This paper aims to explore the challenges of English language teaching in the Bogura district, Ba... more This paper aims to explore the challenges of English language teaching in the Bogura district, Bangladesh. Although Bogura is advanced in establishing educational institutions and trades, it is still lagging in respect of the quality and consequence of English language teaching in higher secondary education. In comparison to the other subject, it seems much more difficult for both teachers and learners. Therefore, the problems of English language learning have been listed, and the result of class observation of colleges in the Bogura district has been presented. To do this study, a descriptive research design, quantitative method, and questionnaires are used. The present findings opine that the majorities depend on the exam system to just pass the exam and there is no equal chance to be skilled in four skills of the English language students. The lacking of teachers has also been detected. However, the study attempts to illuminate a scenario of the English teaching system as well as the problems and prospects of English language learning and teaching in higher secondary education.
Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
Outdoor-to-indoor (OtI) signal propagation further challenges link budgets at millimeter-wave (mm... more Outdoor-to-indoor (OtI) signal propagation further challenges link budgets at millimeter-wave (mmWave). To gain insight into OtI mmWave at 28 GHz, we conducted an extensive measurement campaign consisting of over 2,000 link measurements in West Harlem, New York City, covering seven highly diverse buildings. A path loss model constructed over all links shows an average of 30 dB excess loss over free space at distances beyond 50 m. We find the type of glass to be the dominant factor in OtI loss, with 20 dB observed difference between clustered scenarios with low-and high-loss glass. Other factors, such as difference in floor height, are found to have an impact between 5ś10 dB. We show that for urban buildings with high-loss glass, OtI data rates up to 400 Mb/s are supported for 90% of indoor users by a base station (BS) up to 49 m away. For buildings with low-loss glass, such as our case study covering multiple classrooms of a public school, data rates over 2.8/1.4 Gb/s are possible from a BS 68/175 m away when a line-of-sight path is available. We expect these results to be useful for the deployment of OtI mmWave networks in dense urban environments and the development of scheduling and beam management algorithms. CCS CONCEPTS • General and reference → Measurement; • Networks → Network measurement; Wireless access networks; Physical links.
Proceedings of the 7th Unconventional Resources Technology Conference, 2019
The URTeC Technical Program Committee accepted this presentation on the basis of information cont... more The URTeC Technical Program Committee accepted this presentation on the basis of information contained in an abstract submitted by the author(s). The contents of this paper have not been reviewed by URTeC and URTeC does not warrant the accuracy, reliability, or timeliness of any information herein. All information is the responsibility of, and, is subject to corrections by the author(s). Any person or entity that relies on any information obtained from this paper does so at their own risk. The information herein does not necessarily reflect any position of URTeC. Any reproduction, distribution, or storage of any part of this paper by anyone other than the author without the written consent of URTeC is prohibited.
This paper introduces a deep learning-based Steganography method for hiding secret information wi... more This paper introduces a deep learning-based Steganography method for hiding secret information within the cover image. For this, we use a convolutional neural network (CNN) with Deep Supervision based edge detector, which can retain more edge pixels over conventional edge detection algorithms. Initially, the cover image is pre-processed by masking the last 5-bits of each pixel. The said edge detector model is then applied to obtain a gray-scale edge map. To get the prominent edge information, the gray-scale edge map is converted into a binary version using both global and adaptive binarization schemes. The purpose of using different binarization techniques is to prove the less sensitive nature of the edge detection method to the thresholding approaches. Our rule for embedding secret bits within the cover image is as follows: more bits into the edge pixels while fewer bits into the non-edge pixels. Experimental outcomes on various standard images confirm that compared to state-of-the-art methods, the proposed method achieves a higher payload.
Journal of theoretical and applied information technology, 2020
In past few eras, emotion recognition from speech is one of the hottest research topic in the fie... more In past few eras, emotion recognition from speech is one of the hottest research topic in the field of Human Computer Interaction. Many researches are going on various types of language, but for Bengali language, it is still very novice. In this work, 4 emotional state have been recognized i.e. happy, sad, angry and neutral from Bengali Speech Dataset. Proposed approach uses Pitch and Mel-frequency Cepstral Coefficient (MFCC) feature vectors to train k-Nearest Neighbor classifier for this work. A self-built Bengali emotional speech dataset has been used for both training and testing purpose. The dataset consists of consist of 50 people with 400 isolated emotional sentences. Using this dataset and above technique, we achieved 87.50% average accuracy rate, with detection accuracy each emotion (happy, sad, angry, neutral) respectively 80.00%, 75.00%, 85.00% and 75.00% in this work.
The purpose of this study is to identify the socio-economic and demographic factors affecting on ... more The purpose of this study is to identify the socio-economic and demographic factors affecting on migrat ion to Chapai-Nawabganj city in Bangladesh. To this, frequency distribution and logistic regression analysis are employed to the data extracted from 750 respondents of the Pouroshava of Chapai-Nawabganj district in Bangladesh through purposive sampling technique. The findings of this study reveal that most of the respondents are migrants (56%) with a monthly income of more than Tk.7000 (73.6%), and belongs to single type of family (82.7%). The risk of migration to the cities increases with the increase in age of the respondents where as it also bears an inverse relation to the level of education, monthly income and numbers of family members. Also, non-muslim respondents engaged in business or other types of occupation and having place of birth in rural areas are more vulnerab le to higher risk of migrat ion to the cities as compared to their counterparts. From the broader perspect...
Submitted for the DAMOP06 Meeting of The American Physical Society Direct Observation of Resonanc... more Submitted for the DAMOP06 Meeting of The American Physical Society Direct Observation of Resonance Condensation in Imbalanced Fermi Mixtures1 MARTIN W. ZWIERLEIN, ANDRE SCHIROTZEK, CHRISTIAN H. SCHUNCK, WOLFGANG KETTERLE, MIT — We directly observe pair condensation in an unequal mixture of resonantly interacting fermionic 6Li atoms. Condensation is revealed by the sudden appearance of a bimodal density distribution in the minority spin component below a critical temperature. Already above the critical temperature for condensation, strong interactions between the two spin states are manifest in the deformed density distribution of the larger cloud. Temperatures can be directly determined from the noninteracting wings of the majority component. Beyond a critical population imbalance of 71(3)% on resonance, no condensates are observed, in agreement with our earlier observation of the Pauli limit of superfluidity. We show that for higher than critical imbalance, the central densities of...
2021 6th International Conference on Communication and Electronics Systems (ICCES), 2021
Chronic kidney disease is the reason for many deaths all over the world every year. Chronic kidne... more Chronic kidney disease is the reason for many deaths all over the world every year. Chronic kidney disease has troubled almost 753 million people all over the world in 2016, wherein 417 million are females and 336 million are males. In the year 2015, it was the reason for 1.2 million deaths all over the world. When CKD is detected in the later stage of a diabetes patient, it is very harmful to them. Sometimes it leads them to death. But if it is possible to detect chronic kidney disease at an early stage of diabetes patients, the damage can be minimized. This research paper has shown a comparative analysis on the performance of some algorithms - Multilayer Perceptron, Bagging, and Adaboost. And this research work has also used some algorithms such as Bagging (J48), Bagging (Random Tree), Bagging (Decision Stump), Bagging (LMT), Adaboost (Random Tree), Adaboost (Decision Stump), Adaboost (J48), Adaboost (Random Forest). Our comparison of different algorithms will help people having diabetes to figure out whether they will have CKD or not in the future. From all these algorithms Bagging (Random Tree) and AdaBoost (Random Forest) have the best result. By comparing the results of all algorithms, the best algorithm can be detected for predicting the chronic kidney disease. This study can save many people's lives and money. Doctors can also be benefitted from this research.
2019 4th International Conference on Electrical Information and Communication Technology (EICT), 2019
With the increase of data size, data analysis is becoming very important for finding hidden knowl... more With the increase of data size, data analysis is becoming very important for finding hidden knowledge. This data may contain sensitive information of individuals that could be revealed while accessing the data from sources. Most individuals or organizations do not want to reveal their personal information because of privacy leakage. In recent years, many models and methods have been designed for preserving privacy such as using matrix decomposition techniques. In this paper, Sparsfied Singular Value Decomposition (SSVD) and Non-negative Matrix Factorization (NMF) are used and a hybrid approach based on those methods has been proposed. The main reason is that the decomposition of matrix more than once removes more sensitive information. By removing the sensitive data, we can improve the privacy of the dataset and keep the data utility considerable. The approach provided here ensures better privacy while keeping good data utility.
Transform domain steganography methods are always preferable than spatial domain methods to the r... more Transform domain steganography methods are always preferable than spatial domain methods to the research community due to following advantages: better feature identification, improved security and higher robustness. In this paper, an integer sequence named Catalan Transform (CT) has been exploited in the image steganography domain. At the outset, the cover image is decomposed into 2 × 2 non-overlapping blocks in row major order. Then, each such block i.e., 4-pixel group is converted into transform domain using CT. Secret bits are embedded into the transformed components in varying proportions which facilitates us to achieve a payload in the range of 1 to 4 bpp. Inverse Catalan Transform (ICT) is applied over transformed cum embedded quadruples to generate the stego-pixels in spatial domain. Successive embedding operation over an entire image ensures the formation of stego-image. Experimental results confirm that the Peak Signal to Noise Ratio (PSNR) values obtained by the proposed method are always above the acceptable level (i.e., 30 dB) and at the same time, it outperforms many state-of-the-art methods. Other metrics such as Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), Normalized Cross Correlation (NCC) and Global histograms with similarity measure have also been computed which prove the effectiveness of the proposed scheme. The robustness of the stego-images has further been tested using the StegExpose tool and it is found that the tool is unable to detect the presence of secret data. The code of this work is available at: https://github.com/Souradeep150/Catalan-based-Steganography .
The interconnectedness of science and religion-two radically different areas in essence but with ... more The interconnectedness of science and religion-two radically different areas in essence but with striking connexions in terms of scopehas entailed reconsideration and reconstruction of some notions, particularly pertaining to areas of religion. This paper presents existing conceptions of one of religion's fundamental constituent elements, theology. In discussing theology, with a brief account of its Islamic counterpart, the current paper indulges in an analysis of some of its vital elements. Upon exploring theology, focus is placed upon the discipline of cosmology and its twofold practices, namely the scientific and theological. Most significantly, a newly articulated, well-categorised framework is provided for theological cosmology, which paves the way for further profound dialogue on the scope and intersection of theology and science in the context of cosmology. In addition, the article attempts to distinguish theological as well as scientific cosmological perceptions and articulate a well-organised analysis containing key discrepancies. Such resounding divergence can produce some fundamental principles for studying the cosmos-both from a scientific as well as theological perspective.
Transactions on Emerging Telecommunications Technologies, 2020
Due to rapid growth of digital communication attributed to advancement of Internet technologies, ... more Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification, copyright violation, and identity theft are proving as the serious concerns because of the malicious attacks or hacking of open information. Attackers can alter or delete the information, and claim the ownership or prevent the receiver to get the data. Hence, researchers try to address such challenges. One such effort is concerned with multimedia data hiding through Steganography. In this article, a polynomial sequence generator called Lah Transform (LhT) is applied for developing a Steganography method. LhT generates an integer polynomial sequence in coefficient form by evaluating the pixel values using addition and multiplication. Initially, the cover image is partitioned into nonoverlapping b-pixel groups (where, b = 3 or 4) which in succession are converted into transform domain using LhT in row-major order. Secret bits are embedded into the LhT coefficients in varying proportions to achieve variable payload. Coefficient adjustment followed by the embedding process ensures minimum quality distortion. Inverse LhT is applied to regenerate b-pixel groups in the spatial domain. Results assure that incongruity between the cover pixels and stego-pixels rises as the value of b increases. Hence, to achieve a high payload, smaller values of b are chosen. The proposed method yields higher peak signal to noise ratio values and payload compared to some recent methods found in the literature. Code of our method is available here.
We analyze flowback and post-flowback production data from six multi-fractured horizontal wells c... more We analyze flowback and post-flowback production data from six multi-fractured horizontal wells completed in Eagle Ford shale formation. Petrophysical analysis of samples from an offset well shows that the target shale is in oil window with type II kerogen. We analyze two groups of wells with different well-completion and operational parameters. Wells fractured with slickwater, with higher total injected volume (TIV) and larger choke size show higher initial oil rate, but faster pressure depletion compared with the wells fractured with cross-linked gel, with lower TIV and smaller choke size. Both groups show supercharged fractures when flowback starts and reservoir pressure remains above bubble point during post-flowback period. Interestingly, rate-normalized pressure plots of oil and water from both groups during post-flowback period show pronounced unit slope indicating boundary dominated flow (BDF), while this trend is not observed during flowback period. Analysis of rate-normalized pressure and rate-decline data suggests that both oil and water are produced from a closed tank under BDF conditions. We propose a multiphase flowing material balance (FMB) model to describe water and oil production from an effective stimulated reservoir volume (ESRV) during post-flowback period. The proposed FMB model assumes negligible oil and water influx into ESRV. The driving forces considered are closure of fractures and expansion of oil and water in ESRV. Applying the proposed model on post-flowback data confirms that after fracture depletion, oil is produced from highly stimulated matrix around hydraulic fractures while water is mainly produced from fractures.
In this study, we propose a new method for estimating average fracture compressibility (cf¯) duri... more In this study, we propose a new method for estimating average fracture compressibility (cf¯) during flowback process, and apply it on flowback data from thirty multi-fractured horizontal wells completed in Eagle Ford, Horn River, Montney and Woodford formations. We conduct complementary diagnostic flow regime analyses and calculate cf¯ by combining a flowing material balance equation with rate-decline analysis.We observe two production signatures during flowback: (1) single-phase water production followed by hydrocarbon breakthrough and (2) immediate production of hydrocarbon with water. Water rate-normalized-pressure plots show pronounced unit slopes, suggesting pseudo-steady state flow. Water decline curves follow a harmonic trend during multiphase flow; from which we forecasted ultimate water production as an estimate of initial fracture volume. The cf¯ estimates are within the range of 7 – 200 × 10-6 psi-1, and are generally lower than the values previously estimated using Aguil...
NUANSA: Jurnal Penelitian Ilmu Sosial dan Keagamaan Islam, 2018
Upon distinguishing cosmogony-the ultimate origin of the cosmos-from cosmogony-the early state of... more Upon distinguishing cosmogony-the ultimate origin of the cosmos-from cosmogony-the early state of the cosmos, the paper presents a Qur"anic account of cosmogeny based on three relevant verses. The articulated Qur"anic cosmogeny of the paper affirms the doctrine of creatio ex nihilo and reveals the metaphysical origin of the cosmos. A number of cosmogenical principles are also presented in the article, which further demonstrate and reaffirm the theocentric nature of Qur"anic as well as Islamic cosmologies. The denouncement of absolute nothingness as per the newly-formulated cosmogeny and its principles presented in the paper certainly indicates the fundamental difference between the natures of the reality and the Ultimate Reality in Islam.
Variable normal tissue dose and inter-target dose interplay effects have been reported in volumet... more Variable normal tissue dose and inter-target dose interplay effects have been reported in volumetric modulated arc therapy (VMAT) of multiple brain metastases. In order to minimize such adverse effects, a Broad-Range Optimization of Modulated Beam Approach (BROOMBA) was developed whereby hundreds of intensity-modulated beams surrounding the central axis of the skull were progressively selected and optimized. To investigate technical feasibility and potential dosimetric benefits of BROOMBA, we first developed such an approach on a standalone workstation and then implemented it for a multi-center benchmark case involving 3 to 12 multiple brain metastases. The BROOMBA planning results was compared with VMAT treatment plans of the same case using coplanar and non-coplanar arc beams. We have found that BROOMBA consistently outperformed VMAT plans in terms of low-level normal brain sparing and reduction in the dose interplay effects among the targets. For example, when planning simultaneo...
We compared treatment plan quality based on target coverage and normal brain tissue sparing for t... more We compared treatment plan quality based on target coverage and normal brain tissue sparing for two intracranial stereotactic radiosurgery systems: TrueBeam STx using VMAT and Gamma Knife (GK). Ten patients with 24 tumors (seven with 1-2 and three with 4-6 ranging from 0.1 to 20.2 cc), previously treated with GK Model 4C (prescription doses ranging from 14-23 Gy), were re-planned for VMAT using Eclipse treatment planning system. Various photon beam energies and MLC leaf widths with and without jaw tracking were studied to achieve optimal plans. Plan qualities were assessed by target coverages using Paddick Conformity Index (PCI), normal-brain-tissue integral dose (Gy-cc) and sparing. In all cases critical structure dose criteria were met. The average PCI was 0.76±0.21 for VMAT and 0.46±0.20 for GK plans (p≤0.001), respectively. On average 81% reduction of 12 Gy normal-brain-tissue volumes was achieved by VMAT. The average integral dose ratio of GK to VMAT plans was 1.50±0.61 (p=0.00...
ABSTRACT Purpose: Intensity modulated arc beams have been newly reported for treating multiple br... more ABSTRACT Purpose: Intensity modulated arc beams have been newly reported for treating multiple brain metastases. The purpose of this study was to determine the variations in the normal brain doses with increasing number of arc beams for multiple brain metastases treatments via the TrueBeam Rapidarc system (Varian Oncology, Palo Alto, CA).
