Zobrazeno 1 - 10
of 112
pro vyhledávání: '"Shohrab Hossain"'
Publikováno v:
Journal of Communications Software and Systems, Vol 19, Iss 4, Pp 278-288 (2023)
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two transformative technologies that offer distinct benefits. SDN virtualizes the control plane by separating it from the data plane, while NFV virtualizes the data plane
Externí odkaz:
https://doaj.org/article/0b9c1b6a019c4d36b59e60051b01a64b
Autor:
Ali, Asad, Islam, Minhajul, Mallick, Tushin, Islam, Mohammad Sakibul, Sakib, Sadman, Shohrab Hossain, Md., Lin, Ying-Dar
Publikováno v:
In Computer Communications 1 June 2024 222:220-229
Publikováno v:
In International Journal of Disaster Risk Reduction January 2022 68
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 3, Pp 251-281 (2022)
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough network coverage, and data transfer speed. Du
Externí odkaz:
https://doaj.org/article/e44607124538426990c671756af14f6a
Publikováno v:
IEEE Access, Vol 10, Pp 35106-35119 (2022)
Multi-Access or Mobile Edge Computing (MEC) is being deployed by 4G/5G operators to provide computational services at lower latencies. Federating MECs across operators expands capability, capacity, and coverage but gives rise to two issues for contin
Externí odkaz:
https://doaj.org/article/cc9242f722574954a994932bb3aa6b10
Publikováno v:
Environmental Challenges, Vol 5, Iss , Pp 100309- (2021)
The spatial and temporal variation of rainfall, Tmax and Tmin (mean maximum and minimum temperature) and ΔT (Tmax -Tmin) of different Regions of Bangladesh and Sea Surface Temperature (SST) of Northern Bay of Bengal at seasonal and annual timescales
Externí odkaz:
https://doaj.org/article/136e851bdb704eb9956a75b71fe9007f
Autor:
Md. Ruhul Amin, Md. Shohrab Hossain
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 65, Iss No 3, Pp 421-428 (2019)
Cross layer cooperative protocol which exploits the benefits of physical layer cooperative communication, is one of the widely recognized MAC layer protocol design strategies for future wireless networks. This paper presents performance analysis of a
Externí odkaz:
https://doaj.org/article/4efef1fd58ab4593b4015d804ddf83c6
Autor:
Omar Sami Oubbati, Mohammed Atiquzzaman, Pascal Lorenz, Md. Hasan Tareque, Md. Shohrab Hossain
Publikováno v:
IEEE Access, Vol 7, Pp 81057-81105 (2019)
Owing to the explosive expansion of wireless communication and networking technologies, cost-effective unmanned aerial vehicles (UAVs) have recently emerged and soon they will occupy the major part of our sky. UAVs can be exploited to efficiently acc
Externí odkaz:
https://doaj.org/article/28cf393d1d3f480099d57875ecfb9718
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 14:1-15
A zone walking attack is to get all existing domain information from a secured DNS server. NSEC3 protocol was proposed to defend against zone walking attacks in a secured DNS server, although NSEC3 uses more CPU time. In this paper, the authors have
Publikováno v:
International Journal of Research and Innovation in Applied Science. :66-71
Cloud computing provides a user-convenient, low-expense, and powerful computing platform for sharing resources like online storage, applications, and software through the internet. But with the exponential growth of the Internet of Things (IoT) devic