Saiful Azad
YOU?
Author Swipe
View article: APDeeM: A machine Learning strategy towards Effective Peptide Vaccine Candidates Identification against Different Types of Viruses
APDeeM: A machine Learning strategy towards Effective Peptide Vaccine Candidates Identification against Different Types of Viruses Open
Viral infections pose significant global health challenges, underscoring the urgent need for improved medications. Nevertheless, traditional medicinal approaches depend significantly on labor-intensive laboratory tests, which impede effici…
View article: Comparison of Propofol and Fentanyl for Preventing Emergence Agitation Following Sevoflurane Anesthesia in Pediatric Patients: A Single-Center Study in Bangladesh
Comparison of Propofol and Fentanyl for Preventing Emergence Agitation Following Sevoflurane Anesthesia in Pediatric Patients: A Single-Center Study in Bangladesh Open
<p>Buying Adderall online with the help of platforms like MedxPharma is a great choice to those who require this drug. This medication is often prescribed as a stimulant used to treat ADHD and narcolepsy. Concentration, attention and…
View article: UDTN-RS: A New Underwater Delay Tolerant Network Routing Protocol for Coastal Patrol and Surveillance
UDTN-RS: A New Underwater Delay Tolerant Network Routing Protocol for Coastal Patrol and Surveillance Open
The Coastal Patrol and Surveillance Application (CPSA) is developed and deployed to detect, track and monitor water vessel traffic using automated devices. The latest advancements of marine technologies, including Automatic Underwater Vehi…
View article: Keyphrases Concentrated Area Identification from Academic Articles as Feature of Keyphrase Extraction: A New Unsupervised Approach
Keyphrases Concentrated Area Identification from Academic Articles as Feature of Keyphrase Extraction: A New Unsupervised Approach Open
The extraction of high-quality keywords and sum-marising documents at a high level has become more difficult in current research due to technological advancements and the expo-nential expansion of textual data and digital sources. Extracti…
View article: Hybrid Henry Gas Solubility Optimization Algorithm with Dynamic Cluster-to-Algorithm Mapping for Search-based Software Engineering Problems
Hybrid Henry Gas Solubility Optimization Algorithm with Dynamic Cluster-to-Algorithm Mapping for Search-based Software Engineering Problems Open
This paper discusses a new variant of the Henry Gas Solubility Optimization (HGSO) Algorithm, called Hybrid HGSO (HHGSO). Unlike its predecessor, HHGSO allows multiple clusters serving different individual meta-heuristic algorithms (i.e., …
View article: <em>i</em>WorkSafe: Towards Healthy Workplaces during COVID-19 with an Intelligent pHealth App for Industrial Settings
<em>i</em>WorkSafe: Towards Healthy Workplaces during COVID-19 with an Intelligent pHealth App for Industrial Settings Open
The recent outbreak of the novel Coronavirus Disease (COVID-19) has given rise to diverse health issues due to its high transmission rate and limited treatment options. Almost the whole world, at some point of time, was placed in lock-down…
View article: <i>i</i> Worksafe: Towards Healthy Workplaces During COVID-19 With an Intelligent Phealth App for Industrial Settings
<i>i</i> Worksafe: Towards Healthy Workplaces During COVID-19 With an Intelligent Phealth App for Industrial Settings Open
The recent outbreak of the novel Coronavirus Disease (COVID-19) has given rise to diverse health issues due to its high transmission rate and limited treatment options. Almost the whole world, at some point of time, was placed in lock-down…
View article: UDTN-RS: A New Underwater Delay Tolerant Network Routing Protocol for Facilitating Coastal Patrol and Surveillance Networks
UDTN-RS: A New Underwater Delay Tolerant Network Routing Protocol for Facilitating Coastal Patrol and Surveillance Networks Open
The Coastal Patrol and Surveillance Application (CPSA) is developed and deployed to detect, track and monitor water vessel traffic using automated devices. Latest advancements of marine technologies, including the Automatic Underwater Vehi…
View article: TeKET: a Tree-Based Unsupervised Keyphrase Extraction Technique
TeKET: a Tree-Based Unsupervised Keyphrase Extraction Technique Open
Automatic keyphrase extraction techniques aim to extract quality keyphrases for higher level summarization of a document. Majority of the existing techniques are mainly domain-specific, which require application domain knowledge and employ…
View article: A Hybrid Screen Size Independent Authentication Scheme for Smart Devices
A Hybrid Screen Size Independent Authentication Scheme for Smart Devices Open
Although, several authentication schemes have already been proposed for smart devices; however, most of these schemes does not consider the fact that smart devices come in different sizes. Hence, they are not screen size independent — whic…
View article: A Geofencing-based Recent Trends Identification from Twitter Data
A Geofencing-based Recent Trends Identification from Twitter Data Open
For facilitating users from information overloading by finding recent trends in twitter, several techniques are proposed. However, most of these techniques need to process extensive data. Therefore, in this paper, a geofencing-based recent…
View article: An Adaptive Fuzzy Symbiotic Organisms Search Algorithm and Its Applications
An Adaptive Fuzzy Symbiotic Organisms Search Algorithm and Its Applications Open
This paper discusses the development of a Symbiotic Organisms Search Algorithm (SOS) variant, called Adaptive Fuzzy SOS (FSOS). Like SOS, FSOS exploits three types of symbiosis operators namely mutualism, commensalism, and parasitism in or…
View article: A Secure Hybrid Authentication Scheme Using Passpoints and Press Touch Code
A Secure Hybrid Authentication Scheme Using Passpoints and Press Touch Code Open
With the increasing capabilities of smart devices, keeping them secure has become a major concern. To mitigate that concern, over the last few years, several new classes of authentication schemes have been proposed. Graphical Authenticatio…
View article: A Cyber-Enabled Mission-Critical System for Post-Flood Response: Exploiting TV White Space as Network Backhaul Links
A Cyber-Enabled Mission-Critical System for Post-Flood Response: Exploiting TV White Space as Network Backhaul Links Open
A crucial problem in post-flood recovery actions is the ability to rapidly establish communication and collaboration among rescuers to conduct timely and effective search and rescue (SAR) mission given disrupted telecommunication infrastru…
View article: Security mechanisms and data access protocols in innovative wireless networks
Security mechanisms and data access protocols in innovative wireless networks Open
Wireless networks play a vital role in shaping today's network infrastructure. Although in the past, the use of wireless communications was limited to the last-mile connectivity of the network, their convenience and adaptability has led to…
View article: An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks Open
Due to avalanches, a considerable number of travellers deceases every year. The number is increasing over the past few decades. Hence, to speed up the rescue mission and thereby, to mitigate number of fatalities, collaborative rescue missi…
View article: Underwater Delay-Tolerant Routing via Probabilistic Spraying
Underwater Delay-Tolerant Routing via Probabilistic Spraying Open
We propose underwater delay-tolerant routing via probabilistic spraying (UDTN-Prob), a routing protocol for underwater delay-tolerant networks based on the store-and-forward paradigm. Our protocol exploits limited statistical knowledge of …
View article: A Flexible Keyphrase Extraction Technique for Academic Literature
A Flexible Keyphrase Extraction Technique for Academic Literature Open
A keyphrase extraction technique endeavors to extract quality keyphrases from a given document, which provide a high-level summary of that document. Except statistical keyphrase extraction approaches, all other approaches are either domain…
View article: Collab-SAR: A Collaborative Avalanche Search-and-Rescue Missions Exploiting Hostile Alpine Networks
Collab-SAR: A Collaborative Avalanche Search-and-Rescue Missions Exploiting Hostile Alpine Networks Open
Every year, Alpine experiences a considerable number of avalanches causing danger to visitor and saviors, where most of the existing techniques to mitigate the number of fatalities in such hostile environments are based on a non-collaborat…
View article: Press touch code: A finger press based screen size independent authentication scheme for smart devices
Press touch code: A finger press based screen size independent authentication scheme for smart devices Open
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a res…
View article: A performance investigation on IoT enabled intra-vehicular wireless sensor networks
A performance investigation on IoT enabled intra-vehicular wireless sensor networks Open
The concept of Internet of Things (IoT) can be utilised in vehicles, since the number of sensor nodes in vehicles is rising tremendously because of the uplifting demand of applications for security, safety and convenience.In order to estab…
View article: Crowd Associated Network: Exploiting over a Smart Garbage Management System
Crowd Associated Network: Exploiting over a Smart Garbage Management System Open
Most existing non-real-time applications utilize infrastructure-based or semi-infrastructure-based network architectures. Such a network architecture demands a considerably high installment and maintenance cost. To alleviate the cost, in t…