[C52] Sajib Bhawal and Mehnaz Tabassum, "Forensic Image Reconstruction based on Efficient Morphological Operational Model", In International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS2018), Kolkata, India.
[C51] Md. Amirul Islam, Sajal Halder and Uzzal Kumar Acharjee and Md Ashraf Uddin, "Periodic Activity Monitoring Using Radio Frequency Tag Arrays", In the International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2-2018), Bangladesh.
[C50] Md Ashraf Uddin, Mahmudul Hasan, Sajal Halder, Sajeeb Ahamed and Uzzal Kumar Acharjee, "CRICRATE: A Cricket Match Conduction and Player Evaluation Framework", In International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS2018), Kolkata, India.
[C49] Md. Al-Amin, Md. Amirul Islam, Sajal Halder, Md. Ashraf Uddin and Uzzal Kumar Acharjee, "An Efficient Sentiment Mining Approach on Social Media Networks", In International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS2018), Kolkata, India.
[C48] Al Bashir, Niamatullah Naeem and Mehnaz Tabassum, “Biometric Image Enhancement, Feature extraction and Recognition comprising FFT and Gabor Filtering”. In Computing Conference 2018, London, United Kingdom.
[C47] Mahadi Hasan, Jakir Hossain and Mehnaz Tabassum, “Efficient Image Steganography Using Adaptive Cryptographic Algorithms”. Accepted in Computing Conference 2018, London, United Kingdom.
[C46] Md.Amirul Islam, Jahidul Islam, Md. Aminul Islam and Mohammed Nasir Uddin, "METT: Modified Expected Transmission Time for Calculating Effective Transmission Time" - Proceedings of the 2017 4th International Conference on Advances in Electrical Engineering(ICAEE) 28-30 September, 2017, Dhaka, Bangladesh
[C45] A. Akhter, M. A. Uddin, M. A. I. Abir, and M. M. Islam, “Noise aware levelbased routing protocol for underwater sensor networks,” inComputational Intelli-gence (IWCI), International Workshop on. IEEE, 2016, pp. 169–174.
[J94] Prof. Dr. Mohammed Nasir Uddin, Linta Islam, Tamanna Yesmin Reshmi, “Development of Relational Security Model”,(Accepted and will be Published in the forthcoming Jaganntah University Journal of Science) , 2017.
[J93] Md. Aminul Islam, Prof. Dr. Mohammed Nasir Uddin, Linta Islam, “A Highly Secured Secret Key Symmetric Algorithm - SKES”,(Accepted and will be Published in the forthcoming Jaganntah University Journal of Science) , 2017.
[J92] Ngo Quang Thai, Md. Abu Layek, Pham Xuan Qui, Seungkyu Lee, Eui-Nam Huh,"A remote display QoE improvement scheme for interactive applications in low network bandwidth environment", Multimedia Tools and Applications, SCIE, 22217--22241, Springer, 2017.
[C44]Ashis Talukder, Md. Golam Rabiul Alam, Anupam Kumar Bairagi, Sarder Fakhrul Abedin, Md Abu Layek, Hoang T. Nguyen, and Choong Seon Hong, "An Approach of Cost Optimized Influence Maximization in Social Networks", 9th Asia-Pacific Network Operations and Management Symposium (APNOMS), IEEE, 2017
[C43] Md Abu Layek, Ngo Quang Thai, Md Alamgir Hossain, Ngo Thien Thu, Le Pham Tuyen, Ashis Talukder, TaeChoong Chung and Eui-Nam Huh, "Performance Analysis of H.264, H.265, VP9 and AV1 Video Encoders", 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), IEEE, 2017
[C42] Nahida Parvin, Ayesha aziz and Mehnaz Tabassum, "Casualty Reduction Intelligent System (CRIS) Based on Classified Prediction & Comparative Analysis of Industrial Mishaps"- In Fifth IEEE Region 10 (Asia Pacific) Humanitarian Technology Conference (R10HTC) , December 21-23, 2017.
[C41] Md.Al-Amin Hossain, Jannatul Ferdous, Mehnaz Tabassum, "Non-visual Environmental Imaging and Object Detection through Electrical Impedance Tomography" - 4th International Conference on Advances in Electrical Engineering(ICAEE) 28-30 September, 2017, Dhaka, Bangladesh.
[C40] Md ShafiurRahman, Md Ashraf Uddin, Leema Rani Dey, Sajal Halder and Md Manowarul Islam, “Link Prediction by Correlation on Social Network”. In 20th International Conference On Computer and Information Technology (ICCIT 2017).
[J91] MMA Polash, MAH Newton, A Sattar, Constraint-based search for optimal Golomb rulers,Journal of Heuristics, 1-32, 2017
[J90] MMA Polash, MAH Newton, A Sattar, Constraint-directed search for all-interval series, Constraints 22 (3), 403-431, 2017
[C39] Sonia Corraya and Jia Uddin, “An Efficient Method for Detecting Electrical Spark and Fire Flame from Real Time Video” – International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS'17), India, 13-16 September 2017.
[C38] Aniqua Nusrat Zereen, Sonia Corraya and Jia Uddin, “Machine Learning based Upstair and Downstair Detection for Visually Impaired” –International Conference on Engineering, Research, Innovation and Education (ICERIE, 2017), SUST, 13-15 January 2017. (best paper award)
[C37] Juthi Kundu, Supriya Debi, Saleh Ahmed and Sajal Halder. Smart E-Agriculture Monitoring System: Case Study of Bangladesh. In 4th International Conference on Advances in Electrical Engineering (ICAEE), 2017, Bangladesh, Publisher: IEEE.
[C36] Md. Fahim Sikder, Sajal Halder, Tanvir Hasan, Md. Jamal Uddin and Mrinal Kanti Baowaly. Smart Disaster Notification System. In 4th International Conference on Advances in Electrical Engineering (ICAEE), 2017, Bangladesh, Publisher: IEEE.
[C35] Milon Talukder, Md. Moshiur Rahman, Md. Jamal Uddin and Sajal Halder. Novel Recommendation System in Social Networks. In the 2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR), University of Dhaka, Bangladesh, Publisher: IEEE.
[J89] Sajal Halder, Md. Samiullah and Young-Koo Lee. Supergraph based Periodic Pattern Mining in Dynamic Social Networks. In the journal of Expert Systems With Applications. Volume 72 Pages 430-442, 2017, SCIE (Impact Factor - 3.928), Publisher: Elsevier.
[C34] Fatema Siddika, Md. Anwar Hossen, Sajeeb Saha, “Transition from IPv4 to IPv6 in Bangladesh: The Competent and Enhanced Way to Follow” International Conference on Networking Systems and Security (NSysS), Jan 5-8, 2017, Dhaka, Bangladesh [PDF].
[C33] Sohely Jahan, Md. Saifur Rahman, Sajeeb Saha, “Application Specific Tunneling Protocol Selection for Virtual Private Networks” International Conference on Networking Systems and Security (NSysS), Jan 5-8, 2017, Dhaka, Bangladesh [PDF].
[J88] Md. Abu Layek, TaeChoong Chung and Eui-Nam Huh, "Efficient Screen Splitting Methods - A Case Study in Block-wise Motion Detection", KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 10, NO. 10, Oct. 2016
[J87] Md. Abu Layek, TaeChoong Chung and Eui-Nam Huh, "Adaptive Desktop Delivery Scheme for Provisioning Quality of Experience in Cloud Desktop as a Service", The Computer Journal, 260--274, Oxford University Press, 2016
[J86] Md Abdullah-Al-Shafi, Ali Newaz Bahar, Sajeeb Saha, “Mobile On-demand Computing: The Future Generation of Cloud”, International Journal of Future Generation Communication and Networking, 9.11 (2016), 161-178. [PDF]
[C32] Sajeeb Saha, Md. Ahsan Habib, Md. Abdur Razzaque, “Compute Intensive Code Offloading in Mobile Device Cloud” IEEE TENCON, Singapore, 22-25 Nov 2016 [PDF].
[C31] Md. Ahsan Habib, Sajeeb Saha, Fernaz Narin Nur, Md. Abdur Razzaque, “Starfish Routing for Wireless Sensor Networks with a Mobile Sink” IEEE TENCON, Singapore, 22-25 Nov 2016 [PDF].
[C30] Hafsa Moontari Ali, Sonia Corraya, “Line Profile Based Fingerprint Matching” – IEEE International Workshop on Computational Intelligence (IWCI) , JU, 12-13 December 2016
[C29] Aniqua Nusrat Zereen , Sonia Corraya, “Detecting Real Time Object Along With The Moving Direction For Visually Impaired People” – IEEE International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE 2016), (sponsored by IEEE), RUET, 8-10 December 2016
[J85] Tanay Kumar Saha, Mourad Ouzzani and Ahmed K. Elmagarmid, A large scale study of SVM based methods for abstract screening in systematic reviews. arXiv preprint arXiv:1610.00192, 2016
[C28] W Peng, T Gao, D Sisodia, TK Saha, F Li, M Al Hasan, "ACTS: Extracting Android App Topological Signature through Graphlet Sampling", IEEE CNS 2016
[J84] Md Masbaul Alam Polash, M A Hakim Newton, A Sattar, "Constraint-directed Search for All-interval Series", Constraints Journal, Springer, Dec 2016.
[C26] Ratul Sikder and Md. Jamal Uddin and Sajal Halder. An Efficient Approach of Identifying Tourist by Call Detail Record Analysis. In
[C25] Md. Anawarul Abir, Arnisha Akter, Md. Ashraf Uddin, Manowarul Islam, “ Design of Parity Preserving Sequential Circuit”, 13-14 May, ICIEV16.
[C24] Md. Ashraf Uddin, Arnisha Akter, Md. Manowarul Islam, “Fuzzy Based Weight to Mine Frequent Patterns from Human Interaction in Meeting using Directed Acyclic Graph”,ICCIT 2016, 18~20 December, Dhaka. Sponsored by IEEE.
[C23] Md. Fahim Sikder, Md. Jamal Uddin and Sajal Halder. Predicting Students Yearly Performance using Neural Network: A Case Study of BSMRSTU. In the 5th International Conference on Informatics, Electronics & Vision (ICIEV), Bangladesh, 2016.
[J80] Md. Momin Reja, Sonia Corraya, Umme Sayma Busra, " A New Technique for ECG Telemedicine Data Security and Privacy Using Digital Signature and XML Database " -Published in International Journal of Advanced Research in Computer and Communication Engineering (vol.4,issue 4, April 2015), ISSN: 2278-1021 , page 400-404
[J79] Sonia Corraya, “ A Comparative Study for Despeckle Filtering in Ultrasound Imaging of Unborn Baby ”-Published in Australian Journal of Computer and Communications, Vol. 2 No. 5, 2015 (June 2015), ISSN: 2203-9500, page 1-7
[J77] Tanay Kumar Saha and Mohammad Hasan, "FS^3: A sampling based method for top-k frequent subgraph mining", Journal of statistical analysis and data mining, 2015
[C21] M Helal Uddin, M Arafat H. Khan, Charles J. Coronella, “Active Contour Tracking of Individual Bubbles in CFD Simulation of Fluidized Beds” - American Institute of Chemical Engineers Annual Meeting November 10, 2015
[J59] Sajeeb Saha, Uzzal Kumar Acharjee, Md. Tahzib-Ul-Islam, “A Survey on Wireless Mesh Network and its Challenges at the Transport Layer”, International Journal of Computer Engineering and Technology (IJCET)5.8 (2014): 169-177
[J58] Md. Manowarul Islam , Md. Ashraf Uddin, Ali Newaz Bahar, A.K.M Kamrul Islam, Md. Selim Al Mamun “Energy Efficient Routing Mechanism for Mobile Ad Hoc Networks” International Journal of Technology and Computer Science (IJTCS). Issues, 1(1), 9-20(2014)
[J57] Md. Manowarul Islam, Md. Abdur Razzaque and Md. Ashraf Uddin, “MCCM: Multilevel Congestion Avoidance and Control Mechanism for Mobile Ad Hoc Networks”, International Journal of Information Technology and Computer Science, vol. 6, no. 1, pp.9-18, May 2014.
[J55] Sonia Corraya, Mohammad Shorif Uddin, “ Global Contrast Enhancement for Effective Medical Image Segmentation ” –Published in ULAB Journal of Science and Engineering (vol.4, Nov. 2013), ISSN: 2079-4398 , page 17-22
[J54] Md. Ashraf Uddin, Md. Mamun-or-Rashid, Md. MustafizurRahman,"Priority Metric based Ad Hoc Routing for Underwater Sensor Network", IJCNIS, vol.5, no.12, pp.1-11,2013. DOI: 10.5815/ijcnis.2013.12.01
[J50] Ali Newaz Bahar, Sajjad Waheed, Md. Ashraf Uddin, Md. Ahsan Habib,” Double Feynman Gate (F2G) in Quantumdot Cellular Automata (QCA)”, International Journal of Computer Science Engineering, Vol.2 No.6,2013.
[J49] Md. Ashraf Uddin, Mamun-or-Rashid, “Link Expiration Time-Aware Routing Protocol for UWSNs,” Journal of Sensors, vol. 2013, Article ID 625274, 9 pages, 2013. doi:10.1155/2013/625274.
[J48] Md. Ashraf uddin, Md Manowarul Islam, and Md Mamun-or-Rashid. "Energy Efficient Fitness Based Routing Protocol for Underwater Sensor Network." International Journal of Intelligent Systems and Applications (IJISA) 5, no. 6 (2013)
[J47] Manowarul Islam, Md. Abdur Razzzaque and Md. Ashraf Uddin, “Stable Route Development and Reparing Mechanisms for Mobile Ad Hoc Networks”, International Journal of Computing Communication and Networking Research (IJCCNet)), Vol. 2, No. 1, pp. 16-28, Feb. 2013.
[J46] Zahid Hasan, Rathindra Chandra Gope and Mohammed Nasir Uddin, Do Aesthetic Matter in Long Established Trust? International Journal of Computer Application, volume-77 No. 13, September 2013, ISSN 0975-8887, Foundation of Computer Science, NY-10001, USA.
[J45] Md. Aminul Islam “A Causative Routing Metric in Wireless Mesh Networks”- published at: “International Journal of Scientific and Research Publications(IJSRP), Volume 3 Issue 9, September 2013 Edition”. www.ijsrp.org
[J41] Iram Fatima, Sajal Halder, Muhammad Aamir Saleem, Rabia Batool, Muhammad Fahim, YoungKoo Lee, Sungyoung Lee. Smart CDSS: Integration of Social Media Interaction Engine (SMIE) in Healthcare for Chronic Disease Patients. Multimedia Tools and Applications, pages 1-21, 2013, SCIE (Impact Factor - 1.53), Publisher: Springer.
[J40] Yongkoo Han, Kisung Park, Donghai Guan, Sajal Halder, and Young-Koo Lee. Topological Similarity based Feature Selection for Graph Classication. In the Computer Journal, bxt123, 2013, SCIE (Impact Factor - 0.755), Publisher: Oxford University Press.
[J39] Sajal Halder, Yongkoo Han and Young-Koo Lee. Discovering Periodic Patterns using Supergraph in Dynamic Networks. Journal of Research Notes in Information Science (RNIS), Volume 14, 2013, pp.148-151.
[J38] Aubhishek Zaman, Md. Arafat Hossain Khan, “A Computational Drug Designing From Active Product of Herbal Plant Ochna Squarrosa to Relieve Menstrual Complexities” - International Journal of Biometric and Bioinformatics (IJBB), 2012
[C13 ] Sajal Halder, A. M. Jehad Sarkar and Young-Koo Lee. Movie Recommendation System Based on Movie Swarm. In Second International Conference on Cloud and Green Computing (CGC), China, 2012.
[C12 ] Sajal Halder, Md. Samiullah, A. M. Jehad Sarkar and Young-Koo Lee. MovieSwarm: Information Mining technique for Movie Recommendation System. In the 7th International Conference on Electrical and Computer Engineering (ICECE), Bangladesh, 2012.
LCRDD: Link Failure and Congestion aware Reliable Data Delivery Mechanism for Mobile Ad Hoc Network.
[J36] Md. Rezaul Karim, Sajal Halder , Byeong-Soo Jeong, and Ho-Jin Choi. Efficient Mining Frequently Correlated, Associated-correlated and Independent Patterns Synchronously by Removing Null Transactions. Human Centric Technology and Service in Smart Space,LNEE 182, v.182, no.0, pp.93-103, 2012, Publisher: Springer.
[J35] Mohammed Nasir Uddin , Jebunnahar and Md. Abul Bashar, Study of Digital image processing for finding image quality dependencies. International Journal of Scientific and Research Publications, Volume-2, Issue 3, March 2012, ISSN 2250-3153, France.
[J34] Md. Habibur Rahman , Mohammed Nasir Uddin and Sayeed Ahmed Siddiqui . Problems and prospects of E – Banking in Bangladesh. International Journal of Scientific and Research Publications, Volume 2, Issue 7, July 2012 1 ISSN 2250-3153.
[C11] Lafifa Jamal, Md. Masbaul Alam Polash, M. A. Mottalib and Dr. Hafiz Md. Hasan Babu, ”On the Compact Designs of Low Power Reversible Decoders and Sequential Circuits”. Proc. of 16 Int. Symposium on VLSI design and Test, LNCS, Springer, 2012.
[J33] Mahmud, I., Sakib, A. N., Ahmed, S., Saha, S., Belali, M. H., Islam, N. A. N., & Rahman, S. “A Realistic Secure On-line E-Voting System.”, International Journal of Engineering Research and Applications (IJERA) 2.5 (2012):425-429
[J31] Md. Arafat Hossain Khan, A. S. M. Zahidur Rahman, Tanvir Muntasir, Uzzal Kumar Acharjee, Md. Abu Layek, "Multiple Polynomial Regreession for Modeling a MOSFET in Saturation to Validate the Early Voltage" - IEEE Symposium on Industrial Electronics and Applications , 2011.
[B1 ] Mehnaz Tabassum (2011), “Extraction of ROI in Geographical Map” ISBN-13: 9783639358148, Publisher: VDM
[J30] Uzzal K. Acharjee, Anis Ahmed, Shahida Rafique, Enhancing the performance of TCP over broadband multimedia satellite networks, Published in the Dhaka University Journal of Applied Science & Engineering,2011.
[J29] Mohammed Nasir Uddin et. all . Security System of Wireless Network. International Journal of Research and Review in Wireless Communication, Vol.1,No. 2, June 2011, ISSN:2046-6447,Science Academy Publisher, UK
[J28] Mohammed Nasir Uddin , Selina Sharmin , Abu Hasnat Shohel Ahmed and Emrul Hasan , Shahadot Hossain and Muniruzzaman, A survey of Biometrics Security System. International Journal of Computer Science and Network security, Vol. 11,No. 10, October 2011, ISSN : 1738-7906, Korea
[J27] Mohammed Nasir Uddin , Selina Sharmin , Abu Hasnat Shohel Ahmed and Emrul Hasan , Shahadot Hossain and Muniruzzaman . USB key as an Active Device of Security System. International Journal of Computer Science and Network security, Vol. 11,No. 10, October 2011, ISSN : 1738-7906, Korea
[J26] Mohammed Nasir Uddin et. all . Network Security Middleware with USB key. International Journal of Emerging Technologies in Science and Engineering Issue, Vol. 5, Issue. 2, November 2011, ISSN : 1923-9181, Canada
Polash Realization of Reversible Logic in DNA Computing
; Shamima Sultana, “Design of a LUT based Reversible Field Programmable Gate Array”, Journal of Computing, Volume 2, Issue 10, 2010.Md. Masbaul Alam Polash
[J23] Sumon Kumar Debnath, Foez Ahmed and Nayeema Islam, “Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Network Routing Protocols”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1 January 2010, pp. 040-046.
[J22] Foez Ahmed, Sateesh Kumar Pradhan, Nayeema Islam and Sumon Kumar Debnath, “Performance Evaluation of TCP over Mobile Ad-hoc Networks”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1 January 2010, pp. 140-146.
[J21] Al Nahian Riyadh, Nayeema Islam and Imranul Hoque, “Electronic finance in developing countries: the implementation and development of electronic finance systems in Bangladesh”, Journal of Business Studies, University of Dhaka, Bangladesh, Vol. 30, No.1, June 2009.
[J20 ] Al Nahian Riyadh, Md. Shahriar Akter and Nayeema Islam, “The adoption of e-banking in developing countries: A theoretical model for SMEs”, International Review of Business Research Papers, Vol. 5, No. 6, November 2009, pp.212-230.
[C7] Abu Sadat Md. Sayem, Md. Masbaul Alam Polash, Dr. Hafiz Md. Hasan Babu, “Design of a Reversible Logic Block of Field Programmable Gate Array”, Proc. of the Silver Jubilee Conference on Communication Technologies & VLSI design, VIT university, Vellore, India, pp.502-503, 2009
[J15] Uzzal K. Acharjee, Anis Ahmed, Shahida Rafique, “ The Potential Positive Impacts in Long Haul Communication System in Bangladesh: Satellites & SEA-MEA-WE4”,(Published in the Journal of Electrical, Electronics & Communication Technology, Stamford University),V-1,I-2,ISSN No.:1995-5383,October-2008
[C4] Nayeema Islam and Sumyea Helal, “Performance Analysis of TCP Tahoe, Reno, New Reno and SACK over Cellular Mobile system”, Proceedings of 8th international conference on Computer and Information Technology (ICCIT 2005), pp. 786-790, 28-30 December 2005, Gazipur-1704, Bangladesh, ISBN: 984-32-2873-1.
[C3] Mohammed Nasir Uddin et. all. Relational model of access control system,
[C2] Mohammed Nasir Uddin et. all. Relational model of network objects security system.
[C1] Mohammed Nasir Uddin et. all. The use of object oriented approach to the model of security System.