Morshed U. Chowdhury

Orcid: 0000-0002-2866-4955

According to our database1, Morshed U. Chowdhury authored at least 118 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SDN enabled BDSP in public cloud for resource optimization.
Wirel. Networks, April, 2023

2022
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters.
IEEE Trans. Sustain. Comput., 2022

DEHM: An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network.
IEEE Trans. Ind. Informatics, 2022

Evaluating Public Service Delivery Smartness and Impact on Citizens' Well-Being.
IEEE Access, 2022

2021
A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things.
ACM Trans. Internet Things, 2021

An Extended Reselling Protocol for Existing Anti-Counterfeiting Schemes.
J. Sens. Actuator Networks, 2021

An empirical analysis of graph-based linear dimensionality reduction techniques.
Concurr. Comput. Pract. Exp., 2021

Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information.
IEEE Access, 2021

Citizens' Trust Measurement in Smart Government Services.
IEEE Access, 2021

2020
Reducing blocking artifacts in blockbased transform video coded images.
PhD thesis, 2020

A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services.
IEEE Trans. Cloud Comput., 2020

Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection.
IEEE Trans. Cloud Comput., 2020

UAV Swarm Mission Planning in Dynamic Environment Using Consensus-Based Bundle Algorithm.
Sensors, 2020

An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments.
Neural Comput. Appl., 2020

A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise.
J. Sens. Actuator Networks, 2020

A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments.
IEEE Access, 2020

Avoiding Geographic Regions in Tor.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Efficiency Broadcast Base Safety Message BSM Through VANET Based on Transmit Packet Coding (TPC).
Proceedings of the 2nd IEEE Global Conference on Life Sciences and Technologies, 2020

BDSP in the cloud: Scheduling and Load Balancing utlizing SDN and CEP.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

Yawn Based Driver Fatigue Level Prediction.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

Utility-Aware Graph Dimensionality Reduction Approach.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

2019
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems.
J. Sens. Actuator Networks, 2019

IoT Insider Attack - Survey.
Proceedings of the Smart Grid and Internet of Things - Third EAI International Conference, 2019

Ad-Hoc Framework for Efficient Network Security for Unmanned Aerial Vehicles (UAV).
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Performance Evaluation of LoRaWAN for Mission-Critical IoT Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
Border Surveillance With WSN Systems in a Distributed Manner.
IEEE Syst. J., 2018

Learning automaton based topology control protocol for extending wireless sensor networks lifetime.
J. Netw. Comput. Appl., 2018

Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms.
Future Gener. Comput. Syst., 2018

Universal and secure object ownership transfer protocol for the Internet of Things.
Future Gener. Comput. Syst., 2018

Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center.
IEEE Access, 2018

Breast Cancer Recurrence Prediction Using Random Forest Model.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

2017
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors.
Concurr. Comput. Pract. Exp., 2017

Multilayer hybrid strategy for phishing email zero-day filtering.
Concurr. Comput. Pract. Exp., 2017

A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV).
Proceedings of the Security and Privacy in Communication Networks, 2017

Is High Performance Computing (HPC) Ready to Handle Big Data?
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

A Smart Framework towards Providing Benefits for One and All.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

2016
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles.
IEEE J. Biomed. Health Informatics, 2016

Secure Object Tracking Protocol for the Internet of Things.
IEEE Internet Things J., 2016

Secure IoT Using Weighted Signed Graphs.
Proceedings of the Security and Privacy in Communication Networks, 2016

A Multi-protocol Security Framework to Support Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2016

Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi).
Proceedings of the Applications and Techniques in Information Security, 2016

2015
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System.
Int. J. Networked Distributed Comput., 2015

Secure object tracking protocol for Networked RFID Systems.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A novel approach to maximize the sum-rate for MIMO broadcast channels.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Image Spam Classification Using Neural Network.
Proceedings of the Security and Privacy in Communication Networks, 2015

Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach.
Proceedings of the 18th ACM International Conference on Modeling, 2015

2014
Large Iterative Multitier Ensemble Classifiers for Security of Big Data.
IEEE Trans. Emerg. Top. Comput., 2014

Securing a Smart Anti-counterfeit Web Application.
J. Networks, 2014

Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking.
J. Networks, 2014

Iterative Construction of Hierarchical Classifiers for Phishing Website Detection.
J. Networks, 2014

Scalable RFID security framework and protocol supporting Internet of Things.
Comput. Networks, 2014

A framework for mobile elearning (mLearning) with analytical decision model.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Securing Sensor Networks by Moderating Frequencies.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Defence Against Code Injection Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

RFID Tag Ownership Transfer Protocol for a Closed Loop System.
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014

Impact of Assurance of Learning (AOL) in Programming Course for Novices.
Proceedings of the Mobility, Intelligent Networks &Smart Societies, Proceedings of the 2nd BCS International IT Conference 2014, Abu Dhabi, United Arab Emirates, 9, 2014

2013
Explicit Rate Control for MANET.
Int. J. Networked Distributed Comput., 2013

Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag.
Int. J. Networked Distributed Comput., 2013

Power graphs: A survey.
Electron. J. Graph Theory Appl., 2013

Multistage approach for clustering and classification of ECG data.
Comput. Methods Programs Biomed., 2013

Predicting cardiac autonomic neuropathy category for diabetic data with missing values.
Comput. Biol. Medicine, 2013

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy.
Artif. Intell. Medicine, 2013

Critical Analysis and Comparative Study of Security for Networked RFID Systems.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

e-Learning Content Authentication Using Bipartite Matching.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Securing a Web-Based Anti-counterfeit RFID System.
Proceedings of the Security and Privacy in Communication Networks, 2013

A Framework for Mobile eLearning (mLearning) with Content Security and Authentication.
Proceedings of the 2013 Second IIAI International Conference on Advanced Applied Informatics, 2013

Smart Interactive Advertising Board (SIAB).
Proceedings of the 2013 Second IIAI International Conference on Advanced Applied Informatics, 2013

2011
Key Predistribution Scheme Using Finite Fields and Reed Muller Codes.
Proceedings of the Software Engineering, 2011

Smart RFID Reader Protocol for Malware Detection.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Security of RFID Systems - A Hybrid Approach.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Detecting Unwanted Email Using VAT.
Proceedings of the Software Engineering, 2011

A Framework for eLearning with Social Media Using DRM.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Web Health Portal to Enhance Patient Safety in Australian Healthcare Systems.
Proceedings of the Software Engineering, 2011

2010
Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010

Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes.
IACR Cryptol. ePrint Arch., 2010

Secure connectivity model in Wireless Sensor Networks (WSN) using first order Reed-Muller codes.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information.
Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, 2010

2009
Improving the QoS for information discovery in autonomic wireless sensor networks.
Pervasive Mob. Comput., 2009

Real-time Early Infectious Outbreak Detection Systems Using Emerging Technologies.
Proceedings of the ARTCom 2009, 2009

MVGL Analyser for Multi-classifier Based Spam Filtering System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.
Proceedings of the Software Engineering, 2008

The Crossroads Approach to Information Discovery in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Email Categorization Using (2+1)-Tier Classification Algorithms.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Fingerprint Recognition System Using Hybrid Matching Techniques.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Acoustic Features Extraction for Emotion Recognition.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Fast Scene Change Detection Based Histogram.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Two Logical Verification of Quantum NOT Gate.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

A novel method for person identification by comparing retinal patterns.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

Session Initiation Protocol (SIP) based Event Notification System Architecture for Telemedicine Applications.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
Computer Aided Analysis of Dental Radiographic Images.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005

An Innovative Spam Filtering Model Based on Support Vector Machine.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Improved Learning Algorithm Performance Using Linear Kernel Transformation.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

Impact of Image Organizations on Multimedia Document Retrieval.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
Medical image classfication using an efficient data mining technique.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004

Block Identification for Reducing Blocking Artefact in MPEG-1 Video Coded Images Using Statistical Inference and Performance Measurement Using Block Impairment Metric (BIM).
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004

2003
Web Services Based Wagering System for the Best Odds.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003

GHIRS: Integration of Hotel Management Systems by Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Parameter Adjustment Method for Relevance Feedback.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2003

A Vision for a Multimedia Knowledge Management Framework.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

Nonlinear Discrimination Using Support Vector Machine.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

A Scheme for Content Based Retrieval of Music Data in MIDI Format.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

A Simulation Model for Video Traffic Performance via ATM over TCP/IP.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2002
A New Texture Spectrum Descriptor and its Application in Image Semantic Classification.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

Eliminating of the Drawback of Existing Testing Technique of Easily Testable PLAs Using an Improved Testing Algorithm with Product Line Rearrangement.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002

2001
Designing Wave Digital Filters with Finite Word Length Coefficient in Time and Frequency Domain.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

Retrieval of Multimedia Documents using Low Cost Image Ranking Algorithms.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

Block Identifications for Minimising Inter-Block Discontinuity in MPEG-1 Video Coded Images Using Statistical Inference.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

2000
Evaluation of linear filters used with statistical inference for reducing blocking artifacts in video coded images.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1998
Block classification for reducing artefacts in video images using statistical correlation.
Proceedings of the Computers and Their Applications (CATA-98), 1998


  Loading...