This paper aims to explore the challenges of English language teaching in the Bogura district, Ba... more This paper aims to explore the challenges of English language teaching in the Bogura district, Bangladesh. Although Bogura is advanced in establishing educational institutions and trades, it is still lagging in respect of the quality and consequence of English language teaching in higher secondary education. In comparison to the other subject, it seems much more difficult for both teachers and learners. Therefore, the problems of English language learning have been listed, and the result of class observation of colleges in the Bogura district has been presented. To do this study, a descriptive research design, quantitative method, and questionnaires are used. The present findings opine that the majorities depend on the exam system to just pass the exam and there is no equal chance to be skilled in four skills of the English language students. The lacking of teachers has also been detected. However, the study attempts to illuminate a scenario of the English teaching system as well as the problems and prospects of English language learning and teaching in higher secondary education.
Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
Outdoor-to-indoor (OtI) signal propagation further challenges link budgets at millimeter-wave (mm... more Outdoor-to-indoor (OtI) signal propagation further challenges link budgets at millimeter-wave (mmWave). To gain insight into OtI mmWave at 28 GHz, we conducted an extensive measurement campaign consisting of over 2,000 link measurements in West Harlem, New York City, covering seven highly diverse buildings. A path loss model constructed over all links shows an average of 30 dB excess loss over free space at distances beyond 50 m. We find the type of glass to be the dominant factor in OtI loss, with 20 dB observed difference between clustered scenarios with low-and high-loss glass. Other factors, such as difference in floor height, are found to have an impact between 5ś10 dB. We show that for urban buildings with high-loss glass, OtI data rates up to 400 Mb/s are supported for 90% of indoor users by a base station (BS) up to 49 m away. For buildings with low-loss glass, such as our case study covering multiple classrooms of a public school, data rates over 2.8/1.4 Gb/s are possible from a BS 68/175 m away when a line-of-sight path is available. We expect these results to be useful for the deployment of OtI mmWave networks in dense urban environments and the development of scheduling and beam management algorithms. CCS CONCEPTS • General and reference → Measurement; • Networks → Network measurement; Wireless access networks; Physical links.
Proceedings of the 7th Unconventional Resources Technology Conference, 2019
The URTeC Technical Program Committee accepted this presentation on the basis of information cont... more The URTeC Technical Program Committee accepted this presentation on the basis of information contained in an abstract submitted by the author(s). The contents of this paper have not been reviewed by URTeC and URTeC does not warrant the accuracy, reliability, or timeliness of any information herein. All information is the responsibility of, and, is subject to corrections by the author(s). Any person or entity that relies on any information obtained from this paper does so at their own risk. The information herein does not necessarily reflect any position of URTeC. Any reproduction, distribution, or storage of any part of this paper by anyone other than the author without the written consent of URTeC is prohibited.
This paper introduces a deep learning-based Steganography method for hiding secret information wi... more This paper introduces a deep learning-based Steganography method for hiding secret information within the cover image. For this, we use a convolutional neural network (CNN) with Deep Supervision based edge detector, which can retain more edge pixels over conventional edge detection algorithms. Initially, the cover image is pre-processed by masking the last 5-bits of each pixel. The said edge detector model is then applied to obtain a gray-scale edge map. To get the prominent edge information, the gray-scale edge map is converted into a binary version using both global and adaptive binarization schemes. The purpose of using different binarization techniques is to prove the less sensitive nature of the edge detection method to the thresholding approaches. Our rule for embedding secret bits within the cover image is as follows: more bits into the edge pixels while fewer bits into the non-edge pixels. Experimental outcomes on various standard images confirm that compared to state-of-the-art methods, the proposed method achieves a higher payload.
Journal of theoretical and applied information technology, 2020
In past few eras, emotion recognition from speech is one of the hottest research topic in the fie... more In past few eras, emotion recognition from speech is one of the hottest research topic in the field of Human Computer Interaction. Many researches are going on various types of language, but for Bengali language, it is still very novice. In this work, 4 emotional state have been recognized i.e. happy, sad, angry and neutral from Bengali Speech Dataset. Proposed approach uses Pitch and Mel-frequency Cepstral Coefficient (MFCC) feature vectors to train k-Nearest Neighbor classifier for this work. A self-built Bengali emotional speech dataset has been used for both training and testing purpose. The dataset consists of consist of 50 people with 400 isolated emotional sentences. Using this dataset and above technique, we achieved 87.50% average accuracy rate, with detection accuracy each emotion (happy, sad, angry, neutral) respectively 80.00%, 75.00%, 85.00% and 75.00% in this work.
