Остановите войну!
for scientists:
default search action
Morshed U. Chowdhury
- > Home > Persons > Morshed U. Chowdhury
Publications
- 2023
- [j39]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
SDN enabled BDSP in public cloud for resource optimization. Wirel. Networks 29(3): 1031-1041 (2023) - 2022
- [j38]Fera Tri Hartanti, Jemal H. Abawajy, Morshed U. Chowdhury:
Evaluating Public Service Delivery Smartness and Impact on Citizens' Well-Being. IEEE Access 10: 69106-69124 (2022) - [j37]Zhou Zhou, Jemal H. Abawajy, Mohammad Shojafar, Morshed U. Chowdhury:
DEHM: An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network. IEEE Trans. Ind. Informatics 18(7): 4944-4953 (2022) - [j36]Zhou Zhou, Kenli Li, Jemal H. Abawajy, Mohammad Shojafar, Morshed Uddin Chowdhury, Fangmin Li, Keqin Li:
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters. IEEE Trans. Sustain. Comput. 7(2): 371-385 (2022) - 2021
- [j35]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy:
Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information. IEEE Access 9: 121686-121697 (2021) - [j34]Fera Tri Hartanti, Jemal H. Abawajy, Morshed U. Chowdhury, Wervyan Shalannanda:
Citizens' Trust Measurement in Smart Government Services. IEEE Access 9: 150663-150676 (2021) - [j33]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed U. Chowdhury, Tahsien Al-Quraishi:
An empirical analysis of graph-based linear dimensionality reduction techniques. Concurr. Comput. Pract. Exp. 33(5) (2021) - 2020
- [j28]Zhou Zhou, Fangmin Li, Huaxi Zhu, Houliang Xie, Jemal H. Abawajy, Morshed U. Chowdhury:
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments. Neural Comput. Appl. 32(6): 1531-1541 (2020) - [j26]Jemal H. Abawajy, Morshed U. Chowdhury, Andrei Kelarev:
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection. IEEE Trans. Cloud Comput. 8(2): 398-407 (2020) - [j25]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei Kelarev, Herbert F. Jelinek:
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services. IEEE Trans. Cloud Comput. 8(2): 473-483 (2020) - [c76]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed Uddin Chowdhury:
Utility-Aware Graph Dimensionality Reduction Approach. CATA 2020: 327-333 - [c75]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy, Ahmed Raad Al-Sudani:
Yawn Based Driver Fatigue Level Prediction. CATA 2020: 372-382 - [c74]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
BDSP in the cloud: Scheduling and Load Balancing utlizing SDN and CEP. CCGRID 2020: 827-835 - 2018
- [j23]Zhou Zhou, Jemal H. Abawajy, Fangmin Li, Zhigang Hu, Morshed U. Chowdhury, Abdulhameed Alelaiwi, Keqin Li:
Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center. IEEE Access 6: 27080-27090 (2018) - [j22]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. Future Gener. Comput. Syst. 78: 838-849 (2018) - [j21]Zhou Zhou, Jemal H. Abawajy, Morshed U. Chowdhury, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. Future Gener. Comput. Syst. 86: 836-850 (2018) - [j20]Mahmood Javadi, Habib Mostafaei, Morshed U. Chowdhury, Jemal H. Abawajy:
Learning automaton based topology control protocol for extending wireless sensor networks lifetime. J. Netw. Comput. Appl. 122: 128-136 (2018) - [c66]Ahmad Shaker Abdalrada, Jemal H. Abawajy, Morshed U. Chowdhury, Sutharshan Rajasegarar, Tahsien Al-Quraishi, Herbert F. Jelinek:
Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population. SCDM 2018: 135-146 - [c65]Tahsien Al-Quraishi, Jemal H. Abawajy, Morshed U. Chowdhury, Sutharshan Rajasegarar, Ahmad Shaker Abdalrada:
Breast Cancer Recurrence Prediction Using Random Forest Model. SCDM 2018: 318-329 - 2017
- [j18]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei V. Kelarev, Teruhisa Hochin:
Multilayer hybrid strategy for phishing email zero-day filtering. Concurr. Comput. Pract. Exp. 29(23) (2017) - 2016
- [j16]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Secure Object Tracking Protocol for the Internet of Things. IEEE Internet Things J. 3(4): 544-553 (2016) - [j15]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Herbert F. Jelinek:
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles. IEEE J. Biomed. Health Informatics 20(1): 408-415 (2016) - [c57]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
A Multi-protocol Security Framework to Support Internet of Things. SecureComm 2016: 257-270 - 2015
- [c54]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy, Monika Jesmin:
Secure object tracking protocol for Networked RFID Systems. SNPD 2015: 135-141 - 2014
- [j13]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury:
Scalable RFID security framework and protocol supporting Internet of Things. Comput. Networks 67: 89-103 (2014) - [j12]Jemal H. Abawajy, Gleb Beliakov, Andrei V. Kelarev, Morshed U. Chowdhury:
Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. J. Networks 9(8): 2089-2098 (2014) - [j11]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. J. Networks 9(9): 2259-2268 (2014) - [j10]Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Smart Anti-counterfeit Web Application. J. Networks 9(11): 2925-2933 (2014) - [j9]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Large Iterative Multitier Ensemble Classifiers for Security of Big Data. IEEE Trans. Emerg. Top. Comput. 2(3): 352-363 (2014) - 2013
- [j8]Andrew Stranieri, Jemal H. Abawajy, Andrei V. Kelarev, Md. Shamsul Huda, Morshed U. Chowdhury, Herbert F. Jelinek:
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy. Artif. Intell. Medicine 58(3): 185-193 (2013) - [j7]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Andrew Stranieri, Herbert F. Jelinek:
Predicting cardiac autonomic neuropathy category for diabetic data with missing values. Comput. Biol. Medicine 43(10): 1328-1333 (2013) - [j6]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Multistage approach for clustering and classification of ECG data. Comput. Methods Programs Biomed. 112(3): 720-730 (2013) - [j5]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Power graphs: A survey. Electron. J. Graph Theory Appl. 1(2): 125-147 (2013) - [j3]Biplob Rakshit Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag. Int. J. Networked Distributed Comput. 1(2): 79-88 (2013) - [c45]Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Web-Based Anti-counterfeit RFID System. SecureComm 2013: 342-355 - [c43]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Critical Analysis and Comparative Study of Security for Networked RFID Systems. SNPD 2013: 197-202
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 18:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint