Search

Your search keyword '"M. Alim"' showing total 107 results

Search Constraints

Start Over You searched for: Author "M. Alim" Remove constraint Author: "M. Alim" Topic computer science Remove constraint Topic: computer science
107 results on '"M. Alim"'

Search Results

1. Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection

2. Towards Greening MapReduce Clusters Considering Both Computation Energy and Cooling Energy

Catalog

Books, media, physical & digital resources

3. Towards achieving a delicate blending between rule-based translator and neural machine translator

4. An Intelligent IoT Approach for Analyzing and Managing Crowds

5. Human-Survey Interaction (HSI): A Study on Integrity of Human Data Collectors in a Mass-Scale Hajj Pilgrimage Survey

6. 'A Tale on Abuse and Its Detection over Online Platforms, Especially over Emails': From the Context of Bangladesh

7. Securing Firearms inside An Arsenal through Using A Remotely-Operated Sensor-Based Safety Mechanism

8. Enhancing throughput in multi-radio cognitive radio networks

9. Intelligent Human Counting through Environmental Sensing in Closed Indoor Settings

10. Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries

11. A hybrid IoT-based approach for emergency evacuation

12. A new network paradigm for low-cost and lightweight real-time communication between train and rail track to detect missing and faulty rail blocks

13. Emergency Planning for UAV-Controlled Crowd Evacuations

14. Scaling Up Bit-Flip Quantum Error Correction

15. Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder

16. Solving The Maze of Diagnosing Parkinson’s Disease based on Portable EEG Sensing to be Adaptable to Go In-The-Wild

17. Enhancing Fidelity of Quantum Cryptography using Maximally Entangled Qubits

18. Exploring network-level performances of wireless nanonetworks utilizing gains of different types of nano-antennas with different materials

19. Towards Devising a Low-cost and Easy-to-use Arithmetic Learning Framework for Economically Less-privileged Visually Impaired Children

20. Strategizing secured image storing and efficient image retrieval through a new cloud framework

21. Towards defending eavesdropping on NFC

22. Intelligent dynamic spectrum access using hybrid genetic operators

23. A framework for extractive text summarization using semantic graph based approach

24. Template-Based Space-Saving Approach for SMS Storage in A Server

25. A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics

26. How smart your smartphone is in lie detection?

27. HEliOS

28. As You Are, So Shall You Move Your Head: A System-Level Analysis between Head Movements and Corresponding Traits and Emotions

29. Towards simulating non-lane based heterogeneous road traffic of less developed countries using authoritative polygonal GIS map

30. A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm

31. A New Approach for Selecting Aggregated Multicast Trees to Reduce Forwarding States

32. Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs)

33. Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms

34. Exploiting a Synergy between Greedy Approach and NSGA for Scheduling in Computing Clusters

35. svLoad: An Automated Test-Driven Architecture for Load Testing in Cloud Systems

36. Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics

37. Duity

38. Towards Simulating Non-lane Based Heterogeneous Road Traffic of Less Developed Countries

39. GMC: Greening MapReduce Clusters Considering Both Computational Energy and Cooling Energy

40. Interference Aware Reliable Cooperative Cognitive Networks for Real-Time Applications

41. Channel Assignment Techniques for Multi-Radio Wireless Mesh Networks: A Survey

42. SymCo: Symbiotic Coexistence of Single-hop and Multi-hop Transmissions in Next-generation Wireless Mesh Networks

43. Fault-tolerant 3D mesh for network-on-chip

44. Efficient UAV deployment strategy for reconnaissance

45. Polygot: An approach towards reliable translation by name identification and memory optimization using semantic analysis

46. Many-objective performance enhancement in computing clusters

47. Secure processing-aware media storage (SPMS)

48. Finding Hierarchical Network Model in Insulin Production Process

49. Service-Hub: A better approach for developing the system of online marketing for daily services

50. An approach towards greening the digital display system