Morshed U. Chowdhury

According to our database1, Morshed U. Chowdhury authored at least 86 papers between 1998 and 2018.

Collaborative distances :
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms.
Future Generation Comp. Syst., 2018

Universal and secure object ownership transfer protocol for the Internet of Things.
Future Generation Comp. Syst., 2018

Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center.
IEEE Access, 2018

Breast Cancer Recurrence Prediction Using Random Forest Model.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

2017
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors.
Concurrency and Computation: Practice and Experience, 2017

Multilayer hybrid strategy for phishing email zero-day filtering.
Concurrency and Computation: Practice and Experience, 2017

A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV).
Proceedings of the Security and Privacy in Communication Networks, 2017

Is High Performance Computing (HPC) Ready to Handle Big Data?
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

2016
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles.
IEEE J. Biomedical and Health Informatics, 2016

Secure Object Tracking Protocol for the Internet of Things.
IEEE Internet of Things Journal, 2016

Secure IoT Using Weighted Signed Graphs.
Proceedings of the Security and Privacy in Communication Networks, 2016

A Multi-protocol Security Framework to Support Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2016

Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi).
Proceedings of the Applications and Techniques in Information Security, 2016

2015
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System.
IJNDC, 2015

Secure object tracking protocol for Networked RFID Systems.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A novel approach to maximize the sum-rate for MIMO broadcast channels.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach.
Proceedings of the 18th ACM International Conference on Modeling, 2015

2014
Large Iterative Multitier Ensemble Classifiers for Security of Big Data.
IEEE Trans. Emerging Topics Comput., 2014

Securing a Smart Anti-counterfeit Web Application.
JNW, 2014

Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking.
JNW, 2014

Iterative Construction of Hierarchical Classifiers for Phishing Website Detection.
JNW, 2014

Scalable RFID security framework and protocol supporting Internet of Things.
Computer Networks, 2014

A framework for mobile elearning (mLearning) with analytical decision model.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Securing Sensor Networks by Moderating Frequencies.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Defence Against Code Injection Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

RFID Tag Ownership Transfer Protocol for a Closed Loop System.
Proceedings of the IIAI 3rd International Congress on Advanced Applied Informatics, 2014

2013
Explicit Rate Control for MANET.
IJNDC, 2013

Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag.
IJNDC, 2013

Power graphs: A survey.
EJGTA, 2013

Multistage approach for clustering and classification of ECG data.
Computer Methods and Programs in Biomedicine, 2013

Predicting cardiac autonomic neuropathy category for diabetic data with missing values.
Comp. in Bio. and Med., 2013

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy.
Artificial Intelligence in Medicine, 2013

Critical Analysis and Comparative Study of Security for Networked RFID Systems.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

e-Learning Content Authentication Using Bipartite Matching.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Securing a Web-Based Anti-counterfeit RFID System.
Proceedings of the Security and Privacy in Communication Networks, 2013

A Framework for Mobile eLearning (mLearning) with Content Security and Authentication.
Proceedings of the 2013 Second IIAI International Conference on Advanced Applied Informatics, 2013

Smart Interactive Advertising Board (SIAB).
Proceedings of the 2013 Second IIAI International Conference on Advanced Applied Informatics, 2013

2011
Key Predistribution Scheme Using Finite Fields and Reed Muller Codes.
Proceedings of the Software Engineering, 2011

Smart RFID Reader Protocol for Malware Detection.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Security of RFID Systems - A Hybrid Approach.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Detecting Unwanted Email Using VAT.
Proceedings of the Software Engineering, 2011

A Framework for eLearning with Social Media Using DRM.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Web Health Portal to Enhance Patient Safety in Australian Healthcare Systems.
Proceedings of the Software Engineering, 2011

2010
Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010

Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes.
IACR Cryptology ePrint Archive, 2010

Secure connectivity model in Wireless Sensor Networks (WSN) using first order Reed-Muller codes.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information.
Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, 2010

2009
Improving the QoS for information discovery in autonomic wireless sensor networks.
Pervasive and Mobile Computing, 2009

Real-time Early Infectious Outbreak Detection Systems Using Emerging Technologies.
Proceedings of the ARTCom 2009, 2009

MVGL Analyser for Multi-classifier Based Spam Filtering System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.
Proceedings of the Software Engineering, 2008

The Crossroads Approach to Information Discovery in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Email Categorization Using (2+1)-Tier Classification Algorithms.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Fingerprint Recognition System Using Hybrid Matching Techniques.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Acoustic Features Extraction for Emotion Recognition.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Fast Scene Change Detection Based Histogram.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Two Logical Verification of Quantum NOT Gate.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

A novel method for person identification by comparing retinal patterns.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

Session Initiation Protocol (SIP) based Event Notification System Architecture for Telemedicine Applications.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
Computer Aided Analysis of Dental Radiographic Images.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005

An Innovative Spam Filtering Model Based on Support Vector Machine.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Improved Learning Algorithm Performance Using Linear Kernel Transformation.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

Impact of Image Organizations on Multimedia Document Retrieval.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
Medical image classfication using an efficient data mining technique.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004

Block Identification for Reducing Blocking Artefact in MPEG-1 Video Coded Images Using Statistical Inference and Performance Measurement Using Block Impairment Metric (BIM).
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004

2003
Web Services Based Wagering System for the Best Odds.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003

GHIRS: Integration of Hotel Management Systems by Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Parameter Adjustment Method for Relevance Feedback.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2003

A Vision for a Multimedia Knowledge Management Framework.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

Nonlinear Discrimination Using Support Vector Machine.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

A Scheme for Content Based Retrieval of Music Data in MIDI Format.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

A Simulation Model for Video Traffic Performance via ATM over TCP/IP.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2002
A New Texture Spectrum Descriptor and its Application in Image Semantic Classification.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

Eliminating of the Drawback of Existing Testing Technique of Easily Testable PLAs Using an Improved Testing Algorithm with Product Line Rearrangement.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002

2001
Designing Wave Digital Filters with Finite Word Length Coefficient in Time and Frequency Domain.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

Retrieval of Multimedia Documents using Low Cost Image Ranking Algorithms.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

Block Identifications for Minimising Inter-Block Discontinuity in MPEG-1 Video Coded Images Using Statistical Inference.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

2000
Evaluation of linear filters used with statistical inference for reducing blocking artifacts in video coded images.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1998
Block classification for reducing artefacts in video images using statistical correlation.
Proceedings of the Computers and Their Applications (CATA-98), 1998


  Loading...