default search action
Md. Shariful Islam
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Suravi Akhter, Muhammad Mahbub Alam, Md. Shariful Islam, M. Arshad Momen, Mohammad Shoyaib:
Low-cost orthogonal basis-core extraction for classification and reconstruction using tensor ring. Pattern Recognit. 154: 110548 (2024) - [c20]Md. Arman Hossain, Suravi Akhter, Md. Shariful Islam, Muhammad Mahbub Alam, Mohammad Shoyaib:
Can a Simple Approach Perform Better for Cross-Project Defect Prediction? ENASE 2024: 328-335 - [i2]Md. Shariful Islam, S. M. Shaqib, Shahriar Sultan Ramit, Sharun Akter Khushbu, Abdus Sattar, Sheak Rashed Haider Noori:
A Deep Learning Approach to Detect Complete Safety Equipment For Construction Workers Based On YOLOv7. CoRR abs/2406.07707 (2024) - 2023
- [j18]Md. Mumtahin Habib Ullah Mazumder, Md. Eusha Kadir, Sadia Sharmin, Md. Shariful Islam, Muhammad Mahbub Alam:
cFEM: a cluster based feature extraction method for network intrusion detection. Int. J. Inf. Sec. 22(5): 1355-1369 (2023) - 2022
- [j17]Md. Ziaul Haque, Aimin Qian, Md. Shariful Islam, Suraiea Akter Lucky:
Hedonic vs. utilitarian value: influencing on social networking sites adoption of institutional investors. Int. J. Bus. Inf. Syst. 41(4): 525-547 (2022) - [c19]Md. Hasan Tarek, Md. Mumtahin Habib Ullah Mazumder, Sadia Sharmin, Md. Shariful Islam, Mohammad Shoyaib, Muhammad Mahbub Alam:
RHC: Cluster based Feature Reduction for Network Intrusion Detections. CCNC 2022: 378-384 - 2021
- [j16]Md Sadek Ali, Md. Shariful Islam, Muhammad Asif, Wali Ullah Khan, Fujiang Lin, Omer Waqar:
On Efficient DCT Type-I Based Low Complexity Channel Estimation for Uplink NB-IoT Systems. IEEE Access 9: 129756-129770 (2021) - [j15]Sayed Asaduzzaman, Md. Raihan Ahmed, Hasin Rehana, Setu Chakraborty, Md. Shariful Islam, Touhid Bhuiyan:
Machine learning to reveal an astute risk predictive framework for Gynecologic Cancer and its impact on women psychology: Bangladeshi perspective. BMC Bioinform. 22(1): 213 (2021) - [c18]Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa, Haipeng Cai:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. SANER 2021: 411-421 - [i1]Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa, Haipeng Cai:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. CoRR abs/2103.08083 (2021) - 2020
- [c17]Aotuo Dong, Md. Shariful Islam, Sacharia Albin, Makarand Deo:
Accurate Estimation of Refractive Indices of Organic Microparticles in Dual-Beam Optical Trap. EMBC 2020: 2213-2216 - [c16]Md. Shariful Islam, Md. Shafiul Alam Forhad, Md. Ashraf Uddin, Mohammad Shamsul Arefin, Syed Md. Galib, Md. Akib Khan:
Developing an Intelligent System for Recommending Products. ICO 2020: 476-490
2010 – 2019
- 2019
- [j14]Neda Ebrahimi, Abdelaziz Trabelsi, Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Kobra Khanmohammadi:
An HMM-based approach for automatic detection and classification of duplicate bug reports. Inf. Softw. Technol. 113: 98-109 (2019) - [c15]Md. Sabir Hossain, Mohammad Robaitul Islam Bhuiyan, Md. Shariful Islam, Md. Faridul Islam, Md. Al-Hasan:
Facilitating Hard-to-Defeat Car AI Using Flood-Fill Algorithm. IJCCI 2019: 541-553 - 2018
- [j13]Md. Shariful Islam, Wael Khreich, Abdelwahab Hamou-Lhadj:
Anomaly Detection Techniques Based on Kappa-Pruned Ensembles. IEEE Trans. Reliab. 67(1): 212-229 (2018) - [j12]Md. Shariful Islam, Nadarajah Mithulananthan, Kwang Y. Lee:
Development of Impact Indices for Performing Charging of a Large EV Population. IEEE Trans. Veh. Technol. 67(2): 866-880 (2018) - [c14]Md. Shariful Islam, Jaeung Lee:
Internal Audit Function (IAF)'s Competencies and Cybersecurity Audit. AMCIS 2018 - [c13]Thomas F. Stafford, Tawei Wang, Rhonda Syler, Md. Shariful Islam:
Analytics for Accounting Information Systems Applications. AMCIS 2018 - [c12]Md. Shariful Islam, Korosh Koochekian Sabor, Abdelaziz Trabelsi, Wahab Hamou-Lhadj, Luay Alawneh:
MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection System. QRS 2018: 25-34 - 2017
- [j11]Md. Shariful Islam, Md. Rabiul Islam, Md. Altab Hossain, Alexander Ferworn, Md. Khademul Islam Molla:
Subband entropy-based features for clothing invariant human gait recognition. Adv. Robotics 31(10): 519-530 (2017) - [j10]Fernaz Narin Nur, Selina Sharmin, Md. Ahsan Habib, Md. Abdur Razzaque, Md. Shariful Islam, Ahmad Almogren, Mohammad Mehedi Hassan, Atif Alamri:
Collaborative neighbor discovery in directional wireless sensor networks: algorithm and analysis. EURASIP J. Wirel. Commun. Netw. 2017: 119 (2017) - [j9]Fernaz Narin Nur, Selina Sharmin, Md. Abdur Razzaque, Md. Shariful Islam, Mohammad Mehedi Hassan:
A Low Duty Cycle MAC Protocol for Directional Wireless Sensor Networks. Wirel. Pers. Commun. 96(4): 5035-5059 (2017) - [c11]Md. Shariful Islam, Thomas F. Stafford:
Information Technology (IT) Integration and Cybersecurity/Security: The Security Savviness of Board of Directors. AMCIS 2017 - [c10]Fernaz Narin Nur, Selina Sharmin, Md. Abdur Razzaque, Md. Shariful Islam:
Quality-Aware Directional MAC Protocol for Multi-Channel Wireless Sensor Networks. ISPA/IUCC 2017: 121-126 - 2016
- [c9]Neda Ebrahimi Koopaei, Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Mohammad Hamdaqa:
An effective method for detecting duplicate crash reports using crash traces and hidden Markov models. CASCON 2016: 75-84 - 2015
- [j8]Md. Rokanujjaman, Md. Shariful Islam, Md. Altab Hossain, Md. Rezaul Islam, Yasushi Makihara, Yasushi Yagi:
Effective part-based gait identification using frequency-domain gait entropy features. Multim. Tools Appl. 74(9): 3099-3120 (2015) - [c8]Fernaz Narin Nur, Selina Sharmin, Md. Abdur Razzaque, Md. Shariful Islam:
A duty cycle directional MAC protocol for wireless sensor networks. NSysS 2015: 1-9 - 2011
- [j7]Muhammad Mahbub Alam, Md. Shariful Islam, Md. Abdul Hamid, Choong Seon Hong, Sungwon Lee:
Congestion-aware fair rate control in wireless mesh networks. Ann. des Télécommunications 66(5-6): 275-291 (2011) - [j6]Md. Shariful Islam, Muhammad Mahbub Alam, Choong Seon Hong, Sungwon Lee:
eMCCA: An enhanced mesh coordinated channel access mechanism for IEEE 802.11s wireless mesh networks. J. Commun. Networks 13(6): 639-654 (2011) - 2010
- [j5]Md. Shariful Islam, Muhammad Mahbub Alam, Md. Abdul Hamid, Choong Seon Hong, Sungwon Lee:
EFT: a high throughput routing metric for IEEE 802.11s wireless mesh networks. Ann. des Télécommunications 65(5-6): 247-262 (2010) - [j4]Md. Abdul Hamid, Muhammad Mahbub Alam, Md. Shariful Islam, Choong Seon Hong, Sungwon Lee:
Fair data collection in wireless sensor networks: analysis and protocol. Ann. des Télécommunications 65(7-8): 433-446 (2010) - [j3]Md. Shariful Islam, Muhammad Mahbub Alam, Choong Seon Hong, Sungwon Lee:
Load-Adaptive Practical Multi-Channel Communications in Wireless Sensor Networks. Sensors 10(9): 8761-8781 (2010) - [c7]Md. Abdul Hamid, Muhammad Mahbub Alam, Md. Shariful Islam, Choong Seon Hong:
Enforcing Fairness for Data Collection in Wireless Sensor Networks. CNSR 2010: 192-198 - [c6]Md. Shariful Islam, Muhammad Mahbub Alam, Md. Abdul Hamid, Choong Seon Hong:
High throughput path selection for IEEE 802.11s based wireless mesh networks. ICUIMC 2010: 66 - [c5]Md. Shariful Islam, Muhammad Mahbub Alam, Choong Seon Hong, Jung-Sik Sung:
Enhanced Channel Access Mechanism for IEEE 802.11s Mesh Deterministic Access. WCNC 2010: 1-6
2000 – 2009
- 2009
- [j2]Md. Shariful Islam, Md. Nazmul Hasan:
Multipurpose community telecentres in Bangladesh: problems and prospects. Electron. Libr. 27(3): 537-553 (2009) - [j1]Md. Shariful Islam, Md. Abdul Hamid, Choong Seon Hong:
SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks. Trans. Comput. Sci. 6: 95-114 (2009) - 2008
- [c4]Md. Shariful Islam, Young Yig Yoon, Md. Abdul Hamid, Choong Seon Hong:
A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. ICCSA (1) 2008: 972-985 - [c3]Md. Shariful Islam, Md. Abdul Hamid, Choong Seon Hong, Beom-Hwan Chang:
Preserving Identity Privacy in Wireless Mesh Networks. ICOIN 2008: 1-5 - [c2]Md. Abdul Hamid, Md. Shariful Islam, Choong Seon Hong:
Developing Security Solutions for Wireless Mesh Enterprise Networks. WCNC 2008: 2549-2554 - [c1]Md. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong:
Securing Layer-2 Path Selection in Wireless Mesh Networks. WISA 2008: 69-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint