Download as pdf or txt
Download as pdf or txt
You are on page 1of 236

Student Handbook

Department of CSE
Southeast University
2018
Contents

Message of the honorable Vice Chancellor, SEU 4

Message of the Dean, School of Science and Engineering, SEU 6

Message of the Chairman, CSE 8

1 Board of Trustees, Southeast University Trust 10

2 About Southeast University (SEU) 11


2.1 Introduction, Vision, Mission and Strategies of SEU . . . . . 11
2.2 Goals, Accreditation and Admission Procedures of SEU . . . 12
2.3 Organogram and University Administration of SEU . . . . . . 14
2.4 Degrees offered at SEU . . . . . . . . . . . . . . . . . . . . . . 15
2.5 Schools, Departments and Centers of SEU . . . . . . . . . . . 15
2.6 Location and Teaching Methods of SEU . . . . . . . . . . . . 16
2.7 General Facilities of SEU . . . . . . . . . . . . . . . . . . . . 16

3 Department of Computer Science and Engineering (CSE) 19


3.1 Vision and Mission of CSE Department . . . . . . . . . . . . 19
3.2 Program Outcomes and Program Educational Objectives . . 19
3.3 Eligibility for Admission . . . . . . . . . . . . . . . . . . . . 20
3.4 Degree Requirements of B.Sc. in CSE . . . . . . . . . . . . . 20
3.5 Assessment and Evaluation Procedures . . . . . . . . . . . . . 20
3.5.1 Grading Policy of SEU for the students . . . . . . . . 20
3.5.2 Faculty Evaluation . . . . . . . . . . . . . . . . . . . . 21

4 Undergraduate Program 22
4.1 B.Sc. in Computer Science and Engineering (CSE) . . . . . . 22
4.1.1 Course Curriculum Structure and List of Courses . . . 22
4.1.2 Policy for distributing Elective Courses . . . . . . . . 27
4.1.3 Semester wise course distribution . . . . . . . . . . . . 28
4.1.4 Course Descriptions . . . . . . . . . . . . . . . . . . . 31

2
5 Academic Strengths of CSE Department 64
5.1 Faculty Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . 64
5.2 Various Committees of CSE Department . . . . . . . . . . . . 167
5.3 Laboratory Facilities . . . . . . . . . . . . . . . . . . . . . . . 168
5.4 Computing and Internet Facilities . . . . . . . . . . . . . . . . 169

6 Extra- and Co-Curricular Activities of CSE Department 170


6.1 Computer Club: Vision, Mission, Committees etc. . . . . . . 170

7 Academic Policies of CSE Department 172


7.1 Course Registration Flow Chart . . . . . . . . . . . . . . . . . 173
7.2 Academic Adviser . . . . . . . . . . . . . . . . . . . . . . . . 174
7.3 Course Re-Take, Make-up Examination Policy . . . . . . . . . 174
7.4 Thesis/ Project/ Internship Guidelines and Evaluation Policy 175
7.4.1 Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
7.4.2 Project . . . . . . . . . . . . . . . . . . . . . . . . . . 180
7.4.3 Internship . . . . . . . . . . . . . . . . . . . . . . . . . 185
7.5 Guidelines to Create Poster Presentation . . . . . . . . . . . . 187

8 Career Prospects of CSE Graduates 189

9 Photo Gallery of CSE Department 192

10 Contact Address 197

A Format of Thesis and Project Report 198

B Format of Internship Report 215

C Teaching Evaluation Form 234

3
I am very much pleased to know that the Department of Computer Science
& Engineering is going to publish the CSE handbook for the first time. Cer-
tainly this handbook will provide useful information for the students and
guardians about the academic curriculum, rules, regulations and policies of
the university as well as the department. Besides, students will be able to
get at -a- glance picture of co-curricular and extra-curricular activities of
the CSE department.

Southeast University (SEU) commenced its journey in the year 2002 with a
humble aspiration to join the leading educational institutions in the country.
Its desire to be a key node in the global network of knowledge communities
brought it at the forefront in the society from the very first day of its journey.

We, in the SEU family, believe in the promotion of free flow of ideas and in
building synergies between the processes of creating, imparting and exploit-
ing knowledge in order to develop a dynamic society, imbued with culture
and a spirit of enterprise. Our goal is to provide diverse opportunities for
intellectual, personal and professional growth.

Southeast University is committed to make learning well-rounded, well-


equipped to succeed in this fast changing world. We take pride in our
vision of nurturing, recruiting and sustaining best quality faculty and staff
by providing a balanced, high quality experiences along with a spirit of en-
terprise. We have been able so far to pursue our cherished goal and strive
to maintain it in the future. Our dedicated team of faculty and adminis-
tration proved our vision and mission as achievable. We also take pride in
our Board of Trustees whose unsolicited and boundless encouragement and

4
support brought this institution to the apex of success.

Finally, I congratulate all the members of the committee on making this


handbook a reality. I wish continuous growth and progress of the CSE De-
partment.

Prof. Dr. ANM Meshquat Uddin


Vice Chancellor

5
I am very much delighted to know that the Department of Computer Sci-
ence and Engineering (CSE) of Southeast University is going to publish its
handbook for the first time. CSE department is one of the very vibrant and
academically sound departments among the five departments of the School
of Science and Engineering of this University.

It is an exciting experience for new students to start studying at a uni-


versity. However, the academic environment of a university is a lot different
from that of a school or college. Very often, fresh students find the uni-
versity life quite challenging to cope with due to not knowing the rules and
regulations as well as new policies and procedures of the university they take
admission. They face a lot of surprises and many things simply do not make
sense to them. Many suffer from a ‘reality shock’. I feel that this handbook
should serve as a guidebook to answer most of the common questions a new
student might have.

Therefore, I would like to urge each student to go through this handbook


carefully so that they can avoid making mistakes for not knowing university
policies and practices as well as rules and regulations. I believe that learn-
ing these things will make their life in the Department of CSE of Southeast
University very pleasant and comfortable.

I would like to thank the Department Chairman and Member of this hand-
book Committee for their relentless efforts for publishing this handbook.
Congratulations to you all!

Finally, I wish all the successes and their endeavors for the continuous growth

6
of the CSE Department.

Prof. Syed Fakhrul Hassan


Dean
School of Science and Engineering

7
Greetings!! from the CSE department of Southeast University. CSE Depart-
ment started its journey in Summer 2002 with 36 students. It received valu-
able guidance at the initial stage from Prof. Dr. M. Kaykobad a renowned
professor of CSE department BUET. In CSE department we follow global
standard syllabus. Class routine and exam routine of CSE department is
fully automated and that is why we can utilize our resources optimally. Now
some teachers, graduates and students of CSE department are working to-
gether to automate the whole university.

Most graduates of CSE department are well placed in the society. Grad-
uates of CSE department are working in companies like Facebook, AT&T,
SSL Wireless, REVE Systems etc. They are also working in Banks, other
renowned Software Companies, ISPs, Garments Sector, NGOs etc. Some of
our graduates are also working as faculty members in other private univer-
sities.

The primary goal of CSE department is to make the students think and
the department do it by engaging students in problem solving in different
courses. The department also participates in regional contests of ACM In-
ternational Collegiate Programming Contest regularly. And it got within
top 5 (University Ranking) position in Dhaka Regional 2005, 2006, 2007.
The department also likes to recruit faculty members who can think be-
cause only then they will also be able to make the students think.

The teachers of CSE department are young, energetic and friendly with the

8
students and university authority is also trying their best to increase the
existing facility of the students. A faculty member of CSE department is a
world famous researcher and another one is a judge of ACM International
Collegiate Programming Contest, World Finals since 2003. The average pro-
gramming skills of CSE department of SEU is the best in Bangladesh. So
in many ways CSE department is different than other CSE department of
Bangladesh and the best way for anyone to know about this difference is by
joining us. Thanks for your patience.

Shahriar Manzoor
Chairman & Associate Professor
CSE Department, Southeast University, Dhaka
President, Bangladesh Association of Problemsetters
Judging Director ACM ICPC Dhaka Site 2004-2017
ACM ICPC World Finals Judge 2003-2018

9
1

Board of Trustees, Southeast


University Trust

Mr. Md. Rezaul Karim


Honorable Chairman

Mr. Md. Anowar Hossain Mr. Md. Enayetur Rahman Mr. M. Tajul Islam
Honorable Vice-Chairman Honorable Vice-Chairman Honorable Vice-Chairman

Mr. Harun-Ar-Rashid Khan Mr. Md. Nasimul Alam


Mr. M. Kamaluddin Chowdhury Advocate Niaz Ahmed
Honorable Member Chowdhury, MP
Honorable Member Honorable Member
Secretary Honorable Member

Mr. Zahirul Haque Mr. Mohammad Hasan Advocate Kazi Md. Nurul Amin Mr. Mohammad Nawaz
Honorable Member Honorable Member Honorable Member Honorable Member

Mr. Md. Reaz Uddin Ansari Al-haj Helal Miah Capt. Md. Irshad Ali Mr. Abul Kalam Azad
Honorable Member Honorable Member Honorable Member Honorable Member

Alhaj Md. Abdul Wahab Mrs. Shirin Akhter Mr. Istiaque Ahmed Mr. Azharul Islam
Honorable Member Honorable Member Honorable Member Honorable Member

10
2

About Southeast University


(SEU)

2.1 Introduction, Vision, Mission and Strategies


of SEU
Realizing the need and value of higher education to build a happy and pros-
perous Bangladesh, a group of dedicated educationalists and philanthropists
agreed to establish a private university that would uphold the torch of knowl-
edge and would pursue quality education in a quiet, trouble-free and con-
genial academic environment. Ultimately a university named ’Southeast
University (SEU)’ started its journey in the month of June 2002 as a private
university under the ’Private University Act 1992’ and as amended in 1998.
The Honorable President of People’s Republic of Bangladesh is the Chancel-
lor of of SEU. From the very beginning till now SEU has been following the
policy of using education to serve the society without considering any com-
mercial motive, whatsoever. The creation of SEU was a visionary decision
by founding fathers in the face of ever-increasing demand for modern spe-
cialized education in Bangladesh. Committed to creating a knowledge-based
society, SEU is now comparable with top private universities in Bangladesh
because of a phenomenal rise in enrolment and provision of high quality
education.

Vision
The vision of SEU is to flourish as a prestigious seat of learning in the South
Asian region. As a center of excellence, it aims at attracting students from
all countries of the region.

Mission
The mission of SEU is to provide higher education to students of Bangladesh
at an affordable cost, keeping in view the challenges of the twenty first cen-

11
tury. And this mission will be achieved by imparting world class education
and providing research facilities so that the students can attain their full
intellectual, social and personal potentials. SEU is committed to develop
human capital by cultivating creative thinking in individuals. It offers edu-
cation through both campus and ICT-based online modes of teaching.

Strategies
The strategies of SEU emanate from its objectives set by the southeast Uni-
versity Trust. The main objective is to import quality education to the
young learners at an affordable cost, in order to make them adequately ca-
pable to meet the challenges of globalization. With this end in view, the
university authority adopts appropriate policies and always tries to imple-
ment them earnestly to reach its goal. The university demands from its
students and teachers the highest standard of performance in academic and
other activities.

2.2 Goals, Accreditation and Admission Procedures


of SEU
Goals
The goal of the University is to provide excellent modern education for
students with a view to equipping them with the skill and knowledge neces-
sary to lead the country in its quest for development. Along with this, the
University also aims at producing students of high moral standard in its stu-
dents. Southeast University (SEU) has the authority, under its charter, to
provide instruction to confer Undergraduate and Post Graduate degrees. It
has plans to offer MPhil. and PhD programs in all branches of higher stud-
ies including engineering, agriculture, language, law and medical sciences.
It has also the authority to grant diplomas, certificates and other academic
distinctions. It has also the authority to open new Schools of studies and
new institutions on its own campus. The University is run by a number of
statutory bodies as required under the provisions of the Private University
Act, 1992.

Accreditation and Collaboration


SEU is accredited by the government of Bangladesh, and its curricula as well
as programs have been approved by the University Grants Commission of
Bangladesh. SEU has exchange programs with Indiana University of Penn-
sylvania and Claffin University, USA; Zhejiang University, Zhejiang Gong-
shang University, China, Wuhan Textile University, Hebei province, China;
Finance Academy under the Government of Russian Federation, Russia;
WTO Research Centre of Aoyama Gakuin University, Japan; Sian Institute
of Technology (AIT), Bangkok, Thailand; and University of Manchester, Uk.

12
Admission Procedure

1. Admission form on payment of Tk. 500/-


2. Original attested copies of all academic certificates and mark sheets
3. Attested 4 (four) copies of a recent passport size photograph, student’s
NID/BIRTH certificate and guardian’s NID photocopy
4. Job experience certificate (only 48 credits MBA)

FEES PAYABLE AT THE TIME OF ADMISSION


Admission Fee Tk. 15,000 (Non refundable)
Library Fee Tk. 2,000
Insurance Premium Tk. 100(Per Year)
Total Tk. 17,100

13
2.3 Organogram and University Administration of
SEU

14
2.4 Degrees offered at SEU
School of Business Studies
Bachelor of Business Administration
Master of Business Administration

School of Science & Engineering


Bachelor of Pharmacy
B.Sc. in Textile Engineering
Bachelor of Architecture
B.Sc. in Computer Science and Engineering
B.Sc. in Electrical & Electronics Engineering

School of Arts & Social Sciences


LLB (Hons.)
LLM (Final)
BA (Hons.) in English
MA in English
BSS (Hons.) in Economics
Master of Development Studies
BA (Hons.) in Islamic Studies
MA in Islamic Studies
BA (Hons.) in Bangla Language & Literature
MA in Bangla Language & Literature

2.5 Schools, Departments and Centers of SEU


SCHOOL OF BUSINESS STUDIES
Bachelor of Business Administration (BBA)
Master of Business Administration (MBA)

SCHOOL OF SCIENCE AND & ENGINEERING


Department of Computer Science & Engineering (CSE)
Department of Electrical & Electronic Engineering (EEE)
Department of Pharmacy
Department of Textile Engineering
Department of Architecture

SCHOOL OF ARTS & SOCIAL SCIENCES


Department of Bangla Language & Literature

15
Department of Economics
Department of English
Department of Law & Justice

2.6 Location and Teaching Methods of SEU


Location
The permanent campus of SEU is situated at Plot ’#251’, 252/A, Tejgaon
Industrial Area, Dhaka. Currently, three departments under the school of
Science and Engineering are functioning in our permanent campus. SEU has
five other campuses situated at House 64, Road ’#18’, Block ’#B’, Banani,
and House ’#1’, Road ’#17’, Block #C, Banani, Dhaka-1213. Southeast
University has purchased 7.5 bighas of land at Tejgaon for its permanent
campus. Enrollment of over 12000 students has placed SEU among the top
five private universities in Bangladesh.

Teaching Methods
Higher education in today’s technologically advanced world demands ac-
quisition of knowledge that promotes free thinking and informed learning.
Keeping that view in mind, classrooms at SEU well equipped with multi-
media and internet facilities. Teaching methodology is mainly participatory
and interactive although some classes are lecture based because of the nature
of the courses. Students are required to be proactive by their presence in the
classes and through their contribution in various ways, such as, questions-
answers, exchange of opinions, group discussions etc. Presentation sessions
by students are very common practice in many of the courses as the stu-
dents enjoy learning through their formal demonstrations on assigned top-
ics. Other common activities in the classroom teaching-learning, include
case and poster presentations, problem solving exercises, quizzes, debates,
role plays, pair-works, group-works, peer-feed backs, interviews, viva etc. In
some courses, specially those belonging to Business Studies and Engineering,
students might be required to undertake field/industry visits, write reports
and conduct project works. On the whole, teaching methodology at SEU
basically fosters critical thinking and independent learning with a view to
preparing students as members of knowledge society.

2.7 General Facilities of SEU


Research Facility
SEU has an Institute of Research & Training (IRT). IRT aims to develop,
maintain, and sustain an overall standard of the university’s core areas of
research, interest and competence. The core areas will be expanded to in-
clude new dimensions reflecting the nature of growth of the university. IRT

16
holds meeting regularly with faculty members and researchers of all de-
partments and maintains regular interaction with them to assist them in
developing and implementing their research projects. IRT seeks research
proposals from individual faculty members in their areas of interest; these
proposals are reviewed by a committee for IRT funding. After funding, IRT
follows up the progress of the research projects until their completion.
IRT also gives emphasis on improving research and teaching capacity of
the faculty members through training. It has already conducted a number
of training programs on Statistical Package for Social Science (SPSS) and
STATA for the faculty members. IRT has plan to implement training pro-
grams on GIS and atlas.ti as well. The long term goal of IRT is to establish
SEU as the best research university in Bangladesh.

Computer Lab Facility


Southeast University has common computer lab facilities for computer prac-
tice and free internet browsing for all students. All the computer labs are
spacious and air-conditioned. The students can use the computer labs from
morning to evening.

CPDS: Department of Career and Professional Development Ser-


vices
The Department of Career and Professional Development Services (CPDS)
works to educate and advise students about the opportunities for their fu-
ture career. It serves the current students as well as the alumni of SEU.
CPDS conducts job needs assessment of students, provides them training
for the necessary skills for employment, and develops their work attitudes
to become successful in competitive job market. CPDS organizes job fairs
as well.

Students enjoying services from CPDS explore career opportunities during


and after their graduation and learn how to become the best possible can-
didates in the competitive job market.

SEU Library
Since its inception in 2002, SEU has been taking all possible steps to build a
well equipped modern library. The library is now fully automated through
KOHA Integrated Library System, which supports web-based online bor-
rowing and receiving, searching catalog of books, CDs, journals, newspa-
pers and magazines, full-text online books and journals, auto email alert
service, and reservation of books from distant workstations. The users can
check their borrowing status, renew issued resources and can reserve books
through internet. SEU Digital Institutional Repository has been developed
using Greenstone Digital Library software which provides full access to all
users. The library subscribes more than 36000 online journals and a large

17
number of e-books published by various internationally reputed publishers.

The library’s purpose is to enrich the teaching, learning and research en-
deavors of the university by delivering easy access to relevant information
resources and proving quality services and facilities. For proper manage-
ment of the library resources, Dewey Decimal Classification (DDC) system
is used. In order to ensure round the clock security, closed-circuit TV camera
network has been installed in the library.

18
3

Department of Computer
Science and Engineering
(CSE)

B.Sc. in Computer Science & Engineering (CSE) is a 4-year program offered


by the Department of Computer Science and Engineering under the School
of Science and Engineering of this University.

3.1 Vision and Mission of CSE Department


Vision
The vision of department of CSE of SEU is to become a regional leader in
research and teaching in CSE by 2025.

Mission
The department is working relentlessly to produce quality graduates who
can meet the needs of today’s industry and the academia. The programs
offered will empower the graduates with both theoretical knowledge and
hands-on experience in application-oriented skills.

3.2 Program Outcomes and Program Educational


Objectives
Computer Science and Engineering is the most influential subject in the
World and in Bangladesh. The President of ACM David Patterson has said
in 2006 that Computer Science is there for 60 years and it will be there
for at least another 60 years. The Turing award (Noble Prize of Computer
Science) winner of 2008 Dr. Barbara Liskov of MIT has also said that the
importance of Computer Science and Engineering will increase in future.

19
But Bangladesh still needs a lot of skilled manpower in this field. The aim
of the Computer Science and Engineering Department is to create interna-
tional standard skills in Computer Science & Engineering and related fields
through innovative ideas and by providing world class education. To achieve
this vision the department educates the students with the latest art of Com-
puter Science and Engineering with the help of modern teaching techniques.
Many of our courses are lab based so that the students can learn their sub-
jects easily with the help of a lot of practical classes. In this way we are
fulfilling our mission of providing world class computer science education at
an affordable cost.

3.3 Eligibility for Admission


For admission in B.Sc. in Computer Science &; Engineering (CSE) a stu-
dent must have Physics, Chemistry and Mathematics in SSC/O-Level and
HSC/A-level. The minimum CGPA requirement for entry is revised by the
university from time to time.

3.4 Degree Requirements of B.Sc. in CSE


At least 144 credit hours must be earned to be eligible for graduation, and
this must include the all the core courses. The minimum CGPA requirement
for obtaining a Bachelor degree in engineering is 2.5. The following table
shows detailed degree requirement for the program.

3.5 Assessment and Evaluation Procedures


3.5.1 Grading Policy of SEU for the students
SEU follows UGC approved grading system as follows:

Scores Grade Grade Value


80-100 A+ 4.00
75-79 A 3.75
70-74 A- 3.50
65-69 B+ 3.25
60-64 B 3.00
55-59 B- 2.75
50-54 C+ 2.50
45-49 C 2.25
40-44 D 2.00
<40 F 0.00

20
3.5.2 Faculty Evaluation
At the end of each semester, students of each course evaluate their faculties
on some certain criteria in a scale from 1 to 5. This is a must for each and
every student. This evaluation plays a very significant role in evaluating
the performance of the faculties. Faculties can know their strengths and
weaknesses and can work on to rectify their mistakes and make themselves
better. To ensure student’s security and freedom of opinion, this evalua-
tion is done online and students’ identity are kept strictly hidden from the
faculties. Faculty evaluation form is attached in the appendix section.

21
4

Undergraduate Program

4.1 B.Sc. in Computer Science and Engineering


(CSE)
4.1.1 Course Curriculum Structure and List of Courses
Course Curriculum Structure

Courses Total Credits


General Education 18
Foundation Courses 22
Interdisciplinary Engineering Courses 12
Core Courses (Theory+lab) 72
Optional Courses 20
Total 144

22
List of Courses

General Education Courses

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 ACT1021 Introduction to Accounting Nil 3
2 ECO2021 Introduction to Economics Nil 3
3 MGT2011 Introduction to Business Management Nil 3
4 SOC2031 Engineering Ethics Comple- 3
tion of 80
Credits
Total 12
English Language Courses

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 ENG1001 Basic Composition Nil 0
2 ENG1002 Intermediate Composition ENG1001 3
3 ENG1021 English for Engineers ENG1002 3
Total 6
Basic Sciences (Theory and Lab)

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 PHY1021 Physics – I Nil 3
2 PHY1031 Physics II PHY1021 3
3 PHY1034 Physics II Lab PHY1021 1
Total 7
Mathematics and Statistics

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 MATH1024 Coordinate Geometry and Vector Anal- MATH1034 3
ysis
2 MATH1034 Differential & Integral Calculus Nil 3
3 MATH2014 Complex Variables and Transforms MATH1034 3
(Laplace & Fourier)
4 MATH2015 Linear Algebra and Matrices MATH2014 3
5 STAT2012 Statistical Methods & Probability Nil 3
Total 15

23
Inter Disciplinary Courses (Theory and Lab)

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 EEE1021 Electrical Circuits Design I Nil 3
2 EEE1022 Electrical Circuits Design I Lab Nil 1
3 EEE2011 Electronic Devices & Circuits I EEE1021 3
4 EEE2012 Electronic Devices & Circuits I Lab EEE1021, 1
EEE1022
5 ETE2023 Communication Theory MATH2014, 3
EEE2011
6 ETE2024 Communication Lab MATH2014, 1
EEE2011
Total 12
Core Courses (Theory, Lab, Research, Project/Internship)

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 CSE1011 Programming Language I CSE1013 3
2 CSE1012 Programming Language I Lab CSE1013 1
3 CSE1013 Computer Fundamentals Nil 3
4 CSE1021 Discrete Mathematics CSE1011 3
5 CSE1031 Numerical Methods CSE1021, 3
MATH1024
6 CSE1033 Data Structures CSE1021 3
7 CSE1034 Data Structures Lab CSE1021 1
8 CSE2013 Digital Logic Design CSE1011 3
9 CSE2014 Digital Logic Design Lab CSE1011 1
8 CSE2015 Programming Language II (Java) CSE1011 10
11 CSE2016 Programming Language II (Java) Lab CSE1011, 1
CSE1012
12 CSE2021 Algorithm CSE1033 3
13 CSE2026 Algorithm Lab CSE1033, 1
CSE1034
14 CSE3011 Database Design CSE2015 3
15 CSE3012 Database Design Lab CSE2015 1
16 CSE3013 Microprocessor Design & Assembly CSE1011, 3
Language Programming CSE2013
17 CSE3014 Microprocessor Design & Assembly CSE1011, 1
Language Programming Lab CSE2013
18 CSE3015 Computer Architecture CSE2013 3

24
SL Course Course Title Pre req- Cre-
NO Code uisite(s) dit(s)
19 CSE3025 Theory of Computing CSE2021 3
20 CSE3027 Introduction to Embedded Systems CSE3013 3
21 CSE3028 Introduction to Embedded Systems Lab CSE3014 1
22 CSE3031 Operating Systems CSE3013 3
23 CSE3032 Operating Systems Lab CSE3014 1
24 CSE3035 Information System Design & Software CSE2015, 3
Engineering CSE2016
25 CSE3036 Information System Design & Software CSE2015, 1
Engineering Lab CSE2016
26 CSE4000 Research Methodology Completion 3
of 110
credit
hours
27 CSE4011 Computer Networking ETE2023 3
28 CSE4012 Computer Networking Lab ETE2023 1
29 CSE4013 Computer Graphics & Animation CSE2015, 3
MATH2015
30 CSE4014 Computer Graphics & Animation Lab CSE2015, 1
MATH2015
31 CSE4041 Artificial Intelligence CSE2021 3
32 CSE4055 Project or Internship CSE4000 3
or
CSE4056
Total 72

Elective Courses

SL Course Code Course Title Credit(s)


NO
1 Elective 1* Any Course from Group A 3
2 Elective II Any course from Group B 3
3 Elective II * Associated Lab of Elective II 1
Lab
4 Elective III* Any course from Group A 3
5 Elective IV* Any course from Group B 3
6 Elective IV* Associated Lab of Elective IV 1
Lab
7 Elective V* Any course from Group A 3

25
SL Course Code Course Title Credit(s)
NO
8 Elective VI* Any course from Group A 3
Total 20

Elective Courses: Group A(without Lab)

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 CSE3021 Mathematical Analysis for Computer STAT2012, 3
Science (theory) CSE1021
1 CSE3033 Compiler Construction CSE3025 3
3 CSE4017 E-Commerce & E-Governance CSE3011, 3
SOC2031
4 CSE4025 Graph Theory CSE2021 3
5 CSE4029 Image Processing CSE2015, 3
CSE2021
6 CSE4037 Cryptography & Network Security CSE4011 3
7 CSE4019 Cloud Computing CSE3031 3
8 CSE4039 Management Information System Completion 3
of 110
Credit
Hours
9 CSE4045 Smart Device App Development CSE2015, 3
CSE4011
10 CSE4053 Introduction to Data Mining CSE2021 3
11 ETE3033 Digital Communication ETE2023, 3
MATH2015

26
Elective Courses with Lab: Group B (Students must take at least
two courses with associated lab from the list below

SL Course Course Title Pre req- Cre-


NO Code uisite(s) dit(s)
1 ETE3031 Telecommunication Engineering EEE2011, 3
ETE2023
2 ETE3032 Telecommunication Engineering Lab EEE2012, 1
ETE2024
3 ETE4013 Digital Signal Processing ETE3031 3
4 ETE4014 Digital Signal Processing Lab ETE3032 1
5 EEE4025 VLSI Design CSE2013, 3
CSE2014
6 EEE4026 VLSI Design Lab CSE2013, 1
CSE2014
7 CSE4027 Advanced Networking CSE4011 3
8 CSE4028 Advanced Networking Lab CSE4011, 1
CSE4012
9 CSE2031 Advanced Algorithm CSE2021 3
10 CSE2032 Advanced Algorithm Lab CSE2022 1
11 CSE4021 Advanced Embedded Systems CSE3027 3
12 CSE4022 Advanced Embedded Systems Lab CSE3027 1
13 CSE4033 Web and Internet Programming CSE3035 3
14 CSE4034 Web and Internet Programming Lab CSE3035 1
15 CSE4035 Software Development and Project CSE3035 3
Management
16 CSE4036 Software Development and Project CSE3035 1
Management Lab
17 CSE4043 Parallel and Distributed Computing CSE3031, 3
CSE3027
18 CSE4044 Parallel and Distributed Computing CSE3031, 1
Lab CSE3027
19 CSE4047 Advanced Java CSE2015 3
20 CSE4048 Advanced Java Lab CSE2015 1

4.1.2 Policy for distributing Elective Courses


The students can pick elective courses from a broad range of choices based
on their interest and career goals. They need to take minimum 20 credits
of optional courses. Students can follow the pattern shown in the semester

27
view or choose elective courses of their own choice from group A and group
B with the following restrictions:

They must take at least two theory courses and corresponding lab courses
from group B. Rest of the credits(112 credits) can be fulfilled by taking any
theory courses from group A or group B. A student can choose to do only
the theory course which has an accompanying lab. However, selecting the
lab without the accompanying theory course is not allowed.

4.1.3 Semester wise course distribution


A semester wise course distribution for four years of study is given below:

1st Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE1013(3) Ni ENG1002(3) ENG1001 CSE1021(3) CSE1011

ENG1001(0) Nil PHY1021(3) Nil CSE2015(3) CSE1011

MATH1034(3) Nil CSE1011(3) CSE1013 CSE2016(1) CSE1011,


CSE1012

ACT1021(3) Nil CSE1012(1) CSE1013 EEE1021(3) Nil

MATH1024(3) MATH1034 EEE1022(1) Nil

ENG1021(3) ENG1002

9 credits 13 credits 14 credits


Total: 36 credits

2nd Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE1033(3) CSE1021 CSE1031(3) CSE1021, CSE2021(3) CSE1033
MATH1024

CSE1034(1) CSE1021 CSE2013(3) CSE1011 CSE2026(1) CSE1033,


CSE1034

28
2nd Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
ECO2021(3) Nil CSE2014(1) CSE1011 ETE2023(3) MATH2014,
EEE2011

STAT2012(3) Nil MATH2014(3) MATH1034 ETE2024(1) MATH2014,


EEE2011

EEE2011(3) EEE1021 MGT2011(3) Nil PHY1031(3) PHY1021

EEE2012(1) EEE1021, PHY1034(1) PHY1021


EEE1022

9 credits 13 credits 14 credits


Total: 36 credits

3rd Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE3011(3) CSE2015 Elective CSE3031(3) CSE3013
1*(3)
CSE3014
CSE3012(1) CSE2015 CSE4011(3) ETE2023 CSE3032(1) CSE3014

CSE3015(3) CSE2013 CSE4012(1) ETE2023 CSE3035(3) CSE2015,


CSE2016

CSE3025(3) CSE2021 CSE3013(3) CSE1011, CSE3036(1) CSE2015,


CSE2013 CSE2016

MATH2015(3) MATH2014 CSE3014(1) CSE1011, Elective II(3)


CSE2013

SOC2031(3) Completion Elective II * *


of 80 Lab(1)
Credits

9 credits 13 credits 14 credits


Total: 36 credits

29
4th Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE3027(3) CSE3013 CSE4000(3) Completion
of 110
credit
hours

CSE3028(1) CSE3014 CSE4013(3) CSE2015,


MATH2015

CSE4041(3) CSE2021 CSE4014(1) CSE2015, CSE4055 or CSE4000


MATH2015 CSE4056(3)

Elective * Elective *
III*(3) V*(3)

Elective * Elective *
IV*(3) VI*(3)

Elective IV* *
Lab(1)

9 credits 13 credits 14 credits


Total: 36 credits

30
4.1.4 Course Descriptions
ACT1021: INTRODUCTION TO ACCOUNTING
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:

Financial Accounting: Objectives and importance of accounting, accounting as an


information system, computerized systems and applications in accounting, recording
system – double entry mechanism, accounts and their classification, accounting equa-
tion, accounting cycle, journal, ledger, trial balance, preparation of financial statements
considering adjusting and closing entries, accounting concepts and conventions.

Cost & Management Accounting: Cost concepts and classification, overhead cost
– meaning and classification, distribution of overhead cost, overhead recovery method,
job order costing, preparation of job cost sheet and quotation prite, inventory valu-
ation, absorption costing and marginal/variable costing technique, cost-volume-profit
analysis, contribution-margin approach, sensitivity analysis. Short term investment de-
cisions – relevant and differential cost analysis, long term investment decisions – capital
budgeting, various techniques of evolution of capital investment.

CSE1011: PROGRAMMING LANGUAGE – I (C)


3 CREDITS, 3 hours/week

PREREQUISITE(S): Nil

TOPICS:
Computer and C Fundamentals, C Data types, Operators and Expressions, Basic I/O
functions, if-else statement, loops – for loop, while loop, do-while loop, functions, global,
local, static and register variables, arrays, bubble sort, selection sort, pointer arithmetic,
arrays and pointers, pointer to pointer to integer, structures.

CSE1012: PROGRAMMING LANGUAGE – I (C) LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): Nil

TOPICS:
Laboratory Work based on CSE1011

31
CSE1013: COMPUTER FUNDAMENTALS
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Introduction to computers, representation of data, input/output – keyboard (stan-
dard layout), mouse, monitor, printer, memory, physical devices - disk drives, types of
diskettes, hard disks, removable hard disks, CD-ROM, CD-recordable, WORM disks
and PhotoCD, Phase change rewritable drives, measuring drive performances, proces-
sors, binary arithmetic, floating point representation of numbers, arithmetic operations
with normalized floating point numbers, introduction to software – different sorts of
software, logic circuits, computer architecture, computer languages and operating sys-
tems, computer history, introduction to Internet – how Internet works, introduction to
telecommunication, satellite communication, fiber-optic communication.

CSE1021: DISCRETE MATHEMATICS


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1011, CSE1012

TOPICS:
Propositional equivalence, predicate, quantifiers, methods of proof, sets, functions,
growth of functions, complexity of algorithms, integers and divisions, number theory
& its applications, matrices, proof strategy, mathematical induction, recursive defini-
tions, basic counting techniques, Pigeonhole principle, permutations and combinations,
binomial coefficients, generating permutations and combinations, discrete probability,
probability theory, recurrence relations, divide-and-conquer algorithm, generating func-
tions, relations, n-ary relations and their applications, closures of relations, equivalent
relations, partial ordering, graphs and graph models, connectivity, graph coloring, trees,
application of tree and tree traversal.

CSE1031: NUMERICAL METHODS


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1011, CSE1012, MATH1024

TOPICS:
Representation of numeric values in Computer, arithmetic operations of floating-point
numbers, precision error, bracketing and open methods of root finding, Solving system
of linear equations, forward and backward differences, Taylor series, different types
of interpolating polynomials, Numerical integration: Trapezoidal rule, Simpson’s rule,
Runge–Kutta methods.

32
CSE1033: DATA STRUCTURES
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1021

TOPICS:
Elementary data types, structures, arrays, pointers; introduction to Object Oriented
Programming; elementary searching: linear search, binary search; implementation and
applications of stacks and queues; solving problems with recursion; binary search trees,
balanced search trees; priority queue implementation with heaps; graph representation
and elementary graph algorithms.

CSE1034: DATA STRUCTURES LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE1021

TOPICS:
Laboratory Work based on Theory Course CSE1033

CSE2013: DIGITAL LOGIC DESIGN


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1021

TOPICS:
Binary Systems, Boolean algebra and Logic Gates, Gate Level Minimization, Combi-
national Logic, Synchronous Sequential Logic, Registers and Counters, Memory and
Programmable Logic.

CSE2014: DIGITAL LOGIC DESIGN LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE1021

TOPICS:
Laboratory Work based on Theory Course CSE2013

CSE2015: PROGRAMMING LANGUAGE – II (JAVA)


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1011, CSE1012

TOPICS:
Introduction to OOP, OOP in Java, Object, Classes, Methods, Variables, Operators,
Expressions, Statements and Blocks, Control Statements, Strings, Arrays, Inheritance,
Package, Interface, Exceptions, I/O, AWT, Swing, Database using JDBC, String Han-
dling, Threads, Events, Applets, Images, Project Work.