The purpose of this study is to identify the socio-economic and demographic factors affecting on ... more The purpose of this study is to identify the socio-economic and demographic factors affecting on migrat ion to Chapai-Nawabganj city in Bangladesh. To this, frequency distribution and logistic regression analysis are employed to the data extracted from 750 respondents of the Pouroshava of Chapai-Nawabganj district in Bangladesh through purposive sampling technique. The findings of this study reveal that most of the respondents are migrants (56%) with a monthly income of more than Tk.7000 (73.6%), and belongs to single type of family (82.7%). The risk of migration to the cities increases with the increase in age of the respondents where as it also bears an inverse relation to the level of education, monthly income and numbers of family members. Also, non-muslim respondents engaged in business or other types of occupation and having place of birth in rural areas are more vulnerab le to higher risk of migrat ion to the cities as compared to their counterparts. From the broader perspect...
Submitted for the DAMOP06 Meeting of The American Physical Society Direct Observation of Resonanc... more Submitted for the DAMOP06 Meeting of The American Physical Society Direct Observation of Resonance Condensation in Imbalanced Fermi Mixtures1 MARTIN W. ZWIERLEIN, ANDRE SCHIROTZEK, CHRISTIAN H. SCHUNCK, WOLFGANG KETTERLE, MIT — We directly observe pair condensation in an unequal mixture of resonantly interacting fermionic 6Li atoms. Condensation is revealed by the sudden appearance of a bimodal density distribution in the minority spin component below a critical temperature. Already above the critical temperature for condensation, strong interactions between the two spin states are manifest in the deformed density distribution of the larger cloud. Temperatures can be directly determined from the noninteracting wings of the majority component. Beyond a critical population imbalance of 71(3)% on resonance, no condensates are observed, in agreement with our earlier observation of the Pauli limit of superfluidity. We show that for higher than critical imbalance, the central densities of...
2021 6th International Conference on Communication and Electronics Systems (ICCES), 2021
Chronic kidney disease is the reason for many deaths all over the world every year. Chronic kidne... more Chronic kidney disease is the reason for many deaths all over the world every year. Chronic kidney disease has troubled almost 753 million people all over the world in 2016, wherein 417 million are females and 336 million are males. In the year 2015, it was the reason for 1.2 million deaths all over the world. When CKD is detected in the later stage of a diabetes patient, it is very harmful to them. Sometimes it leads them to death. But if it is possible to detect chronic kidney disease at an early stage of diabetes patients, the damage can be minimized. This research paper has shown a comparative analysis on the performance of some algorithms - Multilayer Perceptron, Bagging, and Adaboost. And this research work has also used some algorithms such as Bagging (J48), Bagging (Random Tree), Bagging (Decision Stump), Bagging (LMT), Adaboost (Random Tree), Adaboost (Decision Stump), Adaboost (J48), Adaboost (Random Forest). Our comparison of different algorithms will help people having diabetes to figure out whether they will have CKD or not in the future. From all these algorithms Bagging (Random Tree) and AdaBoost (Random Forest) have the best result. By comparing the results of all algorithms, the best algorithm can be detected for predicting the chronic kidney disease. This study can save many people's lives and money. Doctors can also be benefitted from this research.
2019 4th International Conference on Electrical Information and Communication Technology (EICT), 2019
With the increase of data size, data analysis is becoming very important for finding hidden knowl... more With the increase of data size, data analysis is becoming very important for finding hidden knowledge. This data may contain sensitive information of individuals that could be revealed while accessing the data from sources. Most individuals or organizations do not want to reveal their personal information because of privacy leakage. In recent years, many models and methods have been designed for preserving privacy such as using matrix decomposition techniques. In this paper, Sparsfied Singular Value Decomposition (SSVD) and Non-negative Matrix Factorization (NMF) are used and a hybrid approach based on those methods has been proposed. The main reason is that the decomposition of matrix more than once removes more sensitive information. By removing the sensitive data, we can improve the privacy of the dataset and keep the data utility considerable. The approach provided here ensures better privacy while keeping good data utility.
