Zobrazeno 1 - 10
of 81
pro vyhledávání: '"Md Shohrab Hossain"'
Autor:
Mohammed Y Aalsalem, Wazir Zada Khan, N M Saad, Md Shohrab Hossain, Mohammed Atiquzzaman, Muhammad Khurram Khan
Publikováno v:
PLoS ONE, Vol 11, Iss 7, p e0158072 (2016)
Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND ou
Externí odkaz:
https://doaj.org/article/58d7b9d0a3714522a4d427940d8fb6ab
Publikováno v:
Journal of Communications Software and Systems, Vol 19, Iss 4, Pp 278-288 (2023)
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two transformative technologies that offer distinct benefits. SDN virtualizes the control plane by separating it from the data plane, while NFV virtualizes the data plane
Externí odkaz:
https://doaj.org/article/0b9c1b6a019c4d36b59e60051b01a64b
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 3, Pp 251-281 (2022)
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough network coverage, and data transfer speed. Du
Externí odkaz:
https://doaj.org/article/e44607124538426990c671756af14f6a
Autor:
Md. Ruhul Amin, Md. Shohrab Hossain
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 65, Iss No 3, Pp 421-428 (2019)
Cross layer cooperative protocol which exploits the benefits of physical layer cooperative communication, is one of the widely recognized MAC layer protocol design strategies for future wireless networks. This paper presents performance analysis of a
Externí odkaz:
https://doaj.org/article/4efef1fd58ab4593b4015d804ddf83c6
Autor:
Omar Sami Oubbati, Mohammed Atiquzzaman, Pascal Lorenz, Md. Hasan Tareque, Md. Shohrab Hossain
Publikováno v:
IEEE Access, Vol 7, Pp 81057-81105 (2019)
Owing to the explosive expansion of wireless communication and networking technologies, cost-effective unmanned aerial vehicles (UAVs) have recently emerged and soon they will occupy the major part of our sky. UAVs can be exploited to efficiently acc
Externí odkaz:
https://doaj.org/article/28cf393d1d3f480099d57875ecfb9718
Publikováno v:
International Journal of Research and Innovation in Applied Science. :66-71
Cloud computing provides a user-convenient, low-expense, and powerful computing platform for sharing resources like online storage, applications, and software through the internet. But with the exponential growth of the Internet of Things (IoT) devic
Publikováno v:
Information, Vol 11, Iss 4, p 216 (2020)
In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area n
Externí odkaz:
https://doaj.org/article/90fd1f8dbb904a75ad8253ad8c4c528f
Publikováno v:
2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
Publikováno v:
FNC/MobiSPC
Malwares are designed to disrupt, disable or take control of a computer system. Android malware specially targets Android OS through leakage of confidential information and crashing the system. Several attempts have been made to detect Android malwar
Autor:
Md Shafiqul Azam, Md Shohrab Hossain, Md Fazal Naser, Md Nurul Hooda, Md Waliul Islam, Md Abul Hossain
Publikováno v:
Bangladesh Journal of Urology. 17:87-96
Objective: To assess the articles published on current treatments for Peyronie’s disease (PD) and it’s new development and to assist clinicians to select the effective management of PD by increasing understanding and awareness of the outcomes ass