33
CSE2031: ADVANCED ALGORITHM
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021

TOPICS:
Introduction to the design and analysis of efficient algorithms, models of computation,
efficient sorting and searching, algorithms for algebraic problems, graph algorithms,
polynomial time algorithms for matching, Fusion trees and their applications to inte-
ger sorting, Fibonacci heaps and self-adjusting search trees, splay trees, linking and
cutting trees. State-of-the-art algorithms for minimum spanning trees, shortest path
problem, Network flows pre flow-push algorithms, max flow algorithms, linear program-
ming, scaling algorithms, dynamic programming, probabilistic methods, approximation
algorithms, completeness, lower bound theory for parallel computation, lower bounds
on the resource requirements of algorithms. Non polynomial Algorithm and satisfiabil-
ity set construction.

CSE2026: ALGORITHM LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE1033, CSE1034

TOPICS:
Laboratory Work based on Theory Course CSE2021

CSE2021: ALGORITHM
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1033, CSE1034

TOPICS:
Sorting (Insertion, Selection, Merge, Quick, Counting, Radix), Growth of Function,
Divide and Conquer, Solving Recurrences, Heap, Median and Order Statistics, Hash-
ing, Elementary Graph Algorithms, Shortest Paths, Sets and Disjoint Sets, Minimum
Spanning Tree, Backtracking, Introduction to Computational Geometry, Introduction
to Greedy Algorithms, Introduction to Dynamic Programming.

CSE2016: PROGRAMMING LANGUAGE – II (JAVA) LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE1011, CSE1012

TOPICS:
Laboratory Work based on Theory Course CSE2015

34
CSE2032: ADVANCED ALGORITHM LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE2021, CSE2026

TOPICS:
Laboratory Work based on Theory Course CSE2031

CSE3011: DATABASE DESIGN


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2015, CSE2016

TOPICS:
Concept of Database Systems; Semantic Database Design: High level Conceptual Mod-
eling, ER Model & Relational Model, ERD, Integrity Constraints, Enhanced ER (EER)
Model; Relational Algebra; SQL; Relational Database Design: Concepts of FDs, De-
composition & Desirable Properties, Normalization, Algorithms for 1NF, 2NF, 3NF,
BCNF, 4NF, 5NF; Other Dependencies & Normal Forms; Storage & Indexing: Stor-
age Structures, File Organization, Heap, Indexing Methods, B+ Tree Indexing, Hash
Indexing; Transaction Processing & Concurrency Control: Transaction Fundamentals,
OLTP Environments, ACID Properties, Locking, Deadlock & Starvation; Database
Recovery Techniques; Query Processing & Optimization; Database Security & Autho-
rization; Enhanced Data Models for Specific Applications; Distributed Databases &
Issues.

CSE3012: DATABASE DESIGN LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE2015, CSE2016

TOPICS:
Laboratory Works based on Theory Course CSE3011

35
CSE3013: MICROPROCESSOR DESIGN & ASSEMBLY LANGUAGE
PROGRAMMING
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1011, CSE2013

TOPICS:
Hardware and software architecture, instruction types and their formats, assembly pro-
gram format, assembly process, interrupts and system services, addressing methods,
high level control structure formation, use of subroutines and macros, numeric process-
ing and string processing, concurrent processes & high level linking, disk geometry, file
system and file I/O handling. Introduction to 8-bit, 16-bit, and 32-bit microprocessor
– architecture, addressing modes, instruction set, interrupts, multi-tasking and virtual
memory – memory interface, bus interface, arithmetic co-processor, Micro-controllers,
integrating microprocessors with interfacing chips.

CSE3014: MICROPROCESSOR DESIGN & ASSEMBLY LANGUAGE


PROGRAMMING LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE1012, CSE2014

TOPICS:
Laboratory Works based on Theory Course CSE3013

36
CSE3015: COMPUTER ARCHETECTURE
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2013

TOPICS:
Fundamentals of computer design – tasks of a computer architect, technology and
trends, cost and trends, measurement of performance, quantitative principles of com-
puter design, the concepts of memory hierarchy, Instruction set principles – classifica-
tion, memory addressing, operations, types and size of operands, encoding, study of
sample instruction set architecture, pipelining – hurdles and Hazards, data hazards and
control hazards, handling multi-cycle operations, instruction level parallelism (ILP) –
overcoming data hazards with dynamic scheduling, reducing Brance penalties with dy-
namic hardware prediction, compiler support for exploiting ILP, hardware support for
extracting more parallelism, Memory hierarchy design – Caches, reducing cache misses
& penalty, reducing hit time, main memory, virtual memory, protection and examples
of virtual memory, Storage systems – types of storage devices, Buses, I/O performance
measures, reliability, availability and RAID, multiprocessors – centralized & distributed
shared memory architectures, synchronization, computer arithmetic, vector processors,
survey of RISC architectures and Intel 80x86.

CSE3021: MATHEMATICAL ANALYSIS FOR COMPUTER SCIENCE


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1021

TOPICS:
Systematic ways of proving, mathematical notations, sums and recurrences, modular
arithmetic, basic number theory, some well known functions related to number theory,
Binomial coefficients, Generating functions, mechanical summations, Stirling, Eulerian,
Harmonic, Bernoulli and Fibonacci numbers, Domino theory, solving recurrences using
generating functions.

CSE3025: THEORY OF COMPUTING


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021

TOPICS:
Formal proofs, finite automata, DFA/NFA and their equivalence, properties of regular
languages, minimizing automata, regular expressions, Pumping lemma, non-regular
languages, context-free grammar, Chomsky and Greibach normal forms, pushdown
automata, non-context free languages, Turing machines, variants of Turing machines,
definition of algorithms, decidable languages, Undecidability of the Halting problem,
Diagonalization and reduction, time complexity, classes P, NP, NPC.

37
CSE3027: INTRODUCTION TO EMBEDDED SYSTEMS
3 Credits, 3 hours/week
PREREQUISITE(S): CSE3013
TOPICS:
8-bit Microcontroller (MCU) with following basic features: Analogue to Digital, Con-
verter (ADC), Analog Comparator, Pulse Width Modulation and or Output Compare
channels, External interrupt(s), Watch Dog Timer, Internal Timers, External and in-
ternal clock input, Hardware I2C and or SPI and or CAN bus capabilities, USART/
USB communication, Parallel I/O ports. MCU: AVR ATMega168/ ATMega328; AVR
Attiny 2313/4313; Microchip PIC 16F/18Fseries

Introduction to embedded system and interfacing: Why is computer interfacing im-


portant?; Typical Interfacing Activities; Inside the embedded system ; Replacement
for discrete logic-based circuits; Von-Neuman Architecture vs. Harvard Architecture;
Microcontroller’s fundamental components; Basic microcontroller architecture; Micro-
controllers vs. Microprocessors; Different Microcontroller manufcaturer; Review: basic
circuits; Digital and Analogue concepts. Detailed Architecture of the Target Micro-
controller, Setting up development environment, Basic Peripherals : Digital input /
output using parallel I/O ports, Timer unit, PWM and Output Compare Channels,
Interfacing with Analogue world, Interrupts and exception handling, Interfacing with
X86/ AMD64 Computer: Introduction to USART, Developing X86/ AMD64 Com-
puter software to control MCU, Introduction to I2C, SPI and or CAN bus, Finite State
Machine and its application in embedded system, Working with sensors and mod-
ules: Proximity Sensor, Distance Sensor, Real Time Clock module (i2c), Accelerometer
(i2c/SPI), Gyroscope, Temperature Sensors, Light sensors, Sensor networking, Relays,
ethernet/WIFI etc., Working with Motors: Introduction to H-bridge, Brushed D.C.,
Unipolar/Bipolar Stepper motor, Servo Motor Torque vs. Speed, Basic Gear box
design, Converting rotational motion to linear motion., USB protocol: USB Human
interface device (HID), USB Host device.

CSE3028: INTRODUCTION TO EMBEDDED SYSTEMS LAB


1 Credit, 1.5 hours/week
PREREQUISITE(S): CSE3013

TOPICS:
Laboratory works based on Theory course CSE3027

38
CSE3031: OPERATING SYSTEMS
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3013

TOPICS:
COMPUTER SYSTEM OVERVIEW: Basic Elements; Processor Registers; Instruction
Execution; Interrupts; The Memory Hierarchy; Cache Memory; I/O Communication
Techniques;

OPERATING SYSTEM OVERVIEW: Operating System Objectives and Functions;


The Evolution of Operating Systems; Developments Leading to Modern Operating
Systems; Microsoft Windows Overview; Modern UNIX Systems; Linux;

PROCESS DESCRIPTION AND CONTROL: Process States; Process Description;


Process Control; Execution of the Operating System; Security Issues; Linux Process
Management; Security Issues

SCHEDULING: Uniprocessor Scheduling: Types of Professor Scheduling, Scheduling


Algorithms, Traditional UNIX Scheduling; Multiprocessor Scheduling: Granularity,
Design Issues, Process Scheduling, Thread Scheduling, Real-Time Scheduling: Charac-
teristics of Real-Time Operating Systems, Real-Time Scheduling, Deadline Scheduling,
Rate Monotonic Scheduling, Priority Inversion, Linux Scheduling

THREADS, SMP, AND MICROKERNELS: Processes Vs.Threads:Multithreading,


User-Level and Kernel-Level Threads; Symmetric Multiprocessing : Modern Multi
Core Processor and Process Management and GPU architecture; Microkernels;
Linux/Windows Process and Thread Management

CONCURRENCY: Principles of Concurrency; Mutual Exclusion; Semaphores; Moni-


tors (Java as example); Message Passing; Classical Problems: Readers/Writers Prob-
lem, Dining Philosophers Problem, Sleeping Barber Problem; Principles of Deadlock;
Deadlock Prevention; Deadlock Avoidance; Deadlock Detection; Linux Concurrency
Mechanisms: Pipes, Messages, Shared Memory, Semaphores; Signals; Linux Kernel
Concurrency Mechanisms: Atomic Operations, Spinlocks, Semaphores, Barriers

MEMORY MANAGEMENT: Memory Management Requirements; Memory Partition-


ing; Paging; Segmentation; Security Issues; Virtual Memory: Hardware and Control
Structures, Operating System Software; Linux/Windows Memory Management

FILE MANAGEMENT: File Organization and Access; File Directories; File Sharing;
Record Blocking; Secondary Storage Management; File System Security; UNIX File
Management: File Allocation, Directories, Volume Structure, Traditional UNIX File
Access Control, Access Control Lists in UNIX; LINUX Virtual File System; Windows
File System;

COMPUTER SECURITY THREATS: 39 Computer Security Concepts; Threats, Attacks,


and Assets; Intruders; Malicious Software Overview; Viruses,Worms, and Bots; Rootk-
its;
CSE3032: OPERATING SYSTEMS LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE3013

TOPICS:
Laboratory Works based on Theory Course CSE3031

CSE3033: COMPILER CONSTRUCTION


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3013, CSE3025

TOPICS:
Lexical analysis, parsing (LL, LR parsers), syntax directed translation, intermediate
code generation, error detection and recovery, design and implementation of lexical
analyzers and parsers using tools like flex and bison.

CSE3035: INFORMATION SYSTEM DESIGN & SOFTWARE ENGI-


NEERING
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2015, CSE3011

TOPICS:
Introduction to information system (information, information system, information
gathering, information sources, system analysis), data collection process (interviewing),
fact finding techniques (questionnaire, joint application design (JAD)), prototyping,
system design tools overview, data flow diagram, data dictionary, process specifications,
E-R diagram, state diagram, variations of modeling tools (flowcharts and its variations,
Nassi-Shneiderman diagram, Ferstl diagram, Hamilton-Zeldin diagram, problem analy-
sis diagrams (PAD), system flowchart, HIPO diagrams, structure charts, variations on
data flow diagram and E-R diagram), analysis models (essential model, environmental
model, behavior model, user implementation model), introduction to UML (use case
modeling and use case diagram, class modeling, relationship, class diagrams, object
interaction – modeling sequence, collaboration diagram, state chart diagram, activity
diagram, component and deployment diagram), ethical and social issues, security is-
sues, project estimation, COCOMO model, PERT/CPM analysis, Gantt charts, cost
benefit analysis, introduction to linear programming, project work

Software Quality Concepts, Process Models, Software Requirements Analysis, Design


Methodologies, Software Testing, Software Maintenance, Testing and Debugging, Mod-
ularity, Specification, Data Abstraction, Object Modeling, Design Patterns, Testing,
RUP, UML, Project Work.

40
CSE3036: INFORMATION SYSTEM DESIGN & SOFTWARE ENGI-
NEERING LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE2015, CSE2016

TOPICS:
Laboratory Works based on Theory Course CSE3035

CSE4000: RESEARCH METHODOLOGY


3 CREDITS,
PREREQUISITE(S): Successful completion of 110 or more credits.

TOPICS:
Study of problems in the field of Computer Science & Engineering. A student needs
to select a suitable topic of his/her interest or supervisors may display a list of project
works related with the academic needs in research activities.

CSE4011: COMPUTER NETWORKING


3 CREDITS, 3 hours/week
PREREQUISITE(S): ETE2023

TOPICS:
Overview of OSI reference model. Topology design, Media Access Control Level, Ser-
vices, Problems and protocols, Practical local area network design and implementation.
IEEE LAN Standards, Logical Link Control protocols, HDLC, ALOHA, SLOTTED
ALOHA, FDDI, Client Server model and related softwares.

Network Layer level services, problems and protocols. WAN, MAN, interconnection
networks related softwares, TCP/IP, Novel NetWare, Routers, Bridges and Gateways
their Practical implementation aspects. X.25, Internet and related softwares. Trans-
port layer, services, problems and their protocol. Brief functioning of upper layers,
E-mail and other application.

CSE4012: COMPUTER NETWORKING LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): ETE2023

TOPICS:
Laboratory Works based on Theory Course CSE4011

41
CSE4013: COMPUTER GRAPHICS & ANIMATION
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2015, MATH2015

TOPICS:
Modeling shapes with meshes, affine transformation, three dimensional viewing, light-
ing and shading techniques, texture mapping, skinning, animating models, collision
detection, ray tracing.

CSE4014: COMPUTER GRAPHICS & ANIMATION LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE2015, MATH2015

TOPICS:
Laboratory Works based on Theory Course CSE4013 using OpenGL and Blender.

CSE4017: E-COMMERCE & E-GOVERNANCE


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3011, SOC2031

TOPICS:
Enterprise Resource Planning (ERP) Software. OpenERP/Odoo/Titanium/ SAP
ERP.
Introduction to Electronic Commerce: What electronic commerce is and how it has
evolved into a second wave of growth; Why companies concentrate on revenue models
and the analysis of business processes instead of business models when they undertake
electronic commerce initiatives; How economic forces have created a business environ-
ment that is fostering the second wave of electronic commerce; How businesses use
value chains and SWOT analysis to identify electronic commerce opportunities ; The
international nature of electronic commerce and the challenges that arise in engaging
in electronic commerce on a global scale

Technology Infrastructure: The Internet and the World Wide Web:The origin, growth,
and current structure of the Internet;How packet-switched networks are combined to
form the Internet; How Internet protocols and Internet addressing work; The history
and use of markup languages on the Web, including SGML,
HTML, and XML; How HTML tags and links work on the World Wide Web; The
differences among internets, intranets, and extranets; Options for connecting to the
Internet, including cost and bandwidth factors; Internet2 and the Semantic Web

42
Business Strategies For E-Commerce: Revenue models; How some companies move
from one revenue model to another to achieve success; Revenue strategy issues that
companies face when selling on the Web; Creating an effective business presence on
the Web; Web site usability; Communicating effectively with customers on the Web;
When to use product-based and customer-based marketing strategies; Communicat-
ing with different market segments; Customer relationship intensity and the customer
relationship life cycle; Using advertising on the Web; E-mail marketing; Technology-
enabled customer relationship management; Creating and maintaining brands on the
Web; Search engine positioning and domain name selection; Social Network, Viral
Marketing;

Business-to-Business Activities: How businesses use the Internet to improve purchasing,


logistics, and other support activities; Electronic data interchange and how it works;
How businesses have moved some of their electronic data interchange operations to
the Internet; Supply chain management and how businesses are using Internet tech-
nologies to improve it; Electronic marketplaces and portals that make purchase–sale
negotiations easier and more efficient
Legal, Ethical, and Tax Issues: Laws that govern electronic commerce activities; Laws
that govern the use of intellectual property by online businesses; Online crime, ter-
rorism, and warfare; Ethics issues that arise for companies conducting electronic com-
merce; Conflicts between companies’ desire to collect and use data about their cus-
tomers and the privacy rights of those customers; Taxes that are levied on electronic
commerce activities.

Electronic Commerce Software & Security: Web server basics; Software for Web servers;
E-mail management and spam control issues; Internet and Web site utility programs;
Web server hardware; Finding and evaluating Web-hosting services; Basic functions
of electronic commerce software; Advanced functions of electronic commerce software;
Electronic commerce software for small and midsize businesses; Security for client com-
puters; Security for the communication channels between computers; Security for server
computers; Organizations that promote computer, network, and Internet security;

Payment Systems for Electronic Commerce: The basic functions of online payment
systems; The use of payment cards in electronic commerce; The history and future of
electronic cash; How electronic wallets work; The use of stored-value cards in electronic
commerce; Internet technologies and the banking industry

The Need for Enterprise Architecture: Enterprises and their challenges; Stakeholders
and Their Concerns; Traditional Approaches; Requirements on Enterprise Architecture;

43
Governance Paradigm: Key Applications for Enterprise Architecture; Defining En-
terprise Architecture; Key Concept of Enterprise Architecture; Benefits of Enterprise
Architecture; Competencies of an Enterprise Architect;

The Results of Enterprise Architecting: Case Study on an Enterprise Architecture;


Quality of the Produced Results; Enterprise Architecture Frameworks : Tapscott &
Caston’s Views, The Integrated Architecture Framework, The ArchiMate Framework,
The Zachman Framework, The Open Group’s Architecture Framework; Dimensions for
Architecture Frameworks: Subject Dimensions, Purpose Dimensions, Form Dimensions

The Process of Enterprise Architecting: The Core Process of Enterprise Architect-


ing: Creating, Using and Maintaining Enterprise Architecture; Patterns for Enterprise
Architecting; Architecture Effectiveness and Organizational Context: Architecture Ma-
turity Level of the Enterprise, Assessing an Organization’s Architecture Effectiveness,
Assessing an Organization’s Culture and Management Style; Organizing the Architec-
ture Function: Planning Learning and Organizinging Architecture Activities.

CSE4019: CLOUD COMPUTING


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3031

TOPICS:
Intro to Clouds, Software as a service (SaaS), Platform as a service (PaaS), Infrastruc-
ture as a Service, MapReduce, Gossip, Membership, Grids, P2P Systems, KeyValue
Stores, Time and Ordering, Snapshots, Multicast, Paxos, Leader Election, Mutual Ex-
clusion, Concurrency Control, Replication Control, Stream Processing, Graph Process-
ing, Structure of Networks, Scheduling, Distributed File Systems, Distributed Shared
Memory, Sensor Networks, Security, Data-center Outage Studies, Cloud computing
service deployment and maintenance.

44
CSE4025: GRAPH THEORY
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021

TOPICS:
Basic Concepts: Graphs and digraphs, incidence and adjacency matrices, isomorphism,
the automorphism group; Trees: Equivalent definitions of trees and forests, Cayley’s
formula, the Matrix-Tree theorem, minimum spanning trees; Connectivity: Cut ver-
tices, cut edges, bonds, the cycle space and the bond space, blocks, Menger’s theorem;
Paths and Cycles: Euler tours, Hamilton paths and cycles, theorems of Dirac, Ore,
Bondy and Chvatal, girth, circumference, the Chinese Postman Problem, the Trav-
elling Salesman problem, diameter and maximum degree, shortest paths; Matchings:
Berge’s Theorem, perfect matchings, Hall’s theorem, Tutte’s theorem, Konig’s theorem,
Petersen’s theorem, algorithms for matching and weighted matching (in both bipartitie
and general graphs), factors of graphs (decompositions of the complete graph), Tutte’s
f-factor theorem; Extremal problems: Independent sets and covering numbers, Tu-
ran’s theorem, Ramsey theorems; Colorings: Brooks theorem, the greedy algorithm,
thWelsh-Powell bound, critical graphs, chromatic polynomials, girth and chromatic
number, Vizing’s theorem; Graphs on surfaces: Planar graphs, duality, Euler’s formula,
Kuratowski’s theorem, toroidal graphs, 2-cell embeddings, graphs on other surfaces;
Directed graphs: Tournaments, directed paths and cycles, connectivity and strongly
connected digraphs, branching; Networks and flows: Flow cuts, Max flow min cut the-
orems, perfect square; Selected topics: Dominating sets, the reconstruction problem,
intersection graphs, perfect graphs, random graphs, Chordal graphs. Famous problems
in Graph Theory include: Minimum Connector Problem, Marriage Problem, the As-
signment Problem, the Network Flow Problem, the Committee Scheduling Problem,
the Four Color Problem, the Traveling Salesman, Transportation and Transshipment
Problem, etc.

CSE4027: ADVANCED NETWORKING


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE4011

TOPICS:
Internet addressing, routing and routed algorithm., NAT, PAT, Sub-netting, Sub-
netting the subnet (VLSM), VLAN, ICMP v4 and v6. IP multicasting, RSVP, next
generation IP – IPng, ATM, wireless – radio basics, satellite systems, WAP, current
trends, issues with wireless over TCP, multiple conversation, socket, Denial service at-
tack, congestion control – control vs. avoidance, overview of algorithms, congestion in
the internet, Mobile IP, Voice over IP (VoIP), VPNs, network security, management –
Quality of Service (QoS), network vs. distributed systems management, protocols, web-
based management and other advanced TOPICS: Bluetooth, Wi-Fi (IEEE 802.11g),
Wi-Max (IEEE 802.16).

45
CSE4028: ADVANCED NETWORKING LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE4011, CSE4012

TOPICS:
Laboratory Works based on Theory Course CSE4027

CSE4029: IMAGE PROCESSING


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2015, CSE2021

TOPICS:
Digital image fundamentals, perceptions, representation, image transforms – Fast
Fourier Transform (FFT), Discrete Cosine Transforms (DCT), Karhunen and Loeve
Transforms (KLT), Wavelet transform and sub-band decomposition, image enhance-
ment and restoration techniques, image compression techniques, image compression
standards – JPEG, MPEG, H.261, H.263

CSE4033: WEB AND INTERNET PROGRAMMING


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3035

TOPICS:
HTML, CSS, Basic web programming, PHP basics, OOP in PHP, Relational Database
and MySQL, JavaScript, Regular Expression, Sessions and Cookies, MVC, PHP Frame-
works, JQuery, AJAX, Project Work.

CSE4034: WEB AND INTERNET PROGRAMMING LAB


1 CREDITS, 1.5 hours/week
PREREQUISITE(S): CSE3035

TOPICS:
Lab works Based on theory course CSE4033

46
CSE4035: SOFTWARE DEVELOPMENT AND PROJECT MANAGE-
MENT
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3035

TOPICS:
Framework: Ruby on Rails, Groovy on Grails, Django, Yii, Symphony, Codeigniter,
Zend etc. Foundations of software project management; organization structure and
staffing; motivation, authority and influence; conflict management; proposal prepara-
tion; a large engineering software system management; client management; managing
software project teams; project planning and scheduling; risk management; configura-
tion management; pricing estimation and cost control; quality assurance and accred-
itation; factors affecting software quality; software quality assurance plans; business
context and legal issues for software projects; software measurement: Software testing-
white-box testing, black-box testing, Unit testing, Functional testing, load testing; up-
grading and maintenance; network systems; and international project management;
Understanding Cloud computing, Differences between hosted services and cloud ser-
vices; Learning about bigdata and problem solving using bigdata.

CSE4036: SOFTWARE DEVELOPMENT AND PROJECT MANAGE-


MENT LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE3035

TOPICS:
Lab works based on theory course CSE4035.

47
CSE4037: CRYPTOGRAPHY & NETWORK SECURITY
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE4011

TOPICS:
Classical Cryptography: Introduction to simple cryptosystems, Cryptanalysis; Shan-
non’s Theory: Perfect secrecy, Entropy, Product cryptosystems; Data Encryption
Standard: Description of DES, Differential cryptanalysis; RSA System and Factor-
ing: Public-key cryptography, RSA cryptosystem, Attacks on RSA, Factroing algo-
rithms; Other Public-key cryptosystems: ElGamal cryptosystem and discrete logs,
Merkle-Hellman Knapsack System; Signature Schemes: ElGamal signature schemes,
Digital signature standard, Fail-stop signatures; Hash Functions: Signatures and Hash
functions, Collision-free Hash functions, Birthday attack; Key Distribution and Key
Agreement: Key predistribution, Kerboros, Diffie-Hellman key exchange; Identifica-
tion Schemes: Schnorr identification scheme, Okamoto identification schemes; Authen-
tication Codes: Computing deception probabilities, Combinatorial bounds, Entropy
bounds; Secret Sharing Schemes: Shamir threshold scheme, Access structure and gen-
eral secret sharing; Pseudo-random Number Generation: Indistinguishable probability
distribution, probabilistic encryption; Zero-knowledge proofs: Interactive proof sys-
tems, computational Zero-knowledge proofs.

CSE4039: MANAGEMENT INFORMATION SYSTEM


3 CREDITS, 3 hours/week
PREREQUISITE(S): Successful completion of 110 or more credits

TOPICS:
Introduction to the components of the management information system and their inte-
gration for managerial control and decision support, major functional applications and
impacts of information technology on individuals and the society, basic discussion of
the environments, approaches, principles and processes of management, environmen-
tal forces, planning, organizing and control processes, motivation, teamwork, group
dynamics and leadership in business and non-business organizations.

CSE4041: ARTIFICIAL INTELLIGENCE


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021

TOPICS:
Searching: conventional graph searching, A*, IDA*, jump point search, local search-
ing: hill climbing, simulated annealing, constraint satisfaction, adversarial search using
minimax, knowledge representation and inference using propositional and first order
logic and implementation using prolog, artificial neural networks.

48
CSE4053: INTRODUCTION TO DATA MINING
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021

TOPICS:
Introduction to Data Mining: Introduction to Data Mining, Data Warehousing, and
OLAP, Classification Concepts, Decision Trees, Model Evaluation, and Classification
Alternative Techniques, Association Analysis Concepts, Algorithms, and Association
Analysis Advanced Concepts, Cluster Analysis Concepts, Algorithms, and Cluster
Analysis Issues, Frequent-Pair Algorithms, Anomaly Detection.
Machine Learning: Inductive learning, Rule Induction, Bayesian Learning, Neural Net-
works, and Genetic Algorithms, Model Ensembles, Learning Theory, and Instance-
based Learning.

Advance Data Mining: Query Flocks, Page-Rank, Hubs-and-Authorities, Web Mining,


Stream Mining, Matching Sequences, Mining Event Sequences, Event Discovery.

CSE4047: ADVANCED JAVA


3 CREDITS, 3 hours/week
PREREQUISITE: CSE2015

TOPICS:
Threads, Generics, Reflection API, Java Network Programming, Advanced JDBC Pro-
gramming, Introduction to J2EE, Java Server Technology, JSP, RMI, Frameworks,
Project Work.

CSE4048: ADVANCED JAVA LAB


1 CREDITS, 1.5 hours/week
PREREQUISITE: CSE2016

TOPICS:
Laboratory Work based on Theory Course CSE4047 (Advanced Java).

49
CSE4021: ADVANCED EMBEDDED SYSTEMS
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3031, CSE3027

TOPICS:
32/64-bit Microcontroller (MCU) with following basic features: Analogue to Digital
Converter (ADC); Analog Comparator; Pulse Width Modulation and/or Output Com-
pare channels; External interrupt(s); Watch Dog Timer; Internal Timers; External and
internal clock input; Hardware I2C, SPI and CAN bus capabilities. USART, USB com-
munication; Parallel I/O ports; JTAG/SWD; Memory Protection Unit (MPU), Multi-
Threading; Multi-Core, Digital to Analogue (DAC) Converter, Direct Memory Access
(DMA), MCU: ARM Cortex M3 / M4 based mcu (as on 2014) or any popular 32/64
bit MCU with System on Chip (SoC) and Real Time OS capability.

Introduction: What Is the ARM Cortex-M3/M4 Processor?; Background of ARM


and ARM Architecture; The Thumb-2 Technology and Instruction Set Architecture.;
Cortex-M3 Processor Applications;

Overview of the Cortex-M3/M4: Registers; Operation Modes; The Built-In Nested Vec-
tored Interrupt Controller; The Memory Map; The Bus Interface; The MPU;Interrupts
and Exceptions; Debugging Support and Tool chain setup.

Configuration: Registers; Special Registers; Clock Distribution; I/O Pins; Pin Remap-
ping; Peripheral Configuration; Vector Tables; Stack Memory Operations

Memory Systems: Memory System Features Overview; Memory Maps; Memory Access
Attributes; Bit-Band Operations

Cortex-M3/ M4 Implementation Overview: The Pipeline; Bus Interfaces on the Cortex-


M3/M4; Other Interfaces on the Cortex-M3/M4

Exceptions: Exception Types; Definitions of Priority; Vector Tables; Interrupt Inputs


and Pending Behavior; Fault Exceptions; Supervisor Call and Pendable Service Call

The Nested Vectored Interrupt Controller and Interrupt Control: Nested Vectored
Interrupt Controller Overview; The Basic Interrupt Configuration;Software Interrupts;
The SYSTICK Timer

The Memory Protection Unit: MPU Registers; Setting Up the MPU


Power Management: Sleep Modes; Multiprocessor Communication Asynchronous Se-
rial Communication: Polling Implementation; Initialization;
SPI: Protocol; SPI Peripheral; EEPROM Interface

I2C: I2C Protocol; I2C Interface;


CAN Bus: CAN Protocol; CAN Interface
50
Timers: PWM Output; Input Capture;
Direct Memory Access: DMA Architecture SPI DMA Support;
Digital Analog Converter, Analog Digital Converter

Real-Time Operating Systems(RTOS): System on a Chip (SoC);Threads; Synchroniza-


tion; Interrupt Handlers;Multitasking;

Sensors and modules: NAND Flash, external RAM; Ultrasonic Sensors; LCD Touch
Screen; VGA display etc.

51
CSE4043: PARALLEL AND DISTRIBUTED COMPUTING
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2031, CSE3031, CSE4027

TOPICS:
Issues in High Performance Computing: Moore’s Law, Processor Performance; Techno-
logical Limitations: Frequency, Power, Instruction Level Parallelism and Memory Wall;
Multi-Core Technology; Introduction to Cluster, Grid and Cloud Computing; Parallel
vs Distributed Computing;
Parallel Architectures: Implicit Parallelism; Introduction to Pipelining and Limi-
tation(s); Introduction to Superscalar and Limitation(s); Graphics Processing Unit
(GPU); Flynn’s Taxonomy: SISD, SIMD, MISD, MIMD; Interconnection Networks:
Static, Dynamic; Evaluating Interconnection Networks; Communication Costs in Par-
allel Machines; Memory System Performance; Cache Coherence in Multiprocessor Sys-
tems.
Parallel Algorithm Design: Parallel Computing Platforms: Control Structure, Commu-
nication Model, Shared-Address-Space Machine, Message-Passing Platform; Designing
Parallel Algorithms: Partitioning, Data Decomposition, Functional Decomposition,
Communication, Agglomeration, Mapping; Common Parallel Programming Models;
Parallel Algorithm Design Examples.
Performance Analysis: Performance Metrics: Execution Time, Total Parallel Overhead,
Speedup, Efficiency; Cost of a Parallel System; Effect of Granularity on Performance;
Scalability of Parallel Systems; Amdahl’s Law; Gustafson-Barsis Law; Scaling Charac-
teristics of Parallel Programs; Iso-efficiency Metric of Scalability.
Message Passing Interface: MPI Basics, MPI blocking send/receive function calls; In-
ter Process Communication; Asynchronous communication; Split-recombine task/data;
MPI Derived Data Types
Programming Shared Address Space Platforms: Programming Shared Address Space
Platforms(PtThread), Thread Basics, Pthreads API, Thread Management, Creating
Threads, Thread Attributes, Terminating Thread, Passing Arguments to Threads,
Joining & Detaching Threads, Synchronization Issues, Mutex: Creating & Destroying,
Locking & Unlocking, Overheads of Locking, Alleviating Locking Overhead, Monitor;
Read-Write Locks
Advanced Topic on Parallel and Distributed Computing: Map Reduce.

Distributed Computing: Client/Server Computing: Client, Server, Network;


Client/Server Terminology, Characteristics, Applications, Database Usage; Classes of
Client/Server Applications: Host-Based Processing, Server-Based Processing, Client-
Based Processing; Disadvantages of Two-Tier Architecture; Three-Tier Client/Server
Architecture; Middleware; Distributed Message Passing: Reliability versus Unreliabil-
ity, Blocking versus Nonblocking; Client/Server Binding; Service-Oriented Architec-
ture (SOA); Clusters; Load Balancing

52
CSE4045: SMART DEVICE APP DEVELOPMENT
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
(Android, iOS, firefox, tizen, ubuntu, Phonegap or any other future popular develop-
ment platform.)
Developing for Mobile Devices: Hardware-Imposed Design Considerations; Considering
the Users’ Environment; Development Tools
Creating Applications: Introducing the Application functionality; Application Life
Cycle; Understanding Application Priority and Process States
Fundamental U.I. Design: Introducing Views; Introducing L ayouts; Creating and using
Menus
Intents, Broadcast Receivers, Adapters, and the Internet
Data Storage, Retrieval, and Sharing
Maps, Geocoding, and Location-Based Services
Working in the Background: Services; Threads; Notifications
Peer-to-Peer Communication: Instant Messaging; SMS;
Accessing Hardware: Media APIs; Camera; using Sensors; Telephony; Bluetooth; Man-
aging Net work and Wi-Fi Connections; Controlling Device Vibration.
Graphics and animation: Drawing graphics; creating animations
Advanced Development: Security; Declaring and Enforcing Permissions; using Internet
Services; Localization

ECO2021: PRINCIPLE OF ECONOMICS


3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Definition of economics, economics and engineering, principles of economics. Intro-
duction to various economic systems – capitalist, command and mixed economy, fun-
damental economic problems and mechanisms through which these problems can be
solved, theory of demand and supply and their elasticities, theory of consumer behav-
ior, cardinal and ordinal approaches of utility analysis, price determination, nature
of an economic theory, applicability of economic theories to the problems of develop-
ing countries, indifference curve techniques, theory of production, production function,
types of productivity, rational region of production of an engineering firm, concepts
of market and market structure, cost analysis and cost function, small and large scale
production, optimization, theory of distribution, use of derivatives in economics, max-
imization and minimization of economic functions, relationship among total, marginal
and average concepts. Micro-Economics: Savings, investment, employment, national
income analysis, inflation, monetary policy, fiscal policy and trade policy with reference
to Bangladesh, economics and development and planning.

53
EEE1021: ELECTRICAL CIRCUIT DESIGN – I
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Units, DC sources, Resistance and Conductance, Ohm’s law, Power and Energy, Series
and parallel circuits, Series-Parallel Networks; Methods of analysis: Mesh analysis,
Node analysis and other methods of analysis; Kirchhoff’s laws, Y-delta transformation;
Circuit theorems: Superposition Theorem, Norton’s Theorem, Thevenin’s Theorem,
Millman’s Theorem, Capacitors, Magnetic circuits, Inductors, R-C and R-L circuits
with DC excitation.

EEE1022: ELECTRICAL CIRCUIT DESIGN – I LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): Nil

TOPICS:
Laboratory Works based on Theory Course EEE1021

EEE1031: ELECTRICAL CIRCUITS – II


3 CREDITS, 3 hours/week
PREREQUISITE(S): EEE1021

TOPICS:
Alternating current - AC quantities, Sinusoidal alternating waveforms, Phasors, AC
circuit analysis - RC, RL, RLC series and parallel circuits, Series-parallel ac networks,
Power and power factors, Network theorems, Dependent sources, Resonance and Q-
factors, Poly-phase systems – balanced and unbalanced, Coupled circuits, introduction
to filters.

EEE2011: ELECTRONIC DEVICES AND CIRCUITS – I


3 CREDITS, 3 hours/week
PREREQUISITE(S): EEE1021, EEE1022
TOPICS:
Introduction to semiconductors, The p-n junction diode: p-n junctions under forward
and reverse biases, The ideal diode and real diode, Load line analysis of diode circuits,
graphical analysis of diode circuits, equivalent circuits and frequency response, diode
applications characteristics of different types of diodes Bipolar Junction Transistors
(BJT): Bipolar junction transistor-Construction and Operation, Amplifying action,
Common-base (CB), Common-collector (CC) and Common-emitter (CE) configura-
tions, Different methods of transistor biasing, Darlington pair, Load Line (AC and
DC), BJTs at low frequencies.

54
EEE2012: ELECTRONIC DEVICES AND CIRCUITS LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): EEE1021, EEE1022
TOPICS:
Laboratory Work based on EEE2011
ETE3031: TELECOMMUNICATION ENGINEERING
3 CREDITS, 3 hours/week
PREREQUISITE(S): EEE2011, ETE2023

TOPICS:
Introduction: Principle, evolution, networks, exchange and international regulatory
bodies. Telephone apparatus: Microphone, speakers, ringer, pulse and tone dialing
mechanism, side-tone mechanism, local and central batteries and advanced features.
Switching system: Introduction to analog system, digital switching systems – space
division switching, blocking probability and multistage switching, time division switch-
ing and two dimensional switching. Traffic analysis: Traffic characterization, grades
of service, network blocking probabilities, delay system and queuing. Modern tele-
phone services and network: Internet telephony, facsimile, integrated services digital
network, asynchronous transfer mode and intelligent networks. Introduction to cellular
telephony and satellite communication.

ETE3032: TELECOMMUNICATION ENGINEERING LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): EEE2011, ETE2023

TOPICS: Laboratory Works based on ETE3031

ETE4013: DIGITAL SIGNAL PROCESSING


3 CREDITS, 3 hours/week
PREREQUISITE(S): ETE3031

TOPICS:
Introduction to digital signals and digital signal processing, A/D conversion, sampling
theorem, Illustration of aliasing, analysis of Discrete-Time Linear-Tme-Invariant (LTI)
systems, Resolution of Discrete-Time signals into impulse, Convolution and correlation,
Z-transform, Concept of Pole and Zero, Frequency domain representation of discrete-
time systems and signals, Discrete Fourier series and discrete Fourier transform (DFT),
computation of the DFT, Fast Fourier Transform (FFT), Discrete Cosine Transform
(DCT), Signal flow graph representation of digital networks. Filter structure for IIR
and FIR filters, Introduction to speech and Image processing.

55
ETE4014: DIGITAL SIGNAL PROCESSING LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): ETE3031

TOPICS: Laboratory Works based on ETE4013

EEE4025: VLSI DESIGN


3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2013, CSE2014

TOPICS:
VLSI technology: terminologies and trends,MOS transistor characteristics and equa-
tions, MOS fabrication process, nMOS & CMOS inverters: dc & transient character-
istics, pass transistor & pass gates, Derivation of drain-to source current (Ids), Ids VS
Vds, Pull-up to pull down ratio, CMOS & nMOS design Style, Stick Diagrams, CMOS
layout and design rules: -based design rule. Complex CMOS gates: NAND, NOR,
Exclusive OR, Resistance & Capacitance estimation and Modeling, raise time and fall
time calculation of gate capacitance, Scaling & scaling factor of different parameters.
Signal propagation delay, noise margin and power consumption, Interconnect, BiCMOS
circuits. CMOS building blocks: adders, counters, multipliers and barrel shifters, Par-
ity generator, Data paths, memory structures: Dynamic RAM cells, PLAs and FPGAs,
VLSI testing: objectives & strategies.

EEE4026: VLSI DESIGN LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE4026

TOPICS:
Lab works based on theory course CSE4025.

56
ENG1001: BASIC COMPOSITION
0 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Basic Composition is a non-credit foundation course. It is designed to brush up stu-
dents’ existing English skills. This course will help them to review the grammatical
items they already know and will prepare them to study at the tertiary level by en-
hancing their English language skills. The main focus of this course is on reading and
writing. Students will also learn to communicate in English by interacting with the
instructor. Students will also explore the creative side of language by solving different
sorts of tasks and preparing assignments on picture description and story completion.
They will also be conditioned to write formal applications and Emails. At the end of
the course they are expected to carry out their academic activities in English effectively.

ENG1002: INTERMEDIATE COMPOSITION


3 CREDITS, 3 hours/week
PREREQUISITE(S): ENG1001

TOPICS:
The goal of this course is to provide students with tertiary level reading and writing
skills. The course focuses on composition, nevertheless includes grammar so as to
provide the students with necessary background knowledge of grammatical structures,
and common mistakes. This knowledge will help them framing paragraphs effectively
maintaining cohesion and coherence. The types of paragraphs selected for this course
will not only excel their writing skill, but will also introduce them with the process and
techniques of writing they will be using in their other academic courses as well as in
real life. The reading section attempts to augment their reading skill adopting various
strategies that can be effective in different writing dimensions. In addition to that, the
journal writing section has been designed to explore and motivate the students into
more free and creative writing. This multifaceted course will help the students learn to
engage critically and clearly with texts and topics by developing their own academic
writing skills.

57
ENG1021: ENGLISH FOR ENGINEERS
3 CREDITS, 3 hours/week
PREREQUISITE(S): ENG1002

TOPICS:
Discussion on common terms related to Electronics, Electricity, Communication Engi-
neering and Computer system, Report writing, Formal presentation, Business Commu-
nication, Dialogue writing, Technology based essay writing. Efficient listening and note
taking: Listening to recorded texts and class lectures and learning to take useful notes
based on listening. Approaches to Communication: Communication today, business
communication, different types of business communication. Effective oral presenta-
tion: Academic Presentations, preparation and styles of presentation. Report Writing:
Defining a report, classification of reports, structure of a report, and writing of reports.

ETE2023: COMMUNICATION THEORY


3 CREDITS, 3 hours/week
PREREQUISITE(S): MATH2014, EEE2011

TOPICS:
Overview of communication systems: Basic principles, fundamental elements, system
limitations. Noise: Source, characteristics of various types of noise, Information the-
ory: Measure of information, source encoding, channel capacity, Communication sys-
tems: Analog and digital. amplitude modulation- introduction, double side band, single
side band, vestigial side band, quadrature; envelope and synchronous detection; angle
modulation- frequency modulation (FM) and phase modulation (PM), demodulation of
FM and PM. Pulse modulation: Sampling- sampling theorem, Nyquist criterion, pulse
code modulation (PCM), differential PCM, demodulation of PCM; delta modulation
(DM)- principle, adaptive DM;Digital modulation: Amplitude-shift keying- principle,
ON-OFF keying, bandwidth requirements, detection, noise performance; phase-shift
keying (PSK)- principle, bandwidth requirements, detection, differential PSK, Quadra-
ture PSK, noise performance; frequency-shift keying (FSK)- principle, continuous and
discontinuous phase FSK, minimum-shift keying, bandwidth requirements, detection of
FSK. Multiplexing: Time-division multiplexing (TDM), frequency-division multiplex-
ing (FDM), multiple-access network- time-division multiple-access (TDMA), frequency-
division multiple access (FDMA); code-division multiple-access (CDMA). Communi-
cation system design: design parameters, channel selection criteria and performance
simulation.

58
ETE2024: COMMUNICATION THEORY LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): MATH2014, EEE2011

TOPICS:
Laboratory Works based on ETE2023

MATH1024: COORDINATE GEOMETRY AND VECTOR ANALYSIS


3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Transformation of coordinates, Straight lines, Parallel lines, Perpendicular lines, Num-
ber line, Interval Notation, Rational Equation, Absolute Value Theorem, Inequality,
Discriminate, Asymptotes, Symmetricity, Matrix Application, Division Algorithm and
Synthetic Division.

MATH 1034: DIFFERENTIAL AND INTEGRAL CALCULUS


3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Differential Calculus: Limits, continuity and differentiability, successive differentiation
of various types of functions, Leibnitz’s theorem, Mean-value theorem in finite and
infinite forms, Lagrange’s form of remainders, Cauchy’s form of remainder, expansion
of functions, evaluation of indeterminate forms by L’Hospital’s rule, partial differentia-
tion, Tangent and Normal, Subtangent and Subnormal in Cartesian and Polar coordi-
nates, maximum and minimum values of functions of single variable, points of inflexion,
curvature – radius of curvature, centre of curvature, asymptotes, curve tracing.

Integral Calculus: Definitions of Integration, integrations by methods of substitutions,


integration by parts, standard integrals, integration by the method of successive reduc-
tion, definite integrals and its properties and use in summing series, Walli’s formula,
Improper integrals, Beta function & Gamma function, area under a plane curve in
Cartesian and polar coordinates, area of the region enclosed by two curves in Cartesian
and Polar coordinates: Arc lengths of curves in Cartesian and Polar coordinates, para-
metric and pedal equations, intrinsic equations, volume of solids of revolutions, volume
of hollow solids of revolution by shell method, area of surface of revolution, Jacobian,
multiple integrals and its applications.

59
MATH2014: COMPLEX VARIABLES AND TRANSFORMS (LAPLACE
AND FOURIER)
3 CREDITS, 3 hours/week
PREREQUISITE(S): MATH1024, MATH1034

TOPICS:
Complex Variables: complex number system, general function of a complex variable,
limits and continuity of a function of a complex variable and related theorems, complex
differentiation, the Cauchy-Riemann equation, mapping by elementary functions, line
integral of a complex function, Cauchy’s Integral Theorem and formula, Liouville’s the-
orem, Taylor’s theorem, Laurent’s theorem, Singular points, Residue, Cauchy’s Residue
Theorem, evaluation of Residues, Contour integration, conformal mapping.

Laplace Transforms: Laplace transforms of some elementary functions, sufficient con-


ditions for existence of Laplace Transforms, inverse Laplace transforms, Laplace trans-
forms of derivatives, the unit step function, periodic function, some special theorems
on Laplace transforms, partial fractions, solutions of differential equations.

Fourier Transforms: Real and complex form of Fourier series, finite transforms, Fourier
Integral, Fourier transforms and their uses in solving boundary value problems of wave
equations.

MATH2015: LINEAR ALGEBRA AND MATRICES


3 CREDITS, 3 hours/week
PREREQUISITE(S): MATH2014

TOPICS:
Definition of matrix, different types of matrices, algebra of matrices, adjoint and in-
verse of a matrix, elementary transformations of a matrix, matrix polynomials,
canonical forms, Rank of matrices. System of linear equations (homogeneous and non-
homogeneous) and their solutions. Applications of system linear equations in real life
problems. Definition and properties of vector space, subspaces, Linear combination of
vectors, Linear dependence and independence of vectors, basis and dimension, linear
transformations ,kernel and image of a linear transformation(LT), definition and prop-
erties, linear operator matrix, matrix representation of linear transformations, change
of basis, Eigenvalues and eigenvectors, Diagonalization, Cayley-Hamilton theorem and
its application.

60
MGT2011: INTRODUCTION TO BUSINESS AND MANAGEMENT
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Concepts of Business, its components, classifications, importance, national and inter-
national business, group dynamics and leadership in business and non-businesses orga-
nizations. Introduction to the components of management in information system and
their integration for managerial control and decision support. Principle and process of
management, types of management, Management in Engineering.

PHY1021: PHYSICS – I
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Mechanics: Kinematics, Graphical representations of displacement-time, velocity-time
and acceleration-time. Terminal velocity. Motion in two and three dimensions – pro-
jectile motion. Applications of Newton’s laws of motion, Analyses of frames of trusses,
Friction, Equilibrium of forces, Work-kinetic energy theorem., Power, Conservative
forces. Conservation of energy. Conservation of linear momentum for a system of
particles. Center-of-mass motion. Elastic and inelastic collision in one dimen-
sion. Rotational kinematics. Angular momentum of a single particle. Conservation
of angular momentum Moment of Inertia, Balancing of rotating masses. Gravitation:
Gravitational field. Kepler’s laws.

Waves and oscillations: Differential equation of simple harmonic oscillator, total energy
and average energy, combination of simple harmonic oscillations, spring mass system,
torsional pendulum; two body oscillation, reduced mass, damped oscillation, forced
oscillation, resonance, progressive wave, power and intensity of wave, stationary wave,
group and phase velocities.

Heat and Thermodynamics: Heat and work- the first law of thermodynamics and its
applications; Kinetic Theory of gases- Kinetic interpretation of temperature, specific
heats of ideal gases, equipartition of energy, mean free path, Maxwell’s distribution of
molecular speeds, reversible and irreversible processes, Carnot’s cycle, second law ther-
modynamics, Carnot’s theorem, entropy, Thermodynamic functions, Maxwell relations,
Clausius and Clapeyron equation.

61
PHY1031: PHYSICS – II
3 CREDITS, 3 hours/week
PREREQUISITE(S): PHY1021

TOPICS:
Electricity and Magnetism: Electric charge and Coulomb’s law, Electric field, concept
of electric flux and the Gauss’s law- some applications of Gauss’s law, Gauss’s law in
vector form, Electric potential, relation between electric field and electric potential,
capacitance and dielectrics, gradient, Laplace’s and Poisson’s equations, Current, Cur-
rent density, resistivity, the magnetic field, Ampere’s law, Biot-Savart law and their
applications.

Optics: Defects of images: spherical aberration, astigmatism, coma, distortion, cur-


vature, chromatic aberration. Theories of light; Interference of light: Young’s double
slit experiment, displacement of fringes and its uses, Fresnel bi-prism, interference
in thin films, Newton’s rings,Bragg’s law and diffraction, interferometers; Diffraction:
Diffraction by single slit, diffraction from a circular aperture, resolving power of opti-
cal instruments, diffraction at double slit and N-slits, diffraction grating; polarization:
Production and analysis of polarized light, Brewster’s law, Malus law, polarization by
double refraction, Nicol prism, optical activity, Polarimeters.

PHY1034: PHYSICS LAB


1 CREDIT, 1.5 hours/week
PREREQUISITE(S): PHY 1021

TOPICS:
Laboratory Works based on PHY 1021 and PHY 1031.

SOC2031: ENGINEERING ETHICS


3 CREDITS, 3 hours/week
PREREQUISITE(S): Completion of 80 Credits

TOPICS:
Ethics and Professionalism: Micro & Macro Issues, Dimension of Engineering; Moral
Reasoning and Code of Ethics; Right, Duty, Virtue, Self Realization Ethics, Utilitari-
ans; Engineering as Social Experimentation, Workplace Responsibilities: Confidential-
ity, Conflict of Interest, Professional Right; Whistle Blowing; Academic and Research
Integrity; Computer Ethics: Ethics for IT Professional and IT Users, Internet Crime;
Environmental Ethics; Global Justice and International Rights; Case Studies in Pro-
fessional behavior.

62
STAT2012: STATISTICAL METHODS AND PROBABILITY
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil

TOPICS:
Data and variables, central tendency, dispersion, skewness, kurtosis, probability, ran-
dom variables, probability distributions, mathematical expectation and moment gener-
ating functions, joint & marginal distributions, stochastic independence, central limit
theorem, concepts of Sampling & its various methods, design of an experiment & anal-
ysis of variance, concepts of estimation, methods of estimation, hypothesis testing &
inference. Concepts of Sample Survey & its various methods- S.R.S; St.R.S. System-
atic Sampling & Multi stage Sampling. Analysis of variance- One way, Two way
& Three way Classification. Design of an experiment-CRD, RBD,LSD & Fractorial
Experiment. Concepts of estimation- Criteria of a good estimator, Point estimation-
Method of Moment, Least square, MLE, Min. Chai-square & Bayes Estimator. Inter-
val Estimation-Confidence Interval, Feducial interval. Large & small Sample Test of
significance & Hypothesis Testing. Non-Parametric Test.

63
5

Academic Strengths of CSE


Department

5.1 Faculty Profiles

1. Name: AL-SAKIB KHAN PATHAN

2. Designation: Associate Professor

3. Degrees obtained:
University Degree Field of Special-
ization
Kyung Hee University, South PhD in Com- Computer Engi-
Korea puter Engi- neering (Major:
neering (MS Computer Net-
leading to works)
PhD)
Islamic University of Technol- B.Sc. (hons) Computer Science
ogy, Bangladesh and Information
Technology

4. Employment record (starting from present position):

64
University/College Designation Period
Southeast University, Associate Pro- 06/2016-Present
Bangladesh fessor
Southeast University, Adjunct/Part- 09/2015-05/2016
Bangladesh time Faculty
University of Asia Pacific, Visiting Faculty 09/2015-03/2016
Bangladesh
International Islamic Assistant Pro- 08/2010-07/2015
University Malaysia, fessor
Malaysia
BRAC University, Assistant Pro- 09/2009-06/2010
Bangladesh fessor
Kyung Hee University, Researcher/ 09/2005-08/2009
South Korea Research Assis-
tant, Net Lab.
North South University, Instructor, CSE 05/2004-08/2005
Bangladesh Laboratories
ICE Technologies Lim- Programmer 02/2004-04/2004
ited, Bangladesh (Web Applica-
tions)
Microland (IICE), Lecturer 01/2004-03/2004
Bangladesh

5. Other related experience-research, industrial etc.


Organization/Employer Designation Period
External Consultant [Part-time], GramBD 03/2009-08/2010
IT & Design Solution, Bangladesh

6. Consultancy and sponsored Research activities:


Year Organization Project Amount re-
ceived
2017 Consultant and Ex- 33,000 BDT
ternal Member for
IQAC evaluation of
CSE Department of
Northern University

7. Publications:

65
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
TOTAL: 78 TOTAL: 58
Editorial Articles in Refereed Papers in LNCS and
Journals: 23 LNICST Conferences: 9
Papers in Refereed Journals: Papers in International
55 Conferences: 49
[Full list is provided at
[Full list is provided at the end of this docu-
the end of this document] ment]

8. Membership of Scientific and Professional Societies:

(a) Senior Member, Institute of Electrical and Electronics Engineers


(IEEE), USA, (Membership No: 80510399, Member since 2006),
2014∼
(b) Member, IEEE Computer Society Technical Committee on Com-
puter Communications (IEEE TCCC), 2009∼
(c) Member, IEEE Computer Society Technical Committee on Par-
allel Processing (IEEE TCPP), 2009∼
(d) Member, IEEE Computer Society Technical Committee on Secu-
rity and Privacy (IEEE TCSP), 2009∼
(e) Member, IEEE Computer Society Technical Committee on Scal-
able Computing (IEEE TCSC), 2009∼
(f) Member, IEEE Sensors Council, 2014∼
(g) Member, IEEE Technology and Engineering Management Tech-
nical Community, 2014∼
(h) Member, International Association of Engineers (IAENG), Hong
Kong, (Member No: 102276), 2009∼
(i) Member, IEEE Technical Subcommittee on Green Communica-
tions and Computing (IEEE TSCGCC), July 2012∼

9. Honours and Awards:

• Invited Speaker, Talk title: “How to Build Customer Trust in


Cloud Computing Model?”, at National Conference on Electron-
ics and ICT, Atomic Energy Center, Dhaka, Bangladesh, 20
April, 2017
• Certificate of Recognition in recognition and appreciation of out-
standing service in the technical committee of IAJIT as one of
the most active reviewers during the year 2016, The Interna-
tional Arab Journal of Information Technology (SCIE-Indexed),

66
General Secretariat, Colleges of Computing and Information So-
ciety, Association of Arab Universities, Zarqa, Jordan, 14 April,
2017.
• Guest Speaker as an IEEE Senior Member on IEEE Day 2016
event organized by IEEE Student Branch, University of Dhaka,
01 October, 2016.
• Interview with the European Alliance for Innovation (EAI). Arti-
cle published with title, “Finding the common ground for Smart
Grids and IoT”, August 25, 2016 (http://blog.eai.eu/finding-the-
common-ground-for-smart-grids-and-iot/)
• Awarded Elsevier Recognized Reviewer in recognition of the re-
views made for the Computers and Electrical Engineering, Else-
vier, Amsterdam, The Netherlands, May 2016.
• Invited Expert talk, Full financially sponsored travel (Airfare,
Accommodation, Food, Local travels): “Mitigating Cross-Site
Scripting Attacks with a Content Security Policy”, International
Conference on Communication and Computing System (ICCCS’16),
Gurgaon, India, September 9-11, 2016.
• Keynote Speaker, Tech-Talk event organized by IEEE Student
Branch, University of Dhaka, Bangladesh, April 17, 2016.
• Certificate of Recognition in recognition and appreciation of out-
standing service in the technical committee of IAJIT as one of the
most active reviewers during the year 2015, The International
Arab Journal of Information Technology (SCIE-Indexed), Gen-
eral Secretariat, Colleges of Computing and Information Society,
Association of Arab Universities, Zarqa, Jordan, 27 February,
2016.
• Awarded Elsevier Outstanding Reviewer in recognition of the con-
tributions made to the quality of the journal, Journal of Network
and Computer Applications, Elsevier, Amsterdam, The Nether-
lands, November 2015.
• Invited as a Keynote Speaker with full financial support at the
International Arab Conference on Information Technology (ACIT
2015), December 15-17, 2015, Amman, Jordan. (Invitation was
accepted on 19 August 2015 when I was in Kuala Lumpur, Malaysia.
Could not attend during the conference time due to relocating to
Dhaka, Bangladesh.)
• Awarded Elsevier Outstanding Reviewer in recognition of the con-
tributions made to the quality of the journal,Computer Networks,
Elsevier, Amsterdam, The Netherlands, July 2015.
• Distinguished Guest and Keynote Speaker, Full financially spon-
sored travel (Airfare, Accommodation, Food, Local travels) to

67
Dehradun, India for the 2nd IEEE International Conference on
Advances in Computing & Communication Engineering (ICACCE-
2015), May 1-2, 2015 by Tula’s Institute, Dehradun, Uttarak-
hand, India.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Computer Networks, Elsevier, Amster-
dam, The Netherlands, March 2015.
• Certificate of Recognition in recognition and appreciation of out-
standing service in the technical committee of IAJIT as one of
the most active reviewers during the year 2014, The Interna-
tional Arab Journal of Information Technology (SCIE-Indexed),
General Secretariat, Colleges of Computing and Information So-
ciety, Association of Arab Universities, Zarqa, Jordan, 08 March,
2015.
• Two books entitled "Advancements in Distributed Computing
and Internet Technologies: Trends and Issues" and "Network and
Traffic Engineering in Emerging Distributed Computing Applica-
tions" published by IGI Global, USA have been indexed with all
the titles (chapters) in Elsevier’s acclaimed abstract and citation
database, Scopus, February 2015.
• Book entitled, “Wireless Networks and Security: Issues, Chal-
lenges and Research Trends”, ISBN 978-3-642-36169-2 (ebook),
ISBN: 978-3-642-36168-5 (print book), Series: Signals and Com-
munication Technology, Springer, 2013 is one of the top 25% most
downloaded eBooks in the relevant Springer eBook Collection in
2013 - a total of 5830 chapter downloads in 2013 – published in
June 2014 report.Since its online publication there has been a to-
tal of 12,655 chapter downloadsas reported inBook Performance
Report 2014 (June 2015).
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Journal of Network and Computer Ap-
plications, Elsevier, Amsterdam, The Netherlands, January 2015.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Future Generation Computer Systems,
Elsevier, Amsterdam, The Netherlands, October 2014.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Ad Hoc Networks Journal, Elsevier,
Amsterdam, The Netherlands, June 2014.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Ad Hoc Networks Journal, Elsevier,
Amsterdam, The Netherlands, April 2014.

68
• Awarded Elsevier Recognized Reviewer status in recognition of
the review made for the Computers & Electrical Engineering
Journal, Elsevier, Amsterdam, The Netherlands, March 2014.
• Chief Guest and Keynote Speaker for the event titled “Interaction
on Wireless Sensor Networks, Image Processing & Research Pub-
lication” held at Sethu Institute of Technology, Madurai, India
on April 11, 2014.
• Chief Guest and Keynote Speaker, Full financially sponsored travel
(Airfare, Accommodation, Food, Local travels) to Madurai, In-
dia for International Conference on Innovations in Electronics,
Communication & Computing (ICIECC 2014), 10-11 April, 2014
sponsored by Velammal College of Engineering and Technology,
Madurai, Tamil Nadu, India.
• Elevated to IEEE Senior Member grade, Institute of Electrical
and Electronics Engineers (IEEE), USA, 28 February 2014.
• Intel Corporation’s Recommended Reading List for Developers,
1st half of 2014,includes the Book (twice consecutively in the
worldwide rank) entitled, “Wireless Sensor Networks: Current
Status and Future Trends”, ISBN: 9781466506060, Auerbach Pub-
lications, CRC Press, Taylor & Francis Group, USA, under the
category of “Books For Embedded Developers”, Intel, USA.
• Full Financially-Sponsored Invited Keynote Speaker (Airfare, Lo-
cal Travels, Accommodation, and Food) for Expert Talk on “Wire-
less Sensor Network Security: Current Status and Future Trends”
on 4 October, 2013 at the International Conference on “Elec-
tronics, Communication and Information Technology” (ICECIT
2013), Oct. 4-5, 2013, Patiala, Punjab, India hosted by Thapar
University.
• IEEE Computer Society Certificate of Appreciation in recognition
for the service and contribution as Publicity Chair for the IEEE
International Conference on Green Computing and Communica-
tion (GreenCom 2013), Beijing, China, August 20-23, 2013, IEEE
Computer Society, USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List recognizes and includes the book entitled, “Automatic
Defense against Zero-day Polymorphic Worms in Communication
Networks”, ISBN: 9781466557277, CRC Press, Taylor & Francis
Group, USA, 2013. - September 2013, IEEE ComSoc, USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List recognizes and includes the book entitled, “Wireless

69
Networks and Security: Issues, Challenges and Research Trends”,
ISBN: 978-3-642-36168-5, Series: Signals and Communication
Technology, Springer, 2013. - September 2013, IEEE ComSoc,
USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List recognizes and includes the book entitled, “Security
of Self-Organizing Networks: MANET, WSN, WMN, VANET”,
ISBN: 978-1-4398-1919-7, Auerbach Publications, CRC Press, Tay-
lor & Francis Group, USA, 2010. - September 2013, IEEE Com-
Soc, USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List includes 2 journal papers and 1 conference paper: On
the Vital Areas of Intrusion Detection Systems in Wireless Sen-
sor Networks, IEEE COMST, under "Intrusion Detection Sys-
tems" category; Towards Privacy Protection in Smart Grid, WPC
Journal, Springer, under "Privacy" category; Security in Wireless
Sensor Networks: Issues and Challenges, ICACT’06 Conference,
Korea, under "Wireless Sensor Networks" category – September
2013, IEEE ComSoc, USA.
• IEEE Outstanding Leadership Award in recognition for the ser-
vice and contribution as the Publicity Chair of the 2013 IEEE
International Conference on Green Computing and Communi-
cations (GreenCom 2013), Beijing, China, August 20-23, 2013
sponsored by IEEE, IEEE TCSC, IEEE Computer Society.
• Invited Guest Speaker for “Author Experience Sharing” session in
2013 Springer SEA eBooks Seminar, Library Auditorium, Ground
Floor, IIUM Library, Kuala Lumpur, Malaysia, 20 September
2013 – organized by Springer South East Asia.
• Recognition of the Book, “Building Next-Generation Converged
Networks: Theory and Practice”, ISBN: 9781466507616, CRC
Press, USA, which got international attention to get published
with a translated version in Simplified Chinese language after a
deal between CRC Press, USA and China Machine Press, July
2013.
• Intel Corporation’s Recommended Reading List for Developers,
2nd half of 2013,recognizes the Book entitled, “Wireless Sensor
Networks: Current Status and Future Trends”, ISBN: 9781466506060,
Auerbach Publications, CRC Press, Taylor & Francis Group,
USA, with its inclusion under the category of “Books For Em-
bedded Developers”, Intel, USA.

70
• Certificate of Recognition in recognition and appreciation of out-
standing service in the technical committee of IAJIT as one of
the most active reviewers during the year 2012, The Interna-
tional Arab Journal of Information Technology (SCIE-Indexed),
General Secretariat, Colleges of Computing and Information So-
ciety, Association of Arab Universities, Zarqa, Jordan, 30 March,
2013.
• Bronze Medal at IIUM Research, Invention and Innovation Ex-
hibition 2012 (IRIIE 2012), 21-22 February 2012 for the work
entitled, "Protection of Digital Qur’anic Document Using Digital
Signature" as a co-author.
• Letter of Appreciation for the years of Editorial Service, from
ACTA Press, Calgary, Canada, 30 March, 2012.
• Certificate of Recognition for achievement in attaining one of the
“Top 5 Depositors of research publications” in IIUM Repository
- IREP, 2011
• Certificate of Completion of Basic Teaching Methodology Course
(BTMC) & Teaching Practicum for IIUM Academic Staff, 16
March 2011, by Center for Professional Development (CPD),
IIUM, Malaysia
• Certificate of Appreciation for being the Team Coach in ACM-
ICPC Malaysia al-Khawarizmi Programming Contest 2010, from
Universiti Kebangsaan Malaysia, Kuala Lumpur, Malaysia
• Biography included in the ‘2000 Outstanding Intellectuals of the
21st Century 2009/2010’ and also in the ‘Top 100 Educators 2009’
by International Biographical Center, Cambridge, England
• Yeong-Dong Scholarship Award 2009, South Korea
• IEEE Seoul Section Bronze Paper Award in the IEEE Interna-
tional Student Paper Contest 2008 (IEEE Seoul Section, Tokyo
Section, Beijing Section, Japan Council), South Korea
• Biography listed in Marquis Who’s Who in the World, 26th Edi-
tion, 2009, USA
• Research scholarships/grants 2008 for outstanding record of pub-
lications in international and domestic journals and conferences,
Department of Computer Engineering, Kyung Hee University,
South Korea
• Yeong-Dong Scholarship 2008, South Korea
• Global Family Movement Scholarship for Foreign Students 2007
in South Korea

71
• Co-recipient of IEEE Student Travel Grant Award for one of the
two papers in IEEE Military Communications Conference 2007
(MILCOM 07), Orlando, Florida, USA
• Scholar Student of the Year 2007 Award (Yeong-Dong Scholarship
Award 2007) in South Korea
• IEEE ComSoc Seoul Chapter Best Paper Award in 17th Joint
Conference on Communication & Information 2007, South Korea
• Travel Grant Award from Global Family Movement Center in
2007 (One student among all Bangladeshi students in South Ko-
rea)
• Academic Research Scholarship (First Semester 2007), Kyung
Hee University, South Korea
• Yeong-Dong Scholarship for Foreign Students 2006 (One student
from each foreign country students) in South Korea
• IEEE Student Travel Grant Award for outstanding paper in IEEE
Military Communications Conference (MILCOM 2006), Wash-
ington, DC, USA
• Scholar Student of the Year 2006 Award (Gwangjin-Gu Award
2006) for Research and Academic achievements in South Korea
• Academic Research Scholarship (Second Semester 2006), Kyung
Hee University, South Korea
• Research Presentation Scholarship (First semester 2006), Kyung
Hee University, South Korea
• President Scholarship (2nd semester 2005, 1st and 2nd semester
2006, 1st and 2nd semester 2007, 1st and 2nd semester 2008),
Kyung Hee University, South Korea [Amount: 32,668,000 KRW
equivalent to approx. US $32,668]
• IEEE Certificate of Prowess from IEEE Student Branch, NED
University of Engineering and Technology, Karachi, Pakistan for
a paper in IEEE E-Tech 2004 conference
• Scholarship for 4-year B.Sc. in CIT in Islamic University of Tech-
nology for 3 years, Bangladesh
• Board Scholarship in Higher Secondary Certificate Examination,
Bangladesh
• Board Scholarship in Secondary School Certification Examination
in Talent pool, Bangladesh
• Junior Scholarship in Class VIII, Bangladesh
• Primary Scholarship in Class V, Bangladesh

72
10. No. of Ph. D. / M.Sc./ M. Engg. Guided: 2 PhD students and 1 MS
student to completion

(a) PhD
i. Tarem Ozair Ahmed, Thesis Title: “Efficient and Effec-
tive Automatic Surveillance Approaches” [Completed Ph.D.
in September 2013 – Successfully defended Ph.D. thesis on
30 July 2013]
ii. Wafaa Mustafa Abduallah, Topic: “Efficient Image Steganog-
raphy Approaches Based on Mix Column Transform Tech-
nique” (Completed Ph.D. in April 2015 – Successfully De-
fended Ph.D. thesis on 31 March 2015)
(b) Master
i. Abdelgadir Tageldin, Thesis Title: "Performance Analysis
of Optimized Heartbeat-based Reliable NEMO Home Agent",
Master degree thesis, IIUM, Semester 1, 2011/2012. [Com-
pleted]

11. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.
International Conference Chairing

• General Co-Chair, International Conference on Intelligent Com-


munication and Computational Techniques (ICCT 2017), Decem-
ber 22-23, 2017, Jaipur, India
• Publicity Chair, The 15th IEEE International Conference on Per-
vasive Intelligence and Computing (PICom 2017), November 6-
10, 2017, Orlando, USA
• Publicity Co-Chair, The 8th International Conference on Emerg-
ing Ubiquitous Systems and Pervasive Networks (EUSPN’17),
September 18-20, 2017, Lund, Sweden
• Publicity Co-Chair, 3rd EAI International Conference on Indus-
trial Networks and Intelligent Systems (INISCOM 2017), Septem-
ber 4–6, 2017, Thu Dau Mot, Vietnam
• Publicity Co-Chair, 2017 IEEE Smart World Congress (Smart-
World 2017), August 4-8, 2017, San Francisco, Bay Area, USA
• Symposium Program Co-Chair, The 4th International Sympo-
sium on Emerging Inter-networks, Communication and Mobility
(EICM 2017) with The 14th International Conference on Mobile
Systems and Pervasive Computing (MobiSPC 2017), July 24-26,
2017, Leuven, Belgium

73
• Publicity & Communications Co-Chair, The 2017 High Perfor-
mance Computing & Simulation Conference (HPCS 2017), July
17-21, 2017, Genoa, Italy
• General Chair, The 1st EAI International Conference on Smart
Grid Assisted Internet of Things (SGIoT 2017), July 11-13, 2017,
Sault Ste. Marie, Ontario, Canada
• General Co-Chair, The 3rd International workshop on Cloud Com-
puting Applications and SEcurity (CASE-2017) in conjunction
with the 8th International Conference on Information and Com-
munication Systems (ICICS2017). May 8-11, 2017, Irbid, Jordan
• Publicity Chair, The International Conference on Recent Ad-
vances on Signal Processing, Telecommunications & Computing
(IEEE SigTelCom 2017), January 9-11, 2017, Da Nang, Vietnam
• Publicity Chair, 16th IEEE International Conference on Com-
puter and Information Technology (CIT’16), Shangri-La’s Fijian
Resort and Spa, December 8-10, 2016, Fiji
• Publicity Co-Chair, The Fifth IEEE International Workshop on
Cloud Computing Systems, Networks, and Applications (CC-
SNA’16) organized in conjunction with IEEE Global Commu-
nications Conference (GLOBECOM 2016), December 4-8, 2016,
Washington, DC, USA
• Publicity Co-Chair, 13th ACS/IEEE International Conference on
Computer Systems and Applications AICCSA 2016, November
29-December 2, 2016 - Royal Atlas and Spa, Agadir, Morocco
• Publicity Chair, 5th International Workshop on Mobile Systems,
Wearables, and Sensors Networks for Collaboration (MSSNC 2016)
as part of the 2016 International Conference on Collaboration
Technologies and Systems (CTS 2016), October 31 - November
04, 2016, Orlando, Florida, USA
• Publicity Co-Chair, 10th International Conference on Network
and System Security (NSS 2016), September 28-30, 2016, Taipei,
Taiwan
• Program Chair, International Workshop on 5G in eHealthcare
Services (5GeS 2016) In conjunction with the 18th International
Conference on E-health Networking, Application & Services (Health-
com’16), September 14-17, 2016, Munich, Germany
• Publicity Chair, The 8th IEEE International Symposium on UbiSafe
Computing (IEEE UbiSafe 2016) in conjunction with The 15th
IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2016), Au-
gust 23-26, 2016, Tianjin, China

74
• Special Session Co-Chair, Next Generation Network amd Cryp-
tography (NetCrypt 2016) session, International Conference on
Green Computing and Engineering Technologies (ICGCET), Au-
gust 18-20, 2016, Aalborg University, Esbjerg, Denmark
• Publicity Co-Chair, The 14th IEEE International Conference on
Pervasive Intelligence and Computing (PICom-2016), August 8-
12, 2016, Auckland, New Zealand
• Publicity Co-Chair, The Fourth IEEE/CIC ICCC International
Workshop on Wireless Communications for Internet of Things
Networking(WIN 2016), July 27-29, 2016, Chengdu, China
• Workshop Chair, The 7th International Workshop on Peer-to-
Peer Architectures, Networks and Systems (PANS 2016), in con-
junction with the International Conference on High Performance
Computing & Simulation (HPCS 2016), July 18-July 22, 2016,
Innsbruck, Austria
• Track Co-Chair, “Wireless, Ad hoc and Sensors Networks” track,
Third International Symposium on Networks, Computers and
Communications (ISNCC 2016), May 11-13, 2016, Hammamet,
Tunisia
• Track Chair, Track 10: Networking, Communications, Sensor
Networks and Mobile Computing, The International Conference
on Information and Communication Systems (ICICS 2016), April
5-7, 2016, Irbid, Jordan
• Publicity Chair, 3rd IEEE International Symposium on Software
Defined Systems (SDS-2016) in conjunction with 2016 IEEE In-
ternational Conference on Cloud Engineering (IC2E 2016), April
4-8, 2016, Berlin, Germany
• Publicity Co-Chair, CCSNA 2015: The Fourth IEEE Interna-
tional Workshop on Cloud Computing Systems, Networks, and
Applications 2015 in conjunction with IEEE GLOBECOM 2015,
December 6-10, 2015, San Diego, CA, USA
• Publicity Co-Chair, IEEE International Workshop on Advances
in Software Defined Radio Access Networks and Context-aware
Cognitive Networks 2015 (IEEE SDRANCAN-2015) in conjunc-
tion with IEEE GLOBECOM 2015, December 6-10, 2015, San
Diego, CA, USA
• Program Co-Chair, The First International Symposium on De-
pendability in Sensor, Cloud, and Big Data Systems and Appli-
cations (DependSys 2015), November 18-20, 2015, Zhangjiajie,
China

75
• Publicity Co-Chair, The Third IEEE/CIC ICCC International
Workshop on Internet of Things (IoT 2015), November 2-4, 2015,
Shenzhen, China
• Publicity Chair, 18th IEEE International Conference on Com-
putational Science and Engineering (CSE 2015), October 21-23,
2015, Porto, Portugal
• Publicity Chair, 3rd International Conference on Islamic Appli-
cations in Computer Science and Technologies (IMAN 2015), Oc-
tober 1-3, 2015, Konya, Turkey
• General Chair, International Conference on Advanced Wireless,
Information, and Communication Technologies (AWICT 2015),
September 20-23, 2015, Tunisia
• Program Chair, 2nd Workshop on Network Surveillance and In-
truder Detection Technologies (NetSID 2015) in conjunction with
EUSPN 2015, September 27-30, 2015, Berlin, Germany
• Publicity Co-Chair, The 7th IEEE International Symposium on
UbiSafe Computing (UbiSafe 2015) Helsinki, Finland, August 20-
22, 2015 in conjunction with IEEE TrustCom-15 - The 14th IEEE
International Conference on Trust, Security and Privacy in Com-
puting and Communications (IEEE TrustCom-15), Helsinki, Fin-
land, August 20-22, 2015
• Symposium Program Co-Chair, The 2nd International Sympo-
sium on Emerging Inter-networks, Communication and Mobility
(EICM) with The 12th International Conference on Mobile Sys-
tems and Pervasive Computing (MobiSPC 2015) and The 10th
International Conference on Future Networks and Communica-
tions (FNC 2015), August 17-20, 2015, Belfort, France
• Workshop Co-Chair, 10th International Conference on Future
Networks and Communications (FNC-2015), August 17-20, 2015,
Belfort, France
• Workshop Chair, The 12th International Conference on Mobile
Systems and Pervasive Computing (MobiSPC’15), August 17-20,
2015, Belfort, France
• Publications Co-Chair, International Conference on Intelligent
Information Processing, Security, and Advanced Communication
(IPAC 2015), August 17-19, 2015, Algeria
• Publicity Co-Chair, The 12th IEEE International Conference on
Ubiquitous Intelligence and Computing (UIC 2015), August 10-
14, 2015, Beijing, China
• Publicity Co-Chair, The International Conference on High Per-
formance Computing & Simulation (HPCS 2015), July 20–24,
2015, Amsterdam, The Netherlands

76
• Publicity Co-Chair, IEEE International Workshop on Advances
in Software Defined and Context Aware Cognitive Networks 2015
(IEEE SCAN 2015) in conjunction with IEEE International Con-
ference on Communications (ICC 2015), June 8-12, 2015, London,
UK
• Publicity Co-Chair, Third Workshop on Cloud Computing Sys-
tems, Networks, and Applications (CCSNA) in conjunction with
IEEE International Conference on Communications, June 8-12,
2015, London, UK
• Technical Program co-Chair, First International Workshop on
Mobile Cloud Computing systems, Management, and Security
(MCSMS-2015) in conjunction with The 6th International Con-
ference on Ambient Systems, Networks and Technologies (ANT
2015), June 2-5, 2015, London, UK
• International Journals Chair, The 6th International Conference
on Ambient Systems, Networks and Technologies (ANT 2015),
June 2-5, 2015, London, UK
• Track Chair, Mobile Networks, Protocols and Applications, The
6th International Conference on Ambient Systems, Networks and
Technologies (ANT 2015), June 2-5, 2015, London, UK
• Publicity Chair, The 6th International Conference on Informa-
tion and Communication Systems (ICICS 2015), April 7-9, 2015,
Amman, Jordan
• Publicity Chair, IEEE International Workshop on Software De-
fined Systems (SDS-2015) in conjunction with 2015 IEEE Inter-
national Conference on Cloud Engineering (IC2E 2015), March
09-13, 2015, Tempe, AZ, USA
• Publicity Co-Chair, IEEE CCNC’s International Workshop on
Cloud-assisted Context-Aware Networks and Cognitive Networks
2015 (IEEE CCAN-2015) in conjunction with IEEE CCNC 2015,
January 9-12, 2015, Las Vegas, Nevada, USA
• Program Co-Chair, The 2014 International Symposium on Ubi-
Com Frontiers - Innovative Research, Systems and Technologies
(UFirst 2014), in conjunction with UIC 2014, ATC 2014, Scal-
Com 2014 December 9-12, 2014, Ayodya Resort, Bali, Indonesia
• Publicity Co-Chair, The 14th IEEE International Conference on
Scalable Computing and Communications (ScalCom-2014), De-
cember 9-12, 2014, Bali, Indonesia
• Publicity Co-Chair, The 11th IEEE International Conference on
Ubiquitous Intelligence and Computing (UIC-2014), December
9-12, 2014, Bali, Indonesia

77
• Executive Co-Chair, The 11th IEEE International Conference on
Autonomic and Trusted Computing (ATC-2014), December 9-12,
2014, Bali, Indonesia
• Publicity Co-Chair, The 11th IEEE International Conference on
Autonomic and Trusted Computing (ATC-2014), December 9-12,
2014, Bali, Indonesia
• General Co-Chair, 2nd International workshop on Big Data and
Social Networking Management and Security (BDSN-2014) in
conjunction with the 7th IEEE/ACM International Conference
On Utility and Cloud Computing (UCC-2014), December 8-11,
2014, London, UK
• Technical Program Co-Chair, First ACS/IEEE International Work-
shop on Internet of Things, Systems, Management and Security
(IOTSMS’2014) with The 11th IEEE International Conference on
Computer Systems and Applications (AICCSA’ 2014), November
10-13, 2014, Doha, Qatar
• Session Chair, Session 2E (17 November 2014), The 5th Interna-
tional Conference on Information and Communication Technol-
ogy for the Muslim World (ICT4M 2014), November 17-19, 2014,
Kuching, Sarawak, Malaysia.
• Track Chair, The 5th International Conference on Information
and Communication Technology for the Muslim World (ICT4M
2014), November 17-19, 2014, Kuching, Sarawak, Malaysia.
• Keynote/Industry Speakers Chair, 3rd International Conference
on Advances in Computing, Communications & Informatics (ICACCI),
September 24-27, 2014, Delhi, India
• Program Chair, Workshop on Network Surveillance and Intruder
Detection (NetSID 2014) in conjunction with the 5th Interna-
tional Conference on Emerging Ubiquitous Systems and Perva-
sive Networks (EUSPN-2014), 22-25 September, 2014, Halifax,
Nova Scotia, Canada
• Publicity Co-Chair, International Workshop on Intelligent Tech-
nologies for HealthCare (ITCare-14), 22-25 September 2014, Hal-
ifax, Canada
• Publicity Chair, The First International Workshop on Social Net-
works Analysis, Management and Security (SNAMS - 2014) in
conjunction with The 2nd International Conference on Future In-
ternet of Things and Cloud (FiCloud-2014), 27-29 August 2014,
Barcelona, Spain
• Publicity Co-Chair, International Symposium on Biometrics and
Security Technologies 2014 (ISBAST 2014), August 26-27, 2014,
Kuala Lumpur, Malaysia

78
• Publicity Chair, The 14th International Conference on Algorithms
and Architectures for Parallel Processing (ICA3PP 2014), August
24-27, 2014, Dalian, China
• Symposium Program Chair, International Symposium on Emerg-
ing Inter-networks, Communication and Mobility (EICM) with
The 9th International Conference on Future Networks and Com-
munications (FNC 2014), August 17-20, 2014, Niagara Falls, Canada
• Publicity Co-Chair, The 2014 International Conference on High
Performance Computing & Simulation (HPCS 2014), July 21 –
25, 2014, The Savoia Hotel Regency, Bologna, Italy
• Program Chair, International Workshop on Secure Peer-to-Peer
Intelligent Networks & Systems (SPINS 2014) in conjunction with
ANT 2014, June 2-5, 2014, Hasselt, Belgium
• Publicity Co-Chairs, The 2014 International Conference on Col-
laboration Technologies and Systems (CTS 2014), May 19-23,
2014, The Commons Hotel, Minneapolis, Minnesota, USA
• Session Chair, Session I, International Conference on Innovations
in Electronics, Communication & Computing (ICIECC 2014),
April 10-11, 2014, Madurai, India
• Program Chair, International Workshop on Security in Self-Organizing
Networks (SelfNet’14), March 13-14, 2014, Trivandrum, India
• Publicity Co-Chair, IEEE International Workshop on Software
Defined Systems, (SDS -2014) in conjunction with 2014 IEEE In-
ternational Conference on Cloud Engineering (IC2E 2014), March
11-14, 2014, Boston, Massachusetts, USA
• Publicity Chair, International Conference on Advanced Computer
Science Applications and Technologies 2013 (ACSAT 2013), De-
cember 22-24, 2013, Kuching, Sarawak, Malaysia
• Track Chair, Grid Computing and Mobile Technology, Interna-
tional Conference on Advanced Computer Science Applications
and Technologies 2013 (ACSAT 2013), December 22-24, 2013,
Kuching, Sarawak, Malaysia
• Publicity Co-Chair, The 10th IEEE International Conference on
Autonomic and Trusted Computing, (ATC-2013), December 18-
23, 2013, Vietri sul Mare, Italy
• Publicity Co-Chair, The 10th IEEE International Conference on
Ubiquitous Intelligence and Computing, (UIC-2013), December
18-23, 2013, Vietri sul Mare, Italy
• Publicity Co-Chair, The 13th International Conference on Algo-
rithm and Architectures for Parallel Processing (ICA3PP-2013),
December 18-21, 2013, Vietri sul Mare, Italy

79
• Publicity Co-Chair, The Fourth IEEE International Symposium
on Trust, Security and Privacy for Emerging Applications (TSP-
13), November 13-15, 2013, Zhangjiajie, China
• Publicity Co-Chair, The 15th IEEE International Conference on
High Performance Computing and Communications (HPCC 2013),
November 13-15, 2013, Zhangjiajie, China
• Chair, Special session on Challenges in Mobile Cloud Computing
(CMCC 2013) in conjunction with NAEC 2013, October 17- 20,
2013, Riva del Garda, Italy
• Tutorial and Demo Chair, 2nd International Conference on Ad-
vances in Computing, Communications and Informatics (ICACCI
2013), August 22-25, 2013, Mysore, India
• Publicity Chair, The 2013 IEEE International Conference on
Green Computing and Communications (GreenCom 2013), Au-
gust 20-23, 2013, Beijing, China
• Workshop Chair, The 2nd International Workshop on Parallel
and Mobile Computing in Future Networks (PMCFN 2013) In
Conjunction with, The 13th International Conference on Compu-
tational Science and Its Applications (ICCSA 2013), June 24-27,
2013, Ho Chi Minh City, Vietnam
• Industry Track Chair, The 7th International Conference on Net-
work and System Security (NSS 2013), co-located with the 6th In-
ternational Conference on Biometrics (ICB 2013, June 4-7, 2013,
Madrid, Spain
• Publicity Chair, The 7th International Conference on Network
and System Security (NSS 2013), co-located with the 6th Inter-
national Conference on Biometrics (ICB 2013, June 4-7, 2013,
Madrid, Spain
• Publicity Co-Chair, The 2013 International Conference on Col-
laboration Technologies and Systems (CTS 2013), May 20-24,
2013, San Diego, California, USA
• Program Co-Chair, The 7th FTRA International Conference on
Multimedia and Ubiquitous Engineering (MUE 2013), May 9-11,
2013, Seoul, Korea
• Program Chair, International Workshop on Converged Networks,
Technologies and Applications (CNTA 2013), In conjunction with
ICNC 2013, January 28-31, 2013, San Diego, USA

International Conference Technical Committee Member

2017

80
• TPC, 11th IEEE International Conference on Advanced Networks
and Telecommunications Systems (IEEE ANTS’17), December
17-20, 2017, Bhubaneswar, Odisha, India
• TPC, The 10th International Conference on Security, Privacy
and Anonymity in Computation, Communication and Storage
(SpaCCS 2017), Guangzhou, China, December 12-15, 2017
• TPC, The 4th International Conference on Information and Com-
munication Technologies for Disaster Management (ICT-DM’2017),
December 11-13, 2017, Münster, Germany
• TPC, Globecom2017 CSSMA (2017 IEEE Global Communica-
tions Conference: Communications Software, Services and Mul-
timedia Apps), December 4-8, 2017, Singapore
• TPC, IEEE Globecom 2017 AHSN (2017 IEEE Global Commu-
nications Conference: Ad Hoc and Sensor Networks), December
4-8, 2017, Singapore
• TPC, IEEE Globecom 2017 MWN (2017 IEEE Global Commu-
nications Conference: Mobile and Wireless Networks), December
4-8, 2017, Singapore
• TPC, Sullivan Global Online Conferenc on Information & Com-
puter Technology, November 15-17, 2017, Louisville, KY, USA
• TPC, The 1st International Conference on Signals and Systems
2017 (ICSigSys 2017), November 07-09, 2017, Bali, Indonesia
• TPC, Symposium on Machine Learning and Metaheuristics Tech-
niques and Applications for Dependable Distributed Systems,
November 6-10, Orlando, Florida, USA
• TPC, The International Conference on Wireless Networks and
Mobile Communications (WINCOM’17), November 01-04, 2017,
Rabat, Morocco
• TPC, The annual International Conference on Wireless Commu-
nications and Signal Processing (WCSP 2017), October 11-13,
2017, Nanjing, China
• TPC, The 7th IEEE International Conference on Communica-
tion, Networks and Satellite (IEEE COMNETSAT 2017), Octo-
ber 5-7, 2017, Semarang, Indonesia
• TPC, The 7th International Conference on Current and Future
Trends of Information and Communication Technologies in Health-
care (ICTH 2017), September 18-20, 2017, Lund, Sweden
• TPC, Fifth International Symposium on Security in Computing
and Communications (SSCC 2017), September 13-16, Karnataka,
India

81
• TPC, The International Symposium on Applications of Compu-
tational Intelligence and Machine Learning in Networked Systems
(ACMiNS) with ICACCI 2017, September 13-16, 2017, Manipal,
Karnataka, India
• TPC, The 3rd International Workshop on Future Trends in Com-
puting System Technologies & Applications (FUSION 2017) in
conjunction with UIC 2017, August 4-8, 2017, San Francisco,
CA, USA
• TPC, The 13th International Wireless Communications and Mo-
bile Computing Conference-Wireless Networks 2017 (IWCMC 2017
Wireless Networking Symposium), July 26-30, 2017, Valencia,
Spain
• TPC, 24th International Conference on Wireless Networks and
Mobile Systems (WINSYS 2017), July 26-28, 2017, Madrid, Spain
• TPC, The Thirteenth International Conference on Wireless and
Mobile Communications (ICWMC 2017), July 23 - 27, 2017 -
Nice, France
• TPC, The Sixth International Conference on Advances in Ve-
hicular Systems, Technologies and Applications (VEHICULAR
2017), July 23 - 27, 2017 - Nice, France
• TPC, The Twelfth International Multi-Conference on Computing
in the Global Information Technology (ICCGI 2017), July 23 -
27, 2017 - Nice, France
• TPC, The 2nd International Workshop on Big Data Analytics for
Smart and Connected Health (BIGDATA4HEALTH 2017), July
17, Philadelphia, USA
• TPC, The 7th International Workshop on Future Computing Sys-
tem Technologies and Applications (FiSTA 2017) In conjunction
with ICCSA 2017, July 3-6, 2017, Trieste, Italy
• TPC, The 22nd IEEE Symposium on Computers and Communi-
cations, July 3-6, 2017, Heraklion, Crete, Greece
• TPC, The Twelfth International Conference on Internet and Web
Applications and Services (ICIW 2017), June 25-29, 2017, Venice,
Italy
• TPC, The second IEEE International workshop on Communi-
cation, Computing, and Networking in Cyber Physical Systems
(CCNCPS 2017) with with IEEE the 37th International Confer-
ence on Distributed Computing Systems (IEEE ICDCS 2017),
June 5 - 8, 2017, Buckhead, Atlanta, GA, USA
• TPC, 5th International Conference on Advanced Computing, Net-
working, and Informatics (ICACNI - 2017), June 01-03, 2017

82
• TPC, ICC’17-WT04 (IEEE ICC 2017: WT04 - 5th IEEE Inter-
national Workshop on Smart Communication Protocols and Al-
gorithms (SCPA 2017)), IEEE International Conference on Com-
munications (ICC’17), May 21-25, 2017, Paris, France
• TPC, ICC’17 AHSN (IEEE ICC 2017 Ad-Hoc and Sensor Net-
working Symposium), IEEE International Conference on Com-
munications (ICC’17), May 21-25, 2017, Paris, France
• TPC, ICC’17 MWN (IEEE ICC 2017 Mobile and Wireless Net-
working), May 21-25, 2017, Paris, France
• TPC, 2017 International Symposium on Networks, Computers
and Communications (ISNCC’17): Cloud, Grid and Social Com-
puting and Networking, May 17-19, 2017, Marrakech, Morocco
• TPC, The Third International Symposium on Ubiquitous Net-
working (UNET 2017), May 10-12, 2017, Casablanca, Morocco
• TPC, The Fourth International Conference on Software Defined
Systems (SDS-2017), May 8-11, 2017, Valencia, Spain
• TPC, 24th International conference on Telecommunications (ICT
2017), May 3-5, 2017, Limassol, Cyprus
• TPC, IEEE INFOCOM 2017 Workshop on Integrating Edge Com-
puting, Caching, and Offloading in Next Generation Networks
(IECCO) with IEEE International Conference on Computer Com-
munications (INFOCOM 2017), May 1-4, 2017, Atlanta, GA,
USA
• TPC, IEEE International Workshop on Advances in Software De-
fined and Context Aware Cognitive Networks (IEEE SCAN-2017)
in conjunction with IEEE INFOCOM 2017, May 1-4, 2017, At-
lanta, GA, USA
• TPC, 8th International Symposium on Cybersecurity, 14th Inter-
national Conference on Information Technology : New Genera-
tions (ITNG 2017), April 10-12, 2017, Las Vegas, Nevada, USA
• TPC, The 4th International Doctoral Symposium on Applied
Computation and Security Systems (ACSS), March 17-19, 2017,
Patna, India
• TPC, The International Conference on Information and Commu-
nication Systems (ICICS 2017), April 4-6,2017, Irbid, Jordan
• TPC, 2017 International Conference on Computing, Networking
and Communications (ICNC): Cognitive Computing and Net-
working (ICNC’17 COG), January 26-29, 2017, Silicon Valley,
USA
• TPC, 3rd International Conference on Networking Systems and
Security (NSysS 2017), January 5-8, 2017, Dhaka, Bangladesh

83
2016

• TPC, International Conference on Advanced Computing and In-


telligent Engineering (ICACIE 2016), December 21-23, 2016, Bhubaneswar,
Odisha, India
• TPC, 14th International Conference on Frontiers of Information
Technology (FIT 2016), December 19-21, 2016, Islamabad, Pak-
istan
• TPC, 9th EAI International Wireless Internet Conference (WiCON
2016), December 19-21, 2016, Haikou, China
• TPC, IPCCC 2016 first International workshop on Communi-
cation, Computing, and Networking in Cyber Physical Systems
(CCN-CPS 2016) with the 35th IEEE IPCCC 2016, December
9-11, 2016, Las Vegas, Nevada, USA
• TPC, 5th IEEE International Conference on Communication,
Networks and Satellite (IEEE COMNETSAT 2016), Surabaya,
December 8-10, 2016
• TPC, Globecom’16-AHSN (2016 IEEE Global Communications
Conference: Ad Hoc and Sensor Networks), December 4-8, 2016,
Washington, DC, USA
• TPC, Globecom’16 - MWN (2016 IEEE Global Communications
Conference: Mobile and Wireless Networks), December 4-8, 2016,
Washington, DC, USA
• TPC, Globecom’16-CSSMA (2016 IEEE Global Communications
Conference: Communications Software, Services and Multimedia
Apps), December 4-8, 2016, Washington, DC, USA
• TPC, The 9th International Conference on Security, Privacy and
Anonymity in Computation, Communication and Storage (SpaCCS
2016), November 16-18, 2016, Zhangjiajie, China
• TPC, The Fifth International Conference on Advances in Vehicu-
lar Systems, Technologies and Applications (VEHICULAR 2016),
November 13-17, 2016, Barcelona, Spain
• TPC, The Eleventh International Multi-Conference on Comput-
ing in the Global Information Technology (ICCGI 2016), Novem-
ber 13-17, 2016 - Barcelona, Spain
• TPC, 10th IEEE International Conference on Advanced Networks
and Telecommunications Systems, November 8-9, 2016, Banga-
lore, India
• TPC, IEEE Workshop on Networks of Sensors, Wearable, and
Medical Devices (IEEE LCN-NSWMD 2016), co-located with
the 41st IEEE Conference on Local Computer Networks (LCN),
November 7-10, 2016, Dubai, UAE

84
• TPC, 2nd EAI International Conference on Industrial Networks
and Intelligent Systems (INISCom 2016), October 31–November
2, 2016, Leicester, Great Britain
• TPC, 2016 International Conference on Innovations in Science,
Engineering and Technology (ICISET 2016), October 28-29, 2016,
Chittagong, Bangladesh
• TPC, The International Conference on Wireless Networks and
Mobile Communications (WINCOM’16), October 26-29, 2016,
Fez, Morocco
• TPC, 2016 13th International Conference on Electrical Engineer-
ing, Computing Science and Automatic Control (CCE 2016), ,
September 26-30, 2016, Mexico City, Mexico
• TPC, 4th International Conference on Advanced Computing, Net-
working, and Informatics (ICACNI – 2016), September 22-24,
2016, India
• TPC, Fourth International Symposium on Security in Computing
and Communications(SSCC’16), September 21-24, 2016, Jaipur,
India
• TPC, IEEE 2016 International Conference on Connected Vehicles
and Expo (ICCVE’16), September 12-16, 2016, Seattle, WA, USA
• TPC, 12th IEEE International Wireless Communications & Mo-
bile Computing Conference (IWCMC 2016), September 5-9, 2016,
Paphos, Cyprus
• TPC, The 22nd Asia-Pacific Conference on Communications, Au-
gust 25-27, 2016, Yogyakarta, Indonesia
• TPC, First International Workshop on QoS aware Future Com-
munication Networks (QoS-FCNs’16) in conjunction with the 11th
International Conference on Future Networks and Communica-
tions (FNC’16), August 15-18, 2016, Montreal, Quebec, Canada
• TPC, 3rd International Doctoral Symposium on Applied Compu-
tation and Security Systems (ACSS 2016), August 12-14, 2016,
Kolkata, India
• TPC, 2016 International Workshop on Emerging Dependable Com-
puting System Technologies and Applications (EDCSTA 2016),
in conjunction with the 14th IEEE International Conference on
Dependable, Autonomic and Secure Computing (DASC 2016),
August 8∼12, 2016, Auckland, New Zealand
• TPC, 6th International Workshop on Privacy, Security and Trust
in Mobile and Wireless Systems (MobiPST 2016) with the 25th
International Conference on Computer Communication and Net-
works (ICCCN 2016), August 1-4, 2016, Waikoloa, Hawaii, USA

85
• TPC, 13th International Conference on Wireless Networks and
Mobile Systems (WINSYS 2016), July 26-28, 2016, Lisbon, Por-
tugal
• TPC, 9th International Conference on Security of Information
and Networks (SIN 2016), July 20-22, 2016, Rutgers University,
New Jersey, USA
• TPC, The 2nd International Workshop on Future Trends in Com-
puting System Technologies and Applications (FUSION 2016), in
conjunction with the 13th IEEE International Conference on Ad-
vanced and Trusted Computing (ATC 2016), July 18-21, 2016,
Toulouse, France.
• TPC, 5th International Conference on Theory and Practice in
Modern Computing 2016; Part of the Multi Conference on Com-
puter Science and Information Systems (MCCSIS 2016), July 1-4,
2016, Funchal, Madeira, Portugal
• TPC, The IEEE International Workshop on Urban Mobility &
Intelligent Transportation Systems (UMITS 2016) in conjunction
with the 21st IEEE International Symposium on Computers and
Communications (ISCC 2016), June 27-30, 2016, Italy
• TPC, CoWPER 2016: CoWPER, Toward A City-Wide Pervasive
EnviRonment Workshop with IEEE International Conference on
Sensing, Communication and Networking (IEEE SECON 2016),
June 27-30, 2016, London, UK
• TPC, Safe, Energy-Aware, & Reliable Connected Health (SEARCH
2016) in association with the First IEEE Conference on Con-
nected Health: Applications, Systems and Engineering Technolo-
gies (CHASE 2016), June 27-29, 2016, Washington DC, USA
• TPC, BIGDATA4HEALTH 2016: The International Workshop
on Big Data Analytics for Smart and Connected Health in con-
junction with the First IEEE Conference on Connected Health:
Applications, Systems and Engineering Technologies (CHASE
2016), June 27-29, 2016, Washington DC, USA
• TPC, Ad-hoc and Sensor Networking Symposium, IEEE Inter-
national Conference on Communications (ICC 2016), May 23-27,
2016, Kuala Lumpur, Malaysia
• TPC, The Eleventh International Conference on Internet and
Web Applications and Services (ICIW 2016), May 22-26, 2016
- Valencia, Spain
• TPC, 23rd International Conference on Telecommunications (ICT
2016), May 16-18, 2016, Thessaloniki, Greece

86
• TPC, Track - W8: The First IEEE International Workshop on
User-Centric Networking for 5G and Beyond, 2016 IEEE 83rd
Vehicular Technology Conference: VTC2016-Spring, May 15-18,
2016, Nanjing, China
• TPC, Track - W4: The Second International Workshop on Ad-
vances in Industrial Networks and Intelligent Systems (AINIS
2016), VTC2016-Spring Recent Results & Workshops, May 15-
18, 2016,Nanjing, China
• TPC, 5th International Conference on Informatics, Electronics &
Vision (ICIEV 2016), May 13-14, 2016, Dhaka, Bangladesh
• TPC, The first IEEE/IFIP International Workshop on Urban
Mobility & Intelligent Transportation Systems (UMITS 2016) in
conjunction with the IEEE/IFIP Network Operations and Man-
agement Symposium (NOMS 2016), April 25-29, 2016, Istanbul,
Turkey
• TPC, 7th Symposium on Security and Privacy in Next Gener-
ation Networks (SPNGN2016) in conjunction with ITNG 2016,
April 11-13, 2016, Las Vegas, Nevada, USA
• TPC, Mobile and Wireless Networks track, IEEE Wireless Com-
munications and Networking Conference (WCNC), April 3-6, 2016,
Doha, Qatar
• TPC, International Conference on Internet of things and Cloud
Computing (ICC 2016), March 22-23, 2016, Cambridge, United
Kingdom
• TPC, The Seventh International Conference on Cloud Comput-
ing, GRIDs, and Virtualization (CLOUD COMPUTING 2016),
March 20-24, 2016, Rome, Italy
• TPC, 7th International Conference on Information Science and
Applications (ICISA 2-16), February 15-18, 2016, Ho Chi Minh,
Vietnam
• TPC, 3rd International Conference Applications and Innovations
in Mobile Computing (AIMoC 2016), February 11-13, 2016, Kolkata,
India
• TPC, The 2nd International Conference on Networking Systems
and Security 2016 (NSysS 2016), January 7-9, 2016, Dhaka, Bangladesh

2015

• TPC, The 18th International Conference on Computer and Infor-


mation Technology (ICCIT 2015), December 22-23, 2015, Dhaka,
Bangladesh

87
• TPC, The 2015 International Conference on Computing and Net-
work Communications (CoCoNet’15), December 16-19, 2015, Trivan-
drum, Kerala, India
• TPC, IEEE International Conference on Advanced Networks and
Telecommunications Systems (IEEE ANTS 2015), December 15-
18, 2015, Kolkata, India
• TPC, 13th International Conference on Frontiers of Information
Technology (FIT’15), December 14-16, 2015, Islamabad, Pakistan
• TPC, Adhoc and Sensor Networks track, IEEE Global Commu-
nications Conference (IEEE GLOBECOM 2015), December 6-10,
2015 San Diego, CA, USA
• PC, IEEE Asia-Pacific World Congress on Computing Science
(APWCCS 2015), December 2-4, 2015, Yanuca, Fiji
• TPC, The 2nd International Conference on Information and Com-
munication Technologies for Disaster Management (ICT-DM’2015),
November 30-December 2, 2015, Rennes, France
• TPC, The First International Workshop on The Advances in In-
dustrial Networks and Intelligent Systems (AINIS 2015) in Con-
junction with The Fourth IEEE/CIC International Conference
on Communications in China (ICCC 2015), Shenzhen, China,
November 2-4, 2015
• TPC, 2015 12th International Conference on Electrical Engineer-
ing, Computing Science and Automatic Control (CCE 2015), Oc-
tober 28-30, 2015, Mexico City, Mexico
• TPC, The 4th International Conference on Connected Vehicles &
Expo (ICCVE 2015) in conjunction with The 2nd APEC Internet
of Vehicles Symposium, October 19-23, 2015, Shenzhen, China
• TPC, International Conference on Civic Technologies for Smart
Cities (CivicTech 2015)with Smart City 360 Summit, October 13,
2015, Bratislava, Slovakia
• TPC, International Conference on E-mobility and Emerging Ve-
hicular Technology (ECARS 2015) with Smart City 360 Summit,
October 13, 2015 Bratislava, Slovakia
• TPC, The Eleventh International Conference on Wireless and
Mobile Communications (ICWMC 2015), October 11-16, 2015,
St. Julians, Malta
• TPC, Track: EMERGING TECHNOLOGIES: Cloud Comput-
ing, 2015 IEEE 82nd Vehicular Technology Conference: VTC2015-
Fall 6–9 September 2015, Boston, USA
• TPC, Wireless Networking Symposium, IEEE IWCMC 2015, Au-
gust 24-27, 2015, Dubrovnik, Croatia

88
• TPC, QoS and QoE in Wireless Communications/Networks Work-
shop (QoS-QoE), in conjunction with IEEE IWCMC 2015, Au-
gust 24-27, 2015, Dubrovnik, Croatia
• TPC, The Ninth International Conference on Emerging Security
Information, Systems and Technologies (SECURWARE 2015),
August 23-28, 2015, Venice, Italy
• TPC, “Track 3: Trusted Security Techniques on Computing De-
vices”, The 12th IEEE International Conference on Advanced
and Trusted Computing (ATC 2015), August 10-14, 2015, Bei-
jing, China
• TPC, “Track 7: Mobile and Pervasive Computing”, The 15th
IEEE International Conference on Scalable Computing and Com-
munications (ScalCom 2015), August 10-14, 2015, Beijing, China
• TPC, 4th International Conference on Advances in Computing,
Communications and Informatics (ICACCI 2015), August 10-13,
2015, Kerala, India
• TPC, 3rd International Workshop on Smart Sensor Protocols and
Algorithms (SSPA 2015) in conjunctions withWMNC 2015, June
23-25, 2015, Novi Sad, Serbia
• TPC, 3rd International Conference on Advanced Computing, Net-
working, and Informatics (ICACNI-2015), June 23-25, 2015, Orissa,
India
• TPC, The 6th International Workshop on Future Computing Sys-
tem Technologies and Applications (FiSTA 2015), in conjunction
with ICCSA 2015, June 22∼25, 2015, Banff, Alberta, Canada
• TPC, 2nd Workshop on Smart Wireless Access Networks for
Smart cITY (SWANSITY 2015) with IEEE SECON 2015, June
22, Seattle, USA
• TPC, The Tenth International Conference on Internet and Web
Applications and Services (ICIW 2015), June 21-26, 2015, Brus-
sels, Belgium
• TPC, 4th International Conference on Informatics, Electronics &
Vision (ICIEV 2015), 15-17 June, Fukuoka, Japan
• TPC, 4th IEEE International Workshop on Smart Communica-
tion Protocols and Algorithms (SCPA 2015) in conjunction with
IEEE International Conference on Communications (ICC 2015),
June 8-12, 2015, London, UK
• TPC, The First IEEE International Workshop on Security and
privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-
Security 2015), in conjunction with IEEE International Confer-
ence on Communications (ICC 2015), June 8-12, 2015, London,
UK

89
• TPC, IEEE International Workshop on Advances in Software De-
fined and Context Aware Cognitive Networks 2015 (IEEE SCAN
2015) in conjunction with IEEE International Conference on Com-
munications (ICC 2015), June 8-12, 2015, London, UK
• TPC, Ad-hoc and Sensor Networking Symposium, IEEE Inter-
national Conference on Communications (ICC 2015), June 8-12,
2015, London, UK
• TPC, Communications Network and Protocols track, The 29th
IEEE International Conference on Advanced Information Net-
working and Applications (AINA-2015), May 24-27, 2015, Gwangju,
Korea
• TPC, 2nd International Conference On Advances in Computing
& Communication Engineering (ICACCE-2015), May1-2, 2015,
Dehradun, India
• TPC, The Eighth International Conference on Communication
Theory, Reliability, and Quality of Service (CTRQ 2015), April
19-24, 2015 - Barcelona, Spain
• TPC, The 6th International Symposium on Security and Privacy
in Next-Generation Networks (SPNGN 2015) in association with
12th International Conference on Information Technology : New
Generations (ITNG 2015), April 13-15, 2015, Las Vegas, Nevada,
USA
• TPC, The Sixth International Conference on Cloud Comput-
ing, GRIDs, and Virtualization (CLOUD COMPUTING 2015),
March 22-27, 2015, Nice, France
• TPC, International Workshop on E2IoT 2015: Energy Efficiency
in the Internet of Things, and Internet of Things for Energy Effi-
ciency, In conjunction with WCNC 2015, New Orleans, LA, USA,
9-12 March 2015
• TPC, Track 3- Mobile and Wireless Networks,IEEE Wireless Com-
munications and Networking Conference (WCNC 2015), March
9-12, 2015, New Orleans, LA, USA
• TPC, 1st International Conference on Industrial Networks and
Intelligent Systems (INISCom 2015), March 2-4, 2015, Tokyo,
Japan
• TPC, International Conference on “Signal Processing & Inte-
grated Networks (SPIN 2015)”, February 19-20, 2015, Noida, In-
dia
• TPC, Internet Services and Applications Symposium, Interna-
tional Conference on Computing, Networking and Communica-
tions (ICNC 2015), February 16-19, 2015, Anaheim, California,
USA

90
• TPC, 2nd IEEE sponsored International Conference on Appli-
cations and Innovations in Mobile Computing (AIMoC 2015),
February 12 - February 14, 2015, Kolkata, India
• SPC, First International Conference on Anti-Cybercrime (ICACC-
2015), February 9-11, 2015, Riyadh, Saudi Arabia
• TPC, International Bio-Metrics & Smart Government Summit,
January 18-20, 2015 (IBMSGS 2015), Sousse, Tunisia
• TPC, The 1st International Conference on Networking Systems
and Security 2015 (NSysS 2015), January 5-7, 2015, Dhaka, Bangladesh

2014

• IPC, The 17th International Conference on Computer & Infor-


mation Technology (ICCIT 2014), December 22-23, 2014, Dhaka,
Bangladesh
• TPC, IEEE Global Communications Conference (IEEE GLOBE-
COM 2014), December 8-12, 2014, Austin, TX, USA
• TPC, International Conference on Contemporary Computing and
Informatics (IC3 I’14), November 27-29 2014, Mysore, India
• TPC, The Eighth International Conference on Emerging Security
Information, Systems and Technologies (SECURWARE 2014),
November 16-20, 2014, Lisbon, Portugal
• TPC, International Workshop on Future Computing and Network
Convergence (FCNC) with 9th International Conference on P2P,
Parallel, Grid, Cloud and Internet Computing (3PGCIC 2014),
November 8-10, 2014, Guangzhou, China
• TPC, IEEE Asia-Pacific World Congress on Computer Science
and Engineering 2014 (IEEE APWC on CS&E 2014), November
4-5, 2014, Nadi, Fiji.
• TPC, 2014 International Conference on Connected Vehicles &
Expo (ICCVE 2014), November 3-7, 2014, Vienna, Austria
• TPC, “Frontiers in Cyber-Physical Systems” track, International
Conference on Identification, Information and Knowledge in the
Internet of Things (IIKI 2014), October 17-18, 2014, Beijing,
China
• TPC, The 1st International Workshop on Reliability of eHealth
Information Systems (ReHIS 2014) In conjunction with 16th In-
ternational Conference on E-health Networking, Application &
Services (HealthCom 2014), October 15-18, 2014, Ponta Negra,
Natal-RN, Brazil

91
• TPC, Second IEEE/CIC ICCC International Workshop on Inter-
net of Things, October 13-15, 2014, Shanghai, China
• TPC, 2014 11th International Conference on Electrical Engineer-
ing, Computing Science and Automatic Control (CCE 2014),
September 29-October 3, 2014, Ciudad del Carmen, Campeche,
Mexico.
• TPC, The 2014 IEEE Symposium on Industrial Electronics & Ap-
plications (ISIEA2014), September 28 to October 1, 2014, Kota
Kinabalu, Sabah, Malaysia
• TPC, ICACCI 2014 Doctoral Consortium with the 3rd Interna-
tional Conference on Advances in Computing, Communications
& Informatics (ICACCI), September 24-27, 2014, Delhi, India
• TPC, 3rd International Conference on Advances in Computing,
Communications & Informatics (ICACCI), September 24-27, 2014,
Delhi, India
• PC, The International Conference on Wireless Information Net-
works and Systems 2014 (WINSYS 2014), September 2-4, Vienna,
Austria
• TPC, Special Session on Networks & Communication Systems
(NCS 2014) Jointly with, Networking and Electronic Commerce
Research Conference (NAEC 2014), August 21-24, 2014, Trieste,
Italy.
• TPC, 2014 International Workshop on the Design and Perfor-
mance of Networks on Chip (DPNoC 2014) August 17-20, 2014,
Niagara Falls, Ontario, Canada in conjunction with the The 9th
International Conference on Future Networks and Communica-
tions (FNC 2014), Niagara Falls, Ontario, Canada
• TPC, 10th International Wireless Communications & Mobile Com-
puting Conference – 2014 (IWCMC 2014), August 4-8, 2014,
Nicosia, Cyprus
• TPC, The Ninth International Conference on Internet and Web
Applications and Services (ICIW 2014), July 20-24, 2014, Paris,
France
• TPC, The 4th International IEEE Workshop on Multimedia Ser-
vices and Technologies for E-health (MUST-EH 2014), In con-
junction with IEEE ICME 2014 (ICME2014), July 14-18, 2014
Chendu, China
• TPC, 2nd Smart Sensor Protocols and Algorithms (SSPA 2014),
June 22-27, 2014, Benidorm, Spain
• TPC, The Ninth International Multi-Conference on Computing
in the Global Information Technology (ICCGI 2014), June 22-26,
2014, Seville, Spain

92
• TPC, Ad Hoc and Sensor Networking Symposium (AHSNS), IEEE
International Conference on Communications (IEEE ICC 2014),
Communications: The Centrepoint of the Digital Economy, June
10-14, 2014, Sydney, Australia
• TPC, The Fifth International Conference on Cloud Computing,
GRIDs, and Virtualization (CLOUD COMPUTING 2014), May
25-29, 2014, Venice, Italy
• IPC, 3rd International Conference on Informatics, Electronics &
Vision (ICIEV), May 23-24, 2014, Dhaka, Bangladesh.
• TPC, Workshop on Mobile and Wireless 2014 Third, April 15-18,
2014, Jeju Island, Korea.
• TPC, “Mobile and Wireless Networks” track, IEEE Wireless Com-
munications and Networking Conference (IEEE WCNC), April
6-9, 2014, Istanbul, Turkey
• TPC, Second International Conference on Security in Computer
Networks and Distributed Systems (SNDS-2014), March 13-14,
2014, Thiruvananthapuram (Trivandrum), India
• TPC, IEEE sponsored International Conference on Applications
and Innovations in Mobile Computing (AIMoC 2014), February
27-March 01, 2014, Kolkata, India
• TPC, 2014 International Conference on Computing, Networking
and Communications, Internet Services and Applications Sym-
posium, February 3-6, 2014, Honolulu, Hawaii, USA
• PC, The 1st International Conference on ICTs for Disaster Man-
agement (ICT-DM’2014), January 18-20, 2014, Algiers, Algeria

2013

• IPC, The 16th International Conference on Computer & Informa-


tion Technology (ICCIT 2013), December 22-24, 2013, Khulna,
Bangladesh
• PC, Workshop on Mobile and Wireless 2013 Second, December
11-13, 2013, Jeju Island, South Korea
• TPC, Smart Sensor protocols and algorithms 2013 (SSPA’13)
workshop in conjunction with MSN-2013, December 11-13, 2013.
Dalian, China
• TPC, 1st International workshop on Big Data and Social Net-
working Management and Security (BDSN-2013) in conjunction
with The 8th International Conference for Internet Technology
and Secured Transactions (ICITST-2013), December 9-12, 2013,
London, UK

93
• TPC, The 2nd International Conference on Connected Vehicles
& Expo (ICCVE 2013), December 2-6, 2013, Las Vegas, Nevada,
USA
• TPC, "Security and Privacy" track, 5th IEEE International Con-
ference on Cloud Computing Technology and Science (IEEE Cloud-
Com 2013), December 2-5, 2013, Bristol, UK
• TPC, IEEE 7th International Symposium on Embedded Multi-
core/Manycore System-on-Chip (MCSoC-13), September 26-28,
2013, Tokyo, Japan
• TPC, The Seventh International Conference on Emerging Secu-
rity Information, Systems and Technologies, SECURWARE 2013,
August 25-31, 2013, Barcelona, Spain
• PC, The Annual International Conference on Science and En-
gineering in Biology, Medical and Public Health (BioMedPub),
August 16-18 , 2013, Jakarta, Indonesia
• TPC, The second IEEE&CIC International Conference on Com-
munications in China (ICCC2013), August 12-14, 2013, Xi’an,
China
• TPC, 10th International Conference on Wireless Information Net-
works and Systems (WINSYS 2013), July 29-31, 2013, Reykjavík,
Iceland
• TPC, Eighth International Multi-Conference on Computing in
the Global Information Technology (ICCGI 2013), July 21-26,
2013 - Nice, France
• TPC, The 9th IEEE International Wireless Communications and
Mobile Computing Conference (IWCMC 2013), July 1-5, 2013,
Cagliari, Sardinia, Italy
• TPC, IEEE International Conference on Communications 2013:
IEEE ICC’13 - 3rd IEEE International Workshop on Smart Com-
munication Protocols and Algorithms (SCPA’13), June 9-13, 2013,
Budapest, Hungary
• TPC, 1st IEEE Workshop on electric vehicle networks for Smart
grid applications (IEEE EVN-SGA 2013), jointly with 2013 IEEE
77th Vehicular Technology Conference: VTC2013-Spring, June
2-5, 2013, Dresden, Germany
• IPC, 2nd International Conference on Informatics, Electronics &
Vision, May 17-18, 2013, Dhaka, Bangladesh
• PC, Information Communication Technology-EurAsia Conference
2013, March 25-29, 2013, Yogyakarta, Indonesia

94
• PC, "Grid, P2P and Scalable Computing" Track, The 27th IEEE
International Conference on Advanced Information Networking
and Applications (AINA-2013), March 25-28, 2013, Barcelona,
Spain
• TPC, Internet Services and Applications (ISA) Symposium with
International Conference on Computing, Networking and Com-
munications (ICNC 2013), January 28-31, 2013, San Diego, USA
• ITPC, 9th International Conference on Heterogeneous Network-
ing for Quality, Reliability, Security and Robustness (Qshine 2013),
January 11-12, 2013, Greater Noida, NCR Delhi, India.

Publication list

Editorial Articles in Refereed Journal

• JE23. Al-Sakib Khan Pathan, “Wireless Network Technologies


and Applications”, Guest Editorial of the Special Issue of Interna-
tional Journal of High Performance Computing and Networking,
Inderscience Publishers. [SCOPUS-Indexed] (To Appear)
• JE22. M. Shamim Hossain, Changsheng Xu, Ying Li, Al-Sakib
Khan Pathan, Josu Bilbao, Wenjun Zeng, Abdulmotaleb El Sad-
dik, “Impact of Next-Generation Mobile Technologies on IoT-
Cloud Convergence”, Guest Editorial of the Special Issue of IEEE
Communications Magazine, Volume: 55, Issue: 1, January 2017,
pp. 18-19. [SCI-Indexed]
• JE21. Sabu M. Thampi, Joel J. P. C. Rodrigues, and Al-Sakib
Khan Pathan, “Advances in Vehicular and Underwater Commu-
nication Networks”, Guest Editorial of the Special Issue of Inter-
national Journal of Ad Hoc and Ubiquitous Computing, Vol. 24,
Nos. 1/2, Inderscience Publishers, 2017, pp. 1-3. [SCIE-Indexed]
• JE20. Al-Sakib Khan Pathan, Xianglin Wei, Homero Toral Cruz,
and Luca Caviglione, “Preface: Security and Trust Issues in Peer-
to-Peer Networks”, Guest Editorial of the Special Issue of Inter-
national Journal of Computational Science and Engineering, Vol.
13, No. 2, 2016, Inderscience Publishers, pp. 109-110. [ESCI-
Indexed]
• JE19. M. Shamim Hossain, Al-Sakib Khan Pathan, Stefan Goebel,
Shawon M. Rahman, and Manzur Murshed, “Advances in Mul-
timedia Sensor Networks for Health-Care and Related Applica-
tions”, Guest Editorial of the Special Issue of International Jour-
nal of Distributed Sensor Networks, vol. 2015, Article ID 596096,
Hindawi Publishing Corporation, 2 pages, 2015. DOI:10.1155/2015/596096.
[SCIE-Indexed]

95
• JE18. Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah,
Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip
Korn, “Information integrity in smart grid systems”, Guest Edi-
torial of the Special Issue of Information Systems, 53 (2015), El-
sevier, 2015, pp. 145-146, DOI:10.1016/j.is.2015.05.002. [SCIE-
Indexed]
• JE17. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,
Hani Alzaid, and Mohammad Asadul Hoque, “Editorial: Con-
verged Networks, Technologies and Applications”, Guest Edito-
rial of the Special Issue on Converged Networks, Technologies and
Applications of International Journal of Computational Science
and Engineering, Inderscience Publishers, Vol. 10, No. 3, 2015,
pp. 231-233. [ESCI-Indexed]
• JE16. Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr.,
and Riaz Ahmed Shaikh, “Editorial: Critical Applications in Ve-
hicular Ad Hoc/Sensor Networks”, Guest Editorial of the Special
Issue on Critical Applications in Vehicular Ad Hoc/Sensor Net-
works of Telecommunication Systems, Volume 58, Issue 4,April
2015, Springer, pp. 275-277, DOI: 10.1007/s11235-014-9876-5.
[SCIE-Indexed]
• JE15. Al-Sakib Khan Pathan, “On the Boundaries of Trust and
Security in Computing and Communications Systems”, Interna-
tional Journal of Trust Management in Computing and Commu-
nications, Vol. 2, No. 1, 2014, Inderscience Publishers, pp. 1-6,
DOI: 10.1504/IJTMCC.2014.063272.
• JE14.Mohammad Mehedi Hassan, Al-Sakib Khan Pathan, Eui-
Nam Huh, and Jemal Abawajy, “Emerging Sensor-Cloud Tech-
nology for Pervasive Services and Applications”, Guest Editorial
of the Special Issue of International Journal of Distributed Sen-
sor Networks, Volume 2014, Article ID 610106, Hindawi Pub-
lishing Corporation, 2 pages, DOI:10.1155/2014/610106. [SCIE-
Indexed]
• JE13. Al-Sakib Khan Pathan and Muhammad Mostafa Monowar,
“Preface: Future Trends in Security Issues in Internet and Web
Applications”, Guest Editorial of the Special Issue of Interna-
tional Journal of Computational Science and Engineering, Vol.
9, No. 4, 2014, Inderscience Publishers, pp. 275-277. [ESCI-
Indexed]
• JE12. Al-Sakib Khan Pathan, Rashid A. Saeed, Mohamed Ali
Feki, and Nguyen H. Tran, “Guest Editorial: Special Issue on
Integration of IoT with Future Internet”, Guest Editorial of the
Special Issue on Integration of IoT with Future Internet, Journal

96
of Internet Technology, Volume 15, No.2, March 2014, pp.145-
147. [SCIE-Indexed]
• JE11. Hyung Seok Kim, Waleed Ejaz, Khalid Al-Begain, Al-
Sakib Khan Pathan, and Najam ul Hasan, “Advances in Cog-
nitive Radio Sensor Networks”, Special Issue of International
Journal of Distributed Sensor Networks, Volume 2014, Article ID
631624, Hindawi Publishing Corporation, 3 pages, DOI: 10.1155/2014/631624.[SCIE-
Indexed]
• JE10. Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah,
Mostafa M. Fouda, and Hae Young Lee, “Defending against Wire-
less Network Intrusion”, Guest Editorial of the Special Issue on
Wireless Network Intrusion of Journal of Computer and Sys-
tem Sciences, Elsevier, Volume 80, Issue 3, 2014, pp. 499-501,
DOI:10.1016/j.jcss.2013.06.006. [SCI-Indexed]
• JE09. Guangjie Han, Lei Shu, Al-Sakib Khan Pathan, Joel Ro-
drigues, and Abdelhamid Mellouk, “Wireless Sensor Networks
based on Environmental Energy Harvesting”, Special Issue of
International Journal of Distributed Sensor Networks, Volume
2013, Article ID 816063, Hindawi Publishing Corporation, 2 pages,
DOI: 10.1155/2013/816063. [SCIE-Indexed]
• JE08. Al-Sakib Khan Pathan, “Editorial: When the Cloud Com-
puting Becomes Mobile!”, International Journal of Internet and
Distributed Systems, Volume 1, Number 3, August 2013,Scientific
Research Publishing Inc., p. 17, DOI: 10.4236/ijids.2013.13003.
• JE07. Al-Sakib Khan Pathan, “Tackling the Threats of Internet
Worms”, (Editor-in-Chief’s Foreword) International Journal on
Internet and Distributed Computing Systems, Volume 3, Number
1, 2013, pp. i-ii.
• JE06. Lei Shu, Athanasios V. Vasilakos, Jaime Lloret, and Al-
Sakib Khan Pathan, “Guest Editorial: Special Issue on Recent
Advance on Mobile Sensor Systems”, Telecommunication Sys-
tems, Volume 52, Issue 4, April 2013, Springer, pp. 2407-2409,
DOI: 10.1007/s11235-011-9560-y. [SCIE-Indexed]
• JE05. Al-Sakib Khan Pathan, “Multi-Dimensional Networking
andDistributed Computing Services”, (Editor-in-Chief’s Foreword)
International Journal on Internet and Distributed Computing
Systems, Volume 2, Number 1, 2012, pp. i-ii.
• JE04. Syed Obaid Amin, Al-Sakib Khan Pathan, and Syed M.
Rahman, “Editorial: Recent Advances in Next-Generation and
Resource-Constrained Converged Networks”, Special Issue of In-
ternational Journal of Communication Networks and Distributed
Systems, Vol. 8, Nos. 1/2, 2012.

97
• JE03. Al-Sakib Khan Pathan, “Internet and Distributed Com-
puting Knowledge in Today’s World”, (Editor-in-Chief’s Fore-
word) International Journal on Internet and Distributed Com-
puting Systems, Volume 1, Issue 1, June 1, 2011, p. i.
• JE02. Sudip Misra, N. Balakrishnan, and Al-Sakib Khan Pathan,
“Preface: Recent advances in simulation and mathematical mod-
eling of wireless networks”, Special Issue of Mathematical and
Computer Modelling Journal, Elsevier (with Sudip Misra and N.
Balakrishnan), Volume 53, Issues 11-12, June 2011, pp. 2057-
2058, DOI:10.1016/j.mcm.2011.03.020. [SCI-Indexed]
• JE01. Jemal H. Abawajy, Mukaddim Pathan, Al-Sakib Khan
Pathan, and Mustafizur Rahman,“Network Management in Dis-
tributed Systems”, Guest Editorial of the Special Issue of Scalable
Computing: Practice and Experience, Volume 11 Nr 4, 2010.

Papers in Refereed Journals

• J.55. Saiful Azad, Arafatur Rahman, A. Taufiq Asyhari, and


Al-Sakib Khan Pathan, “Crowd Associated Network: Exploiting
over Smart Garbage Management System”, IEEE Communica-
tions Magazine [SCI-Indexed] (To Appear)
• J.54. Mohamed Guerroumi and Al-Sakib Khan Pathan, “Hybrid
Data Dissemination Protocol (HDDP) for Wireless Sensor Net-
works”, Wireless Networks, Springer. [SCIE-Indexed] (To Ap-
pear)
• J.53. Mohamed Guerroumi, Al-Sakib Khan Pathan, Abdelouahid
Derhab, Nadjib Badache, and Samira Moussaoui, “MMSMAC: A
Multi-mode Medium Access Control Protocol for Wireless Sensor
Networks with Latency and Energy-Awareness”, Wireless Per-
sonal Communications, Springer. [SCIE-Indexed] (To Appear)
• J.52. Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat,
and Al-Sakib Khan Pathan, “Checkpointing distributed applica-
tion running on mobile ad hoc networks”, International Journal
of High Performance Computing and Networking, Inderscience
Publishers. [SCOPUS-Indexed] (To Appear)
• J.51. Dilara Ireen Swarna, Saiful Azad, Al-Sakib Khan Pathan,
and Arafatur Rahman, “Finding a suitable hop-to-hop busty traf-
fic transmission approach for Underwater Acoustic Networks: handshake-
based vs handshake-free MAC protocols”, International Journal
of Ad Hoc and Ubiquitous Computing, Inderscience Publishers.
[SCIE-Indexed] (To Appear)

98
• J.50. Mounya Smara, Makhlouf Aliouat, Al-Sakib Khan Pathan,
and Zibouda Aliouat, “Acceptance Test for Fault Detection in
Component-based Cloud Computing and Systems”, Future Gen-
eration Computer Systems, Volume 70, May 2017, pp. 74–93,
Elsevier, DOI: 10.1016/j.future.2016.06.030 [SCI-Indexed]
• J.49. Matin Saad Abdullah, Al-Sakib Khan Pathan, and Imad
Fakhri Al Shaikhli, “A Web and Software-based Approach Blend-
ing Social Networks for Online Qur’anic Arabic Learning”, The
International Arab Journal of Information Technology, Volume
14, No. 1, 2017, pp. 80-90. [SCIE-Indexed]
• J.48. Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mo-
hammed, and Al-Sakib Khan Pathan, “Detecting Zero-day Poly-
morphic Worms with Jaccard Similarity Algorithm”, Interna-
tional Journal of Communication Networks and Information Se-
curity, Vol. 8, No. 3, December 2016, pp. 203-214. [SCOPUS-
Indexed]
• J.47. N.M. Masoodhu Banu, S. Sujatha, and Al-Sakib Khan
Pathan, “Skip Block based Distributed Source Coding for Hy-
perspectral Image Compression”, Multimedia Tools and Appli-
cations, Volume 75, Issue 18, September 2016, pp 11267-11289,
Springer US, DOI: 10.1007/s11042-015-2852-6. [SCIE-Indexed]
• J.46. Kalpana Murugan and Al-Sakib Khan Pathan, “Prolonging
the Lifetime of Wireless Sensor Networks using Secondary Sink
Nodes”, Telecommunication Systems, Volume 62, Issue 2, June
2016, Springer US, pp. 347-361, DOI: 10.1007/s11235-015-0079-
5. [SCIE-Indexed]
• J.45. Djallel Eddine Boubiche, Sabrina Boubiche, HomeroToral-
Cruz, Al-Sakib Khan Pathan, Azzedine Bilami, and Samir Ath-
mani, “SDAW: Secure Data Aggregation Watermarking-based
Scheme in Homogeneous WSNs”, Telecommunication Systems,
Volume 62, Issue 2, Springer, June 2016, pp. 277-288, DOI:10.1007/s11235-
015-0047-0. [SCIE-Indexed]
• J.44. Imran Yusof and Al-Sakib Khan Pathan, “Mitigating Cross-
Site Scripting Attacks with a Content Security Policy”, IEEE
Computer, Volume: 49, Issue: 3, March 2016, pp. 56-63. [SCI-
Indexed]
• J.43. Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Shafkat
Ahmed, “Learning Algorithms for Anomaly Detection from Im-
ages”, International Journal of System Dynamics Applications,
Volume 4, Issue 3, IGI Global, July-September 2015, pp. 43-69.
[ESCI-Indexed]

99
• J.42. Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat,
and Al-Sakib Khan Pathan, “A New Efficient Checkpointing Al-
gorithm for Distributed Mobile Computing”, Journal of Control
Engineering and Applied Informatics, Vol.17, No.2 2015, pp. 43-
54. [SCIE-Indexed]
• J.41. Al-Sakib Khan Pathan and Mohssen M. Z. E. Mohammed,
“Building Customer Trust in Cloud Computing with an ICT-
enabled Global Regulatory Body”, Wireless Personal Communi-
cations, Volume 85, Issue 1, November 2015, Springer, pp. 77-99,
DOI:10.1007/s11277-015-2729-z. [SCIE-Indexed]
• J.40. Saiful Azad, Khandaker Tabin Hasan, Dip Nandi, and Al-
Sakib Khan Pathan, “A High-Throughput Routing Metric for
Multi-Hop Underwater Acoustic Networks”, Computers and Elec-
trical Engineering, Volume 44, May 2015, Elsevier, pp. 24-33,
DOI:10.1016/j.compeleceng.2015.03.020. [SCIE-Indexed]
• J.39. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“Key Revocation in Wireless Sensor Networks – A Survey on
a Less-addressed yet Vital Issue”, International Journal of Ad
Hoc and Ubiquitous Computing, Vol. 18, Nos. 1/2, Inderscience
Publishers, 2015, pp. 3-22, DOI:10.1504/IJAHUC.2015.067789.
[SCIE-Indexed]
• J.38. Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache,
and Samira Moussaoui, “On the Medium Access Control Proto-
cols Suitable for Wireless Sensor Networks – A Survey”, Inter-
national Journal of Communication Networks and Information
Security, Vol. 6, No. 2, August 2014, pp. 89-103. [SCOPUS-
Indexed]
• J.37. Al-kindy Athman Abdalla and Al-Sakib Khan Pathan, “On
Protecting Data Storage in Mobile Cloud Computing Paradigm”,
IETE Technical Review, Volume 31, Issue 1, 2014, pp. 82-91,
DOI:10.1080/02564602.2014.891382. [SCIE-Indexed] [ Recognized
as the “Most Read” article during the period of May 2014-August
2016]
• J.36. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and
Al-Sakib Khan Pathan, “Mix Column Transform based on Ir-
reducible Polynomial Mathematics for Color Image Steganogra-
phy: A Novel Approach”, Computers and Electrical Engineering,
Volume 40, Issue 4, Elsevier, May 2014, pp. 1390-1404, DOI:
10.1016/j.compeleceng.2014.02.007. [SCIE-Indexed]
• J.35. Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah,
and Al-Sakib Khan Pathan, “Routing Protocol Design for Secure
WSN: Review and Open Research Issues”, Journal of Network

100
and Computer Applications, Volume 41, 2014, Elsevier, pp. 517-
530, DOI: 10.1016/j.jnca.2014.02.008. [SCIE-Indexed]
• J.34. Al-Sakib Khan Pathan and Diallo Abdoulaye Kindy, “Lethal-
ity of SQL Injection against Current and Future Internet-Technologies”,
International Journal of Computational Science and Engineer-
ing, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 386-394,
DOI:10.1504/IJCSE.2014.060720. [ESCI-Indexed]
• J.33. Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan,
“Automated Surveillance in Distributed, Visual Networks: An
Empirical Comparison of Recent Algorithms”, International Jour-
nal of Control and Automation, Vol.7, No.3, SERSC, 2014,pp.389-
400, DOI:10.14257/ijca.2014.7.3.37. (Conference version appeared
in Mobile2013SE) [SCOPUS-Indexed]
• J.32. Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache,
and Samira Moussaoui, “Strengths and Weaknesses of Prominent
Data Dissemination Techniques in Wireless Sensor Networks”, In-
ternational Journal of Communication Networks and Information
Security, Vol. 5, No. 3, 2013, pp. 158-177. [SCOPUS-Indexed]
• J.31. Al-Sakib Khan Pathan, “Fi-Wi Network for Future Cloud”,
International Journal of Applied Research on Information Tech-
nology and Computing, Volume 4, Issue 3, December 2013, pp.
122-132, DOI:10.5958/j.0975-8089.4.3.012.
• J.30. Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz,
and Mohamad Badra, “Towards Privacy Protection in Smart
Grid”, Wireless Personal Communications, Volume 73, Issue 1,
Springer, November 2013, pp 23-50, DOI:10.1007/s11277-012-
0939-1. [SCIE-Indexed] [ Included in IEEE Communications So-
ciety’s (IEEE ComSoc) Best Readings Topics on Communica-
tions and Information Systems Security, 2013 under the category
of “Privacy”]
• J.29. Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A
Detailed Survey on various aspects of SQL Injection in Web Ap-
plications: Vulnerabilities, Innovative Attacks and Remedies”,
International Journal of Communication Networks and Informa-
tion Security, Vol. 5, No. 2, August 2013, pp. 80-92. [SCOPUS-
Indexed]
• J.28. Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou,
Rodrigo Roman, and Wai-Choong Wong, “On the Vital Areas of
Intrusion Detection Systems in Wireless Sensor Networks”, IEEE
Communications Surveys & Tutorials, Volume: 15, Issue: 3,
Third Quarter 2013, pp. 1223-1237, DOI: 10.1109/SURV.2012.121912.00006

101
[SCI-Indexed]. This article was included in IEEE Communica-
tions Society’s (IEEE ComSoc) Best Readings Topics on Com-
munications and Information Systems Security, 2013 under the
category of “Intrusion Detection Systems”]
• J.27. Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C.
Ramírez Pacheco, “Accurate Modeling of VoIP Traffic QoS Pa-
rameters in Current and Future Networks with Multifractal and
Markov Models”, Mathematical and Computer Modelling Jour-
nal, Volume 57, Issues 11–12, Elsevier, June 2013, pp. 2832-2845,
DOI:10.1016/j.mcm.2011.12.007. [SCI-Indexed]
• J.26. Feyza Gündüz and Al-Sakib Khan Pathan, “On the Key
Factors of Usability in Small-sized Mobile Touch-Screen Applica-
tion”, International Journal of Multimedia and Ubiquitous En-
gineering, Vol. 8, No. 3, SERSC, May, 2013, pp. 115-137.
[SCOPUS-Indexed]
• J.25. Harry Tin Win and Al-Sakib Khan Pathan, “On the Issues
and Challenges of Fiber-Wireless (Fi-Wi) Networks”, Journal of
Engineering, Volume 2013, Hindawi Publishing Corporation, Ar-
ticle ID 645745, 11 pages, 2013, DOI:10.1155/2013/645745.
• J.24. Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, and
Al-Sakib Khan Pathan, “SMART: A Subspace based Malicious
Peers Detection algorithm for P2P Systems”, International Jour-
nal of Communication Networks and Information Security, Vol.
5, No. 1, April 2013, pp. 1-9. [SCOPUS-Indexed]
• J.23. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and
Al-Sakib Khan Pathan, “A New Data Hiding Technique Based
on Irreducible Polynomials”, Journal of Emerging Technologies
in Web Intelligence, Volume 5, No. 1, Academy Publisher, 2013,
DOI:10.4304/jetwi.5.1.45-51. [SCOPUS-Indexed]
• J.22. Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla
Khanam, and Habibullah Yusuf Saleem, “A Pay-and-Stay Model
for Tackling Intruders in Hybrid Wireless Mesh Networks”, SIM-
ULATION: Transactions of The Society for Modeling and Sim-
ulation International, Volume 89, Issue 5, SAGE Publishing, May
2013, pp. 616-633, DOI:10.1177/0037549712467827. [SCIE-Indexed]
[This article was ranked as one of the "SIMULATION: Most-Read
Full-Text Articles" consecutively for the months of June 2013-
August 2013 under the category of "Modeling & Simulation" by
The Cyber Security and Information Systems Information Analy-
sis Center (CSIAC), USA (https://www.thecsiac.com/aggregator/sources/22)]
• J.21. Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-
Sakib Khan Pathan, “Efficient and Effective Automated Surveil-

102
lance Agents using Kernel Tricks”, SIMULATION: Transactions
of The Society for Modeling and Simulation International, Vol-
ume 89, Issue 5, SAGE Publishing, May 2013, pp. 562-577,
DOI:10.1177/0037549712460908. [SCIE-Indexed]. This article
was ranked as one of the "SIMULATION: Most-Read Full-Text
Articles" consecutively for the months of June 2013-August 2013
under the category of "Modeling & Simulation" by The Cyber
Security and Information Systems Information Analysis Center
(CSIAC), USA (https://www.thecsiac.com/aggregator/sources/22)]
• J.20. Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, and
Al-Sakib Khan Pathan, “IDPS: An Integrated Intrusion Handling
Model for Cloud Computing Environment”, International Journal
of Computing & Information Technology, Volume 4, Number 1,
International Science Press, Serials Publications, Jan-June 2012,
pp. 1-16.
• J.19. Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-
Sakib Khan Pathan, “Automated Intruder Detection from Image
Sequences using Minimum Volume Sets”, International Journal
of Communication Networks and Information Security, Volume
4, Number 1, April 2012, pp. 11-17. [SCOPUS-Indexed]
• J.18. Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-
Sakib Khan Pathan, and Choong Seon Hong, “Prioritized Hetero-
geneous Traffic-oriented Congestion Control Protocol for Wireless
Sensor Network”, The International Arab Journal of Information
Technology, Volume 9, No. 1, January 2012, pp. 39-48 [SCIE-
Indexed]
• J.17. Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Mo-
hiuddin Ahmed, and Shariq Haseeb, “Experimental Analysis of
MIPL Based Mobile IPv6 Using Single vs Dual Interface with
Practical Test-Beds”, International Journal of Applied Research
on Information Technology and Computing, Volume 2, Issue 3,
December 2011, pp. 61-79, DOI:10.5958/j.0975-8070.2.3.021.
• J.16. Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-
Sakib Khan Pathan, Ariff Abdullah, and Shariq Haseeb, “Per-
formance Analysis of a Highly Available Home Agent in Mo-
bile Networks”, American Journal of Applied Sciences, Volume
8, Issue 12, Science Publications, USA, 2011, pp. 1388-1397,
DOI:10.3844/ajassp.2011.1388.1397. [SCOPUS and ISI Indexed]
• J.15. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,
Jinfang Jiang, Lei Shu, and Guangjie Han, “An Efficient Ap-
proach of Secure Group Association Management in Densely De-
ployed Heterogeneous Distributed Sensor Network”, Security and

103
Communication Networks, Volume 4, Issue 9, Wiley InterScience,
August 2011, pp. 1013-1026, DOI:10.1002/sec.277. [SCIE-Indexed]
[Invited Paper]
• J.14. Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib
Khan Pathan, “ViSim: A User-Friendly Graphical Simulation
Tool for Performance Analysis of MANET Routing Protocols”,
Mathematical and Computer Modelling, Volume 53, Issues 11-12,
Elsevier, June 2011, pp. 2204-2218, DOI:10.1016/j.mcm.2010.08.026.
[SCI-Indexed]
• J.13. Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan,
“Securing Wireless Sensor Networks with An Efficient B+ Tree-
Based Key Management Scheme”, International Journal of Com-
munication Networks and Information Security, Volume 2, Num-
ber 3, December 2010, pp. 162-168. [SCOPUS-Indexed]
• J.12. Mohammad Ziaur Rahman and Al-Sakib Khan Pathan,
“A Case Study - Establishing Redundant Access Networks in the
Telecommunication Sector of a Developing Country”, Interna-
tional Journal of Information Technology, Communications, and
Convergence, Volume 1, No. 1, Inderscience Publishers, 2010, pp.
108-126, DOI:10.1504/IJITCC.2010.035230.
• J.11. Mohammad Ziaur Rahman and Al-Sakib Khan Pathan,
“A Case Study: Submarine Cable in Bangladesh - Its Prospects,
Present Status, and Challenges Ahead”, International Journal
of Applied Research on Information Technology and Computing,
Volume 1, Number 2, May-August 2010, pp. 209-223, DOI:10.5958/j.0975-
8070.1.2.016.
• J.10. Al-Sakib Khan Pathan, “A Review and Cryptanalysis of
Similar Timestamp-Based Password Authentication Schemes Us-
ing Smart Cards”, International Journal of Communication Net-
works and Information Security, Volume 2, Number 1, April 2010,
pp. 15-20. [SCOPUS-Indexed]
• J.09. Al-Sakib Khan Pathan and Choong Seon Hong, “Weakly
connected dominating set-based secure clustering and operation
in distributed sensor networks”, International Journal of Commu-
nication Networks and Distributed Systems, Volume 3, Number 2,
Inderscience Publishers, 2009, pp. 175-195, DOI:10.1504/IJCNDS.2009.026825.
(Conference version appeared in HPCC 2006)
• J.08. Al-Sakib Khan Pathan and Choong Seon Hong, “Design-
ing an Efficient DMCIS with Wireless Sensor and Ad Hoc Net-
works”, Ubiquitous Computing and Communication Journal, Oc-
tober 2008. (Conference version appeared in IEEE MILCOM
2006) [Open Access, available online]

104
• J.07. Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong
Seon Hong, and Eui-Nam Huh, “An Asymmetric Key-Based Se-
curity Architecture for Wireless Sensor Networks”, KSII Transac-
tions on Internet and Information Systems, Volume 2, Number 5,
October 2008, pp. 265–279, DOI:10.3837/tiis.2008.05.004. (Con-
ference version appeared in IEEE MILCOM 2007) [Open Access]
(One of the top 10 downloaded papers in May-June 2009) [SCIE-
Indexed]
• J.06. Al-Sakib Khan Pathan and Choong Seon Hong, “SERP:
Secure Energy-efficient Routing Protocol for Densely Deployed
Wireless Sensor Networks”, Annals of Telecommunications, Vol-
ume 63, Numbers 9-10, Springer, October 2008, pp. 529–541,
DOI:10.1007/s12243-008-0042-5. (Conference version appeared
in ISPA 2007) [SCI-Indexed]
• J.05. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,
Md. Forhad Rabbi, Muhammad Mahbub Alam, and Choong
Seon Hong, “NAMP: Neighbor Aware Multicast Routing Protocol
for Mobile Ad Hoc Networks”, The International Arab Journal
of Information Technology, Vol. 5, No. 1, January 2008, pp.
102-107. (Conference version appeared in IEEE E-Tech 2004)
[SCIE-Indexed]
• J.04. Al-Sakib Khan Pathan and Choong Seon Hong, “A Security
Enhanced Timestamp-Based Password Authentication Scheme
Using Smart Cards”, IEICE Transactions on Information and
Systems, Volume E90-D, No. 11, November, 2007, pp. 1885-1888.
(Conference version appeared in IEEE ICACT 2007) [SCIE-Indexed]
• J.03. Tran Thanh Dai, Al-Sakib Khan Pathan, and Choong
Seon Hong, “A Resource-Optimal Key Pre-distribution Scheme
with Improved Security for Wireless Sensor Networks”, The 9th
Asia-Pacific Network Operations and Management Symposium
(APNOMS 2006), Busan, Korea, (Y.-T. Kim and M. Takano
(Eds.)), Lecture Notes in Computer Science (LNCS), Volume
4238, Springer-Verlag 2006, pp. 546-549. (acceptance rate: 26.7%)
[SCIE-Indexed]
• J.02. Al-Sakib Khan Pathan and Choong Seon Hong, “A Key-
Predistribution-Based Weakly Connected Dominating Set for Se-
cure Clustering in DSN”, The 2006 International Conference on
High Performance Computing and Communications (HPCC 2006),
Munich, Germany, (M. Gerndt and D. Kranzlmüller (Eds.)), Lec-
ture Notes in Computer Science (LNCS), Volume 4208, Springer-
Verlag 2006, pp. 270-279. (acceptance rate: 29%) [SCIE-Indexed]
• J.01. Al-Sakib Khan Pathan and Humayun Kadir Islam, “A

105
Study on the Key Factors for Effective E-Learning”, Asian Jour-
nal of Information Technology, Volume 4 Number 1, 2005, pp.
49-52.

Papers in Refereed Conferences/ LNCS and LNICST Con-


ferences

• LNICST 09. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma,


and Al-Sakib Khan Pathan, “Reversible Data Hiding Scheme
based on 3-Least Significant Bits and Mix Column Transform”,
4th International Workshop on Applications and Techniques in
Information Security (ATIS), 26 September 2013 with the 9th
International Conference on Security and Privacy in Commu-
nication Networks (SecureComm 2013), September 25-27, 2013,
Sydney, Australia, (Zia, T., Zomaya, A., Varadharajan, V., and
Mao, M. (Eds.)) Lecture Notes of the Institute for Computer
Sciences, Social Informatics and Telecommunications Engineer-
ing (LNICST), Volume 0127, Springer 2013, pp. 405-417.
• LN.8. Shapla Khanam, Habibullah Yusuf Saleem, and Al-Sakib
Khan Pathan, “An Efficient Detection Model of Selective For-
warding Attacks in Wireless Mesh Networks”, Proceedings of
IDCS 2012, 21-23 November 2012, Wu Yi Shan, Fujian, China,
(Y. Xiang et al. (Eds.)) Lecture Notes in Computer Science
(LNCS), Volume 7646, Springer-Verlag 2012, pp. 1–14, 2012.
(acceptance rate: 34.78%)
• LN.7. Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan,
and Mohiuddin Ahmed, “On the Performance of MPI-OpenMP
on a 12 nodes Multi-core Cluster”, Proceedings of ICA3PP 2011
Workshops (IDCS Workshop), October 24-26, 2011, Melbourne,
Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part II, Lec-
ture Notes in Computer Science (LNCS), Volume 7017, Springer-
Verlag 2011, pp. 225–234, 2011. (acceptance rate: 45%) [SCOPUS-
Indexed]
• LN.6. Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio
C. Ramírez-Pacheco, “Modeling QoS Parameters of VoIP Traffic
with Multifractal and Markov Models”, Proceedings of ICA3PP
2011 Workshops (IDCS Workshop), October 24-26, 2011, Mel-
bourne, Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part
II, Lecture Notes in Computer Science (LNCS), Volume 7017,
Springer-Verlag 2011, pp. 255–265, 2011. (acceptance rate: 45%)
[SCOPUS-Indexed]
• LN.5. Md. Sabbir Rahman Sakib, Nazmus Saquib, and Al-Sakib
Khan Pathan, “A New Visual Simulation Tool for Performance

106
Evaluation of MANET Routing Protocols”, The 2010 Interna-
tional Symposium on Frontiers of Parallel and Distributed Com-
puting (FPDC 2010) In conjunction with The 10th ICA3PP 2010,
23 May, 2010, Busan, Korea, (C.-H. Hsu et al. (Eds.)): ICA3PP
2010, Part II, Lecture Notes in Computer Science (LNCS), Vol-
ume 6082, Springer-Verlag 2010, pp. 208–217, 2010. [SCOPUS-
Indexed][Invited Paper]
• LN.4. Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel
Haque, and Choong Seon Hong, “Security Management in Wire-
less Sensor Networks with a Public Key Based Scheme”, The
10th Asia-Pacific Network Operations and Management Sympo-
sium (APNOMS 2007), 10-12 October, 2007, Sapporo, Japan,
(Shingo Ata and Choong Seon Hong (Eds.)) Lecture Notes in
Computer Science (LNCS), Volume 4773, Springer-Verlag 2007,
pp. 503-506. (acceptance rate: 48.4%) [SCOPUS-Indexed]
• LN.3. Al-Sakib Khan Pathan and Choong Seon Hong, “A Se-
cure Energy-Efficient Routing Protocol for WSN”, The Fifth In-
ternational Symposium on Parallel and Distributed Processing
and Applications (ISPA 2007), August 29-31, Niagara Falls, On-
tario, Canada, (Ivan Stojmenovic, Ruppa K. Thulasiram, Lau-
rence T. Yang, Weijia Jia, Minyi Guo and Rodrigo F. de Mello
(Eds.)), Lecture Notes in Computer Science (LNCS), Volume
4742, Springer-Verlag 2007, pp. 407-418. (acceptance rate: 34%)
[SCOPUS-Indexed]
• LN.2. Al-Sakib Khan Pathan and Choong Seon Hong, “Securing
Sensor Reports in Wireless Sensor Networks”, European Confer-
ence on Parallel and Distributed Computing (Euro-Par 2007),
August 28-31, Rennes, France, (A.-M. Kermarrec, L. Bougé, and
T. Priol (Eds.)), Lecture Notes in Computer Science (LNCS),
Volume 4641, Springer-Verlag 2007, pp. 881-890. (acceptance
rate: 27%) [SCOPUS-Indexed]
• LN.1. Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong
Seon Hong, “A Key Management Scheme with Encoding and Im-
proved Security for Wireless Sensor Networks”, The 2006 Interna-
tional Conference on Distributed Computing and Internet Tech-
nology (ICDCIT 2006), December 20-23, Bhubaneswar, India, (S.
Madria, K. Claypool, R. Kannan, and P. Uppuluri (Eds.)), Lec-
ture Notes in Computer Science (LNCS), Volume 4317, Springer-
Verlag 2006, pp. 102-115. (acceptance rate: 12%)

Papers in International Conferences

• C.49. Houssem Mansouri, Al-Sakib Khan Pathan, and Makhlouf

107
Aliouat, “A Snapshot Security Protocol for Radar Network Pro-
tection”, 7th Seminar on Detection Systems: Architectures and
Technologies (DAT 2017), February 20-22, 2017, Algiers, Algeria.
(To Appear)
• C.48. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“ECL-EKM: An Enhanced Certificateless Effective Key Manage-
ment Protocol for Dynamic WSN”, International Conference on
Networking, Systems and Security (NSysS 2017), January 5-8,
2017, Dhaka, Bangladesh, pp. 150-155.
• C.47. Houssem Mansouri and Al-Sakib Khan Pathan, “An Ef-
ficient Minimum-Process Non-Intrusive Snapshot Algorithm for
Vehicular Ad Hoc Networks”, 13th ACS/IEEE International Con-
ference on Computer Systems and Applications (AICCSA 2016),
November 29-December 2, 2016, Agadir, Morocco. (acceptance
rate: 26%)
• C.46. Matin Saad Abdullah, M.M. Hafizur Rahman, Al-Sakib
Khan Pathan, and Imad Fakhri Al Shaikhli, “A Practical and In-
teractive Web-based Software for Online Qur’anic Arabic Learn-
ing”, International Conference on Information & Communication
Technology For the Muslim World (ICT4M’16), November 22-24,
2016, Jakarta, Indonesia, pp. 76-81.
• C.45. Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan
Pathan, Nadjib Badache, and Samira Moussaoui, “MMSMAC: A
Multi-mode Medium Access Control Protocol for Wireless Sen-
sor Networks”, IEEE Wireless Communications and Networking
Conference (IEEE WCNC 2016), April 3-6, 2016, Doha, Qatar.
• C.44. Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat,
and Al-Sakib Khan Pathan, “A Non-Blocking Coordinated Check-
pointing Algorithm for Message-Passing Systems”, International
Conference on Intelligent Information Processing, Security and
Advanced Communication (IPAC 2015), Article No. 34, ACM,
November 23-25, 2015, Batna, Algeria.
• C.43. Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat,
and Al-Sakib Khan Pathan, “Adaptive Fault Tolerant Check-
pointing Algorithm for Cluster Based Mobile Ad Hoc Networks”,
International Conference on Advanced Wireless, Information, and
Communication Technologies (AWICT 2015), September 20-23,
2015, Sousse, Tunisia, Procedia Computer Science, Elsevier, Vol-
ume 73, 2015, pp. 40-47.
• C.42. A. Babu Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram,
and Al-Sakib Khan Pathan, “Energy-Efficient Sybil Node Detec-
tion Algorithm for Wireless Sensor Networks”, 3rd International

108
Conference on Eco-Friendly Computing and Communication Sys-
tems (ICECCS), December 18-21, 2014, Mangalore, India, pp.
95-98.
• C.41. Mohssen M. Z. E. Mohammed, and Al-Sakib Khan Pathan,
“International Center for Monitoring Cloud Computing Providers
(ICMCCP) for Ensuring Trusted Clouds”, The 11th IEEE In-
ternational Conference on Autonomic and Trusted Computing
(ATC-2014), December 9-12, 2014, Ayodya Resort, Bali, Indone-
sia, pp. 571-576.
• C.40. Md. Rafiqul Islam, M.A.E. Shakib, Md. Azizur Rahaman,
Md. Obaidur Rahman, and Al-Sakib Khan Pathan, “A Neigh-
bour Discovery Approach for Cognitive Radio Network Using
Tower of Hanoi (ToH) Sequence Based Channel Rendezvous”,
The 5th International Conference on Information and Communi-
cation Technology for the Muslim World (ICT4M 2014), Novem-
ber 17-19, 2014, Kuching, Sarawak, Malaysia.
• C.39. Imran Yusof and Al-Sakib Khan Pathan, “Preventing Per-
sistent Cross-Site Scripting (XSS) Attack By Applying Pattern
Filtering Approach”, The 5th International Conference on In-
formation and Communication Technology for the Muslim World
(ICT4M 2014), November 17-19, 2014, Kuching, Sarawak, Malaysia.
• C.38. Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Ahmed,
“Adaptive Algorithms for Automated Intruder Detection in Surveil-
lance Networks”,ICACCI 2014 Doctoral Consortium; 3rd Interna-
tional Conference on Advances in Computing, Communications
& Informatics (ICACCI 2014), September 24-27, 2014, Delhi, In-
dia, pp. 2775-2780.
• C.37. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“SECRET: A Secure and Efficient Certificate Revocation Scheme
for Mobile Ad Hoc Networks”, International Symposium on Bio-
metric and Security Technologies 2014 (ISBAST’14), August 26-
27, 2014, Kuala Lumpur, Malaysia, pp. 137-143.
• C.36. Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco
Ventura, and Al-Sakib Khan Pathan, “An Automated Signature
Generation Method for Zero-day Polymorphic Worms Based on
Multilayer Perceptron Model”, 2nd International Conference on
Advanced Computer Science Applications and Technologies (AC-
SAT2013), December 22-24, 2013, Kuching, Sarawak, Malaysia,
pp. 450-455.
• C.35. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and
Al-Sakib Khan Pathan, “Data Hiding within Color Images based
on MCT with X-OR Operations”, 2nd International Conference

109
on Advanced Computer Science Applications and Technologies
(ACSAT2013), December 22-24, 2013, Kuching, Sarawak, Malaysia,
pp. 19-24. [Invited Paper]
• C.34. Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan,
“Automated Surveillance in Distributed, Wireless Visual Net-
works: A Comparative Study”, Workshop on Mobile and Wire-
less 2013 Second (Mobile2013SE), December 11-13, 2013, Jeju
National University International Center, Jeju Island, Korea; Ad-
vanced Science and Technology Letters, Volume 42 (Mobile and
Wireless 2013), DOI: 10.14257/astl.2013.42.01, pp.1-4. [Invited
Paper]
• C.33. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“On the Key Revocation Schemes in Wireless Sensor Networks”,
The 2013 IEEE International Conference on Green Computing
and Communications (GreenCom 2013): Security, Privacy, and
Trust Computing, Beijing, China, August 20-23, 2013, pp. 290-
297.
• C.32. Matin Saad Abdullah and Al-Sakib Khan Pathan, “Learn-
ing Qur’anic Arabic through Interactive Web-Based Software: A
case-study in Languages for Specific Purposes”, The 4th Inter-
national Conference on Information and Communication Tech-
nology for the Muslim World (ICT4M 2013), March 25-27, 2013,
Rabat, Morocco, pp. 1-6. (CD Proceedings)
• C.31. Feyza Gündüz and Al-Sakib Khan Pathan, “Usability Im-
provements for Touch-Screen Mobile Flight Booking Application:
A Case Study”, International Conference on Advanced Computer
Science Applications and Technologies (ACSAT2012), November
26-28 2012, Kuala Lumpur, Malaysia, pp. 49-54.
• C.30. Muhammad Faheem Mohd Ezani, Al-Sakib Khan Pathan,
and Shariq Haseeb, “Comparative Analysis of IEEE 802.11g Mul-
timedia Multicast Performance Using RTP with an Implemented
Test-bed”, The 2012 IEEE Conference on Open Systems (ICOS
2012), October 21-24, 2012, Kuala Lumpur, Malaysia, pp. 1-5
(CD Proceedings).
• C.29. Matin Saad Abdullah, Al-Sakib Khan Pathan, and Muham-
mad Abdur Rahman, “Using the Web for Critical Learning of Al-
Qur’an’s Language: an Exploratory Case Study”, (Poster) World
Conference on Islamic Thought 2012 (WCIT’12), September 11-
12, 2012, Perak, Malaysia.
• C.28. Imad Al Shaikhli, Akram M. Zeki, Rusydi Makarim, and
Al-Sakib Khan Pathan, “Protection of Integrity and Ownership

110
of PDF Documents Using Invisible Signature”, UKSim 14th In-
ternational Conference on Computer Modelling and Simulation
(UKSim2012), Cambridge University (Emmanuel College), March
28-30, 2012, UK, pp.533-537.
• C.27. Xianglin Wei, Tarem Ahmed, Ming Chen, and Al-Sakib
Khan Pathan, “PeerMate: A Malicious Peer Detection Algorithm
for P2P Systems based on MSPCA”, International Conference
on Computing, Networking and Communications (IEEE ICNC
2012), January 30 - February 2, 2012, Maui, Hawaii, USA, pp.
815-819. (acceptance rate: 35%)
• C.26. Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-
Sakib Khan Pathan, “Intruder Detection in Camera Networks
using the One-Class Neighbor Machine”, American Telecommu-
nications Systems Management Association (ATSMA), Network-
ing and Electronic Commerce Research Conference 2011 (NAEC
2011), October 13-16, 2011, Riva del Garda, Italy, pp. 115-118.
[ Invited Paper]
• C.25. Leopoldo Estrada-Vargas, Homero Toral-Cruz, Al-Sakib
Khan Pathan, and Deni Torres-Román, “A Generator of Cauchy-
distributed Time Series with Specific Hurst Index”, American
Telecommunications Systems Management Association (ATSMA),
Networking and Electronic Commerce Research Conference 2011
(NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp.
8-14. [Invited Paper]
• C.24. Mohammad Moshee Uddin, Shariq Haseeb, Mohiuddin
Ahmed, and Al-Sakib Khan Pathan, “Comprehensive QoS Analy-
sis of MIPL Based Mobile IPv6 Using Single VS.Dual Interfaces”,
Proceedings of 1st International Conference on Electrical, Con-
trol and Computer Engineering 2011 (IEEE InECCE 2011), June
21-22, 2011, Kuantan, Pahang, Malaysia, pp. 388-393.
• C.23. Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A
Survey on SQL Injection: Vulnerabilities, Attacks, and Preven-
tion Techniques”, (Poster) Proceedings of The 15th IEEE Sym-
posium on Consumer Electronics (IEEE ISCE 2011), June 14-17,
2011, Singapore, pp. 468-471.
• C.22. Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Shariq
Haseeb, and Mohiuddin Ahmed, “A Test-Bed Analysis for Seam-
less MIPV6 Handover in Heterogeneous Environment”, Proceed-
ings of The 15th IEEE Symposium on Consumer Electronics
(IEEE ISCE 2011), June 14-17, 2011, Singapore, pp. 89 - 94.
• C.21. Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-
Sakib Khan Pathan, Ariff Abdullah, Shariq Haseeb, and Omar

111
Al-Mushayt, “Performance Analysis of a Highly Available Home
Agent in Mobile Networks”, Proceedings of 14th Communica-
tions and Networking Symposium (CNS 2011) with SpringSim’11,
April 4-7, 2011, Boston, MA, USA, pp. 62-70.
• C.20. Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan,
“An Enhanced Tree-based Key Management Scheme for Secure
Communication in Wireless Sensor Network”, Proceedings of the
3rd IEEE International Workshop on Internet and Distributed
Computing Systems (IDCS’10) in conjunction with the 12th IEEE
International Conference on High Performance Computing and
Communications (HPCC 2010) September 01-03, 2010, Melbourne,
Australia, pp. 671-676.
• C.19. Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-
Sakib Khan Pathan, “Demo Abstract: ViSiM, A MANET Rout-
ing Simulation Demonstration Tool for Naive Users”, The 29th
IEEE Conference on Computer Communications (IEEE INFO-
COM 2010), March 15-19, 2010, San Diego, CA, USA. [Paper in
Demo Session]
• C.18. Al-Sakib Khan Pathan and Choong Seon Hong, “Bilinear-
Pairing-Based Remote User Authentication Schemes Using Smart
Cards”, Proceedings of the Third International Conference on
Ubiquitous Information Management and Communication (ACM
ICUIMC 2009), ACM SIGKDD and ACM SIGMOD, January 15-
16, 2009, SKKU, Suwon, Korea, pp. 366-371.
• C.17. Al-Sakib Khan Pathan and Choong Seon Hong, “Feasibil-
ity of PKC in Resource-Constrained Wireless Sensor Networks”,
Proceedings of the IEEE International Workshop on Internet
and Distributed Computing Systems (IEEE IDCS’08) in con-
junction with 11th IEEE ICCIT’08, December 24, 2008, Khulna,
Bangladesh, pp. 13-20. (acceptance rate: 25.45%)
• C.16. Muhammad Mostafa Monowar, Md. Obaidur Rahman,
Al-Sakib Khan Pathan, and Choong Seon Hong, “Congestion
Control Protocol for Wireless Sensor Networks Handling Prior-
itized Heterogeneous Traffic”, Proceedings of the 2nd Interna-
tional Symposium on Security and Multimodality in Pervasive
Environments (SMPE’08) Workshop in conjunction with MobiQ-
uitous 2008, July 21-25, 2008, Trinity College Dublin, Ireland,
2008. (acceptance rate: 24%)
• C.15. Al-Sakib Khan Pathan and Choong Seon Hong, “Crypt-
analysis of Yang-Wang-Chang’s Password Authentication Scheme
with Smart Cards”, Proceedings of the 10th International Con-
ference on Advanced Communication Technology (IEEE ICACT

112
2008), Volume III, February 17-20, 2008, Phoenix Park, Korea,
pp. 1618-1620.
• C.14. Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong
Seon Hong, “Securing U-Healthcare Sensor Networks using Public
Key Based Scheme”, Proceedings of the 10th International Con-
ference on Advanced Communication Technology (IEEE ICACT
2008), Volume II, February 17-20, 2008, Phoenix Park, Korea,
pp. 1108-1111.
• C.13. Al-Sakib Khan Pathan, Gihyuk Heo, and Choong Seon
Hong, “A Secure Lightweight Approach of Node Membership
Verification in Dense HDSN”, Proceedings of the IEEE Military
Communications Conference (IEEE MILCOM 2007), October 29-
31, Orlando, Florida, USA, p. 99 (CD).
• C.12. Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung
Goo Choi, and Choong Seon Hong, “An Efficient PKC-Based Se-
curity Architecture for Wireless Sensor Networks”, Proceedings
of the IEEE Military Communications Conference (IEEE MIL-
COM 2007), October 29-31, Orlando, Florida, USA, p. 72 (CD).
[This article received IEEE Student Travel Grant Award]
• C.11. Brian J. d’Auriol, Nguyen Thi Thanh Tuyen, Vo Quoc
Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, S.M.K.R.
Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan,
Sunghyun Kim, Shu Lei, Sakib Pathan, Tran Van Phuong, Sungy-
oung Lee and Young-Koo Lee, “Embedded Processor Security”,
Proceedings of the 2007 International Conference on Security and
Management (SAM’07), June 25-28, Las Vegas, Nevada, USA,
pp. 591-594.
• C.10. Al-Sakib Khan Pathan and Choong Seon Hong, “An Im-
proved Timestamp-Based Password Authentication Scheme with
Two-Party Verification using Smart Cards”, Proceedings of the
9th International Conference on Advanced Communication Tech-
nology (IEEE ICACT 2007), Volume I, February 12-14, 2007,
Phoenix Park, Korea, pp. 804-809.
• C.09. Al-Sakib Khan Pathan, Choong Seon Hong, and Tatsuya
Suda, “A Novel and Efficient Bilateral Remote User Authentica-
tion Scheme Using Smart Cards”, Proceedings of the 2007 IEEE
International Conference on Consumer Electronics (IEEE ICCE
2007), January 10-14, Las Vegas, USA, pp. 1-2. (acceptance rate:
41.9%)
• C.08. Al-Sakib Khan Pathan and Choong Seon Hong, “Devel-
oping an Efficient DMCIS with Next-Generation Wireless Net-
works”, Proceedings of the IEEE Military Communications Con-

113
ference (IEEE MILCOM 2006), October 23-25, Washington, DC,
USA, p. 92 (CD). [This article received IEEE Student Travel
Grant Award]
• C.07. Al-Sakib Khan Pathan and Choong Seon Hong, “Secure
Clustering in DSN with Key Predistribution and WCDS”, Pro-
ceedings of the IEEE Military Communications Conference (IEEE
MILCOM 2006), October 23-25, Washington, DC, USA, p. 93
(CD).
• C.06. Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon
Hong, “An Efficient LU Decomposition-based Key Pre-distribution
Scheme for Ensuring Security in Wireless Sensor Networks”. Pro-
ceedings of the 2006 IEEE International Conference on Computer
and Information Technology (IEEE CIT 2006), September 20-22,
Seoul, Korea, 2006, pp. 227-232. (acceptance rate: 40%)
• C.05. Al-Sakib Khan Pathan, Choong Seon Hong, and Hyung-
Woo Lee, “Towards Developing Smart Environment using Wire-
less Sensor and Ad Hoc Networks”, Accepted as Poster in the
International Conference on Computational Science and its Ap-
plications 2006, Glasgow, Scotland (UK), ICCSA 2006 (IEE),
May 8-11, 2006.
• C.04. Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon
Hong, “Security in Wireless Sensor Networks: Issues and Chal-
lenges”, Proceedings of the 8th International Conference on Ad-
vanced Communication Technology (IEEE ICACT 2006), Vol-
ume II, 20-22 February, Phoenix Park, Korea, 2006, pp. 1043-
1048. [This article was included in IEEE Communications Soci-
ety’s (IEEE ComSoc) Best Readings Topics on Communications
and Information Systems Security, 2013 under the category of
“Wireless Sensor Networks”]{This article has got 401 citations as
of 13 September, 2016 according to Google Scholar}
• C.03. Al-Sakib Khan Pathan, Choong Seon Hong, and Hyung-
Woo Lee, “Smartening the Environment using Wireless Sensor
Networks in a Developing Country”, Proceedings of the 8th In-
ternational Conference on Advanced Communication Technology
(IEEE ICACT 2006), Volume I, 20-22 February, Phoenix Park,
Korea, 2006, pp. 705-709.
• C.02. Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit An-
jum Sayeed, Farruk Ahmed, and Choong Seon Hong, “A Frame-
work for Providing E-Services to the Rural Areas Using Wireless
Ad Hoc and Sensor Networks”, Proceedings of the First Interna-
tional Conference on Next-Generation Wireless Systems (IEEE
ICNEWS 2006), 2-4 January, Dhaka, Bangladesh, 2006, pp. 282-
286.

114
• C.01. Al-Sakib Khan Pathan, Md. Mahbub Alam, Md. Mostafa
Monowar, and Md. Forhad Rabbi, “An Efficient Routing Proto-
col for Mobile Ad Hoc Networks with Neighbor Awareness and
Multicasting”. Proceedings of IEEE E-Tech, pp. 97-100, Karachi,
Pakistan, 31 July, 2004.

115
1. Name: Shahriar Manzoor

2. Designation: Associate Professor

3. Degrees obtained:
University Degree Field of Special-
ization
Bangladesh University of En- BSc CSE
gineering and Technology

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Associate Pro- May 2018 till date
fessor
Southeast University Assistant Pro- December 2014 June
fessor 2018
Southeast University Sr. Lecturer April 2007 – Dec 2014
Southeast University Lecturer September 2002 – April
2007

5. Other related experience-research, industrial etc.


Organization/Employer Designation Period
Judge of ACM International Collegiate Pro- 2003-2017
gramming Contest, World Finals
Judging Director of ACM ICPC Dhaka Re- 2004-2016
gional
President, Bangladesh Association of
Problem-setters

6. Consultancy and sponsored Research activities:

116
Year Organization Project
Amount re-
ceived
2006-2009 Was involved with Did not receive
edujudge project any direct fund
http://www.edujudge.eu/ .It
is a joint project of European
Commission and CEDETEL
(http://www.cedetel.es/ ).
7. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
3 3

8. Honours and Awards:

• 3rd in National Programming Contest of 2001


• 3rd in ACM ICPC Dhaka Regional,1999
• 2nd in ECD Programming Contest organized in BUET
• Junior Scholarship in Class 8
• 2nd in BUET Admission test
• 7th in University of Dhaka Ka Unit Admission Test
• Award from ICT Ministry for being a World Finals Judge for a
long time

9. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

• Attended CLI Symposium in ACM ICPC World Finals 2017


• Attended CLI Symposium in ACM ICPC World Finals 2014
• Attended CLI Symposium in ACM ICPC World Finals 2013
• Attended WAMCOM 2015 in BUET

Publications List:

International Journal:

• IT-INDUSTRIES IN BANGLADESH FOR DEVELOPING SOFT-


WARE FOR GOOD GOVERNENCE – Presented in a conference
of Institute of Engineers (With Prof. Golam Mohiuddin, IPE
Dept, BUET)

117
• “Competitive Learning in Informatics: The UVa Online Judge
Experience”, Miguel A. REVILLA, Shahriar MANZOOR, Rujia
LIU, published in OLYMPIADS IN INFORMATICS, 2008, Vol.
2, 131-148
• “Common Mistakes in Online and Real-time Programming Con-
tests” – published in ACM Magazine Crossroads August 2001
Edition and republished in Summer 2008 edition.

International Conference:

• On optimal keyboard layout, presented at International Con-


ference on Computer and Information Technology, 2000. Held
during 25-26 th January, 2001 (With M. Abedin and Dr. M.
Kaykobad)
• “Analyzing Programming Contest Statistics”, accepted at Per-
spectives on Computer Science Competitions for (High School)
Students, Dagstuhl, Germany
• “CodeMarshal Judge: Deploying Cloud to Enhance ACM ICPC
Reach”, Mohammad Mahmudur Rahman, Mahmud Ridwan, Shahriar
Manzoor, Miguel Revilla

118
1. Name: Md. Ashiqur Rahman

2. Designation: Assistant Professor

3. Degrees obtained:
University Degree Field of Special-
ization
North South University M.Sc. Computer Science
& Engineering.
American International Uni- B.Sc. Computer Engi-
versity – Bangladesh neering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Assistant Pro- 12 Years 6 Months
fessor
Aptech Computer Educa- Instructor 6 Months
tion

5. Publications:
Papers Pub- Papers presented in Review Pa-
lished in Conferences pers
Refereed Jour-
nals
5 3 N/A
6. Membership of Scientific and Professional Societies: Institution of En-
gineers, Bangladesh, M – 31249

7. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

Publications List:

International Journal:

119
• Md. Ashiqur Rahman, M. Rashedur Rahman, “CAPM Indexed
Hybrid E-Negotiation for Resource Allocation in Grid Comput-
ing”, IJGHPC, Volume 5, Issue 2. 2013, IGI, ISSN: 1938-0259
• Md. Ashiqur Rahman, Roksana Akter, M. Rashedur Rahman,
“Fuzzy-Logic Based Self Adaptive Grid Architecture”, Journal of
Computing (JOC), Vol. 3, Issue 6, June 2011, ISSN: 2151-9617.
• Md. Ashiqur Rahman, Shaffat Sheik Giasuddin, M. Rashuedur
Rahman, “Decision Tree Based Routine Generation (DRG) Al-
gorithm: A Data Mining Advancement to Generate Academic
Routine and Exam-time Tabling for Open Credit System”, Jour-
nal of Computers (JCP), Vol. 5, No. 1, Academy Publisher (AP
Journal), 2010.
• Mohammad Shahidul Karim, Md. Ashiqur Rahman, Abul Kalam
Azad, “Discovering Models from Event-Based Data Basis on a
Survey of Issues and Application”, WeST 2010, Springer.
• Abul Kalam Azad, Md. Ashiqur Rahman, Subrata Kumar Aditya,
“Estimation of the Maximum Power and the Normal Operating
Power of a PV Module using Artificial Neural Network”, Vol. 1
No. 1, SEUJSE, 2008, ISSN 1999-1630
• Md. Ashiqur Rahman, Shaffat S. Giasuddin, M. Shamim, Abul
Kalam Azad, “Hardware Implementation for Data Encryption
Standard using VerilogHDL”, Vol. 1 No. 1, SEUJSE, 2008, ISSN
1999-1630

International Conference:

• Md. Ashiqur Rahman, M. Rashedur Rahman, “CAPMAuction:


Reputation Indexed Auction Model for Resource Allocation in
Grid Computing”, ICECE 2012, IEEE Xplore, ISBN: 978-1-4673-
1434-3
• Md. Ashiqur Rahman, Shaffat Sheik Giasuddin, M. Rashuedur
Rahman, “Decision Tree Based Routine Generation (DRG) Algo-
rithm: A Data Mining Advancement to Generate Academic Open
Credit System”, ICCIT 2008, IEEE Xplore.

120
1. Name: Roksana Akter

2. Designation: Assistant Professor


3. Degrees obtained:
University Degree Field of Specialization
University of Dhaka M.Sc. Computer Science and Engi-
neering
University of Dhaka B.Sc. Computer Science and Engi-
neering
4. Employment record (starting from present position):
University/College Designation Period
Southeast University Assistant Pro- 5th January,2016 - to
fessor date
Southeast University Senior Lecturer 1st April,2010 - 4th Jan-
uary,2016
Southeast University Lecturer 16th May,2007 – 31st
March,2010
5. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
07 02 N/A
Publications List:

International Journal:

• Roksana Akter; “Mobile Grid Architecture and Service Compo-


sition.” Southeast Journal of Science & Engineering (SEUJSE),
volume 8, No. 1-2.
• Md. Ashiqur Rahman, Roksana Akter, M. Rashedur Rahman;
“Fuzzy-Logic Based Self Adaptive Grid Architecture”; Journal
of Computing, Volume 3, Issue 6, June 2011, ISSN 2151-9617;
WWW.JOURNALOFCOMPUTING.ORG.

121
• Roksana Akter, M. Lufar Rahman; “A Geometric Model to Re-
duce Interference Computations in Simulation of Large Ad hoc
Networks”. Journal of Networks by Academy Publisher; Vol 6,
No 1, Jan 2011; ISSN 1796-2056, page: 46-53. IEEE Xplored.
• Roksana Akter, M. Lufar Rahman; “Simulation of Large Ad hoc
Networks: Reducing Complexity of Interference Computations
through Adaptive Node Grouping.” Journal of the Bangladesh
Electronics Society; Volume 9, Number1-2, June-December 2009,
ISSN: 1816-1510; page: 01-08.
• Roksana Akter, M. Lufar Rahman; “Minimal Rectangle Approach:
A Dynamic Range Selection Model for Node Discovery in Sim-
ulating Large Mobile Ad-hoc Networks.” Southeast University
Journal of Science & Engineering (SEUJSE), volume 1, issue 1,
2008. ISSN: 1999-1630; page: 1-8.
• M. Lutfar Rahman, Farzana Yasmeen, Roksana Akter; "Com-
parative Study of the AODV, DSDV and DSR Wireless Ad-Hoc
Network Routing Protocols". Journal of The People’s Univer-
sity of Bangladesh, Volume 3, Number 1, Janury 2008. ISSN:
1812-4747; pp. 40-59
• Md. Minhajul Abedin, Roksana Akter, Shah Mostafa Khaled,
Md. Rashedul Bari; “A Low Cost Effective Leader Election Al-
gorithm based on AODV.” Journal of Computer Science; IBAIS
University. Volume 1 Number 2, December 2007. Page: 45-52.

International Conference:

• Roksana Akter, Mohammad Shaiduzzaman, M. Lufar Rahman;


“Finding Secure Keys for RSA Algorithm through Factorization.”
National Conference on Cryptography and Information Security,
NCCIS 2006, Organized by- Daffodil International University,
Dhaka,15 December, 2006. Proceedings Page: 11-15.
• Roksana Akter, M. Lufar Rahman; “Geometric Model for Min-
imizing Node Discovery Load in Network Simulators for Large
Ad hoc Networks”. 12th International Conference on Computer
and Information Technology, ICCIT 2009; Print ISBN: 978-1-
4244-6281-0; INSPECAccessionNumber: 11136610; Digital Ob-
ject Identifier: 10.1109/ICCIT.2009.5407151; Page(s): 133 – 138.
IEEE Xplored.

122
1. Name: Rezwan-Al-Islam Khan

2. Designation: Assistant Professor

3. Degrees obtained:
University Degree Field of Specialization
Independent Univer- M. Sc. Telecommunication Engi-
sity Bangladesh neering
Independent Univer- B. Sc. (Hons.) Computer Science
sity Bangladesh

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Assistant Pro- 2015 - Now
fessor
Southeast University Senior Lecturer 2012 - 2015
Independent Univer- Lecturer 2006 - 2008
sity Bangladesh
Manarat International Lecturer 2005 - 2006
College

5. Other related experience-research, industrial etc.


Organization/Employer Designa- Period
tion
Mentor, Access to Information(A2I), 2017 – till now
Prime Minister’s Office

6. Publications:
Papers Published in Papers pre- Review Papers
Refereed Journals sented in Con-
ferences
05 03 01

7. Honours and Awards:

123
• Chancellor’s Gold Medal 2006 for Master of Science in Telecom-
munication Engineering
• "Magna Cum Laude" Bachelor of Science (Honors) in Computer
Science

8. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.
Publications List:

• Khan R.-.A.-I., Automatic Incident Detection Framework For


Large Scale Urban Road Traffic Networks, International Jour-
nal of Computer & Mathematical Sciences, ISSN 2347–8527, Vol.
4, No. 11 November 2015.
• Khan R.-.A.-I., Design and Development of a Desktop Computer
Numeric Control Machine, International Journal of Electronics,
Electrical and Computational System, ISSN 2348-117X, Vol. 4,
No. 11 November 2015.
• Anwer M., Kalam N., Khan R.-.A.-I., De-noising Speech Sig-
nal Using Composite Wavelets and Grazing Estimation Methods,
Journal of Emerging Trends in Computing and Information Sci-
ences, ISSN 2079-8407, Vol. 4, No. 11 November 2013.
• Anwer M., Khan R.-.A.-I., Voice identification Using a Composite
Haar Wavelets and Proper Orthogonal Decomposition, Interna-
tional Journal of Innovation and Applied Studies, ISSN 2028-9324
Vol. 4 No. 2 Oct. 2013, pp. 353-358
• Khan R.-.A.-I., Landfeldt B., Dhamdere A., Predicting Travel
Times in Dense and Highly Varying Road Traffic Networks using
STARIMA Models, Technical Report, The University of Sydney,
URL: http://sydney.edu.au/engineering/it/research/tr/tr685.pdf,
ISBN: 9781742102696, February 2012.
• Khan R.-A.-I., Anwer M. Graphical Tools for Computer Algo-
rithms Using OpenGL, In 7th International Conference on Com-
puter and Information Technology 2004.
• Khan R.-A.-I, Salim K.M. Microcontroller Based Data Acqui-
sition System Used In Calculating Gravitational Acceleration In
8th International Conference on Computer and Information Tech-
nology 2005.
• Kalam N., Anwer M., Khan R.-A.-I, .Enhancement of Bayesian
Spam Filter In 8th International Conference on Computer and
Information Technology 2005.

124
1. Name: Md. Mijanur Rahman

2. Designation: Assistant Professor

3. Degrees obtained:
University Degree Field of Specialization
Islamic University of Ph.D. Computer Science and Engi-
Technology (Ongoing) neering
East West University M.Sc. Computer Science and Engi-
neering
East West University B.Sc. Computer Science and Engi-
neering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Assistant Pro- May,2018 - to date
fessor
Shanto-Moriam Uni- Assistant Pro- November 2016 - May
versity of Creative fessor 2018
Technology

5. Other related experience-research, industrial etc.


Organization/Employer Designation Period
Consultant ICT (Software Engineering) February 2016 -
Syntech Solution Ltd. September 2016
Trainer (Professional Workshop & Seminar) January 2010 - 30
Bdjobs.com September 2014 (Part
time)

6. Publications:
Papers Published in Papers presented in Books
Refereed Journals Conferences
08 02 07

7. Honours and Awards:

125
• Merit scholarship for the year 2005-2006, East West University
• ND place in an Intra University Programming Contest organized
by EWU
• 1st place for English speech competition organized by EWUECC.
• 2nd NC Intra College Debating Championship, 2001.
• Member of ACM (Association for Computing Machinery).
• Moderator of APPSO (Mobile Apps Development), Department
of SWE, Daffodil International University, 2013
• Summit on Leadership and Entrepreneurship, Dhrubotara, 2013
• Key Speaker of Outsourcing Workshop, DIU, Department of SWE,
Daffodil International University, 2012

8. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

Publications List:

Books:

• Md. Mijanur Rahman, 2015, Object Oriented Programming Java,


Published by: Gyankosh Prokashoni, Dhaka, ISBN 978-984-8812-
91-4
• Md. Mijanur Rahman, 2012, PHP and MYSQL, Published by:Gyankosh
Prokashoni, Dhaka, ISBN 978-984-8933-96-1
• Md. Mijanur Rahman, 2014, Object Oriented Programming PHP,
Published by: Gyankosh Prokashoni, Dhaka, ISBN 984-300-0032-
94
• Md. Mijanur Rahman, 2010, Freelancing and Outsourcing, Pub-
lished by: Gyankosh Prokashoni, Dhaka, ISBN 984-300-0032-64
• Md. Mijanur Rahman, Jewel Ahmed 2013, Java Script, Published
by: Gyankosh Prokashoni, Dhaka, ISBN 984-300-0032-94
• Md. Mijanur Rahman, 2013, HTML5, Published by: Gyankosh
Prokashoni, Dhaka, ISBN 978-984-90538-0-4
• Md. Mijanur Rahman, 2013, CSS3, Published by: Gyankosh
Prokashoni, Dhaka, ISBN 984-300-0032-97

International Journal:

126
• Md. Mijanur Rahman , Subarata Chandra Talukder; "Customer
requirements oriented component based software development life
cycle model"; IEEE - 2015 International Conference on Comput-
ers, Communications and System (ICCCS), ISBN: 978-1-4673-
9756-8, 2015
• Md. Mijanur Rahman , Md. Alamgir Kabir; "A Survey on Secu-
rity Requirements Elicitation and Presentation in Requirements
Engineering Phase"; American Journal and Engineering Research
(AJER), PP 360-366, Volume 2, Issue 12, 2013, USA;
• Md.Mijanur Rahman, Md.NazimUddin, Sujan Chandra Sarker;
"Abrupt Software Cost Estimation Technique Based on Basic Re-
quirement"; International Journal of Research in Computer and
Communication Technology (IJRCT) ISSN: 2278-5841, 2015
• Shariful Islam Majumdar, Md. Mijanur Rahman, Md. Saidur
Rahman; "Stakeholder Prioritization in Requirement Engineering
Process: A Case Study on School Management System"; Scientific
Academic Publishing, USA ISSN: 2163-1484, 2014
• Shariful Islam Majumdar, Md. Mijanur Rahman, Md. Saidur
Rahman; "Thorny Issues of Stakeholder Identification and Prior-
itization in Requirement Engineering Process"; IOSR Journal of
Computer Engineering (IOSR-JCE), 2013
• Md. Mijanur Rahman1, Kazi Imdadul Islam2, Tapushe; "Adapt-
ing Social Network to Make Effective Class Room Learning: A
Case Study Facebook"; IOSR Journal of Research Method in
Education, 2013
• Md. Mijanur Rahman and Shamim Ripon; "Eliciting and Model-
ing Non-Functional Requirements-A POS Case Study"; Interna-
tional Journal of Future Computer and Communication (IJFCC),
Singapore, Vol.2(5):485-489 ISSN: 2010-3751, 2013
• Md. Mijanur Rahman , Md. Alamgir Kabir and Md. Ismail
Jabiullah; "Model for Identifying the Security of a System: A
Case Study of Point of Sale System"; International Organization
of Scientific Research (IOSR)-Journal of Computer Engineering
(IOSR-JCE), Volume 11, Issue 6 (May. - Jun. 2013), PP 75-82,
2013

International Conference:

• Md. Mijanur Rahman and Shamim Ripon,"Modeling Nonfunc-


tional Requirements- A Case Study", International Conference
on Future Trends in Computing and Communication Technology,
Malaysia

127
• Md. Mijanur Rahman and Subarata Chandra Talukder, "Cus-
tomer Requirements Oriented Component based Software De-
velopment Life Cycle Model", 2015, International Conference on
Computers, Communications, and Systems

128
1. Name: Monirul Hasan

2. Designation: Senior Lecturer

3. Degrees obtained:
University Degree Field of Specialization
University of Manitoba Master of Sci- Computer Science
ence (course
work com-
pleted)
North South University Bachelor of Computer Science
Science

4. Employment record (starting from present position):


University/College Designation Period
Southeast University, Senior Lec- September, 2015 to
Bangladesh turer present
Lecturer May, 2011 to September,
Lecturer 2015
February, 2003 to August,
2005
University of Manitoba, Sessional January, 2007 to August,
Canada Instructor 2007
North South University, Teaching As- September, 2001 to Au-
Bangladesh sistant gust, 2002
Trainer, Pro- May, 2003 to August,
gramming 2003
Contests

5. Other related experience-research, industrial etc:


Organization/Employer Designa- Period
tion
Research Assistant, University of Mani- January, 2017 to August,
toba 2017

129
6. Publications:
Papers Published in Papers pre- Review Papers
Refereed Journals sented in
Conferences
1 3 N/A

7. Honours and Awards:

• Cum Laude in B. Sc. in CSE.

8. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

• Participated in seminar on “Mozilla Firefox” at Southeast Uni-


versity
• Delivered speech in seminar titled “The Role of Programming
Contests in Shaping up Career in CSE” at Southeast University
• Participated in seminar on “Good teaching and Ethics” at South-
east University.
• Participated in seminar on “CSE: How it all started in Bangladesh”
at Southeast University

Publications List:

International Journal:

• Islam, T. , Shahriar, Z. , Perves, M. and Hasan, M. (2016) Uni-


versity Timetable Generator Using Tabu Search. Journal of Com-
puter and Communications, 4, 28-37. doi: 10.4236/jcc.2016.416003.

International Conference:

• Monirul Hasan, “Counting Disjoint Longest Increasing Subse-


quences”, Proceedings of the International Conference on Com-
puter and Information Technology, Dec 19 – 21, 2003, Dhaka,
Bangladesh, Vol 1, 153 – 156.
• Venkatesh Manian, Monirul Hasan and Christel Kemke, “HCP
with PSMA: A Robust Spoken Language Parser”, (To appear in)
Proceedings of NeSy’07 Third International Workshop on Neural-
Symbolic Learning and Reasoning, 8 January 2007, Hyderabad,
India.

130
• Christel Kemke, Richard Galka and Monirul Hasan, “Towards an
Intelligent Interior Design System”, Workshop "Intelligent Vir-
tual Design Environments (IVDEs)", at the Second International
Conference on Design Computing and Cognition (DCC-06), 9
July 2006, Eindhoven, The Netherlands.

131
1. Name: Md. Rakibul Hasan

2. Designation: Senior Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
Bangladesh University of Engineer- M. Phil Applied Mathe-
ing and Technology (BUET) ( Continu- matics
ing)
University of Dhaka M.S. Applied Mathe-
matics
University of Dhaka B.Sc. Mathematics

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Senior Lecturer September 22,2011 to
present
University of Information Lecturer May 2011 to September
Technology and Science 2011

5. Publications:
Papers Published in Papers presented in Review Pa-
Refereed Journals Conferences pers
3 2 N/A

Publication List:

International Journal

• Md. Rakibul Hasan, “The Ground State of Helium : Perturbation


Method”, SEU Journal of Science and Engineering, Vol. 8, No.
1-2, December 2014, pp. 19-26.

132
• Md. Rakibul Hasan, “Some Characterization of Neutral n-ideals
andDistributive n-ideals of a Lattices”, Annals of Pure and Ap-
plied Mathematics, Vol. 10, No.2, 2015, 141-146, ISSN: 2279-
087X (P), 2279-0888(online), August 2015
• Md. Rakibul Hasan, “A Singular Non-Linear Boundary Value
Problem Arising in the Boundary Layer flow”, SEU Journal of
Science and Engineering, Vol. 9, No. 1-2, December 2015, pp.
14-17.

International Conference

• Md. Rakibul Hasan ,K.M. Ariful kabir , “Numerical Investi-


gation of Three-Dimensional Interaction Turbulent Flow”, 7th
BSME International Conference on Thermal Engineering, 22-24
December 2016, BUET, Dhaka, Bangladesh.
• K.M Ariful Kabir, Md. Rakibul Hasa,nMd. Abdul Hakim Khan,
“Numerical Analysis of Natural Ventilation System in a Studio
Apartment in Bangladesh”, FCSPTS 2017, 7-8 April, 2017, Ra-
machandra College of Engineering, Eluru, India.

133
1. Name: MD. Hasan Tareque

2. Designation: Senior Lecturer

3. Degrees obtained:
University Degree Field of Spe-
cialization
Bangladesh University of En- M.Sc. in Computer Wireless & Ad-
gineering and Technology Science & Engineer- hoc networks
(BUET) ing (Course work com-
pleted)
Military Institute of Science B.Sc. in Computer Computer Sci-
& Technology (MIST) Science & Engineering ence & Engi-
neering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Senior Lecturer 8 months
Southeast University Lecturer 1 years 8 months
IBAIS University Senior Lecturer 2 years 6 months
IBAIS University Lecturer 2 years
5. Other related experience-research, industrial etc. :
Organization/Employer Designation Period
Bangladesh Election Commission, Team 3 months
Leader
Grameenphone, Web developer 2 months
6. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
5 1 4

7. Membership of Scientific and Professional Societies: The Institution


of Engineers, Bangladesh (IEB), M-34296

134
8. Honours and Awards:

• MIST COMMANDANT Award


• Dean’s Award.

9. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

• 2015 International Conference on Networking Systems and Secu-


rity (NSysS2015) at BUET.
• Seminar on Mozilla-Fire Fox at SEU.
• Seminar on The Role of Programming Contests in Shaping up
Career in CSE at SEU.
• Seminar on Good teaching and Ethics at SEU.
• Seminar on CSE: How it all started in Bangladesh at SEU.
• Workshop on bdapps a platform presented by Robi Axiata Lim-
ited (Robi).

Publication List:

International Journals

• Md. Hasan Tareque, Golam Dastoger Bashar, Saria Islam and


A. S. M Mahmudul Hasan, Contour Based Face Recognition Pro-
cess, International Journal of Computer Science & Engineering
Technology (IJCSET), Vol 3, Issue 7, pp.244-248, July 2013.
• Md. Hasan Tareque, A. S. A. Hasan, Route Optimization in
Network Mobility, International Journal of Advanced Computer
Science and Applications (IJACSA), Vol. 4, No. 12, pp.137-142,
December 2013.
• Md. Hasan Tareque, A. S. A. Hasan, Human Lips-Contour Recog-
nition and Tracing, International Journal of Advanced Research
in Artificial Intelligence (IJARAI), Vol. 3, No. 1, pp.47-51, Jan-
uary 2014.
• S. A. Hasan, Md. Hasan Tareque, Reliable ECG Signals Based on
GMM for Body Area Network, International Journal of Science
and Research (IJSR), Vol. 2 Issue 12, pp.452-455, December
2013.

135
• S. A. Hasan, Md. Hasan Tareque, Fatema Tuz Zohra, Com-
parison among Different Routing Protocols of Vehicular Ad Hoc
Networks, Global Journal of Computer Science and Technology
Network, Web & Security (GJCST), Vol.13, Issue 17, pp. 22-28,
November-December 2013.

International Conferences:

• Md. Hasan Tareque, Md. Shohrab Hossain, Mohammed Atiquz-


zaman, On the Routing in Flying Ad hoc Networks, Federated
Conference on Computer Science and Information Systems (Fed-
CSIS), ISSN: 2300-5963, Vol. 5, pp.1-9.

Review Papers

• "Efficient Cooperative Relaying In Flying Ad Hoc Networks Us-


ing Fuzzy-Bee Colony Optimization" for International Journal of
Communication Systems.
• "Radio Interference Challenges in Compact Multi-Protocol RF
Hardware for Smart-Grid Applications" for International Journal
of Communication Systems.
• "Radio interference challenges in a multi-protocol compact RF
hardware platform for home and building automation applica-
tions" for International Journal of Communication Systems
• "Recent Advances in Wireless Communication Protocols for In-
ternet of Things" for Wireless Communications and Mobile Com-
puting Hindawi Publishing Corporation.

136
1. Name: Mohammad Ashraful Hoque

2. Designation: Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
London South Bank Univer- M.Sc. in Computer Net-
sity, UK Computer works & Telecom-
Networks munication Engi-
& Telecom- neering
munication
Engineering
Ahsanullah University of Sci- B.Sc. in Computer Science
ence and Technology Computer and Engineering
Science and
Engineering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer 1 May, 2011-Continue
Business College of Lon- Jr. Lecturer 2009-2010
don, UK

5. Publications:
Papers Published in Papers presented Review Papers
Refereed Journals in Conferences
4 N/A N/A

6. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

137
Publication List:

International Journal

• Md. Tanvir Ahmed, Mohammad Ashraful Hoque “Performance Eval-


uation of the Layered Space-Time Receiver in Frequency-Flat Fading
MIMO Channel”, Accepted for Southeast University Journal of Sci-
ence & Engineering (SEUJSE), Volume 11, No.1, June 2017

• Md. Tanvir Ahmed, Mohammad Ashraful Hoque "Performance of


MIMO Channel Estimation Methods for Space-Time Communication
Systems Operated in the Frequency-Flat Fading Channel.", Southeast
University Journal of Science & Engineering (SEUJSE), Volume 10,
No.1, June 2016

• 3Mohammad Ashraful Hoque, Md. Tanvir Ahmed "Performance Anal-


ysis of MIMO-OFDM for 4G Wireless Systems under Rayleigh Fading
Channel", The AUST Journal of Science and Technology, Volume - 2,
Issue - 1, pp. 29 - 40, January, 2010.

• Tanvir Ahmed, Mohammad Ashraful Hoque, “Automated WSN based


System for Emission level and Air pollution Detection in Vehicles”,
November 16 Volume 4 Issue 11 , International Journal on Recent
and Innovation Trends in Computing and Communication (IJRITCC),
ISSN: 2321-8169, PP: 113 – 117

138
1. Name: Rajon Bardhan

2. Designation: Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
Ahsanullah University of Sci- B. Sc Computer Science
ence & Technology and Engineering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer September 30,2015- till

5. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
N/A 3 N/A

6. Honors and Awards:

• Dean Award in B.Sc.

7. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years:

• 2015 18th International Conference on Computer and Informa-


tion Technology (ICCIT), MIST, Dhaka, Bangladesh.
• Participated in seminar on “CSE: How it all started in Bangladesh”
at Southeast University.
• Participated in seminar on “Good teaching and Ethics” at South-
east University
• Organized a seminar on “Mozilla Firefox” at Southeast University

139
• Participated in seminar titled “The Role of Programming Con-
tests in Shaping up Career in CSE” at Southeast University.
• Participated in seminar titled “Digital Bangladesh: Vision 2021”
at Southeast University.

Publications List:

International Journal

• Tania Sultana, Rajon Bardhan, Tangina Firoz Bithee, Zinia Tabas-


sum, Nusrat Jahan Lisa, a compact design of n-bit ripple carry
adder circuit using QCA architecture, 2015 IEEE/ACIS 14th
International Conference on Computer and Information Science
(ICIS), Las Vegas, NV, USA.
• Rajon Bardhan, Tania Sultana, Nusrat Jahan Lisa, An efficient
design of adder/subtractor circuit using quantum dot cellular au-
tomata, 2015 18th International Conference on Computer and
Information Technology (ICCIT), MIST, Dhaka, Bangladesh.
• Hanif Bhuiyan, Jinat Ara, Rajon Bardhan, Md. Rashedul Islam,
Retrieving YouTube Video by Sentiment Analysis on User Com-
ment, 2017 IEEE International conference on signal and image
processing applications, Kuching, Malaysia.

140
1. Name: Md Tawseef Alam

2. Designation: Lecturer (on study leave)

3. Degrees obtained:
University Degree Field of Special-
ization
Ahsanullah University of Sci- B.Sc. in Software Engineer-
ence and Technology Computer ing
Science and
Engineering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer 17 August 2016 -
(on study leave) Present
Southeast University Lecturer 30 September 2015 – 16
August 2016

5. Employment record (starting from present position):


Organization/Employer Desig- Period
nation
Proggasoft-Software Engineer September 2014 – August 2015

6. Publications:
Papers Published in Papers presented Review Papers
Refereed Journals in Conferences
N/A N/A N/A

7. Honours and Awards:

• Erasmus Mundus Scholarship for Master in Pervasive Computing


and Communication in Sustainable Development-2016

141
• Dean’s Merit Award in B.Sc. from Ahsanullah University of Sci-
ence and Technology in 2013.

8. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

• Participated in a Seminar on Internet of Things (IoT) by Olivier


Seznec at Universite de Lorriane, France in September 2016.
• Completed a short course on “Computing Clusters, Grids and
Clouds Systems” and “Semantic Technologies for Urban IT” at
ITMO University, Saint Petersburg, Russia in May 2017.

142
1. Name: Mou Mahmood

2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
Karlsruhe Institute of Tech- Masters in En- Electrical Energy
nology (KIT), Germany ergy Technolo- and High Voltage
gies Technology
Universidade de Lisboa (Uni- Masters in En- Renewable Energy
versity of Lisbon, Portugal) ergy Engineer-
ing and Man-
agement
Ahsanullah University of Sci- B.Sc. in Elec- Power and Commu-
ence and Technology (AUST) trical and nication
Electronic
Engineering
(EEE)
4. Employment record (starting from present position):
University/College Designation Period
Southeast University Lecturer October, 2015 to till
date
5. Employment record (starting from present position):

Organization/Employer Designation Period


Research Assistant in department of Electric January, 2015-August,
Energy and High Voltage Technology, KIT 2015 (8 months)
6. Publications:
Papers Published in Papers presented Review Papers
Refereed Journals in Conferences
1 1 N/A

143
7. Honours and Awards:

• European Union (EU) funded, European Institute of Innovation


and Technology (EIT) labeled, KIC-InnoEnergy. study grant for
attending the two years’ double degree master program ENTECH
(Scholarship Offered Type 1)
• Achieved scholarships and tuition fee waivers in all the eight
semesters at AUST.

8. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

Publication List:

International Journal:

• “A Novel Load Distribution Technique of DC Micro-Grid Scheme


on PV-Diesel Hybrid System for Remote Areas of Bangladesh”,
International Journal of Scientific and Technology Research (IJSTR),
Volume 2, Issue 1, ISSN: 2277-8616, Pages 133-137

International Conference:

• “Load flow analysis of the German high voltage transmission grid


in year
2023”, 5th International Conference on informatics, electronics
and vision (ICIEV), 2016 sponsored by IEEE.

144
1. Name: Maksuda Rabeya

2. Designation: Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
University of Dhaka M. Sc Computer Science
and Engneering
University of Dhaka B. Sc Computer Science
and Engneering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer 2016- till

5. Honours and Awards:

• University Scholarship based on honors result.

145
1. Name: Md. Shohel Babu

2. Designation: Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
Jahangirnagar University M.Sc Mathematics
Jahangirnagar University B.Sc Mathematics

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer January 20,2016 to
present
IUBAT-International Junior lecturer November 13, 2012 to
University of Business January 20, 2016
Agriculture & Technology

5. Publications:
Papers Published in Papers presented in Review Pa-
Refereed Journals Conferences pers
2 N/A N/A

Publication List:

International Journal:

• Md. Shohel Babu, Fatema Tuj Johora, Abdul Alim, “Investiga-


tion of Order among Some Known T-norms”, American Journal
of Applied Mathematics. Vol. 3, No. 5, 2015, pp. 229-232. doi:
10.11648/j.ajam.20150305.14

146
• Md. Shohel Babu, Dr. Abeda Sultana, Md. Abdul Alim, “Con-
tinuous Functions as the Generators of T-norms”, IOSR Jour-
nal of Mathematics (IOSR-JM) e-ISSN: 2278-5728, p-ISSN: 2319-
765X. Volume 11, Issue 2 Ver. I (Mar - Apr. 2015), PP 35-38

147
1. Name: Shifat Ahmed

2. Designation: Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
Jahangirnagar University M.S Mathematics
Jahangirnagar University BSc(Hons) Mathematics

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer 08 Sep 2014 - Present
IUBAT- International 13 Nov 2012 to
University of Business 07 Sep 2014
Agriculture and Technol-
ogy

5. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
04

6. Honours and Awards:

• 7th in BSc.(Hons) in Mathematics.(JU)


• 7th in M.S in Mathematics.(JU)

Publication List:

International Journal:

148
• Md. Shafiqul Islam, Md. Saiduzzaman, Sobuj Kumar Ray, Shi-
fat Ahmed, Professor Dr. Laek Sazzad Andallah : “A NUMER-
ICAL EXPERIMENT ON BURGER’S EQUATION” , Interna-
tional Journal of Scientific amp; Engineering Research, Volume
5, Issue 4, April-2014, ISSN 2229- 5518.
• Shifat Ahmed : “AN APPROACH TO MAXIMIZE PROFIT OF
A CONSTRUCTING PROJECT WITHIN LIMITED BUDGET
BY USING SIMPLEX METHOD”, International Journal of Sci-
entific amp; Engineering Research, Volume 6, Issue 11, November
- 2015, ISSN 2229-5518.
• Shifat Ahmed : “SENSITINITY ANALYSIS OF A LARGE CON-
STRUCTING PROJECT”, International Journal of Advanced
Research and Review, Volume 1, Issue 4, April-2016, ISSN 2455-
7277.
• Md. Shohel Babu, Shifat Ahmed : “FUNCTION AS THE GEN-
ERATOR OF PARAMETRIC T-NORMS”, American Journal of
Applied Mathematics, 2017; 5(4): 114 - 118, doi: 10.11648/j.ajam.20170504.13,
ISSN: 2330-0043 (Print); ISSN: 2330-006X (Online).

149
1. Name: Md. Moshiur Rahman

2. Designation: Lecturer (On study leave)

3. Degrees obtained:
University Degree Field of Special-
ization
Ahsanullah University of Sci- Bachelor of Electronics, De-
ence and Technology Science in vices and Nan-
Electrical and otechnology
Electronic
Engineering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer September 18, 2016-
Present

5. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
1 N/A N/A

6. Honours and Awards:

• Dean’s List of Honor


• President’s Scout Award

Publication List:

International Journal:

150
• Performance Analysis of Current Ratio under Different Dielec-
tric Constant for Carbon Nano Tube Field Effect Transistor- Md.
Moshiur Rahman, Md. Motiur Rahman Sagar, Shafkat Tasnim,
Mohammad Farhan, Md. Tahmidur Rahman-International Jour-
nal of Advanced Research in Computer and Communication En-
gineering, Vol. 5, Issue 1, January 2016.

151
1. Name: Kimia Aksir

2. Designation: Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
University of Greenwich, UK MSc Bigdata and Busi-
ness Intelligence
American International BSc Computer Science
University- Bangladesh and Engineering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer 5 months

5. Other related experience-research, industrial etc.


Organization/Employer Designation Period
Software Engineer Q/A at SoftwindTech 5 months

6. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
N/A N/A N/A

7. Honours and Awards:

• Finished third place in the concept presentation contest 2013 at


AIUB

8. List of Conferences, Short-term Courses etc. organized/participated


in during the past five years.

152
• Took part in the workshop on Project Development and Manage-
ment organized by CMS department of University of Greenwich
for the year 2015.

153
1. Name: Mahbub Hasan

2. Designation: Lecturer

3. Degrees obtained:
University Degree Field of Special-
ization
Southeast University BSc in CSE Software engineer-
ing and implemen-
tation

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer 3 Months

5. Other related experience-research, industrial etc.


Organization/Employer Designation Period
Software Engineer 3 Years 3 Months

6. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
N/A N/A N/A

154
1. Name: M. Saiful Bari

2. Designation: Lecturer (On study leave)

3. Degrees obtained: Bachelor of Science


University Degree Field of Specialization
Islamic University of Bachelor of Computer Science and
Technology Science Engineering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer May 2017 - Present
Bangladesh Univer- Lecturer February 2017 – May
sity of Business and 2017
Technology

5. Publications:
Papers Published in Papers presented in Review Papers
Refereed Journals Conferences
1 N/A N/A

6. Honours and Awards:

• Champion – IUT Programming Contest 2014


• Honorable Mention - Human Expedition on Mars- Timeline 2018
• Champion – IUT Programming Contest 2015
• Runner up - Daffodill International University ACM ICPC World
Finals Warmup Contest 2016
• Lightoj Global Ranking – 31 (Solve Count = 342)
• 6th in NSU Cybernauts National Programming Contest 2016
• 15th in Quazi Azhar Ali Programming Contest 2014
• 15th in SUB Inter University Programming Contest 2016

Publication List: International Journal:

155
• “Human Expedition on Mars Timeline 2018” – MD. Wasif Za-
man, Fahad Al Mamun, Faisal Hussain, M. Saiful Bari, MD. Ab-
dullah Al Joha, MD. Muhtady Muhaisin, Mohammad Abdullah
Matin Khan, Muhammad Usama Islam, Raihan Uddin Ahmed ,
Shabab Bin Karim, Tanzil Bin Hassan. Inspirational Mars Design
Contest. Mars society online journal. DOI:10.13140/RG.2.1.2908.4563

156
1. Name: Badhan Das

2. Designation: Lecturer

3. Degrees obtained: Bachelor of Science


University Degree Field of Specialization
Bangladesh Univer- Bachelor of Computer Science and
sity of Engineering & Science Engineering
Technology

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer October 2017 - Present

157
1. Name: Sadman Sakib

2. Designation: Lecturer

3. Degrees obtained: Bachelor of Science


University Degree Field of Specialization
Ahsanullah Univer- Bachelor of Computer Science and
sity of Science and Science Engineering
Technology

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer December 2017 - Present
Cloudware Systems Software Engi- July 2017 - January 2018
neer

158
1. Name: Md. Siyam Sajeeb Khan

2. Designation: Lecturer

3. Degrees obtained: Bachelor of Science


University Degree Field of Specialization
East West University Bachelor of Computer Science and
Science Engineering

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer February 2018 - Present
Bangladesh Univer- Lecturer August 2017 - January
sity of Business and 2018
Technology
Bangladesh Military Gentleman January 2013 - September
Academy Cadet 2013

5. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
1 N/A N/A

6. Honours and Awards:

• Merit Scholarship award for consecutive two years for securing


CGPA 3.90 or above
• Dean’s list
• Merit Scholarship in class 5 securing 2nd place in Sylhet division
• Merit Scholarship in class 8 securing 1st place in Rangpur Sadar
• 2nd and 9th place in Intra University Math Olympiad in 2016
and 2017 respectively

159
Publication List:

International Journal:

• “Human Face Detection Using Combination of LDA and DWT”


Rifat Mehreen Amin, Siyam Sajeeb Khan, Md. Imdadul Islam,
International Journal of Computer Science and Information Se-
curity, Vol. 15, No. 7, pp. 87-94, Jul 2017

160
1. Name: Ishrat Jahan

2. Designation: Lecturer

3. Degrees obtained: Bachelor of Science


University Degree Field of Specialization
Jahangirnagar Univer- M.Phil. (On- Physics
sity going)
Jahangirnagar Univer- M.Sc. Physics (Thesis group)
sity
Jahangirnagar Univer- B.Sc. Physics
sity

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer May 2018 - Present

161
1. Name: A.S.M. Ahsan-Ul-Haque

2. Designation: Lecturer

3. Degrees obtained: Bachelor of Science


University Degree Field of Specialization
Bangladesh University Bachelor of Computer Science and
of Engineering and Science Engineering
Technology

4. Employment record (starting from present position):


University/College Designation Period
Southeast University Lecturer June 2018 - Present
Samsung R&D Institute Software Engi- April 2018 - May 2018
Ltd. neer
Reve Systems Jr. Software November 2017 - March
Engineer (An- 2018
droid)

162
1. Name: Raghad Rowaida

2. Designation: Lecturer
3. Degrees obtained: Bachelor of Science
University Degree Field of Specialization
Bangladesh University M. Sc. ICT
of Engineering and
Technology (BUET)
Ahsanullah Univer- B. Sc. CSE
sity of Science and
Technology
4. Employment record (starting from present position):
University/College Designation Period
Southeast University Lecturer May 2018 - Present
Bangladesh Univer- Lecturer 1 October 2014 - 14 May
sity of Business and 2018
Technology
5. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
2 N/A N/A

6. Honours and Awards:


• 3rd position at Intra university project show for ‘Arduino based
USB oscilloscope’ at 2013

Publication List:

International Journal:

163
• 1. Raghad Rowaida and Afsana Ahmed Munia, ‘A New Ranking
Algorithm for a Round-Robin Tournament’, Global Journal of
Computer Science and Technology, Volume 17 Issue 2 Version
1.0 Year 2017, pp.31-33
• Sheikh Tania and Raghad Rowaida, ‘A Comparative Study of
Various Image Filtering Techniques for Removing Various Noisy
Pixels in Aerial Image’, International Journal of Signal Process-
ing, Image Processing and Pattern Recognition (IJSIP), SERSC,
2016, Vol.9, No.3 (2016), pp.113-124

164
1. Name: Anurata Prabha Hridi

2. Designation: Lecturer
3. Degrees obtained: Bachelor of Science
University Degree Field of Specialization
Bangladesh University Bachelor of Computer Science and
of Engineering and Science Engineering
Technology
4. Employment record (starting from present position):
University/College Designation Period
Southeast University Lecturer May 2018 - Present
Reve Systems Limited Junior Soft- November 2017 - May
ware Engineer 2018
5. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
N/A 2 N/A

6. Honours and Awards:


• 2nd Runners up in App Development Contest under the ban-
ner “Shake It App: Youth Campaign for Earthquake Prepared-
ness 2016” organized by UNDP and a2i (Access to Information-
Bangladesh govt.).
• Champion in IEEE-UIU Inter Varsity Idea Contest 2016 .
• 1st Runners up in Poster Presentation segment in Esonance 2016,
arranged by IEEE IUT Student Branch.
• Got accepted in Top 300 ideas in EATL-Prothom Alo App Con-
test 2015 and 2016, a nationwide competition to seek new and
innovative ideas in the field of CS.

165
• 1st Runners up in Intra Varsity Idea Contest 2015 organised by
Dept of CSE, BUET.
• ’Best Girl 2010’ of Viqarunnisa Noon School and College for over-
all outstanding performance.

Publication List:

International Conferences:

• Hridi, A. P., Das, D., Anjum, M. M., Das, T. (2016, November).


Faster Evacuation after Disaster: Finding Alternative Routes us-
ing Probable Human Behavior. In Proceedings of the 7th Annual
Symposium on Computing for Development (p. 23). ACM.
• Das, D., Hridi, A. P. (2017, May). Too long Didn’t Read: Auto
Summarization using Machine Learning Techniques. Abstract
was accepted and paper was presented in ICACM 2017 (Interna-
tional Center for Applied Computational Mechanics).

166
5.2 Various Committees of CSE Department

Committee Members Responsibilities


Name
[SM] Shahriar Manzoor 1. To Monitor the syllabus
[KMH] Monirul Hasan 2. Report to academic council
if any modification is required
[RBH] Md. Rakibul Hasan

[DSKP] Al-Sakib Khan


Curriculum
Pathan
Committee
[MMAH] Mou Mahmud
[RIK] Rezwan Al Islam Khan
[AR] Md. Ashiqur Rahman
[HT] Hasan Tareque

[DSKP] Al-Sakib Khan 1. Dedicated to check Thesis


Pathan reports
[AR] Md. Ashiqur Rahman 2. To evaluate thesis report of
each group
[KMH] Monirul Hasan
Research
[HT] Hasan Tareque
Report Review
[RIK] Rezwan Al Islam Khan
Committee
[MMAH] Mou Mahmud
[AR] Md. Ashiqur Rahman 1. To check all the floors and
rooms of AR Tower regularly
Space Manage- [AHQ] Md. Ashraful Haque 2. To take necessary steps in
ment Commit- case of shortage of space
tee
[RBH] Md. Rakibul Hasan
Extra Curric- [RAJ] Roksana Akter Jolly 1. To encourage students in
ular Activities extracurricular and cocurricu-
Committee lar activities
[RBH] Md. Rakibul Hasan 2. To find talented students
for these kind of activities
[RB] Rajon Bardhan 3. To arrange all kinds of
cultural activities in different
events for the department
[SBB] Md. Shohel Babu
[MAHB] Mahbub Hasan
Mridul

167
Committee Members Terms of Reference
Name
[KMH] Monirul Hasan 1. To assess the applications of
the waiver wanting students
Course Waiver [RB] Rajon Bardhan 2. To select eligible students
Committee for waiver
[RBH] Md. Rakibul Hasan
[SM] Shahriar Manzoor 1. To prepare a document on
the basis of the applications of
the tuition waiver seeking stu-
dents and send it to exam of-
fice
[KMH] Monirul Hasan
Tuition Waiver [RAJ] Roksana Akter Jolly
Committee [RBH] Md. Rakibul Hasan
Admission [SM] Shahriar Manzoor 1. Dedicated to set admission
Test test questions
Committee [SBB] Md. Shohel Babu 2. To take admission test
3. To check the exam scripts
4. To prepare the result of the
admission test
Course [SM] Shahriar Manzoor
Distribution [KMH] Monirul Hasan 1. To distribute courses
Committee among the faculties according
to their expertise, preference
and student’s feedback
[KMH] Monirul Hasan 1. To prepare the class rou-
tine with an automated rou-
tine generator
Class & Exam [SM] Shahriar Manzoor 2. To prepare exam schedule
Scheduling
Committee
[RB] Rajon Bardhan 3. Assignment of invigilation
duties by the Chairman

5.3 Laboratory Facilities


Laboratories of department of CSE are well equipped with modern appara-
tus and facilities. Department of CSE currently has 4 general purpose com-
puter labs, 1 Physics lab, 1 Digital Logic Design lab, 1 Special Purpose Lab,
which is designed with highly configured computers for performing special
tasks that demand high processing power, and a browsing lab, exclusively

168
for the students. In total, there are 8 labs. The browsing lab is always
open to the students. Students can access other 7 labs for practising, given
the availability of the labs, and in the presence of a Lab Assistant, who is
responsible for maintaining the lab. All of the labs are air conditioned, facil-
itated with multimedia access and updated with almost all possible modern
tools and softwares.

5.4 Computing and Internet Facilities


Department of CSE provides campus-wide fast Internet service for the stu-
dents, academic and administrative staffs through WiFi coverage. We also
have a browsing lab exclusively for the students.

169
6

Extra- and Co-Curricular


Activities of CSE
Department

6.1 Computer Club: Vision, Mission, Committees


etc.
SEU Computer Club initiated its journey in March 2018 with a motto of
‘Light upon light’to engage the enthusiastic students in acquiring and dis-
seminating the knowledge, getting acquainted and up to date with new
technologies and innovations, building camaraderie among the students and
patronize out of the box thinking. Any student can be a part of this journey
through the membership of this club.

Vision:
The vision of this club is to make an impact on the total department to grow
the club in active members count and inspire them to participate more in
various activities. And with such activities of the club we shall spread the
name of our department to the world.

Mission:
Mission of this club will be to arrange one big event in each semester from
the list below to keep the club and i’s members active:

• Animation Contest

• Mobile app/game Contest

• Computer Gaming Contest

170
• Math Olympiad

• Seminar on different topics

• Idea Contest

• Tech Talk Contest

Current Executive Body


Currently this club is functioning under the guidance of two moderators,
who are faculty members of department of CSE and an executive body
which consists of a President, a Vice President, a General Secretary and a
Treasurer.

Moderators:
[HT] Hasan Tareque
Senior Lecturer, Department of CSE.

[RB] Rajon Bardhan


Lecturer, Department of CSE

President: Shamin Asfaq


Vice President: Md. Isteak Uddin
General Secretary: Md. Ziaul Hoque
Treasurer: Shuvra Sarker

171
7

Academic Policies of CSE


Department

172
7.1 Course Registration Flow Chart

173
7.2 Academic Adviser
A faculty member of the department of CSE is assigned to a group of stu-
dents. He/she works as an academic adviser for those students. Students
can consult him/her for academic purposes like course registration, adding
or dropping courses. The students can also seek advises regarding non-
academic matters such as choosing career paths, learning other skills that
will help him/her in the long run and others. To summarize, academic
adviser acts as a guide for the students.

7.3 Course Re-Take, Make-up Examination Policy


Re-take of course(s)
A student must Re-take a course if he/she receives and ’F’ grade in a course.
He/she may also re-take a course if he/she wants to improve his/her previous
grade. For improvement of grade a student must comply with the following
requirements:

a) The student will have to pay full registration fee for the re-taken course.

b) The student will be required to attend the classes, submit the assign-
ments, and appear at the Mid Term and Final examinations.

c) A students must re-take a course for maximum two times to improve


his/her passing grade but only the best grade will be recorded and used for
CGPA calculation.

Make-up Examination Policy


If a student missed the Term Final examination with prior permission of the
concerned course teacher and the department Chair for a valid ground, his
result will be graded as Incomplete result (i.e: "I"). The following conditions
will apply:

a) No fee will be charged from a student for such authorized absence in


the Term Final examination.

b) With the approval of the Chairman/Director concerned, the course teacher


will take the make-up examinations of Term Final examination(s) for the
concerned students(s) and change the grade accordingly within the next
semester.

c) If a student fails to appear in Mid-Term exam with prior information,


the course teacher will take the make-up examination for Mid-term exam if

174
approved by the Chairman/Director of the department/program.

d) Grade "I" (Incomplete Result) will remain valid for one semester. Af-
ter one semester the "I" grade will be treated as a "F" grade and the student
will have to take the course as Re-take on payment of full registration fee.

e) Medical certificate, in general, will not be accepted for giving and "I"
(Incomplete) grade. Only then the course teacher will be satisfied at the
ground shown by the student and the documents presented by him, a stu-
dent may be allowed "I" Grade with the approval of the Chairman/Director.

f) Authorized absence in the Term Final examination will be shown in the


Grade Sheet as (Ab) while and unauthorized absence will be shown as (-).

7.4 Thesis/ Project/ Internship Guidelines and Eval-


uation Policy
7.4.1 Thesis
Details of Thesis and Guidelines
Course Description
This course introduces the students to carry out research by reviewing work
done in the particular area of choice. The students will do thorough research
on existing work on a particular topic, identify scope of work and suggest
possible improvements. If time permits, they may implement their ideas,
conduct tests and summarize their findings.

Course Duration
14 weeks (3.5 months)

Course Goals & Objectives


The goals and objectives of the research methodology course is to:
• Introduce the students to studying scientific researches on a particular
topic

• Draw comparative analysis on work done

• Identify the lacks in the previous works and suggest possible improve-
ments
Research Types

In Computer Science & Engineering (CSE) researches can be (but not be


limited to) of the following five types:

175
1. The study of what is possible – and its scope and limits including
both mathematical and less formal modes of theories

2. The study of existing (naturally occurring) information-processing


systems e.g., animals, societies, brains, minds, sometimes described
as quot;Natural computationquot;

3. Research involving creation of new useful information-processing


systems i.e., research directly related to engineering applications.

4. The creation and evaluation of tools, formalisms and tech-


niques to support all these activities.

5. Research on social and economic issues including studies of the


social and economic impact of computing, ethical issues, changing
views of humanity, etc.

Methodology of Research

• Students must see prospective supervisors to learn about possible re-


search topics

• They must submit research proposal in the prescribed application form

• Department will announce the supervisor assignment for students

• The assigned supervisor must keep the record of the progress of se-
lected research work

• The supervisor has to counsel a student at least twice a week

• The supervisor must proof read the research report before final sub-
mission

Guidelines for Report Writing


A report for a BSc in CSE must be a contribution to scientific knowledge,
of highest possible quality and of lasting value to the intellectual commu-
nity. The following guidelines have been established to fulfill the minimum
standards for professional presentation of the work.

Paper
For report examination, high-quality, long lived white A4 sized paper must
be used. Three ‘hard bound’ copies to be provided to the department for
distribution to examiners at least 2 working days prior to the final presenta-
tion. Students must also submit a soft copy of the report to the department
chair.

176
Typeface
Type size should be at least 10 points. Students must not use script, or
ornamental forms. Print must be letter quality or near letter quality with
dark black characters that are consistently clear, crisp and easy to read.

Margins
Margins on the binding side (left edge) must be 4 cm; all other margins
must be 2.5 cm. Headers and/or footers must be placed within the 2.5 cm
margin, Pagination must be placed 1.25 cm from bottom of page.

Spacing
One and a half or double spacing is required in the main body of the
manuscript except where conventional usage calls for single spacing; e.g.,
footnotes, indented quotations, tables etc.

Word and Text Divisions


Words must be divided correctly at the end of the line and may not be di-
vided from one page to the next. Use a standard dictionary to determine
word division. Avoid short lines that end a paragraph at the top of the page,
and any heading or subheading at the bottom of a page that is not followed
by text.

Language
The report must be in English.
Binding, Order and Content

1. Binding

(a) Soft binding only is required for report examination by the su-
pervisor.
(b) Full/hard binding is required for final submission ie, (after exam-
ination and/or emendations).
(c) Students must submit three copies in black cover with gold let-
tering on the spine and the cover.

2. Preliminary Pages

(a) Title Page


(b) Certificate
(c) Abstract
(d) Preface and/or Acknowledgements.
(e) Table of Contents, with page references.
(f) List of Tables, with titles and page references.

177
(g) List of Illustrations/figures, with titles and page references.
3. Text
(a) Introduction
(b) Main body, with the larger divisions and more importantly sub-
divisions indicated by suitable chapter (suggested chapter head-
ings can be found in the writing guideline sides in the appendix),
section and consistent headings
(c) Conclusion
(d) Appendices
(e) Bibliography or List of References
4. Pagination
Each page of the report except for the title, letter of transmittal and
certificate should be numbered. For the preliminary pages, use small
Roman numerals (i, ii, iii, iv, etc.). For the remainder of the report,
use continuous pagination for text, illustrations, images, appendices,
and bibliography, using Arabic numbers (1,2,3, etc.). The main body
must start with page 1, as this is not a continuation of the Roman
numeral numbering.
5. Images and Graphs
All images and graphs should be of professional quality. If it is not
their own work students must provide full reference to the source.
6. Scholarly Reference
The report should follow the reference prescribed for IEEE Transac-
tions.
Guidelines for Students
• Research work can be done in a group of at most 3 students
• The research work must be completed within the semester (14 weeks)
• Every student must contact with the supervisor at least twice a week
with updates about the researches
• Each group of student must submit 3 copies of the final report within
the deadline announced
• Each group of student must present their research twice – once as a
midterm presentation to show progress of the research midway through
the semester, and finally at the end of the semester to present their
final findings
• Any kind of unethical practices and plagiarism is strictly prohibited

178
Evaluation Policy
Grading Scheme for the Report
The report will receive straight zero if
• it is not submitted 2 working days prior to the final presentation date

• it is missing signature of the supervisor or the students on the letter


of transmittal and the certificate pages. By signing the report, the
student confirms that the report submitted is their work. As for the
supervisor, their signature is confirming that they have in fact reviewed
the report before submission and that they are accepting the work as
satisfactory.

• the report is plagiarized in parts or full. We expect that all figures


and tables (if not created by the students themselves) must be prop-
erly referenced. The text itself should not be copy/pasted from any
source, even if reference is properly cited. Students should be able to
paraphrase what they understood. Supervisor must ensure that the
students are complying with this expectation.

• soft copy of the report is not provided in pdf format.


The report review committee will grade the reports out of 20. A suggested
breakdown of the grading criteria is presented in the following table:
Criteria Marks(%)
Document organization in chapters, sections, subsections 20
Formatting 10
Literature Review 20
Grammar and writing style 20
Content of the report 20
Citation and References 10
Total 100
Grading Scheme for the Course
Students will be individually graded based on the following grading scheme:

Item Marks(%)
Supervisor’s discretion
Attendance 10
Knowledge about the topic 20
Interview panel’s marks
Midterm presentation 20
Final presentation 10
Knowledge about the topic & Q/A 20
Report (Marks obtained as per the previous table 20
Total 100

179
final grade of the course will be awarded as per UGC rules:

Scores Grade Grade Value


80-100 A+ 4.00
75-79 A 3.75
70-74 A- 3.50
65-69 B+ 3.25
60-64 B 3.00
55-59 B- 2.75
50-54 C+ 2.50
45-49 C 2.25
40-44 D 2.00
<40 F 0.00

Format of Thesis Report


A template of the thesis report can be founded in the appendix section.

7.4.2 Project
Details of Project and Guidelines
Course Description
This course introduces the students to carry out project implementation in
the particular area of choice. The students will do implement a substantial
piece of work – be it a software tool or hardware device to solve some real
life problem.

Course Duration
14 weeks (3.5 months)

Course Goals & Objectives


The goals and objectives of the project course is to:

• Introduce the students to developing tools

• Properly document their work

• Follow proper software engineering practices

Methodology of Project

• Students must see prospective supervisors to learn about possible


project topics

• They must submit project proposal in the prescribed application form

180
• Department will announce the supervisor assignment for students

• The assigned supervisor must keep the record of the progress of se-
lected project work

• The supervisor has to counsel a student at least twice a week

• The supervisor must proof read the project report before final submis-
sion

Guidelines for Report Writing


A report for a BSc in CSE must be a contribution to scientific knowledge,
of highest possible quality and of lasting value to the intellectual commu-
nity. The following guidelines have been established to fulfill the minimum
standards for professional presentation of the work.

Paper
For report examination, high-quality, long lived white A4 sized paper must
be used. Three ‘hard bound’ copies to be provided to the department for dis-
tribution to examiners at least 2 working days prior to the final presentation.
Students must also submit a soft copy of the report to the department chair.

Typeface
Type size should be at least 10 points. Students must not use script, or
ornamental forms. Print must be letter quality or near letter quality with
dark black characters that are consistently clear, crisp and easy to read.

Margins
Margins on the binding side (left edge) must be 4 cm; all other margins
must be 2.5 cm. Headers and/or footers must be placed within the 2.5 cm
margin, Pagination must be placed 1.25 cm from bottom of page.

Spacing
One and a half or double spacing is required in the main body of the
manuscript except where conventional usage calls for single spacing; e.g.,
footnotes, indented quotations, tables etc.

Word and Text Divisions


Words must be divided correctly at the end of the line and may not be di-
vided from one page to the next. Use a standard dictionary to determine
word division. Avoid short lines that end a paragraph at the top of the page,
and any heading or subheading at the bottom of a page that is not followed
by text.

181
Language
The report must be in English.

Binding, Order and Content

1. Binding

(a) Soft binding only is required for report examination by the su-
pervisor.
(b) Full/hard binding is required for final submission ie, (after exam-
ination and/or emendations).
(c) Students must submit three copies in black cover with gold let-
tering on the spine and the cover.

2. Preliminary Pages

(a) Title Page


(b) Certificate
(c) Abstract
(d) Preface and/or Acknowledgements.
(e) Table of Contents, with page references.
(f) List of Tables, with titles and page references.
(g) List of Illustrations/figures, with titles and page references.

3. Text

(a) Introduction
(b) Main body, with the larger divisions and more importantly sub-
divisions indicated by suitable chapter (suggested chapter head-
ings can be found in the writing guideline sides in the appendix),
section and consistent headings
(c) Conclusion
(d) Appendices
(e) Bibliography or List of References

4. Pagination
Each page of the report except for the title, letter of transmittal and
certificate should be numbered. For the preliminary pages, use small
Roman numerals (i, ii, iii, iv, etc.). For the remainder of the report,
use continuous pagination for text, illustrations, images, appendices,
and bibliography, using Arabic numbers (1,2,3, etc.). The main body
must start with page 1, as this is not a continuation of the Roman
numeral numbering.

182
5. Images and Graphs
All images and graphs should be of professional quality. If it is not
their own work students must provide full reference to the source.
6. Scholarly Reference
The report should follow the reference prescribed for IEEE Transac-
tions.
Guidelines for Students
• Project work can be done in a group of at most 3 students
• Under special recommendation by the Chairman of the department at
most 4 students can work in the same group
• The project work must be completed within the semester (14 weeks)
• Every student must contact with the supervisor at least twice a week
with updates about the researches
• Each group of student must submit 3 copies of the final report within
the deadline announced
• Each group of student must present their project twice – once as a
midterm presentation to show progress of the project midway through
the semester, and finally at the end of the semester to present their
final findings
• Any kind of unethical practices and plagiarism is strictly prohibited

Evaluation Policy
Grading Scheme for the Report
The report will receive straight zero if
• it is not submitted 2 working days prior to the final presentation date
• it is missing signature of the supervisor or the students on the letter
of transmittal and the certificate pages. By signing the report, the
student confirms that the report submitted is their work. As for the
supervisor, their signature is confirming that they have in fact reviewed
the report before submission and that they are accepting the work as
satisfactory.
• the report is plagiarized in parts or full. We expect that all figures
and tables (if not created by the students themselves) must be prop-
erly referenced. The text itself should not be copy/pasted from any
source, even if reference is properly cited. Students should be able to
paraphrase what they understood. Supervisor must ensure that the
students are complying with this expectation.

183
• soft copy of the report is not provided in pdf format.

The report review committee will grade the reports out of 20. A suggested
breakdown of the grading criteria is presented here:

Criteria Marks(%)
Document organization in chapters, 20
sections, subsections
Formatting 10
Originality of work 20
Grammar and writing style 20
Content of the report 20
Citation and References 10
Total 100
Grading Scheme for the Course
Students will be individually graded based on the following grading scheme:

Item Marks(%)
Supervisors discretion
Attendance 10
Knowledge about the topic 10
Interview panel’s marks
Midterm presentation 30
Final presentation 10
Knowledge about the topic & Q/A 20
Report 20
Total 100
The final grade of the course will be awarded as per UGC rules:

Scores Grade Grade Value


80-100 A+ 4.00
75-79 A 3.75
70-74 A- 3.50
65-69 B+ 3.25
60-64 B 3.00
55-59 B- 2.75
50-54 C+ 2.50
45-49 C 2.25
40-44 D 2.00
<40 F 0.00

184
Format of Project Report
The Writing Guide presentation and output of Latex template are the same
as for the Research Methodology course.

7.4.3 Internship
Course Code: CSE433 or CSE4056
3 Credits

Internship Course Description and Guidelines


Internship is a combination of practical work and study, that is to say, it
is a specified period of planned and supervised professional training of the
students which help them to gain practical work experience from compe-
tent organizations. The students generally select internship according to
their areas of interest. The department may help the students to select the
proper place for internship. The Department of Career Services also helps
the students to get suitable internship opportunities. After successful com-
pletion of most of the courses (Minimum 80% of the courses), the students
are allowed to do the internship.

Duration of Internship The duration of Internship is at least 2.5 Months.


But the student may do this internship within two semesters after doing his
registration. This allows the student ample time to find suitable internship.
For example a student who has registered for internship course in Spring
2014 may face internship viva board at the end of Spring 2014 or at the end
of Summer 2014. Under special circumstances department may take viva of
a student at the middle of a semester and submit his grade to exam section.

Course Goals
• An internship is a structured learning experience in a work setting
that enhances a student’s understanding of their career field of choice.

• To acquire important supplementary skill during an internship and


make contact with potential future employers.

• Internship represents a cross-over point between university and career.

• Match Classroom Theory.

• Skill Development, improving teamwork, writing and speaking abili-


ties. Assignments and work environment will determine the types of
skills developed.

• Personal Development, make a special effort to observe the personal


style of supervisors and colleagues. The intern will be able to identify

185
the clear examples of leadership styles that either promote good work-
ing relationships or hinder a productive working environment. They
will also learn how to handle pressure, tension and praise in work
relationships.

Course Schedule
This course has no particular schedule as the student can complete it within
one or two semester. But if the student wants to complete it within one
semester he is expected to collect forwarding letter from department within
first week, apply for internship and start internship within week two. Stu-
dent can also collect forwarding letter before the semester starts if he wants.

Schooling Method

• At the beginning of the semester a student should apply for forwarding


letter by filling up Internship Application Form.

• After the student applies for forwarding letter, the department will
issue him/her a forwarding letter and assign a supervisor for him.

• The respective supervisor will direct and assist the student to perform
his/her internship.

• The person who guides the student at internship site is named as co-
supervisor.

• The respective supervisor will monitor the regularity and problem of


his/her assigned student. The supervisor may also contact the co-
supervisor to learn about student’s actual project.

Internship Guidelines
• Every student must be regular and punctual in internship.

• Students must follow ethical issues and respective organizational rules.

• They have to be prepared to answer the questions/academic knowledge


asked by the internship offering organization.

• Every student must submit 3 copies of final paper report within depart-
ment specified timeline. Students will also need to submit a softcopy
of their report (Preferably in PDF format).

• Every student must contact with supervisor at least once a week with
internship advancement.

186
Evaluation Policy
Basis Percentage
Internship Report 20%
Feedback from co-supervisor 20%
Presentation 40%
Viva 20
Total 100%

Format of Internship Report


A format of internship report is included in the appendices.

7.5 Guidelines to Create Poster Presentation


Area of Interests (not limited to):

• Computer Control

• Web Based Applications

• Communications and Networking

• Internet of Things

• Information System

• Database Systems and Big-Data

• Robotics Automation

• Algorithms and Computation

• Computer Vision

• Image Processing

• Human-Computer Interaction

• Network Security

• Sensors Embedded Systems

• Electronics

• Pattern Recognition

• VLSI Design

• Mobile Applications

187
• Others

Prepare the Poster:

1. Portrait format in A4 size is suggested. Standard sized art papers,


Size: 22 inch width by 28 inch height, Weights: 128 gm

2. Each poster may be no larger than 48 inches height (122 cm) by 36


inches width (91.4 cm) unfolded. Posters may be prepared using A4,
A5 or 8” by 11”

3. Place your Paper Title, Paper Title and Authors’ names prominently
at the top of the poster to allow viewers to identify your paper easily.

4. Highlight the Authors’ names, e-mail and address information in case


the viewer is interested in contacting you for more information.

5. You have complete freedom in displaying your information in figures,


tables, text, photographs, etc. in the poster.

6. Structure your poster by including the background of your research


followed by results and conclusions.

Rules & Regulations:

1. Each poster must contain a title of the poster, name of group members,
university name and logo.

2. Maximum of 2 members in a group.

3. All contents of the poster should be original. Content that is copyright


to someone else should not be in your poster.

4. Poster’s design and content should strongly represent the information


that the designers want to convey to the viewers.

5. Any content of the poster should not negatively criticize any social
issue or any person

188
8

Career Prospects of CSE


Graduates

Computer has been used ubiquitously almost in every sector nowadays.


Thus, the demand of computer related technologies has also increased no-
tably. The extensive use of computer has created a demand for skilled
persons in various sectors. The most exciting part of CSE is that its area
is not confined within a particular discipline. It is an interdisciplinary field
that incorporates the combination of Computer Science and Electrical Engi-
neering into a specialized professional area of practice. The use of computer
technologies is also commonplace in all types of organizations, in academia,
research, industry, government, private and business organizations. The
pervasive use of computer has lead to the growth of potential career oppor-
tunities in computer related sectors as well as many other areas because of
the diverse use of computer. Currently, it is one of the world’s hottest and
most in-demand professional fields, and it is likely that this demand will
keep on increasing.

The career opportunities for computer science graduates can be classified


into seven categories: programming and software development, informa-
tion systems operation and management, telecommunications and network-
ing, computer science research, web and Internet, graphics and multimedia,
training and support, and computer industry specialists.
Programming and Software Development: Following jobs are available
in this category:

• Systems analyst

• Systems consultant

• Software engineer

• Systems programmer

189
• Database analyst

• Artificial Intelligence programmer

• Scientific applications programmer

• User interface designer

• Embedded systems application programmer

Information Systems Operation and Management

• Electronic data processing (EDP) auditor

• Database administrator

• Systems administrator

• Computer security specialist

• Management/IT consultants

• Information systems manager

• Chief information officer (CIO)

Telecommunications and Networking

• Network engineer/consultant

• Network administrator

Computer Science Research

• Computer scientist/researcher

• Computer science professor

• Artificial Intelligence researcher

• Data miner

• Bioinformatics specialist

• Medical imaging specialist

Web and Internet

• Front End Software Engineer

• Backed Software Engineer

Graphics and Multimedia

190
• Animation/Special effects developer

• Multimedia developer

• Computer game designer/programmer

• Electronic sound producer

Training and Support

• Technical support representative

• Trainer, software applications

• Technical writer

Computer Industry Specialists

• Systems integrator

• IT recruitment consultant

• IT sales professional

• Journalist, computer-related publications

These are just a few examples. There are many more emerging and exciting
fields which the prospective graduates can choose for their career. Depart-
ment of CSE of SEU is up for the challenge, and always try to keep the
curriculum up to date so that the students can be ready to build their ca-
reer in whatever path they want. So, choosing CSE will be the smartest
choice one has made and if he/she works diligently, nothing but shiny days
are ahead.

191
192
9

Photo Gallery of CSE


Department

193
194
195
196
10

Contact Address

A.R. Tower
24, Kamal Ataturk Avenue
7th floor to 12th floor
Banani, Dhaka-1213
Phone: +88029822040
Mobile: +8801718211738

Location in the google map

197
Appendix A

Format of Thesis and Project


Report

198
Department of Computer Science & Engineering
SOUTHEAST UNIVERSITY

CSEXXXX: Course Title


Title of the Thesis

A dissertation submitted to the Southeast University in partial fulfillment of the


requirements for the degree of B. Sc. in Computer Science & Engineering

Submitted by
Abul Babul Kabul
ID: 1 ID: 2 ID: 3

Supervised by
Faculty Name
Rank, Department of CSE
Southeast University

Copyright c Year XYZ


Month, Year
Letter of Transmittal
November 20, 2014

The Chairman,
Department of Computer Science & Engineering,
Southeast University,
Banani, Dhaka.

Through: Supervisor, Supervisor Name

Subject: Submission of XXXX

Write a letter asking for permission to work on whatever you are working.

Thank you.

Sincerely yours, Supervisor:

Abul Supervisor Name


ID: 1 Rank, Department of CSE
Batch: X Program: CSE Southeast University
Certificate
Supervisor writes a paragraph where he/she certifies the work done as satisfactory.

Author: Approved by the Supervisor:

Abul Supervisor Name


ID: 1 Rank, Department of CSE
Batch: X Program: CSE Southeast University
Abstract

Abstract goes here. Abstract should stand on it’s own, without any references.
The abstract should not exceed 150 words.

i
Acknowledgements

Thanks everyone.

ii
Contents

Abstract i

Acknowledgements ii

List of Tables iv

List of Figures v

1 Introduction 1
1.1 Some section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Some subsection . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Another section . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

2 Literature Review 2

3 Problem 3

4 Implementation 4

5 Result and Evaluation 5

6 Conclusion 6

Appendix A 7

Bibliography 8

iii
List of Tables

iv
List of Figures

v
Chapter 1

Introduction

The chapter headings presented here are roughly what should appear in a the-
sis. You may need to change the names to suit your work. Cite researches you
reviewed [1].

1.1 Some section

1.1.1 Some subsection

1.2 Another section

1
Chapter 2

Literature Review

2
Chapter 3

Problem

Clearly present the problem with all necessary details. Present a schematic view
of it. Precisely mention what present systems do and what it fails to accomplish.
State what might be a desirable goal in the present environment.

3
Chapter 4

Implementation

Give a schematic view of your solution. Establish how your implementation/formalism


is better than what has been done already. Clearly mention how you tested your
work.

4
Chapter 5

Result and Evaluation

Mention what your results were compared against, how data was gathered and
what factors affect the result.

5
Chapter 6

Conclusion

Your conclusion must be relevant to what has been done. Make no recommenda-
tions that has not been addressed in the work.

6
Appendix A

Whatever you need to add. Add further appendices if you need more. Anything
you add in the appendix must be mentioned in the body of the report.

7
Bibliography

[1] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to


Algorithms, 3rd ed. The MIT Press, 2009.

8
Appendix B

Format of Internship Report

215
Department of Computer Science & Engineering
SOUTHEAST UNIVERSITY

Internship Report
on
Title

A dissertation submitted to the Southeast University in partial fulfillment of the


requirements for the degree of B. Sc. in Computer Science & Engineering

Submitted by
[student name]
ID:......
Batch

Supervised by
Faculty Name
Designation
Department of CSE
Southeast University

Copyright c Year XYZ


Month, Year
Letter of Transmittal
month name date, year
The Chairman,
Department of Computer Science & Engineering,
Southeast University,
Banani, Dhaka.

Through: Supervisor, Supervisor Name

Subject: Submission of XXXX

Write a letter asking for permission to work on whatever you are working.

Thank you.

Sincerely yours, Supervisor:

name Supervisor Name


ID: 1 Designation
Batch: X Department of CSE
Program: CSE Southeast University
Certificate
Supervisor writes a paragraph where he/she certifies the work done as satisfactory.

Supervisor: Co-Supervisor:

name Name
Designation Position
Department of CSE
Southeast University
Executive Summary

This is a most important part of your report. It summarizes the body of the
report, outlining its scope, purpose and major findings, highlighting the key con-
clusions and recommendations.

i
Acknowledgements

You may address all the people (parents, teachers, friends, others) who have con-
tributed to the success of this document. Expression of thanks to the people, to
the company and others who have made invaluable contribution to the completion
of this report.

ii
Contents

Executive Summary i

Acknowledgements ii

List of Tables iv

List of Figures v

1 Introduction 1
1.1 Presentation of the company/organization . . . . . . . . . . . . . 1
1.2 Objective of the Internship . . . . . . . . . . . . . . . . . . . . . 1
1.3 Scope and Methodology . . . . . . . . . . . . . . . . . . . . . . . 2

2 Literature Review 3

3 Details of Internship Work 4

4 Key Results/Key Learning’s 5

5 Limitations and Recommendations 6

6 Conclusion 7

Glossary 8

Appendix A 8

Bibliography 10

Text Format in the Report 10

iii
List of Tables

Table1: [Name of the Table]...........[Page Number]


Table2: [Name of the Table]...........[Page Number]

iv
List of Figures

Figure1: [Name of the Figure]..........[Page Number]


Figure2: [Name of the Figure]..........[Page Number]

....

v
Chapter 1

Introduction

1.1 Presentation of the company/organization

a. Brief history
b. Nature of the organization/competition
c. Product lines
d. Business volume/ employee

1.2 Objective of the Internship

The purpose the study should provide a Specific and accurate synopsis of the
overall purpose of the study. It stresses the reader why you performed the study.
In other words, the reader should be informed of the importance of the study. Key
points to keep in mind when preparing a purpose statement. Try to incorporate a
sentence that begins with ”the purpose of this study is...”. This will clarify your
own mind as to purpose and it will inform the reader directly and explicitly.

1
CHAPTER 1. INTRODUCTION

1.3 Scope and Methodology

The purpose of this section is to describe in detail how you performed the study.
This includes sample, data collection, and data analyzing method. This section
should not be very lengthy. The writer has to give separate details of survey
methodology if he/she has conducted a survey in the study.

2
Chapter 2

Literature Review

3
Chapter 3

Details of Internship Work

Explain in details what you have done in your internship.


Include the following in this section.

• Your work, time table, what you did, when, where and who had supervised
you.

• Who was your overall internship supervisor and how he or she had con-
tributed to the program.

4
Chapter 4

Key Results/Key Learning’s

• Analysis of the results obtained/learning’s realized in an appropriate con-


ceptual framework derived from the situation analysis.

• Emphasize results related to strategy, organizational structure, business


processes, human resources, technology as appropriate depending on the
mission.

5
Chapter 5

Limitations and
Recommendations

A limitation identifies potential weaknesses of the study. Think about your


data, analysis, the nature of your instruments, and the sample. Explain these
limitations in briefly.

Recommendations must follow logically from the conclusion and findings. They
should not be vague, abstract, idealistic or ambitious. Instead they should be
specific, concrete, to the point, practical, relevant to the organization and the
study

6
Chapter 6

Conclusion

Conclusion must be based on findings of the study and link them to your research
objectives/purpose.
REMEMBER that conclusions deal with the present, recommendations with the
future

7
Glossary

Provide a glossary if the text is necessarily heavy with specialized terms, math-
ematical symbols. If there is only the occasional term in the report, define it as
part of the text.

8
Appendix A

Whatever you need to add. Add further appendices if you need more.

9
Text Format in the Report

• Paper : For report examination, high-quality, long lived white A4 sized


paper must be used. Three ’hard bound’ copies to be provided to the de-
partment for distribution to examiners at least 2 working days prior to the
final presentation.
• Font type & size : Times New Roman, 12 point for body text
• Margin : Margins on the binding side (left edge) must be 4 cm; all other
margins must be 2.5 cm. Headers and/or footers must be placed within the
2.5 cm margin, Pagination must be placed 1.25 cm from bottom of page.
• Line Spacing : One and a half or double spacing is required in the main
body of the manuscript except where conventional usage calls for single
spacing; e.g., footnotes, indented quotations, tables etc.
• Punctuations, Spelling and Grammar Check: Use correct punctuation marks.
Spelling and grammar should be accurate.
• Page Numbering: Every page should be numbered. The page numbers
should start with 1 from the first page of your chapter 1. All the pages
before the first chapter should be given Roman numbers (i, ii, iii,etc.)
• Justification : Both left and right
• Start major sections of the report on new page.
• Language:The report must be in English.
• Binding :
a) Soft binding only is required for report examination by the supervisor
b) Full/hard binding is required for final submission ie, (after examination
and/or emendations).
Three copies in black cover with gold lettering on the spine and the cover.
• Each page of the report except for the title, letter of transmittal and cer-
tificate should be numbered. For the preliminary pages, use small Roman
numerals (i, ii, iii, iv, etc.). For the remainder of the report, use continuous
pagination for text, illustrations, images, appendices, and bibliography, us-
ing Arabic numbers (1,2,3, etc.). Remember to start with page 1, as this is
not a continuation of the Roman numeral numbering.
• Images and Graphs: All images and graphs should be of professional qual-
ity. If it is not your own work you must provide full reference to the source.
• NOTE: - Student should adhere to the timings for submission of report.
No excuse will be entertained in any case.
• - Papers that are not typed will not be accepted.

10
Appendix C

Teaching Evaluation Form

234
Annexure VIII

Southeast University
Teaching Evaluation Form
THIS IS AN ANONYMOUS EVALUATION. THE SYSTEM DOES NOT ALLOW
DISCLOSURE OF YOUR IDENTITY.

Strongly Strongly
Disagree Neutral Agree
Disagree Agree
About the Teacher
1
 The Teacher was adequateley 1 2 3 4 5
prepared for the class.
2
 Classes began and ended on time. 1 2 3 4 5
3
 The Teacher presented and
explained materials clearly 1 2 3 4 5
through examples.
4
 The Teacher encouraged class
participation and responded to 1 2 3 4 5
questions.
5
 The Teacher's teaching methods 1 2 3 4 5
were effective.
6
 The Teacher was available for help 1 2 3 4
outside class, if needed.
7
 The Teacher demonstrated good
knowledge of the subject matter of 1 2 3 4 5
the course.
8
 The Teacher's English
communication and delivery skills 1 2 3 4 5
were very good.
9
 The exams, quizzes and
assignments covered the meterial 1 2 3 4 5
taught in class.
10
 The Teacher graded and showed
mid-term exam, class tests, quizzes 1 2 3 4 5
and assignments within a
reasonable time.
Page 1 of 2
Annexure VIII

About the Course


 The Course was well-designed and
organized. 1 2 3 4 5
 The Course materials (books and
readings) were up-to-date. 1 2 3 4 5
 The content specified in the course
outline was actually covered in 1 2 3 4 5
class.
 The material covered in this
Course was not taught in another 1 2 3 4 5
course.
 The material covered in this
Course was reasonable for one 1 2 3 4 5
semester.
 The Course was interesting and
useful. 1 2 3 4 5
Additional Comments

 Comments
(You can write anything about your Course
Teacher)

Page 2 of 2

You might also like