Transform domain steganography methods are always preferable than spatial domain methods to the r... more Transform domain steganography methods are always preferable than spatial domain methods to the research community due to following advantages: better feature identification, improved security and higher robustness. In this paper, an integer sequence named Catalan Transform (CT) has been exploited in the image steganography domain. At the outset, the cover image is decomposed into 2 × 2 non-overlapping blocks in row major order. Then, each such block i.e., 4-pixel group is converted into transform domain using CT. Secret bits are embedded into the transformed components in varying proportions which facilitates us to achieve a payload in the range of 1 to 4 bpp. Inverse Catalan Transform (ICT) is applied over transformed cum embedded quadruples to generate the stego-pixels in spatial domain. Successive embedding operation over an entire image ensures the formation of stego-image. Experimental results confirm that the Peak Signal to Noise Ratio (PSNR) values obtained by the proposed method are always above the acceptable level (i.e., 30 dB) and at the same time, it outperforms many state-of-the-art methods. Other metrics such as Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), Normalized Cross Correlation (NCC) and Global histograms with similarity measure have also been computed which prove the effectiveness of the proposed scheme. The robustness of the stego-images has further been tested using the StegExpose tool and it is found that the tool is unable to detect the presence of secret data. The code of this work is available at: https://github.com/Souradeep150/Catalan-based-Steganography .
The interconnectedness of science and religion-two radically different areas in essence but with ... more The interconnectedness of science and religion-two radically different areas in essence but with striking connexions in terms of scopehas entailed reconsideration and reconstruction of some notions, particularly pertaining to areas of religion. This paper presents existing conceptions of one of religion's fundamental constituent elements, theology. In discussing theology, with a brief account of its Islamic counterpart, the current paper indulges in an analysis of some of its vital elements. Upon exploring theology, focus is placed upon the discipline of cosmology and its twofold practices, namely the scientific and theological. Most significantly, a newly articulated, well-categorised framework is provided for theological cosmology, which paves the way for further profound dialogue on the scope and intersection of theology and science in the context of cosmology. In addition, the article attempts to distinguish theological as well as scientific cosmological perceptions and articulate a well-organised analysis containing key discrepancies. Such resounding divergence can produce some fundamental principles for studying the cosmos-both from a scientific as well as theological perspective.
Transactions on Emerging Telecommunications Technologies, 2020
Due to rapid growth of digital communication attributed to advancement of Internet technologies, ... more Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification, copyright violation, and identity theft are proving as the serious concerns because of the malicious attacks or hacking of open information. Attackers can alter or delete the information, and claim the ownership or prevent the receiver to get the data. Hence, researchers try to address such challenges. One such effort is concerned with multimedia data hiding through Steganography. In this article, a polynomial sequence generator called Lah Transform (LhT) is applied for developing a Steganography method. LhT generates an integer polynomial sequence in coefficient form by evaluating the pixel values using addition and multiplication. Initially, the cover image is partitioned into nonoverlapping b-pixel groups (where, b = 3 or 4) which in succession are converted into transform domain using LhT in row-major order. Secret bits are embedded into the LhT coefficients in varying proportions to achieve variable payload. Coefficient adjustment followed by the embedding process ensures minimum quality distortion. Inverse LhT is applied to regenerate b-pixel groups in the spatial domain. Results assure that incongruity between the cover pixels and stego-pixels rises as the value of b increases. Hence, to achieve a high payload, smaller values of b are chosen. The proposed method yields higher peak signal to noise ratio values and payload compared to some recent methods found in the literature. Code of our method is available here.
We analyze flowback and post-flowback production data from six multi-fractured horizontal wells c... more We analyze flowback and post-flowback production data from six multi-fractured horizontal wells completed in Eagle Ford shale formation. Petrophysical analysis of samples from an offset well shows that the target shale is in oil window with type II kerogen. We analyze two groups of wells with different well-completion and operational parameters. Wells fractured with slickwater, with higher total injected volume (TIV) and larger choke size show higher initial oil rate, but faster pressure depletion compared with the wells fractured with cross-linked gel, with lower TIV and smaller choke size. Both groups show supercharged fractures when flowback starts and reservoir pressure remains above bubble point during post-flowback period. Interestingly, rate-normalized pressure plots of oil and water from both groups during post-flowback period show pronounced unit slope indicating boundary dominated flow (BDF), while this trend is not observed during flowback period. Analysis of rate-normalized pressure and rate-decline data suggests that both oil and water are produced from a closed tank under BDF conditions. We propose a multiphase flowing material balance (FMB) model to describe water and oil production from an effective stimulated reservoir volume (ESRV) during post-flowback period. The proposed FMB model assumes negligible oil and water influx into ESRV. The driving forces considered are closure of fractures and expansion of oil and water in ESRV. Applying the proposed model on post-flowback data confirms that after fracture depletion, oil is produced from highly stimulated matrix around hydraulic fractures while water is mainly produced from fractures.
