Artificial Neural Networks (ANN) based system, whereas our BRBES’s results are found more reliable than that of FLBES and ANN. Therefore, this BRBES can be considered to predict the occurrence of an earthquake in a region by taking account of the data, related to the animal, environmental and chemical changes.

Place, publisher, year, edition, pages
JoWUA, 2018
Keywords
Earthquake, Prediction, Expert system, Uncertainty, Belief rule base.
National Category
Natural Sciences Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-70025 (URN)10.22667/JOWUA.2018.06.30.026 (DOI)
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251
Note

Validerad;2018;Nivå 1;2018-08-02 (rokbeg)

Available from: 2018-07-01 Created: 2018-07-01 Last updated: 2018-08-10Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-0244-3561

Search in DiVA

Show all publications