Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Kazi A Kalpoma"'
Publikováno v:
2022 25th International Conference on Computer and Information Technology (ICCIT).
Publikováno v:
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).
Publikováno v:
Tenth Pan-Commonwealth Forum on Open Learning.
This work evaluates blended learning implementation at Ahsanullah University of Science and Technology (AUST) by integrating technologies with the collaboration of the Commonwealth of Learning (COL). It explores the readiness of students toward blend
Autor:
Kazi A Kalpoma, G. M. Rezwan Kabir Robin, Jannatul Ferdaus, Md. Masudur Rahaman Mitul, Arni Rahman
Publikováno v:
IGARSS 2022 - 2022 IEEE International Geoscience and Remote Sensing Symposium.
Publikováno v:
IGARSS 2022 - 2022 IEEE International Geoscience and Remote Sensing Symposium.
Autor:
Ashiqur Rahman, Kazi A. Kalpoma
Publikováno v:
IGARSS
In this work, we used MODIS (Moderate Resolution Imaging Spectroradiometer) data MOD13Q1 and MYD13Q1 images to improvise the existing rice model[1] where MODIS NDVI threshold value was used for calculating Boro rice areas in the Sylhet Haor region of
Autor:
Kazi A. Kalpoma, Fariha Elahee, Tonmoy Hossain, Sharika Tabassom, Faizah Binte Naquib, Farhana Mim
Publikováno v:
2020 23rd International Conference on Computer and Information Technology (ICCIT).
The finger vein authentication system is a prominent field in biometric-based research that prevents identity theft by forgery or spoofing. However, as the finger images are affected by many environmental factors such as illumination or shifting duri
Autor:
Md. Ahsan Ayub, Kazi A. Kalpoma, Sujoy Chowdhury, Rashedun Nobi Chowdhury, Mohammed Rashedul Islam, Anik Chowdhury, Maliha M. Chowdhury
Publikováno v:
2020 23rd International Conference on Computer and Information Technology (ICCIT).
The use of Intrusion Detection System (IDS) as one of the most trusted layers of security to an organization to defend against all sorts of cyber attacks is ubiquitous. The uniqueness as well as the severity of recent cyber threats is significant. Th
Autor:
Faizah Binte Naquib, Farhana Mim, Fariha Elahee, Kazi A. Kalpoma, Sharika Tabassom, Tonmoy Hossain
Publikováno v:
2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT).
Over the years Biometric authentication system has gained widespread popularity due to the rising need for personal identification and security. The most common biometric features used in authentication systems are fingerprint, iris, hand geometry, r
Publikováno v:
IGARSS
In this work, we developed a satellite-based Boro rice monitoring system which will be capable of collecting data on rice production area of whole Bangladesh along with a graphical statistics of rice production area every season. In this monitoring s