In this study, we propose a new method for estimating average fracture compressibility (cf¯) duri... more In this study, we propose a new method for estimating average fracture compressibility (cf¯) during flowback process, and apply it on flowback data from thirty multi-fractured horizontal wells completed in Eagle Ford, Horn River, Montney and Woodford formations. We conduct complementary diagnostic flow regime analyses and calculate cf¯ by combining a flowing material balance equation with rate-decline analysis.We observe two production signatures during flowback: (1) single-phase water production followed by hydrocarbon breakthrough and (2) immediate production of hydrocarbon with water. Water rate-normalized-pressure plots show pronounced unit slopes, suggesting pseudo-steady state flow. Water decline curves follow a harmonic trend during multiphase flow; from which we forecasted ultimate water production as an estimate of initial fracture volume. The cf¯ estimates are within the range of 7 – 200 × 10-6 psi-1, and are generally lower than the values previously estimated using Aguil...
NUANSA: Jurnal Penelitian Ilmu Sosial dan Keagamaan Islam, 2018
Upon distinguishing cosmogony-the ultimate origin of the cosmos-from cosmogony-the early state of... more Upon distinguishing cosmogony-the ultimate origin of the cosmos-from cosmogony-the early state of the cosmos, the paper presents a Qur"anic account of cosmogeny based on three relevant verses. The articulated Qur"anic cosmogeny of the paper affirms the doctrine of creatio ex nihilo and reveals the metaphysical origin of the cosmos. A number of cosmogenical principles are also presented in the article, which further demonstrate and reaffirm the theocentric nature of Qur"anic as well as Islamic cosmologies. The denouncement of absolute nothingness as per the newly-formulated cosmogeny and its principles presented in the paper certainly indicates the fundamental difference between the natures of the reality and the Ultimate Reality in Islam.
Variable normal tissue dose and inter-target dose interplay effects have been reported in volumet... more Variable normal tissue dose and inter-target dose interplay effects have been reported in volumetric modulated arc therapy (VMAT) of multiple brain metastases. In order to minimize such adverse effects, a Broad-Range Optimization of Modulated Beam Approach (BROOMBA) was developed whereby hundreds of intensity-modulated beams surrounding the central axis of the skull were progressively selected and optimized. To investigate technical feasibility and potential dosimetric benefits of BROOMBA, we first developed such an approach on a standalone workstation and then implemented it for a multi-center benchmark case involving 3 to 12 multiple brain metastases. The BROOMBA planning results was compared with VMAT treatment plans of the same case using coplanar and non-coplanar arc beams. We have found that BROOMBA consistently outperformed VMAT plans in terms of low-level normal brain sparing and reduction in the dose interplay effects among the targets. For example, when planning simultaneo...
We compared treatment plan quality based on target coverage and normal brain tissue sparing for t... more We compared treatment plan quality based on target coverage and normal brain tissue sparing for two intracranial stereotactic radiosurgery systems: TrueBeam STx using VMAT and Gamma Knife (GK). Ten patients with 24 tumors (seven with 1-2 and three with 4-6 ranging from 0.1 to 20.2 cc), previously treated with GK Model 4C (prescription doses ranging from 14-23 Gy), were re-planned for VMAT using Eclipse treatment planning system. Various photon beam energies and MLC leaf widths with and without jaw tracking were studied to achieve optimal plans. Plan qualities were assessed by target coverages using Paddick Conformity Index (PCI), normal-brain-tissue integral dose (Gy-cc) and sparing. In all cases critical structure dose criteria were met. The average PCI was 0.76±0.21 for VMAT and 0.46±0.20 for GK plans (p≤0.001), respectively. On average 81% reduction of 12 Gy normal-brain-tissue volumes was achieved by VMAT. The average integral dose ratio of GK to VMAT plans was 1.50±0.61 (p=0.00...
ABSTRACT Purpose: Intensity modulated arc beams have been newly reported for treating multiple br... more ABSTRACT Purpose: Intensity modulated arc beams have been newly reported for treating multiple brain metastases. The purpose of this study was to determine the variations in the normal brain doses with increasing number of arc beams for multiple brain metastases treatments via the TrueBeam Rapidarc system (Varian Oncology, Palo Alto, CA).
Uploads
Papers by Sabbir Hossain