Adaptive algorithms for automated intruder detection in surveillance networks

T Ahmed, ASK Pathan, S Ahmed - … International Conference on …, 2014‏ - ieeexplore.ieee.org
Many types of automated visual surveillance systems have been presented in the recent
literature. Most of the schemes require custom equipment, or involve significant complexity …

Anomaly clustering based on correspondence analysis

H Islam, T Ahmed - 2018 IEEE 32nd International Conference …, 2018‏ - ieeexplore.ieee.org
Traffic patterns in backbone IP networks often deviate from the norm, to lead to events
commonly termed as anomalies. Different algorithms have been proposed in literature to …

Learning algorithms for anomaly detection from images

T Ahmed, ASK Pathan, SS Ahmed - … Concepts, Methodologies, Tools …, 2017‏ - igi-global.com
Visual surveillance networks are installed in many sensitive places in the present world.
Human security officers are required to continuously stare at large numbers of monitors …

Taking meredith out of Grey's anatomy: Automating hospital ICU emergency signaling

T Ahmed, S Ahmed… - 2016 IEEE International …, 2016‏ - ieeexplore.ieee.org
In this paper we propose a new algorithm based on kernel machines for automatic,
instantaneous detection of emergencies occurring in a hospital Intensive Care Unit. The …

The kernel-based online anomaly detection algorithm: Detailed derivation and development

S Daneshgadeh, T Ahmed… - Security Analytics for the …, 2020‏ - taylorfrancis.com
The evolution of intelligent computer networks, distributed processing facilities, range of
communication protocols, and arrays of smart devices has significantly raised the …

RouteFinder: Real-time optimum vehicle routing using mobile phone network

N Ahmadullah, S Islam, T Ahmed - TENCON 2015-2015 IEEE …, 2015‏ - ieeexplore.ieee.org
Road traffic congestion is a major issue in most mega cities. The traffic jams are often
exacerbated by drivers habitually following the same routes. A real-time, optimum vehicle …