Остановите войну!
for scientists:
default search action
Ashikur Rahman
- > Home > Persons > Ashikur Rahman
Publications
- 2023
- [j19]Sarif Sultan Saruar Jahan, Raqeebir Rab, Peom Dutta, Hossain Muhammad Mahdi Hassan Khan, Muhammad Shahariar Karim Badhon, Sumaiya Binte Hassan, Ashikur Rahman:
Deep Learning Based Misogynistic Bangla Text Identification from Social Media. Comput. Informatics 42(4): 993-1012 (2023) - [c49]Md. Ershadul Haque, Manoranjan Paul, Ashikur Rahman, Faranak Tohidi, Md Jahirul Islam:
Rice Leaf Disease Detection and Classification Using Shallow Trained Yolov7 Active Deep Learning Approach. DICTA 2023: 516-522 - [c47]Md. Abubakar Siddik, Ashikur Rahman:
IT-SBA: An Improved Timer-based Scalable Broadcast Algorithm for Wireless Ad-hoc Networks. NSysS 2023: 1-8 - [c43]Md. Abubakar Siddik, Tawsif Shahriar, SM Zuhair Zawhar Zaki, Monirul Haque Imon, Ashikur Rahman, Raqeebir Rab, Abderrahmane Leshob:
A novel FRTS/FCTS-based MAC Protocol for In-band Full-duplex Wireless Ad-hoc Networks. WiMob 2023: 36-42 - 2022
- [c42]Khaleda Akther Papry, Ashikur Rahman:
Fault Tolerant Multiple Dominating Set Constructions for Wireless Ad-hoc Networks. AINA (1) 2022: 566-578 - [c41]Nazmus Sakib, Sohel Bashar, Ashikur Rahman:
Road Accident Analysis of Dhaka City Using Counter Propagation Network. UNet 2022: 164-179 - [c40]Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab:
On Feature Selection Algorithms for Effective Botnet Detection. UNet 2022: 253-266 - [i2]Md. Ershadul Haque, Ashikur Rahman, Iftekhar Junaeid, Samiul Ul Hoque, Manoranjan Paul:
Rice Leaf Disease Classification and Detection Using YOLOv5. CoRR abs/2209.01579 (2022) - 2021
- [j16]Sajeda Akter, Sriram Chellappan, Tusher Chakraborty, Taslim Arefin Khan, Ashikur Rahman, A. B. M. Alim Al Islam:
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection. IEEE Trans. Dependable Secur. Comput. 18(6): 3012-3023 (2021) - [c38]Syeda Farzia Afroze, Ashikur Rahman:
A Target-Oriented Conflict Graph-based Approach for the Coverage Problem in Directional Sensor Networks. NSysS 2021: 1-12 - 2020
- [c36]Md. Imtiyaz Hossain, Sakib Eshrak, Minhaj Jami Auvik, Syed Faiz Nasim, Raqeebir Rab, Ashikur Rahman:
Efficient Feature Selection for Detecting Botnets based on Network Traffic and Behavior Analysis. NSysS 2020: 56-62 - 2019
- [j15]Md. Sadiqur Rahman Sohel, Chowdhury Nawrin Ferdous, Ashikur Rahman, Akib Jawad Nafis, Salsabil Arabi Shushmi, Raqeebir Rab:
On constructing contention aware connected dominating sets for inter-connectivity among internet of things devices. Int. J. Multim. Intell. Secur. 3(3): 244-270 (2019) - [c33]Suman Saha, Abdullah Al Zishan, Ashikur Rahman:
On target monitoring in directional sensor networks by jointly considering network lifetime and fault tolerance. NSysS 2019: 68-76 - 2018
- [j13]Abdullah Al Zishan, Imtiaz Karim, Sudipta Saha Shubha, Ashikur Rahman:
Maximizing heterogeneous coverage in over and under provisioned visual sensor networks. J. Netw. Comput. Appl. 124: 44-62 (2018) - [c30]Nafisa Anzum, Syeda Farzia Afroze, Ashikur Rahman:
Zone-Based Indoor Localization Using Neural Networks: A View from a Real Testbed. ICC 2018: 1-7 - [c29]Ananya Bhattacharjee, Tanmoy Pias, Mahathir Ahmad, Ashikur Rahman:
On the Performance Analysis of APIs Recognizing Emotions from Video Images of Facial Expressions. ICMLA 2018: 223-230 - [c26]Sirat Samyoun, Ashikur Rahman, Raqeebir Rab:
Design and Analysis of a Fault-Tolerant Topology Control Algorithm for Wireless Multi-hop Networks. NSysS 2018: 37-45 - [c25]Nafis Sadeq, Fazle Rabbi Rahat, Ashikur Rahman, Sheikh Iqbal Ahamed, Md. Kamrul Hasan:
Smartphone-based Calorie Estimation From Food Image Using Distance Information. NSysS 2018: 66-73 - [c24]Chowdhury Nawrin Ferdous, Ashikur Rahman:
A Contention Aware Connected Dominating Set Construction Algorithm for Wireless Ad-Hoc Networks. WiMob 2018: 1-8 - 2016
- [j12]Raqeebir Rab, Ashikur Rahman, Fatema Tuz Zohra:
Analytical modeling of self-pruning and an improved probabilistic broadcast for wireless multihop networks. Ad Hoc Networks 52: 106-116 (2016) - [j11]Sakib Md. Bin Malek, Md. Muntakim Sadik, Ashikur Rahman:
On balanced k-coverage in visual sensor networks. J. Netw. Comput. Appl. 72: 72-86 (2016) - [j10]Hafsa Zannat, Taslima Akter, Mashrura Tasnim, Ashikur Rahman:
The coverage problem in visual sensor networks: A target oriented approach. J. Netw. Comput. Appl. 75: 1-15 (2016) - [c21]Shahla Farzana, Khaleda Akther Papry, Ashikur Rahman, Raqeebir Rab:
Maximally pair-wise disjoint set covers for directional sensors in visual sensor networks. Wireless Days 2016: 1-7 - 2015
- [c18]Fatema Tuz Zohra, Ashikur Rahman:
Mathematical analysis of self-pruning and a new dynamic probabilistic broadcast for MANETs. NSysS 2015: 1-9 - [c17]Ashikur Rahman, Nawshad Rehan Rasha, Imtiaz Ahmed, Sirat Samyoun:
Modeling sparsity of planar topologies for wireless multi-hop networks. WiOpt 2015: 339-346 - [i1]Md. Muntakim Sadik, Sakib Md. Bin Malek, Ashikur Rahman:
On Balanced k-coverage in Visual Sensor Network. CoRR abs/1512.07332 (2015) - 2014
- [c16]Ashikur Rahman, Nael B. Abu-Ghazaleh:
On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks. INFOCOM 2014: 889-897 - 2013
- [c15]Ashikur Rahman, Raqeebir Rab:
Modeling and analysis of bi-connected minimum energypath preserving graphs for wireless multi-hop networks. MiSeNet@MobiCom 2013: 3-10 - 2012
- [c12]Ashikur Rahman, Carey L. Williamson:
Delta-graphs for wireless ad hoc networks. SECON 2012: 632-640 - 2011
- [j7]Syed Rafiul Hussain, Subrata Saha, Ashikur Rahman:
SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks. J. Netw. Syst. Manag. 19(3): 394-426 (2011) - [j6]Ashikur Rahman, Carey Williamson:
Poster: Δ-Graphs: flexible topology control in wireless ad hoc networks. SIGMETRICS Perform. Evaluation Rev. 39(2): 75 (2011) - [j5]Ashikur Rahman, Hanan Shpungin, Carey Williamson:
Poster: on capacity maximization in wireless relay networks. SIGMETRICS Perform. Evaluation Rev. 39(2): 76 (2011) - 2010
- [c9]Subrata Saha, Syed Rafiul Hussain, Ashikur Rahman:
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks. AINA 2010: 526-532 - [c8]S. M. Rifat Ahsan, Mohammad Saiful Islam, Naeemul Hassan, Ashikur Rahman:
Packet distribution based tuning of RTS Threshold in IEEE 802.11. ISCC 2010: 1-6 - 2009
- [j4]Pawel Gburzynski, Bozena Kaminska, Ashikur Rahman:
On Reliable Transmission of Data over Simple Wireless Channels. J. Comput. Networks Commun. 2009: 409853:1-409853:14 (2009) - [j3]Ashikur Rahman, Md. Endadul Hoque, Farzana Rahman, Sabuj Kumar Kundu, Pawel Gburzynski:
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks. J. Networks 4(9): 895-904 (2009) - [c6]Syed Rafiul Hussain, Subrata Saha, Ashikur Rahman:
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks. ADHOC-NOW 2009: 152-165 - 2008
- [c4]Pawel Gburzynski, Bozena Kaminska, Ashikur Rahman:
Reliable Data Transmission over Simple Wireless Channels: A Case Study. DSD 2008: 817-824 - 2007
- [c3]Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska:
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks. ICC 2007: 3389-3394 - 2006
- [j1]Ashikur Rahman, Pawel Gburzynski:
MAC-assisted topology control for ad hoc wireless networks. Int. J. Commun. Syst. 19(9): 955-976 (2006) - [c2]Ashikur Rahman, Pawel Gburzynski:
MAC-assisted broadcast speedup in ad-hoc wireless networks. IWCMC 2006: 923-928 - 2005
- [c1]Ashikur Rahman, Pawel Gburzynski:
On constructing minimum-energy path-preserving graphs for ad-hoc wireless networks. ICC 2005: 3083-3087
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-23 18:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint