Professional Documents
Culture Documents
SEU CSE Student Handbook
SEU CSE Student Handbook
Department of CSE
Southeast University
2018
Contents
4 Undergraduate Program 22
4.1 B.Sc. in Computer Science and Engineering (CSE) . . . . . . 22
4.1.1 Course Curriculum Structure and List of Courses . . . 22
4.1.2 Policy for distributing Elective Courses . . . . . . . . 27
4.1.3 Semester wise course distribution . . . . . . . . . . . . 28
4.1.4 Course Descriptions . . . . . . . . . . . . . . . . . . . 31
2
5 Academic Strengths of CSE Department 64
5.1 Faculty Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . 64
5.2 Various Committees of CSE Department . . . . . . . . . . . . 167
5.3 Laboratory Facilities . . . . . . . . . . . . . . . . . . . . . . . 168
5.4 Computing and Internet Facilities . . . . . . . . . . . . . . . . 169
3
I am very much pleased to know that the Department of Computer Science
& Engineering is going to publish the CSE handbook for the first time. Cer-
tainly this handbook will provide useful information for the students and
guardians about the academic curriculum, rules, regulations and policies of
the university as well as the department. Besides, students will be able to
get at -a- glance picture of co-curricular and extra-curricular activities of
the CSE department.
Southeast University (SEU) commenced its journey in the year 2002 with a
humble aspiration to join the leading educational institutions in the country.
Its desire to be a key node in the global network of knowledge communities
brought it at the forefront in the society from the very first day of its journey.
We, in the SEU family, believe in the promotion of free flow of ideas and in
building synergies between the processes of creating, imparting and exploit-
ing knowledge in order to develop a dynamic society, imbued with culture
and a spirit of enterprise. Our goal is to provide diverse opportunities for
intellectual, personal and professional growth.
4
support brought this institution to the apex of success.
5
I am very much delighted to know that the Department of Computer Sci-
ence and Engineering (CSE) of Southeast University is going to publish its
handbook for the first time. CSE department is one of the very vibrant and
academically sound departments among the five departments of the School
of Science and Engineering of this University.
I would like to thank the Department Chairman and Member of this hand-
book Committee for their relentless efforts for publishing this handbook.
Congratulations to you all!
Finally, I wish all the successes and their endeavors for the continuous growth
6
of the CSE Department.
7
Greetings!! from the CSE department of Southeast University. CSE Depart-
ment started its journey in Summer 2002 with 36 students. It received valu-
able guidance at the initial stage from Prof. Dr. M. Kaykobad a renowned
professor of CSE department BUET. In CSE department we follow global
standard syllabus. Class routine and exam routine of CSE department is
fully automated and that is why we can utilize our resources optimally. Now
some teachers, graduates and students of CSE department are working to-
gether to automate the whole university.
Most graduates of CSE department are well placed in the society. Grad-
uates of CSE department are working in companies like Facebook, AT&T,
SSL Wireless, REVE Systems etc. They are also working in Banks, other
renowned Software Companies, ISPs, Garments Sector, NGOs etc. Some of
our graduates are also working as faculty members in other private univer-
sities.
The primary goal of CSE department is to make the students think and
the department do it by engaging students in problem solving in different
courses. The department also participates in regional contests of ACM In-
ternational Collegiate Programming Contest regularly. And it got within
top 5 (University Ranking) position in Dhaka Regional 2005, 2006, 2007.
The department also likes to recruit faculty members who can think be-
cause only then they will also be able to make the students think.
The teachers of CSE department are young, energetic and friendly with the
8
students and university authority is also trying their best to increase the
existing facility of the students. A faculty member of CSE department is a
world famous researcher and another one is a judge of ACM International
Collegiate Programming Contest, World Finals since 2003. The average pro-
gramming skills of CSE department of SEU is the best in Bangladesh. So
in many ways CSE department is different than other CSE department of
Bangladesh and the best way for anyone to know about this difference is by
joining us. Thanks for your patience.
Shahriar Manzoor
Chairman & Associate Professor
CSE Department, Southeast University, Dhaka
President, Bangladesh Association of Problemsetters
Judging Director ACM ICPC Dhaka Site 2004-2017
ACM ICPC World Finals Judge 2003-2018
9
1
Mr. Md. Anowar Hossain Mr. Md. Enayetur Rahman Mr. M. Tajul Islam
Honorable Vice-Chairman Honorable Vice-Chairman Honorable Vice-Chairman
Mr. Zahirul Haque Mr. Mohammad Hasan Advocate Kazi Md. Nurul Amin Mr. Mohammad Nawaz
Honorable Member Honorable Member Honorable Member Honorable Member
Mr. Md. Reaz Uddin Ansari Al-haj Helal Miah Capt. Md. Irshad Ali Mr. Abul Kalam Azad
Honorable Member Honorable Member Honorable Member Honorable Member
Alhaj Md. Abdul Wahab Mrs. Shirin Akhter Mr. Istiaque Ahmed Mr. Azharul Islam
Honorable Member Honorable Member Honorable Member Honorable Member
10
2
Vision
The vision of SEU is to flourish as a prestigious seat of learning in the South
Asian region. As a center of excellence, it aims at attracting students from
all countries of the region.
Mission
The mission of SEU is to provide higher education to students of Bangladesh
at an affordable cost, keeping in view the challenges of the twenty first cen-
11
tury. And this mission will be achieved by imparting world class education
and providing research facilities so that the students can attain their full
intellectual, social and personal potentials. SEU is committed to develop
human capital by cultivating creative thinking in individuals. It offers edu-
cation through both campus and ICT-based online modes of teaching.
Strategies
The strategies of SEU emanate from its objectives set by the southeast Uni-
versity Trust. The main objective is to import quality education to the
young learners at an affordable cost, in order to make them adequately ca-
pable to meet the challenges of globalization. With this end in view, the
university authority adopts appropriate policies and always tries to imple-
ment them earnestly to reach its goal. The university demands from its
students and teachers the highest standard of performance in academic and
other activities.
12
Admission Procedure
13
2.3 Organogram and University Administration of
SEU
14
2.4 Degrees offered at SEU
School of Business Studies
Bachelor of Business Administration
Master of Business Administration
15
Department of Economics
Department of English
Department of Law & Justice
Teaching Methods
Higher education in today’s technologically advanced world demands ac-
quisition of knowledge that promotes free thinking and informed learning.
Keeping that view in mind, classrooms at SEU well equipped with multi-
media and internet facilities. Teaching methodology is mainly participatory
and interactive although some classes are lecture based because of the nature
of the courses. Students are required to be proactive by their presence in the
classes and through their contribution in various ways, such as, questions-
answers, exchange of opinions, group discussions etc. Presentation sessions
by students are very common practice in many of the courses as the stu-
dents enjoy learning through their formal demonstrations on assigned top-
ics. Other common activities in the classroom teaching-learning, include
case and poster presentations, problem solving exercises, quizzes, debates,
role plays, pair-works, group-works, peer-feed backs, interviews, viva etc. In
some courses, specially those belonging to Business Studies and Engineering,
students might be required to undertake field/industry visits, write reports
and conduct project works. On the whole, teaching methodology at SEU
basically fosters critical thinking and independent learning with a view to
preparing students as members of knowledge society.
16
holds meeting regularly with faculty members and researchers of all de-
partments and maintains regular interaction with them to assist them in
developing and implementing their research projects. IRT seeks research
proposals from individual faculty members in their areas of interest; these
proposals are reviewed by a committee for IRT funding. After funding, IRT
follows up the progress of the research projects until their completion.
IRT also gives emphasis on improving research and teaching capacity of
the faculty members through training. It has already conducted a number
of training programs on Statistical Package for Social Science (SPSS) and
STATA for the faculty members. IRT has plan to implement training pro-
grams on GIS and atlas.ti as well. The long term goal of IRT is to establish
SEU as the best research university in Bangladesh.
SEU Library
Since its inception in 2002, SEU has been taking all possible steps to build a
well equipped modern library. The library is now fully automated through
KOHA Integrated Library System, which supports web-based online bor-
rowing and receiving, searching catalog of books, CDs, journals, newspa-
pers and magazines, full-text online books and journals, auto email alert
service, and reservation of books from distant workstations. The users can
check their borrowing status, renew issued resources and can reserve books
through internet. SEU Digital Institutional Repository has been developed
using Greenstone Digital Library software which provides full access to all
users. The library subscribes more than 36000 online journals and a large
17
number of e-books published by various internationally reputed publishers.
The library’s purpose is to enrich the teaching, learning and research en-
deavors of the university by delivering easy access to relevant information
resources and proving quality services and facilities. For proper manage-
ment of the library resources, Dewey Decimal Classification (DDC) system
is used. In order to ensure round the clock security, closed-circuit TV camera
network has been installed in the library.
18
3
Department of Computer
Science and Engineering
(CSE)
Mission
The department is working relentlessly to produce quality graduates who
can meet the needs of today’s industry and the academia. The programs
offered will empower the graduates with both theoretical knowledge and
hands-on experience in application-oriented skills.
19
But Bangladesh still needs a lot of skilled manpower in this field. The aim
of the Computer Science and Engineering Department is to create interna-
tional standard skills in Computer Science & Engineering and related fields
through innovative ideas and by providing world class education. To achieve
this vision the department educates the students with the latest art of Com-
puter Science and Engineering with the help of modern teaching techniques.
Many of our courses are lab based so that the students can learn their sub-
jects easily with the help of a lot of practical classes. In this way we are
fulfilling our mission of providing world class computer science education at
an affordable cost.
20
3.5.2 Faculty Evaluation
At the end of each semester, students of each course evaluate their faculties
on some certain criteria in a scale from 1 to 5. This is a must for each and
every student. This evaluation plays a very significant role in evaluating
the performance of the faculties. Faculties can know their strengths and
weaknesses and can work on to rectify their mistakes and make themselves
better. To ensure student’s security and freedom of opinion, this evalua-
tion is done online and students’ identity are kept strictly hidden from the
faculties. Faculty evaluation form is attached in the appendix section.
21
4
Undergraduate Program
22
List of Courses
23
Inter Disciplinary Courses (Theory and Lab)
24
SL Course Course Title Pre req- Cre-
NO Code uisite(s) dit(s)
19 CSE3025 Theory of Computing CSE2021 3
20 CSE3027 Introduction to Embedded Systems CSE3013 3
21 CSE3028 Introduction to Embedded Systems Lab CSE3014 1
22 CSE3031 Operating Systems CSE3013 3
23 CSE3032 Operating Systems Lab CSE3014 1
24 CSE3035 Information System Design & Software CSE2015, 3
Engineering CSE2016
25 CSE3036 Information System Design & Software CSE2015, 1
Engineering Lab CSE2016
26 CSE4000 Research Methodology Completion 3
of 110
credit
hours
27 CSE4011 Computer Networking ETE2023 3
28 CSE4012 Computer Networking Lab ETE2023 1
29 CSE4013 Computer Graphics & Animation CSE2015, 3
MATH2015
30 CSE4014 Computer Graphics & Animation Lab CSE2015, 1
MATH2015
31 CSE4041 Artificial Intelligence CSE2021 3
32 CSE4055 Project or Internship CSE4000 3
or
CSE4056
Total 72
Elective Courses
25
SL Course Code Course Title Credit(s)
NO
8 Elective VI* Any course from Group A 3
Total 20
26
Elective Courses with Lab: Group B (Students must take at least
two courses with associated lab from the list below
27
view or choose elective courses of their own choice from group A and group
B with the following restrictions:
They must take at least two theory courses and corresponding lab courses
from group B. Rest of the credits(112 credits) can be fulfilled by taking any
theory courses from group A or group B. A student can choose to do only
the theory course which has an accompanying lab. However, selecting the
lab without the accompanying theory course is not allowed.
1st Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE1013(3) Ni ENG1002(3) ENG1001 CSE1021(3) CSE1011
ENG1021(3) ENG1002
2nd Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE1033(3) CSE1021 CSE1031(3) CSE1021, CSE2021(3) CSE1033
MATH1024
28
2nd Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
ECO2021(3) Nil CSE2014(1) CSE1011 ETE2023(3) MATH2014,
EEE2011
3rd Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE3011(3) CSE2015 Elective CSE3031(3) CSE3013
1*(3)
CSE3014
CSE3012(1) CSE2015 CSE4011(3) ETE2023 CSE3032(1) CSE3014
29
4th Year
Semester 1 Semester 2 Semester 3
Courses Pre requi- Courses Pre requi- Courses Pre requi-
site(s) site(s) site(s)
CSE3027(3) CSE3013 CSE4000(3) Completion
of 110
credit
hours
Elective * Elective *
III*(3) V*(3)
Elective * Elective *
IV*(3) VI*(3)
Elective IV* *
Lab(1)
30
4.1.4 Course Descriptions
ACT1021: INTRODUCTION TO ACCOUNTING
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
Cost & Management Accounting: Cost concepts and classification, overhead cost
– meaning and classification, distribution of overhead cost, overhead recovery method,
job order costing, preparation of job cost sheet and quotation prite, inventory valu-
ation, absorption costing and marginal/variable costing technique, cost-volume-profit
analysis, contribution-margin approach, sensitivity analysis. Short term investment de-
cisions – relevant and differential cost analysis, long term investment decisions – capital
budgeting, various techniques of evolution of capital investment.
PREREQUISITE(S): Nil
TOPICS:
Computer and C Fundamentals, C Data types, Operators and Expressions, Basic I/O
functions, if-else statement, loops – for loop, while loop, do-while loop, functions, global,
local, static and register variables, arrays, bubble sort, selection sort, pointer arithmetic,
arrays and pointers, pointer to pointer to integer, structures.
TOPICS:
Laboratory Work based on CSE1011
31
CSE1013: COMPUTER FUNDAMENTALS
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
Introduction to computers, representation of data, input/output – keyboard (stan-
dard layout), mouse, monitor, printer, memory, physical devices - disk drives, types of
diskettes, hard disks, removable hard disks, CD-ROM, CD-recordable, WORM disks
and PhotoCD, Phase change rewritable drives, measuring drive performances, proces-
sors, binary arithmetic, floating point representation of numbers, arithmetic operations
with normalized floating point numbers, introduction to software – different sorts of
software, logic circuits, computer architecture, computer languages and operating sys-
tems, computer history, introduction to Internet – how Internet works, introduction to
telecommunication, satellite communication, fiber-optic communication.
TOPICS:
Propositional equivalence, predicate, quantifiers, methods of proof, sets, functions,
growth of functions, complexity of algorithms, integers and divisions, number theory
& its applications, matrices, proof strategy, mathematical induction, recursive defini-
tions, basic counting techniques, Pigeonhole principle, permutations and combinations,
binomial coefficients, generating permutations and combinations, discrete probability,
probability theory, recurrence relations, divide-and-conquer algorithm, generating func-
tions, relations, n-ary relations and their applications, closures of relations, equivalent
relations, partial ordering, graphs and graph models, connectivity, graph coloring, trees,
application of tree and tree traversal.
TOPICS:
Representation of numeric values in Computer, arithmetic operations of floating-point
numbers, precision error, bracketing and open methods of root finding, Solving system
of linear equations, forward and backward differences, Taylor series, different types
of interpolating polynomials, Numerical integration: Trapezoidal rule, Simpson’s rule,
Runge–Kutta methods.
32
CSE1033: DATA STRUCTURES
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1021
TOPICS:
Elementary data types, structures, arrays, pointers; introduction to Object Oriented
Programming; elementary searching: linear search, binary search; implementation and
applications of stacks and queues; solving problems with recursion; binary search trees,
balanced search trees; priority queue implementation with heaps; graph representation
and elementary graph algorithms.
TOPICS:
Laboratory Work based on Theory Course CSE1033
TOPICS:
Binary Systems, Boolean algebra and Logic Gates, Gate Level Minimization, Combi-
national Logic, Synchronous Sequential Logic, Registers and Counters, Memory and
Programmable Logic.
TOPICS:
Laboratory Work based on Theory Course CSE2013
TOPICS:
Introduction to OOP, OOP in Java, Object, Classes, Methods, Variables, Operators,
Expressions, Statements and Blocks, Control Statements, Strings, Arrays, Inheritance,
Package, Interface, Exceptions, I/O, AWT, Swing, Database using JDBC, String Han-
dling, Threads, Events, Applets, Images, Project Work.
33
CSE2031: ADVANCED ALGORITHM
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021
TOPICS:
Introduction to the design and analysis of efficient algorithms, models of computation,
efficient sorting and searching, algorithms for algebraic problems, graph algorithms,
polynomial time algorithms for matching, Fusion trees and their applications to inte-
ger sorting, Fibonacci heaps and self-adjusting search trees, splay trees, linking and
cutting trees. State-of-the-art algorithms for minimum spanning trees, shortest path
problem, Network flows pre flow-push algorithms, max flow algorithms, linear program-
ming, scaling algorithms, dynamic programming, probabilistic methods, approximation
algorithms, completeness, lower bound theory for parallel computation, lower bounds
on the resource requirements of algorithms. Non polynomial Algorithm and satisfiabil-
ity set construction.
TOPICS:
Laboratory Work based on Theory Course CSE2021
CSE2021: ALGORITHM
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1033, CSE1034
TOPICS:
Sorting (Insertion, Selection, Merge, Quick, Counting, Radix), Growth of Function,
Divide and Conquer, Solving Recurrences, Heap, Median and Order Statistics, Hash-
ing, Elementary Graph Algorithms, Shortest Paths, Sets and Disjoint Sets, Minimum
Spanning Tree, Backtracking, Introduction to Computational Geometry, Introduction
to Greedy Algorithms, Introduction to Dynamic Programming.
TOPICS:
Laboratory Work based on Theory Course CSE2015
34
CSE2032: ADVANCED ALGORITHM LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE2021, CSE2026
TOPICS:
Laboratory Work based on Theory Course CSE2031
TOPICS:
Concept of Database Systems; Semantic Database Design: High level Conceptual Mod-
eling, ER Model & Relational Model, ERD, Integrity Constraints, Enhanced ER (EER)
Model; Relational Algebra; SQL; Relational Database Design: Concepts of FDs, De-
composition & Desirable Properties, Normalization, Algorithms for 1NF, 2NF, 3NF,
BCNF, 4NF, 5NF; Other Dependencies & Normal Forms; Storage & Indexing: Stor-
age Structures, File Organization, Heap, Indexing Methods, B+ Tree Indexing, Hash
Indexing; Transaction Processing & Concurrency Control: Transaction Fundamentals,
OLTP Environments, ACID Properties, Locking, Deadlock & Starvation; Database
Recovery Techniques; Query Processing & Optimization; Database Security & Autho-
rization; Enhanced Data Models for Specific Applications; Distributed Databases &
Issues.
TOPICS:
Laboratory Works based on Theory Course CSE3011
35
CSE3013: MICROPROCESSOR DESIGN & ASSEMBLY LANGUAGE
PROGRAMMING
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE1011, CSE2013
TOPICS:
Hardware and software architecture, instruction types and their formats, assembly pro-
gram format, assembly process, interrupts and system services, addressing methods,
high level control structure formation, use of subroutines and macros, numeric process-
ing and string processing, concurrent processes & high level linking, disk geometry, file
system and file I/O handling. Introduction to 8-bit, 16-bit, and 32-bit microprocessor
– architecture, addressing modes, instruction set, interrupts, multi-tasking and virtual
memory – memory interface, bus interface, arithmetic co-processor, Micro-controllers,
integrating microprocessors with interfacing chips.
TOPICS:
Laboratory Works based on Theory Course CSE3013
36
CSE3015: COMPUTER ARCHETECTURE
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2013
TOPICS:
Fundamentals of computer design – tasks of a computer architect, technology and
trends, cost and trends, measurement of performance, quantitative principles of com-
puter design, the concepts of memory hierarchy, Instruction set principles – classifica-
tion, memory addressing, operations, types and size of operands, encoding, study of
sample instruction set architecture, pipelining – hurdles and Hazards, data hazards and
control hazards, handling multi-cycle operations, instruction level parallelism (ILP) –
overcoming data hazards with dynamic scheduling, reducing Brance penalties with dy-
namic hardware prediction, compiler support for exploiting ILP, hardware support for
extracting more parallelism, Memory hierarchy design – Caches, reducing cache misses
& penalty, reducing hit time, main memory, virtual memory, protection and examples
of virtual memory, Storage systems – types of storage devices, Buses, I/O performance
measures, reliability, availability and RAID, multiprocessors – centralized & distributed
shared memory architectures, synchronization, computer arithmetic, vector processors,
survey of RISC architectures and Intel 80x86.
TOPICS:
Systematic ways of proving, mathematical notations, sums and recurrences, modular
arithmetic, basic number theory, some well known functions related to number theory,
Binomial coefficients, Generating functions, mechanical summations, Stirling, Eulerian,
Harmonic, Bernoulli and Fibonacci numbers, Domino theory, solving recurrences using
generating functions.
TOPICS:
Formal proofs, finite automata, DFA/NFA and their equivalence, properties of regular
languages, minimizing automata, regular expressions, Pumping lemma, non-regular
languages, context-free grammar, Chomsky and Greibach normal forms, pushdown
automata, non-context free languages, Turing machines, variants of Turing machines,
definition of algorithms, decidable languages, Undecidability of the Halting problem,
Diagonalization and reduction, time complexity, classes P, NP, NPC.
37
CSE3027: INTRODUCTION TO EMBEDDED SYSTEMS
3 Credits, 3 hours/week
PREREQUISITE(S): CSE3013
TOPICS:
8-bit Microcontroller (MCU) with following basic features: Analogue to Digital, Con-
verter (ADC), Analog Comparator, Pulse Width Modulation and or Output Compare
channels, External interrupt(s), Watch Dog Timer, Internal Timers, External and in-
ternal clock input, Hardware I2C and or SPI and or CAN bus capabilities, USART/
USB communication, Parallel I/O ports. MCU: AVR ATMega168/ ATMega328; AVR
Attiny 2313/4313; Microchip PIC 16F/18Fseries
TOPICS:
Laboratory works based on Theory course CSE3027
38
CSE3031: OPERATING SYSTEMS
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3013
TOPICS:
COMPUTER SYSTEM OVERVIEW: Basic Elements; Processor Registers; Instruction
Execution; Interrupts; The Memory Hierarchy; Cache Memory; I/O Communication
Techniques;
FILE MANAGEMENT: File Organization and Access; File Directories; File Sharing;
Record Blocking; Secondary Storage Management; File System Security; UNIX File
Management: File Allocation, Directories, Volume Structure, Traditional UNIX File
Access Control, Access Control Lists in UNIX; LINUX Virtual File System; Windows
File System;
TOPICS:
Laboratory Works based on Theory Course CSE3031
TOPICS:
Lexical analysis, parsing (LL, LR parsers), syntax directed translation, intermediate
code generation, error detection and recovery, design and implementation of lexical
analyzers and parsers using tools like flex and bison.
TOPICS:
Introduction to information system (information, information system, information
gathering, information sources, system analysis), data collection process (interviewing),
fact finding techniques (questionnaire, joint application design (JAD)), prototyping,
system design tools overview, data flow diagram, data dictionary, process specifications,
E-R diagram, state diagram, variations of modeling tools (flowcharts and its variations,
Nassi-Shneiderman diagram, Ferstl diagram, Hamilton-Zeldin diagram, problem analy-
sis diagrams (PAD), system flowchart, HIPO diagrams, structure charts, variations on
data flow diagram and E-R diagram), analysis models (essential model, environmental
model, behavior model, user implementation model), introduction to UML (use case
modeling and use case diagram, class modeling, relationship, class diagrams, object
interaction – modeling sequence, collaboration diagram, state chart diagram, activity
diagram, component and deployment diagram), ethical and social issues, security is-
sues, project estimation, COCOMO model, PERT/CPM analysis, Gantt charts, cost
benefit analysis, introduction to linear programming, project work
40
CSE3036: INFORMATION SYSTEM DESIGN & SOFTWARE ENGI-
NEERING LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE2015, CSE2016
TOPICS:
Laboratory Works based on Theory Course CSE3035
TOPICS:
Study of problems in the field of Computer Science & Engineering. A student needs
to select a suitable topic of his/her interest or supervisors may display a list of project
works related with the academic needs in research activities.
TOPICS:
Overview of OSI reference model. Topology design, Media Access Control Level, Ser-
vices, Problems and protocols, Practical local area network design and implementation.
IEEE LAN Standards, Logical Link Control protocols, HDLC, ALOHA, SLOTTED
ALOHA, FDDI, Client Server model and related softwares.
Network Layer level services, problems and protocols. WAN, MAN, interconnection
networks related softwares, TCP/IP, Novel NetWare, Routers, Bridges and Gateways
their Practical implementation aspects. X.25, Internet and related softwares. Trans-
port layer, services, problems and their protocol. Brief functioning of upper layers,
E-mail and other application.
TOPICS:
Laboratory Works based on Theory Course CSE4011
41
CSE4013: COMPUTER GRAPHICS & ANIMATION
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2015, MATH2015
TOPICS:
Modeling shapes with meshes, affine transformation, three dimensional viewing, light-
ing and shading techniques, texture mapping, skinning, animating models, collision
detection, ray tracing.
TOPICS:
Laboratory Works based on Theory Course CSE4013 using OpenGL and Blender.
TOPICS:
Enterprise Resource Planning (ERP) Software. OpenERP/Odoo/Titanium/ SAP
ERP.
Introduction to Electronic Commerce: What electronic commerce is and how it has
evolved into a second wave of growth; Why companies concentrate on revenue models
and the analysis of business processes instead of business models when they undertake
electronic commerce initiatives; How economic forces have created a business environ-
ment that is fostering the second wave of electronic commerce; How businesses use
value chains and SWOT analysis to identify electronic commerce opportunities ; The
international nature of electronic commerce and the challenges that arise in engaging
in electronic commerce on a global scale
Technology Infrastructure: The Internet and the World Wide Web:The origin, growth,
and current structure of the Internet;How packet-switched networks are combined to
form the Internet; How Internet protocols and Internet addressing work; The history
and use of markup languages on the Web, including SGML,
HTML, and XML; How HTML tags and links work on the World Wide Web; The
differences among internets, intranets, and extranets; Options for connecting to the
Internet, including cost and bandwidth factors; Internet2 and the Semantic Web
42
Business Strategies For E-Commerce: Revenue models; How some companies move
from one revenue model to another to achieve success; Revenue strategy issues that
companies face when selling on the Web; Creating an effective business presence on
the Web; Web site usability; Communicating effectively with customers on the Web;
When to use product-based and customer-based marketing strategies; Communicat-
ing with different market segments; Customer relationship intensity and the customer
relationship life cycle; Using advertising on the Web; E-mail marketing; Technology-
enabled customer relationship management; Creating and maintaining brands on the
Web; Search engine positioning and domain name selection; Social Network, Viral
Marketing;
Electronic Commerce Software & Security: Web server basics; Software for Web servers;
E-mail management and spam control issues; Internet and Web site utility programs;
Web server hardware; Finding and evaluating Web-hosting services; Basic functions
of electronic commerce software; Advanced functions of electronic commerce software;
Electronic commerce software for small and midsize businesses; Security for client com-
puters; Security for the communication channels between computers; Security for server
computers; Organizations that promote computer, network, and Internet security;
Payment Systems for Electronic Commerce: The basic functions of online payment
systems; The use of payment cards in electronic commerce; The history and future of
electronic cash; How electronic wallets work; The use of stored-value cards in electronic
commerce; Internet technologies and the banking industry
The Need for Enterprise Architecture: Enterprises and their challenges; Stakeholders
and Their Concerns; Traditional Approaches; Requirements on Enterprise Architecture;
43
Governance Paradigm: Key Applications for Enterprise Architecture; Defining En-
terprise Architecture; Key Concept of Enterprise Architecture; Benefits of Enterprise
Architecture; Competencies of an Enterprise Architect;
TOPICS:
Intro to Clouds, Software as a service (SaaS), Platform as a service (PaaS), Infrastruc-
ture as a Service, MapReduce, Gossip, Membership, Grids, P2P Systems, KeyValue
Stores, Time and Ordering, Snapshots, Multicast, Paxos, Leader Election, Mutual Ex-
clusion, Concurrency Control, Replication Control, Stream Processing, Graph Process-
ing, Structure of Networks, Scheduling, Distributed File Systems, Distributed Shared
Memory, Sensor Networks, Security, Data-center Outage Studies, Cloud computing
service deployment and maintenance.
44
CSE4025: GRAPH THEORY
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021
TOPICS:
Basic Concepts: Graphs and digraphs, incidence and adjacency matrices, isomorphism,
the automorphism group; Trees: Equivalent definitions of trees and forests, Cayley’s
formula, the Matrix-Tree theorem, minimum spanning trees; Connectivity: Cut ver-
tices, cut edges, bonds, the cycle space and the bond space, blocks, Menger’s theorem;
Paths and Cycles: Euler tours, Hamilton paths and cycles, theorems of Dirac, Ore,
Bondy and Chvatal, girth, circumference, the Chinese Postman Problem, the Trav-
elling Salesman problem, diameter and maximum degree, shortest paths; Matchings:
Berge’s Theorem, perfect matchings, Hall’s theorem, Tutte’s theorem, Konig’s theorem,
Petersen’s theorem, algorithms for matching and weighted matching (in both bipartitie
and general graphs), factors of graphs (decompositions of the complete graph), Tutte’s
f-factor theorem; Extremal problems: Independent sets and covering numbers, Tu-
ran’s theorem, Ramsey theorems; Colorings: Brooks theorem, the greedy algorithm,
thWelsh-Powell bound, critical graphs, chromatic polynomials, girth and chromatic
number, Vizing’s theorem; Graphs on surfaces: Planar graphs, duality, Euler’s formula,
Kuratowski’s theorem, toroidal graphs, 2-cell embeddings, graphs on other surfaces;
Directed graphs: Tournaments, directed paths and cycles, connectivity and strongly
connected digraphs, branching; Networks and flows: Flow cuts, Max flow min cut the-
orems, perfect square; Selected topics: Dominating sets, the reconstruction problem,
intersection graphs, perfect graphs, random graphs, Chordal graphs. Famous problems
in Graph Theory include: Minimum Connector Problem, Marriage Problem, the As-
signment Problem, the Network Flow Problem, the Committee Scheduling Problem,
the Four Color Problem, the Traveling Salesman, Transportation and Transshipment
Problem, etc.
TOPICS:
Internet addressing, routing and routed algorithm., NAT, PAT, Sub-netting, Sub-
netting the subnet (VLSM), VLAN, ICMP v4 and v6. IP multicasting, RSVP, next
generation IP – IPng, ATM, wireless – radio basics, satellite systems, WAP, current
trends, issues with wireless over TCP, multiple conversation, socket, Denial service at-
tack, congestion control – control vs. avoidance, overview of algorithms, congestion in
the internet, Mobile IP, Voice over IP (VoIP), VPNs, network security, management –
Quality of Service (QoS), network vs. distributed systems management, protocols, web-
based management and other advanced TOPICS: Bluetooth, Wi-Fi (IEEE 802.11g),
Wi-Max (IEEE 802.16).
45
CSE4028: ADVANCED NETWORKING LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): CSE4011, CSE4012
TOPICS:
Laboratory Works based on Theory Course CSE4027
TOPICS:
Digital image fundamentals, perceptions, representation, image transforms – Fast
Fourier Transform (FFT), Discrete Cosine Transforms (DCT), Karhunen and Loeve
Transforms (KLT), Wavelet transform and sub-band decomposition, image enhance-
ment and restoration techniques, image compression techniques, image compression
standards – JPEG, MPEG, H.261, H.263
TOPICS:
HTML, CSS, Basic web programming, PHP basics, OOP in PHP, Relational Database
and MySQL, JavaScript, Regular Expression, Sessions and Cookies, MVC, PHP Frame-
works, JQuery, AJAX, Project Work.
TOPICS:
Lab works Based on theory course CSE4033
46
CSE4035: SOFTWARE DEVELOPMENT AND PROJECT MANAGE-
MENT
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3035
TOPICS:
Framework: Ruby on Rails, Groovy on Grails, Django, Yii, Symphony, Codeigniter,
Zend etc. Foundations of software project management; organization structure and
staffing; motivation, authority and influence; conflict management; proposal prepara-
tion; a large engineering software system management; client management; managing
software project teams; project planning and scheduling; risk management; configura-
tion management; pricing estimation and cost control; quality assurance and accred-
itation; factors affecting software quality; software quality assurance plans; business
context and legal issues for software projects; software measurement: Software testing-
white-box testing, black-box testing, Unit testing, Functional testing, load testing; up-
grading and maintenance; network systems; and international project management;
Understanding Cloud computing, Differences between hosted services and cloud ser-
vices; Learning about bigdata and problem solving using bigdata.
TOPICS:
Lab works based on theory course CSE4035.
47
CSE4037: CRYPTOGRAPHY & NETWORK SECURITY
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE4011
TOPICS:
Classical Cryptography: Introduction to simple cryptosystems, Cryptanalysis; Shan-
non’s Theory: Perfect secrecy, Entropy, Product cryptosystems; Data Encryption
Standard: Description of DES, Differential cryptanalysis; RSA System and Factor-
ing: Public-key cryptography, RSA cryptosystem, Attacks on RSA, Factroing algo-
rithms; Other Public-key cryptosystems: ElGamal cryptosystem and discrete logs,
Merkle-Hellman Knapsack System; Signature Schemes: ElGamal signature schemes,
Digital signature standard, Fail-stop signatures; Hash Functions: Signatures and Hash
functions, Collision-free Hash functions, Birthday attack; Key Distribution and Key
Agreement: Key predistribution, Kerboros, Diffie-Hellman key exchange; Identifica-
tion Schemes: Schnorr identification scheme, Okamoto identification schemes; Authen-
tication Codes: Computing deception probabilities, Combinatorial bounds, Entropy
bounds; Secret Sharing Schemes: Shamir threshold scheme, Access structure and gen-
eral secret sharing; Pseudo-random Number Generation: Indistinguishable probability
distribution, probabilistic encryption; Zero-knowledge proofs: Interactive proof sys-
tems, computational Zero-knowledge proofs.
TOPICS:
Introduction to the components of the management information system and their inte-
gration for managerial control and decision support, major functional applications and
impacts of information technology on individuals and the society, basic discussion of
the environments, approaches, principles and processes of management, environmen-
tal forces, planning, organizing and control processes, motivation, teamwork, group
dynamics and leadership in business and non-business organizations.
TOPICS:
Searching: conventional graph searching, A*, IDA*, jump point search, local search-
ing: hill climbing, simulated annealing, constraint satisfaction, adversarial search using
minimax, knowledge representation and inference using propositional and first order
logic and implementation using prolog, artificial neural networks.
48
CSE4053: INTRODUCTION TO DATA MINING
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2021
TOPICS:
Introduction to Data Mining: Introduction to Data Mining, Data Warehousing, and
OLAP, Classification Concepts, Decision Trees, Model Evaluation, and Classification
Alternative Techniques, Association Analysis Concepts, Algorithms, and Association
Analysis Advanced Concepts, Cluster Analysis Concepts, Algorithms, and Cluster
Analysis Issues, Frequent-Pair Algorithms, Anomaly Detection.
Machine Learning: Inductive learning, Rule Induction, Bayesian Learning, Neural Net-
works, and Genetic Algorithms, Model Ensembles, Learning Theory, and Instance-
based Learning.
TOPICS:
Threads, Generics, Reflection API, Java Network Programming, Advanced JDBC Pro-
gramming, Introduction to J2EE, Java Server Technology, JSP, RMI, Frameworks,
Project Work.
TOPICS:
Laboratory Work based on Theory Course CSE4047 (Advanced Java).
49
CSE4021: ADVANCED EMBEDDED SYSTEMS
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE3031, CSE3027
TOPICS:
32/64-bit Microcontroller (MCU) with following basic features: Analogue to Digital
Converter (ADC); Analog Comparator; Pulse Width Modulation and/or Output Com-
pare channels; External interrupt(s); Watch Dog Timer; Internal Timers; External and
internal clock input; Hardware I2C, SPI and CAN bus capabilities. USART, USB com-
munication; Parallel I/O ports; JTAG/SWD; Memory Protection Unit (MPU), Multi-
Threading; Multi-Core, Digital to Analogue (DAC) Converter, Direct Memory Access
(DMA), MCU: ARM Cortex M3 / M4 based mcu (as on 2014) or any popular 32/64
bit MCU with System on Chip (SoC) and Real Time OS capability.
Overview of the Cortex-M3/M4: Registers; Operation Modes; The Built-In Nested Vec-
tored Interrupt Controller; The Memory Map; The Bus Interface; The MPU;Interrupts
and Exceptions; Debugging Support and Tool chain setup.
Configuration: Registers; Special Registers; Clock Distribution; I/O Pins; Pin Remap-
ping; Peripheral Configuration; Vector Tables; Stack Memory Operations
Memory Systems: Memory System Features Overview; Memory Maps; Memory Access
Attributes; Bit-Band Operations
The Nested Vectored Interrupt Controller and Interrupt Control: Nested Vectored
Interrupt Controller Overview; The Basic Interrupt Configuration;Software Interrupts;
The SYSTICK Timer
Sensors and modules: NAND Flash, external RAM; Ultrasonic Sensors; LCD Touch
Screen; VGA display etc.
51
CSE4043: PARALLEL AND DISTRIBUTED COMPUTING
3 CREDITS, 3 hours/week
PREREQUISITE(S): CSE2031, CSE3031, CSE4027
TOPICS:
Issues in High Performance Computing: Moore’s Law, Processor Performance; Techno-
logical Limitations: Frequency, Power, Instruction Level Parallelism and Memory Wall;
Multi-Core Technology; Introduction to Cluster, Grid and Cloud Computing; Parallel
vs Distributed Computing;
Parallel Architectures: Implicit Parallelism; Introduction to Pipelining and Limi-
tation(s); Introduction to Superscalar and Limitation(s); Graphics Processing Unit
(GPU); Flynn’s Taxonomy: SISD, SIMD, MISD, MIMD; Interconnection Networks:
Static, Dynamic; Evaluating Interconnection Networks; Communication Costs in Par-
allel Machines; Memory System Performance; Cache Coherence in Multiprocessor Sys-
tems.
Parallel Algorithm Design: Parallel Computing Platforms: Control Structure, Commu-
nication Model, Shared-Address-Space Machine, Message-Passing Platform; Designing
Parallel Algorithms: Partitioning, Data Decomposition, Functional Decomposition,
Communication, Agglomeration, Mapping; Common Parallel Programming Models;
Parallel Algorithm Design Examples.
Performance Analysis: Performance Metrics: Execution Time, Total Parallel Overhead,
Speedup, Efficiency; Cost of a Parallel System; Effect of Granularity on Performance;
Scalability of Parallel Systems; Amdahl’s Law; Gustafson-Barsis Law; Scaling Charac-
teristics of Parallel Programs; Iso-efficiency Metric of Scalability.
Message Passing Interface: MPI Basics, MPI blocking send/receive function calls; In-
ter Process Communication; Asynchronous communication; Split-recombine task/data;
MPI Derived Data Types
Programming Shared Address Space Platforms: Programming Shared Address Space
Platforms(PtThread), Thread Basics, Pthreads API, Thread Management, Creating
Threads, Thread Attributes, Terminating Thread, Passing Arguments to Threads,
Joining & Detaching Threads, Synchronization Issues, Mutex: Creating & Destroying,
Locking & Unlocking, Overheads of Locking, Alleviating Locking Overhead, Monitor;
Read-Write Locks
Advanced Topic on Parallel and Distributed Computing: Map Reduce.
52
CSE4045: SMART DEVICE APP DEVELOPMENT
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
(Android, iOS, firefox, tizen, ubuntu, Phonegap or any other future popular develop-
ment platform.)
Developing for Mobile Devices: Hardware-Imposed Design Considerations; Considering
the Users’ Environment; Development Tools
Creating Applications: Introducing the Application functionality; Application Life
Cycle; Understanding Application Priority and Process States
Fundamental U.I. Design: Introducing Views; Introducing L ayouts; Creating and using
Menus
Intents, Broadcast Receivers, Adapters, and the Internet
Data Storage, Retrieval, and Sharing
Maps, Geocoding, and Location-Based Services
Working in the Background: Services; Threads; Notifications
Peer-to-Peer Communication: Instant Messaging; SMS;
Accessing Hardware: Media APIs; Camera; using Sensors; Telephony; Bluetooth; Man-
aging Net work and Wi-Fi Connections; Controlling Device Vibration.
Graphics and animation: Drawing graphics; creating animations
Advanced Development: Security; Declaring and Enforcing Permissions; using Internet
Services; Localization
TOPICS:
Definition of economics, economics and engineering, principles of economics. Intro-
duction to various economic systems – capitalist, command and mixed economy, fun-
damental economic problems and mechanisms through which these problems can be
solved, theory of demand and supply and their elasticities, theory of consumer behav-
ior, cardinal and ordinal approaches of utility analysis, price determination, nature
of an economic theory, applicability of economic theories to the problems of develop-
ing countries, indifference curve techniques, theory of production, production function,
types of productivity, rational region of production of an engineering firm, concepts
of market and market structure, cost analysis and cost function, small and large scale
production, optimization, theory of distribution, use of derivatives in economics, max-
imization and minimization of economic functions, relationship among total, marginal
and average concepts. Micro-Economics: Savings, investment, employment, national
income analysis, inflation, monetary policy, fiscal policy and trade policy with reference
to Bangladesh, economics and development and planning.
53
EEE1021: ELECTRICAL CIRCUIT DESIGN – I
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
Units, DC sources, Resistance and Conductance, Ohm’s law, Power and Energy, Series
and parallel circuits, Series-Parallel Networks; Methods of analysis: Mesh analysis,
Node analysis and other methods of analysis; Kirchhoff’s laws, Y-delta transformation;
Circuit theorems: Superposition Theorem, Norton’s Theorem, Thevenin’s Theorem,
Millman’s Theorem, Capacitors, Magnetic circuits, Inductors, R-C and R-L circuits
with DC excitation.
TOPICS:
Laboratory Works based on Theory Course EEE1021
TOPICS:
Alternating current - AC quantities, Sinusoidal alternating waveforms, Phasors, AC
circuit analysis - RC, RL, RLC series and parallel circuits, Series-parallel ac networks,
Power and power factors, Network theorems, Dependent sources, Resonance and Q-
factors, Poly-phase systems – balanced and unbalanced, Coupled circuits, introduction
to filters.
54
EEE2012: ELECTRONIC DEVICES AND CIRCUITS LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): EEE1021, EEE1022
TOPICS:
Laboratory Work based on EEE2011
ETE3031: TELECOMMUNICATION ENGINEERING
3 CREDITS, 3 hours/week
PREREQUISITE(S): EEE2011, ETE2023
TOPICS:
Introduction: Principle, evolution, networks, exchange and international regulatory
bodies. Telephone apparatus: Microphone, speakers, ringer, pulse and tone dialing
mechanism, side-tone mechanism, local and central batteries and advanced features.
Switching system: Introduction to analog system, digital switching systems – space
division switching, blocking probability and multistage switching, time division switch-
ing and two dimensional switching. Traffic analysis: Traffic characterization, grades
of service, network blocking probabilities, delay system and queuing. Modern tele-
phone services and network: Internet telephony, facsimile, integrated services digital
network, asynchronous transfer mode and intelligent networks. Introduction to cellular
telephony and satellite communication.
TOPICS:
Introduction to digital signals and digital signal processing, A/D conversion, sampling
theorem, Illustration of aliasing, analysis of Discrete-Time Linear-Tme-Invariant (LTI)
systems, Resolution of Discrete-Time signals into impulse, Convolution and correlation,
Z-transform, Concept of Pole and Zero, Frequency domain representation of discrete-
time systems and signals, Discrete Fourier series and discrete Fourier transform (DFT),
computation of the DFT, Fast Fourier Transform (FFT), Discrete Cosine Transform
(DCT), Signal flow graph representation of digital networks. Filter structure for IIR
and FIR filters, Introduction to speech and Image processing.
55
ETE4014: DIGITAL SIGNAL PROCESSING LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): ETE3031
TOPICS:
VLSI technology: terminologies and trends,MOS transistor characteristics and equa-
tions, MOS fabrication process, nMOS & CMOS inverters: dc & transient character-
istics, pass transistor & pass gates, Derivation of drain-to source current (Ids), Ids VS
Vds, Pull-up to pull down ratio, CMOS & nMOS design Style, Stick Diagrams, CMOS
layout and design rules: -based design rule. Complex CMOS gates: NAND, NOR,
Exclusive OR, Resistance & Capacitance estimation and Modeling, raise time and fall
time calculation of gate capacitance, Scaling & scaling factor of different parameters.
Signal propagation delay, noise margin and power consumption, Interconnect, BiCMOS
circuits. CMOS building blocks: adders, counters, multipliers and barrel shifters, Par-
ity generator, Data paths, memory structures: Dynamic RAM cells, PLAs and FPGAs,
VLSI testing: objectives & strategies.
TOPICS:
Lab works based on theory course CSE4025.
56
ENG1001: BASIC COMPOSITION
0 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
Basic Composition is a non-credit foundation course. It is designed to brush up stu-
dents’ existing English skills. This course will help them to review the grammatical
items they already know and will prepare them to study at the tertiary level by en-
hancing their English language skills. The main focus of this course is on reading and
writing. Students will also learn to communicate in English by interacting with the
instructor. Students will also explore the creative side of language by solving different
sorts of tasks and preparing assignments on picture description and story completion.
They will also be conditioned to write formal applications and Emails. At the end of
the course they are expected to carry out their academic activities in English effectively.
TOPICS:
The goal of this course is to provide students with tertiary level reading and writing
skills. The course focuses on composition, nevertheless includes grammar so as to
provide the students with necessary background knowledge of grammatical structures,
and common mistakes. This knowledge will help them framing paragraphs effectively
maintaining cohesion and coherence. The types of paragraphs selected for this course
will not only excel their writing skill, but will also introduce them with the process and
techniques of writing they will be using in their other academic courses as well as in
real life. The reading section attempts to augment their reading skill adopting various
strategies that can be effective in different writing dimensions. In addition to that, the
journal writing section has been designed to explore and motivate the students into
more free and creative writing. This multifaceted course will help the students learn to
engage critically and clearly with texts and topics by developing their own academic
writing skills.
57
ENG1021: ENGLISH FOR ENGINEERS
3 CREDITS, 3 hours/week
PREREQUISITE(S): ENG1002
TOPICS:
Discussion on common terms related to Electronics, Electricity, Communication Engi-
neering and Computer system, Report writing, Formal presentation, Business Commu-
nication, Dialogue writing, Technology based essay writing. Efficient listening and note
taking: Listening to recorded texts and class lectures and learning to take useful notes
based on listening. Approaches to Communication: Communication today, business
communication, different types of business communication. Effective oral presenta-
tion: Academic Presentations, preparation and styles of presentation. Report Writing:
Defining a report, classification of reports, structure of a report, and writing of reports.
TOPICS:
Overview of communication systems: Basic principles, fundamental elements, system
limitations. Noise: Source, characteristics of various types of noise, Information the-
ory: Measure of information, source encoding, channel capacity, Communication sys-
tems: Analog and digital. amplitude modulation- introduction, double side band, single
side band, vestigial side band, quadrature; envelope and synchronous detection; angle
modulation- frequency modulation (FM) and phase modulation (PM), demodulation of
FM and PM. Pulse modulation: Sampling- sampling theorem, Nyquist criterion, pulse
code modulation (PCM), differential PCM, demodulation of PCM; delta modulation
(DM)- principle, adaptive DM;Digital modulation: Amplitude-shift keying- principle,
ON-OFF keying, bandwidth requirements, detection, noise performance; phase-shift
keying (PSK)- principle, bandwidth requirements, detection, differential PSK, Quadra-
ture PSK, noise performance; frequency-shift keying (FSK)- principle, continuous and
discontinuous phase FSK, minimum-shift keying, bandwidth requirements, detection of
FSK. Multiplexing: Time-division multiplexing (TDM), frequency-division multiplex-
ing (FDM), multiple-access network- time-division multiple-access (TDMA), frequency-
division multiple access (FDMA); code-division multiple-access (CDMA). Communi-
cation system design: design parameters, channel selection criteria and performance
simulation.
58
ETE2024: COMMUNICATION THEORY LAB
1 CREDIT, 1.5 hours/week
PREREQUISITE(S): MATH2014, EEE2011
TOPICS:
Laboratory Works based on ETE2023
TOPICS:
Transformation of coordinates, Straight lines, Parallel lines, Perpendicular lines, Num-
ber line, Interval Notation, Rational Equation, Absolute Value Theorem, Inequality,
Discriminate, Asymptotes, Symmetricity, Matrix Application, Division Algorithm and
Synthetic Division.
TOPICS:
Differential Calculus: Limits, continuity and differentiability, successive differentiation
of various types of functions, Leibnitz’s theorem, Mean-value theorem in finite and
infinite forms, Lagrange’s form of remainders, Cauchy’s form of remainder, expansion
of functions, evaluation of indeterminate forms by L’Hospital’s rule, partial differentia-
tion, Tangent and Normal, Subtangent and Subnormal in Cartesian and Polar coordi-
nates, maximum and minimum values of functions of single variable, points of inflexion,
curvature – radius of curvature, centre of curvature, asymptotes, curve tracing.
59
MATH2014: COMPLEX VARIABLES AND TRANSFORMS (LAPLACE
AND FOURIER)
3 CREDITS, 3 hours/week
PREREQUISITE(S): MATH1024, MATH1034
TOPICS:
Complex Variables: complex number system, general function of a complex variable,
limits and continuity of a function of a complex variable and related theorems, complex
differentiation, the Cauchy-Riemann equation, mapping by elementary functions, line
integral of a complex function, Cauchy’s Integral Theorem and formula, Liouville’s the-
orem, Taylor’s theorem, Laurent’s theorem, Singular points, Residue, Cauchy’s Residue
Theorem, evaluation of Residues, Contour integration, conformal mapping.
Fourier Transforms: Real and complex form of Fourier series, finite transforms, Fourier
Integral, Fourier transforms and their uses in solving boundary value problems of wave
equations.
TOPICS:
Definition of matrix, different types of matrices, algebra of matrices, adjoint and in-
verse of a matrix, elementary transformations of a matrix, matrix polynomials,
canonical forms, Rank of matrices. System of linear equations (homogeneous and non-
homogeneous) and their solutions. Applications of system linear equations in real life
problems. Definition and properties of vector space, subspaces, Linear combination of
vectors, Linear dependence and independence of vectors, basis and dimension, linear
transformations ,kernel and image of a linear transformation(LT), definition and prop-
erties, linear operator matrix, matrix representation of linear transformations, change
of basis, Eigenvalues and eigenvectors, Diagonalization, Cayley-Hamilton theorem and
its application.
60
MGT2011: INTRODUCTION TO BUSINESS AND MANAGEMENT
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
Concepts of Business, its components, classifications, importance, national and inter-
national business, group dynamics and leadership in business and non-businesses orga-
nizations. Introduction to the components of management in information system and
their integration for managerial control and decision support. Principle and process of
management, types of management, Management in Engineering.
PHY1021: PHYSICS – I
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
Mechanics: Kinematics, Graphical representations of displacement-time, velocity-time
and acceleration-time. Terminal velocity. Motion in two and three dimensions – pro-
jectile motion. Applications of Newton’s laws of motion, Analyses of frames of trusses,
Friction, Equilibrium of forces, Work-kinetic energy theorem., Power, Conservative
forces. Conservation of energy. Conservation of linear momentum for a system of
particles. Center-of-mass motion. Elastic and inelastic collision in one dimen-
sion. Rotational kinematics. Angular momentum of a single particle. Conservation
of angular momentum Moment of Inertia, Balancing of rotating masses. Gravitation:
Gravitational field. Kepler’s laws.
Waves and oscillations: Differential equation of simple harmonic oscillator, total energy
and average energy, combination of simple harmonic oscillations, spring mass system,
torsional pendulum; two body oscillation, reduced mass, damped oscillation, forced
oscillation, resonance, progressive wave, power and intensity of wave, stationary wave,
group and phase velocities.
Heat and Thermodynamics: Heat and work- the first law of thermodynamics and its
applications; Kinetic Theory of gases- Kinetic interpretation of temperature, specific
heats of ideal gases, equipartition of energy, mean free path, Maxwell’s distribution of
molecular speeds, reversible and irreversible processes, Carnot’s cycle, second law ther-
modynamics, Carnot’s theorem, entropy, Thermodynamic functions, Maxwell relations,
Clausius and Clapeyron equation.
61
PHY1031: PHYSICS – II
3 CREDITS, 3 hours/week
PREREQUISITE(S): PHY1021
TOPICS:
Electricity and Magnetism: Electric charge and Coulomb’s law, Electric field, concept
of electric flux and the Gauss’s law- some applications of Gauss’s law, Gauss’s law in
vector form, Electric potential, relation between electric field and electric potential,
capacitance and dielectrics, gradient, Laplace’s and Poisson’s equations, Current, Cur-
rent density, resistivity, the magnetic field, Ampere’s law, Biot-Savart law and their
applications.
TOPICS:
Laboratory Works based on PHY 1021 and PHY 1031.
TOPICS:
Ethics and Professionalism: Micro & Macro Issues, Dimension of Engineering; Moral
Reasoning and Code of Ethics; Right, Duty, Virtue, Self Realization Ethics, Utilitari-
ans; Engineering as Social Experimentation, Workplace Responsibilities: Confidential-
ity, Conflict of Interest, Professional Right; Whistle Blowing; Academic and Research
Integrity; Computer Ethics: Ethics for IT Professional and IT Users, Internet Crime;
Environmental Ethics; Global Justice and International Rights; Case Studies in Pro-
fessional behavior.
62
STAT2012: STATISTICAL METHODS AND PROBABILITY
3 CREDITS, 3 hours/week
PREREQUISITE(S): Nil
TOPICS:
Data and variables, central tendency, dispersion, skewness, kurtosis, probability, ran-
dom variables, probability distributions, mathematical expectation and moment gener-
ating functions, joint & marginal distributions, stochastic independence, central limit
theorem, concepts of Sampling & its various methods, design of an experiment & anal-
ysis of variance, concepts of estimation, methods of estimation, hypothesis testing &
inference. Concepts of Sample Survey & its various methods- S.R.S; St.R.S. System-
atic Sampling & Multi stage Sampling. Analysis of variance- One way, Two way
& Three way Classification. Design of an experiment-CRD, RBD,LSD & Fractorial
Experiment. Concepts of estimation- Criteria of a good estimator, Point estimation-
Method of Moment, Least square, MLE, Min. Chai-square & Bayes Estimator. Inter-
val Estimation-Confidence Interval, Feducial interval. Large & small Sample Test of
significance & Hypothesis Testing. Non-Parametric Test.
63
5
3. Degrees obtained:
University Degree Field of Special-
ization
Kyung Hee University, South PhD in Com- Computer Engi-
Korea puter Engi- neering (Major:
neering (MS Computer Net-
leading to works)
PhD)
Islamic University of Technol- B.Sc. (hons) Computer Science
ogy, Bangladesh and Information
Technology
64
University/College Designation Period
Southeast University, Associate Pro- 06/2016-Present
Bangladesh fessor
Southeast University, Adjunct/Part- 09/2015-05/2016
Bangladesh time Faculty
University of Asia Pacific, Visiting Faculty 09/2015-03/2016
Bangladesh
International Islamic Assistant Pro- 08/2010-07/2015
University Malaysia, fessor
Malaysia
BRAC University, Assistant Pro- 09/2009-06/2010
Bangladesh fessor
Kyung Hee University, Researcher/ 09/2005-08/2009
South Korea Research Assis-
tant, Net Lab.
North South University, Instructor, CSE 05/2004-08/2005
Bangladesh Laboratories
ICE Technologies Lim- Programmer 02/2004-04/2004
ited, Bangladesh (Web Applica-
tions)
Microland (IICE), Lecturer 01/2004-03/2004
Bangladesh
7. Publications:
65
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
TOTAL: 78 TOTAL: 58
Editorial Articles in Refereed Papers in LNCS and
Journals: 23 LNICST Conferences: 9
Papers in Refereed Journals: Papers in International
55 Conferences: 49
[Full list is provided at
[Full list is provided at the end of this docu-
the end of this document] ment]
66
General Secretariat, Colleges of Computing and Information So-
ciety, Association of Arab Universities, Zarqa, Jordan, 14 April,
2017.
• Guest Speaker as an IEEE Senior Member on IEEE Day 2016
event organized by IEEE Student Branch, University of Dhaka,
01 October, 2016.
• Interview with the European Alliance for Innovation (EAI). Arti-
cle published with title, “Finding the common ground for Smart
Grids and IoT”, August 25, 2016 (http://blog.eai.eu/finding-the-
common-ground-for-smart-grids-and-iot/)
• Awarded Elsevier Recognized Reviewer in recognition of the re-
views made for the Computers and Electrical Engineering, Else-
vier, Amsterdam, The Netherlands, May 2016.
• Invited Expert talk, Full financially sponsored travel (Airfare,
Accommodation, Food, Local travels): “Mitigating Cross-Site
Scripting Attacks with a Content Security Policy”, International
Conference on Communication and Computing System (ICCCS’16),
Gurgaon, India, September 9-11, 2016.
• Keynote Speaker, Tech-Talk event organized by IEEE Student
Branch, University of Dhaka, Bangladesh, April 17, 2016.
• Certificate of Recognition in recognition and appreciation of out-
standing service in the technical committee of IAJIT as one of the
most active reviewers during the year 2015, The International
Arab Journal of Information Technology (SCIE-Indexed), Gen-
eral Secretariat, Colleges of Computing and Information Society,
Association of Arab Universities, Zarqa, Jordan, 27 February,
2016.
• Awarded Elsevier Outstanding Reviewer in recognition of the con-
tributions made to the quality of the journal, Journal of Network
and Computer Applications, Elsevier, Amsterdam, The Nether-
lands, November 2015.
• Invited as a Keynote Speaker with full financial support at the
International Arab Conference on Information Technology (ACIT
2015), December 15-17, 2015, Amman, Jordan. (Invitation was
accepted on 19 August 2015 when I was in Kuala Lumpur, Malaysia.
Could not attend during the conference time due to relocating to
Dhaka, Bangladesh.)
• Awarded Elsevier Outstanding Reviewer in recognition of the con-
tributions made to the quality of the journal,Computer Networks,
Elsevier, Amsterdam, The Netherlands, July 2015.
• Distinguished Guest and Keynote Speaker, Full financially spon-
sored travel (Airfare, Accommodation, Food, Local travels) to
67
Dehradun, India for the 2nd IEEE International Conference on
Advances in Computing & Communication Engineering (ICACCE-
2015), May 1-2, 2015 by Tula’s Institute, Dehradun, Uttarak-
hand, India.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Computer Networks, Elsevier, Amster-
dam, The Netherlands, March 2015.
• Certificate of Recognition in recognition and appreciation of out-
standing service in the technical committee of IAJIT as one of
the most active reviewers during the year 2014, The Interna-
tional Arab Journal of Information Technology (SCIE-Indexed),
General Secretariat, Colleges of Computing and Information So-
ciety, Association of Arab Universities, Zarqa, Jordan, 08 March,
2015.
• Two books entitled "Advancements in Distributed Computing
and Internet Technologies: Trends and Issues" and "Network and
Traffic Engineering in Emerging Distributed Computing Applica-
tions" published by IGI Global, USA have been indexed with all
the titles (chapters) in Elsevier’s acclaimed abstract and citation
database, Scopus, February 2015.
• Book entitled, “Wireless Networks and Security: Issues, Chal-
lenges and Research Trends”, ISBN 978-3-642-36169-2 (ebook),
ISBN: 978-3-642-36168-5 (print book), Series: Signals and Com-
munication Technology, Springer, 2013 is one of the top 25% most
downloaded eBooks in the relevant Springer eBook Collection in
2013 - a total of 5830 chapter downloads in 2013 – published in
June 2014 report.Since its online publication there has been a to-
tal of 12,655 chapter downloadsas reported inBook Performance
Report 2014 (June 2015).
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Journal of Network and Computer Ap-
plications, Elsevier, Amsterdam, The Netherlands, January 2015.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Future Generation Computer Systems,
Elsevier, Amsterdam, The Netherlands, October 2014.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Ad Hoc Networks Journal, Elsevier,
Amsterdam, The Netherlands, June 2014.
• Awarded Elsevier Recognized Reviewer status in recognition of
the reviews made for the Ad Hoc Networks Journal, Elsevier,
Amsterdam, The Netherlands, April 2014.
68
• Awarded Elsevier Recognized Reviewer status in recognition of
the review made for the Computers & Electrical Engineering
Journal, Elsevier, Amsterdam, The Netherlands, March 2014.
• Chief Guest and Keynote Speaker for the event titled “Interaction
on Wireless Sensor Networks, Image Processing & Research Pub-
lication” held at Sethu Institute of Technology, Madurai, India
on April 11, 2014.
• Chief Guest and Keynote Speaker, Full financially sponsored travel
(Airfare, Accommodation, Food, Local travels) to Madurai, In-
dia for International Conference on Innovations in Electronics,
Communication & Computing (ICIECC 2014), 10-11 April, 2014
sponsored by Velammal College of Engineering and Technology,
Madurai, Tamil Nadu, India.
• Elevated to IEEE Senior Member grade, Institute of Electrical
and Electronics Engineers (IEEE), USA, 28 February 2014.
• Intel Corporation’s Recommended Reading List for Developers,
1st half of 2014,includes the Book (twice consecutively in the
worldwide rank) entitled, “Wireless Sensor Networks: Current
Status and Future Trends”, ISBN: 9781466506060, Auerbach Pub-
lications, CRC Press, Taylor & Francis Group, USA, under the
category of “Books For Embedded Developers”, Intel, USA.
• Full Financially-Sponsored Invited Keynote Speaker (Airfare, Lo-
cal Travels, Accommodation, and Food) for Expert Talk on “Wire-
less Sensor Network Security: Current Status and Future Trends”
on 4 October, 2013 at the International Conference on “Elec-
tronics, Communication and Information Technology” (ICECIT
2013), Oct. 4-5, 2013, Patiala, Punjab, India hosted by Thapar
University.
• IEEE Computer Society Certificate of Appreciation in recognition
for the service and contribution as Publicity Chair for the IEEE
International Conference on Green Computing and Communica-
tion (GreenCom 2013), Beijing, China, August 20-23, 2013, IEEE
Computer Society, USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List recognizes and includes the book entitled, “Automatic
Defense against Zero-day Polymorphic Worms in Communication
Networks”, ISBN: 9781466557277, CRC Press, Taylor & Francis
Group, USA, 2013. - September 2013, IEEE ComSoc, USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List recognizes and includes the book entitled, “Wireless
69
Networks and Security: Issues, Challenges and Research Trends”,
ISBN: 978-3-642-36168-5, Series: Signals and Communication
Technology, Springer, 2013. - September 2013, IEEE ComSoc,
USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List recognizes and includes the book entitled, “Security
of Self-Organizing Networks: MANET, WSN, WMN, VANET”,
ISBN: 978-1-4398-1919-7, Auerbach Publications, CRC Press, Tay-
lor & Francis Group, USA, 2010. - September 2013, IEEE Com-
Soc, USA.
• IEEE Communications Society’s (IEEE ComSoc) Best Readings
Topics on Communications and Information Systems Security,
2013 List includes 2 journal papers and 1 conference paper: On
the Vital Areas of Intrusion Detection Systems in Wireless Sen-
sor Networks, IEEE COMST, under "Intrusion Detection Sys-
tems" category; Towards Privacy Protection in Smart Grid, WPC
Journal, Springer, under "Privacy" category; Security in Wireless
Sensor Networks: Issues and Challenges, ICACT’06 Conference,
Korea, under "Wireless Sensor Networks" category – September
2013, IEEE ComSoc, USA.
• IEEE Outstanding Leadership Award in recognition for the ser-
vice and contribution as the Publicity Chair of the 2013 IEEE
International Conference on Green Computing and Communi-
cations (GreenCom 2013), Beijing, China, August 20-23, 2013
sponsored by IEEE, IEEE TCSC, IEEE Computer Society.
• Invited Guest Speaker for “Author Experience Sharing” session in
2013 Springer SEA eBooks Seminar, Library Auditorium, Ground
Floor, IIUM Library, Kuala Lumpur, Malaysia, 20 September
2013 – organized by Springer South East Asia.
• Recognition of the Book, “Building Next-Generation Converged
Networks: Theory and Practice”, ISBN: 9781466507616, CRC
Press, USA, which got international attention to get published
with a translated version in Simplified Chinese language after a
deal between CRC Press, USA and China Machine Press, July
2013.
• Intel Corporation’s Recommended Reading List for Developers,
2nd half of 2013,recognizes the Book entitled, “Wireless Sensor
Networks: Current Status and Future Trends”, ISBN: 9781466506060,
Auerbach Publications, CRC Press, Taylor & Francis Group,
USA, with its inclusion under the category of “Books For Em-
bedded Developers”, Intel, USA.
70
• Certificate of Recognition in recognition and appreciation of out-
standing service in the technical committee of IAJIT as one of
the most active reviewers during the year 2012, The Interna-
tional Arab Journal of Information Technology (SCIE-Indexed),
General Secretariat, Colleges of Computing and Information So-
ciety, Association of Arab Universities, Zarqa, Jordan, 30 March,
2013.
• Bronze Medal at IIUM Research, Invention and Innovation Ex-
hibition 2012 (IRIIE 2012), 21-22 February 2012 for the work
entitled, "Protection of Digital Qur’anic Document Using Digital
Signature" as a co-author.
• Letter of Appreciation for the years of Editorial Service, from
ACTA Press, Calgary, Canada, 30 March, 2012.
• Certificate of Recognition for achievement in attaining one of the
“Top 5 Depositors of research publications” in IIUM Repository
- IREP, 2011
• Certificate of Completion of Basic Teaching Methodology Course
(BTMC) & Teaching Practicum for IIUM Academic Staff, 16
March 2011, by Center for Professional Development (CPD),
IIUM, Malaysia
• Certificate of Appreciation for being the Team Coach in ACM-
ICPC Malaysia al-Khawarizmi Programming Contest 2010, from
Universiti Kebangsaan Malaysia, Kuala Lumpur, Malaysia
• Biography included in the ‘2000 Outstanding Intellectuals of the
21st Century 2009/2010’ and also in the ‘Top 100 Educators 2009’
by International Biographical Center, Cambridge, England
• Yeong-Dong Scholarship Award 2009, South Korea
• IEEE Seoul Section Bronze Paper Award in the IEEE Interna-
tional Student Paper Contest 2008 (IEEE Seoul Section, Tokyo
Section, Beijing Section, Japan Council), South Korea
• Biography listed in Marquis Who’s Who in the World, 26th Edi-
tion, 2009, USA
• Research scholarships/grants 2008 for outstanding record of pub-
lications in international and domestic journals and conferences,
Department of Computer Engineering, Kyung Hee University,
South Korea
• Yeong-Dong Scholarship 2008, South Korea
• Global Family Movement Scholarship for Foreign Students 2007
in South Korea
71
• Co-recipient of IEEE Student Travel Grant Award for one of the
two papers in IEEE Military Communications Conference 2007
(MILCOM 07), Orlando, Florida, USA
• Scholar Student of the Year 2007 Award (Yeong-Dong Scholarship
Award 2007) in South Korea
• IEEE ComSoc Seoul Chapter Best Paper Award in 17th Joint
Conference on Communication & Information 2007, South Korea
• Travel Grant Award from Global Family Movement Center in
2007 (One student among all Bangladeshi students in South Ko-
rea)
• Academic Research Scholarship (First Semester 2007), Kyung
Hee University, South Korea
• Yeong-Dong Scholarship for Foreign Students 2006 (One student
from each foreign country students) in South Korea
• IEEE Student Travel Grant Award for outstanding paper in IEEE
Military Communications Conference (MILCOM 2006), Wash-
ington, DC, USA
• Scholar Student of the Year 2006 Award (Gwangjin-Gu Award
2006) for Research and Academic achievements in South Korea
• Academic Research Scholarship (Second Semester 2006), Kyung
Hee University, South Korea
• Research Presentation Scholarship (First semester 2006), Kyung
Hee University, South Korea
• President Scholarship (2nd semester 2005, 1st and 2nd semester
2006, 1st and 2nd semester 2007, 1st and 2nd semester 2008),
Kyung Hee University, South Korea [Amount: 32,668,000 KRW
equivalent to approx. US $32,668]
• IEEE Certificate of Prowess from IEEE Student Branch, NED
University of Engineering and Technology, Karachi, Pakistan for
a paper in IEEE E-Tech 2004 conference
• Scholarship for 4-year B.Sc. in CIT in Islamic University of Tech-
nology for 3 years, Bangladesh
• Board Scholarship in Higher Secondary Certificate Examination,
Bangladesh
• Board Scholarship in Secondary School Certification Examination
in Talent pool, Bangladesh
• Junior Scholarship in Class VIII, Bangladesh
• Primary Scholarship in Class V, Bangladesh
72
10. No. of Ph. D. / M.Sc./ M. Engg. Guided: 2 PhD students and 1 MS
student to completion
(a) PhD
i. Tarem Ozair Ahmed, Thesis Title: “Efficient and Effec-
tive Automatic Surveillance Approaches” [Completed Ph.D.
in September 2013 – Successfully defended Ph.D. thesis on
30 July 2013]
ii. Wafaa Mustafa Abduallah, Topic: “Efficient Image Steganog-
raphy Approaches Based on Mix Column Transform Tech-
nique” (Completed Ph.D. in April 2015 – Successfully De-
fended Ph.D. thesis on 31 March 2015)
(b) Master
i. Abdelgadir Tageldin, Thesis Title: "Performance Analysis
of Optimized Heartbeat-based Reliable NEMO Home Agent",
Master degree thesis, IIUM, Semester 1, 2011/2012. [Com-
pleted]
73
• Publicity & Communications Co-Chair, The 2017 High Perfor-
mance Computing & Simulation Conference (HPCS 2017), July
17-21, 2017, Genoa, Italy
• General Chair, The 1st EAI International Conference on Smart
Grid Assisted Internet of Things (SGIoT 2017), July 11-13, 2017,
Sault Ste. Marie, Ontario, Canada
• General Co-Chair, The 3rd International workshop on Cloud Com-
puting Applications and SEcurity (CASE-2017) in conjunction
with the 8th International Conference on Information and Com-
munication Systems (ICICS2017). May 8-11, 2017, Irbid, Jordan
• Publicity Chair, The International Conference on Recent Ad-
vances on Signal Processing, Telecommunications & Computing
(IEEE SigTelCom 2017), January 9-11, 2017, Da Nang, Vietnam
• Publicity Chair, 16th IEEE International Conference on Com-
puter and Information Technology (CIT’16), Shangri-La’s Fijian
Resort and Spa, December 8-10, 2016, Fiji
• Publicity Co-Chair, The Fifth IEEE International Workshop on
Cloud Computing Systems, Networks, and Applications (CC-
SNA’16) organized in conjunction with IEEE Global Commu-
nications Conference (GLOBECOM 2016), December 4-8, 2016,
Washington, DC, USA
• Publicity Co-Chair, 13th ACS/IEEE International Conference on
Computer Systems and Applications AICCSA 2016, November
29-December 2, 2016 - Royal Atlas and Spa, Agadir, Morocco
• Publicity Chair, 5th International Workshop on Mobile Systems,
Wearables, and Sensors Networks for Collaboration (MSSNC 2016)
as part of the 2016 International Conference on Collaboration
Technologies and Systems (CTS 2016), October 31 - November
04, 2016, Orlando, Florida, USA
• Publicity Co-Chair, 10th International Conference on Network
and System Security (NSS 2016), September 28-30, 2016, Taipei,
Taiwan
• Program Chair, International Workshop on 5G in eHealthcare
Services (5GeS 2016) In conjunction with the 18th International
Conference on E-health Networking, Application & Services (Health-
com’16), September 14-17, 2016, Munich, Germany
• Publicity Chair, The 8th IEEE International Symposium on UbiSafe
Computing (IEEE UbiSafe 2016) in conjunction with The 15th
IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2016), Au-
gust 23-26, 2016, Tianjin, China
74
• Special Session Co-Chair, Next Generation Network amd Cryp-
tography (NetCrypt 2016) session, International Conference on
Green Computing and Engineering Technologies (ICGCET), Au-
gust 18-20, 2016, Aalborg University, Esbjerg, Denmark
• Publicity Co-Chair, The 14th IEEE International Conference on
Pervasive Intelligence and Computing (PICom-2016), August 8-
12, 2016, Auckland, New Zealand
• Publicity Co-Chair, The Fourth IEEE/CIC ICCC International
Workshop on Wireless Communications for Internet of Things
Networking(WIN 2016), July 27-29, 2016, Chengdu, China
• Workshop Chair, The 7th International Workshop on Peer-to-
Peer Architectures, Networks and Systems (PANS 2016), in con-
junction with the International Conference on High Performance
Computing & Simulation (HPCS 2016), July 18-July 22, 2016,
Innsbruck, Austria
• Track Co-Chair, “Wireless, Ad hoc and Sensors Networks” track,
Third International Symposium on Networks, Computers and
Communications (ISNCC 2016), May 11-13, 2016, Hammamet,
Tunisia
• Track Chair, Track 10: Networking, Communications, Sensor
Networks and Mobile Computing, The International Conference
on Information and Communication Systems (ICICS 2016), April
5-7, 2016, Irbid, Jordan
• Publicity Chair, 3rd IEEE International Symposium on Software
Defined Systems (SDS-2016) in conjunction with 2016 IEEE In-
ternational Conference on Cloud Engineering (IC2E 2016), April
4-8, 2016, Berlin, Germany
• Publicity Co-Chair, CCSNA 2015: The Fourth IEEE Interna-
tional Workshop on Cloud Computing Systems, Networks, and
Applications 2015 in conjunction with IEEE GLOBECOM 2015,
December 6-10, 2015, San Diego, CA, USA
• Publicity Co-Chair, IEEE International Workshop on Advances
in Software Defined Radio Access Networks and Context-aware
Cognitive Networks 2015 (IEEE SDRANCAN-2015) in conjunc-
tion with IEEE GLOBECOM 2015, December 6-10, 2015, San
Diego, CA, USA
• Program Co-Chair, The First International Symposium on De-
pendability in Sensor, Cloud, and Big Data Systems and Appli-
cations (DependSys 2015), November 18-20, 2015, Zhangjiajie,
China
75
• Publicity Co-Chair, The Third IEEE/CIC ICCC International
Workshop on Internet of Things (IoT 2015), November 2-4, 2015,
Shenzhen, China
• Publicity Chair, 18th IEEE International Conference on Com-
putational Science and Engineering (CSE 2015), October 21-23,
2015, Porto, Portugal
• Publicity Chair, 3rd International Conference on Islamic Appli-
cations in Computer Science and Technologies (IMAN 2015), Oc-
tober 1-3, 2015, Konya, Turkey
• General Chair, International Conference on Advanced Wireless,
Information, and Communication Technologies (AWICT 2015),
September 20-23, 2015, Tunisia
• Program Chair, 2nd Workshop on Network Surveillance and In-
truder Detection Technologies (NetSID 2015) in conjunction with
EUSPN 2015, September 27-30, 2015, Berlin, Germany
• Publicity Co-Chair, The 7th IEEE International Symposium on
UbiSafe Computing (UbiSafe 2015) Helsinki, Finland, August 20-
22, 2015 in conjunction with IEEE TrustCom-15 - The 14th IEEE
International Conference on Trust, Security and Privacy in Com-
puting and Communications (IEEE TrustCom-15), Helsinki, Fin-
land, August 20-22, 2015
• Symposium Program Co-Chair, The 2nd International Sympo-
sium on Emerging Inter-networks, Communication and Mobility
(EICM) with The 12th International Conference on Mobile Sys-
tems and Pervasive Computing (MobiSPC 2015) and The 10th
International Conference on Future Networks and Communica-
tions (FNC 2015), August 17-20, 2015, Belfort, France
• Workshop Co-Chair, 10th International Conference on Future
Networks and Communications (FNC-2015), August 17-20, 2015,
Belfort, France
• Workshop Chair, The 12th International Conference on Mobile
Systems and Pervasive Computing (MobiSPC’15), August 17-20,
2015, Belfort, France
• Publications Co-Chair, International Conference on Intelligent
Information Processing, Security, and Advanced Communication
(IPAC 2015), August 17-19, 2015, Algeria
• Publicity Co-Chair, The 12th IEEE International Conference on
Ubiquitous Intelligence and Computing (UIC 2015), August 10-
14, 2015, Beijing, China
• Publicity Co-Chair, The International Conference on High Per-
formance Computing & Simulation (HPCS 2015), July 20–24,
2015, Amsterdam, The Netherlands
76
• Publicity Co-Chair, IEEE International Workshop on Advances
in Software Defined and Context Aware Cognitive Networks 2015
(IEEE SCAN 2015) in conjunction with IEEE International Con-
ference on Communications (ICC 2015), June 8-12, 2015, London,
UK
• Publicity Co-Chair, Third Workshop on Cloud Computing Sys-
tems, Networks, and Applications (CCSNA) in conjunction with
IEEE International Conference on Communications, June 8-12,
2015, London, UK
• Technical Program co-Chair, First International Workshop on
Mobile Cloud Computing systems, Management, and Security
(MCSMS-2015) in conjunction with The 6th International Con-
ference on Ambient Systems, Networks and Technologies (ANT
2015), June 2-5, 2015, London, UK
• International Journals Chair, The 6th International Conference
on Ambient Systems, Networks and Technologies (ANT 2015),
June 2-5, 2015, London, UK
• Track Chair, Mobile Networks, Protocols and Applications, The
6th International Conference on Ambient Systems, Networks and
Technologies (ANT 2015), June 2-5, 2015, London, UK
• Publicity Chair, The 6th International Conference on Informa-
tion and Communication Systems (ICICS 2015), April 7-9, 2015,
Amman, Jordan
• Publicity Chair, IEEE International Workshop on Software De-
fined Systems (SDS-2015) in conjunction with 2015 IEEE Inter-
national Conference on Cloud Engineering (IC2E 2015), March
09-13, 2015, Tempe, AZ, USA
• Publicity Co-Chair, IEEE CCNC’s International Workshop on
Cloud-assisted Context-Aware Networks and Cognitive Networks
2015 (IEEE CCAN-2015) in conjunction with IEEE CCNC 2015,
January 9-12, 2015, Las Vegas, Nevada, USA
• Program Co-Chair, The 2014 International Symposium on Ubi-
Com Frontiers - Innovative Research, Systems and Technologies
(UFirst 2014), in conjunction with UIC 2014, ATC 2014, Scal-
Com 2014 December 9-12, 2014, Ayodya Resort, Bali, Indonesia
• Publicity Co-Chair, The 14th IEEE International Conference on
Scalable Computing and Communications (ScalCom-2014), De-
cember 9-12, 2014, Bali, Indonesia
• Publicity Co-Chair, The 11th IEEE International Conference on
Ubiquitous Intelligence and Computing (UIC-2014), December
9-12, 2014, Bali, Indonesia
77
• Executive Co-Chair, The 11th IEEE International Conference on
Autonomic and Trusted Computing (ATC-2014), December 9-12,
2014, Bali, Indonesia
• Publicity Co-Chair, The 11th IEEE International Conference on
Autonomic and Trusted Computing (ATC-2014), December 9-12,
2014, Bali, Indonesia
• General Co-Chair, 2nd International workshop on Big Data and
Social Networking Management and Security (BDSN-2014) in
conjunction with the 7th IEEE/ACM International Conference
On Utility and Cloud Computing (UCC-2014), December 8-11,
2014, London, UK
• Technical Program Co-Chair, First ACS/IEEE International Work-
shop on Internet of Things, Systems, Management and Security
(IOTSMS’2014) with The 11th IEEE International Conference on
Computer Systems and Applications (AICCSA’ 2014), November
10-13, 2014, Doha, Qatar
• Session Chair, Session 2E (17 November 2014), The 5th Interna-
tional Conference on Information and Communication Technol-
ogy for the Muslim World (ICT4M 2014), November 17-19, 2014,
Kuching, Sarawak, Malaysia.
• Track Chair, The 5th International Conference on Information
and Communication Technology for the Muslim World (ICT4M
2014), November 17-19, 2014, Kuching, Sarawak, Malaysia.
• Keynote/Industry Speakers Chair, 3rd International Conference
on Advances in Computing, Communications & Informatics (ICACCI),
September 24-27, 2014, Delhi, India
• Program Chair, Workshop on Network Surveillance and Intruder
Detection (NetSID 2014) in conjunction with the 5th Interna-
tional Conference on Emerging Ubiquitous Systems and Perva-
sive Networks (EUSPN-2014), 22-25 September, 2014, Halifax,
Nova Scotia, Canada
• Publicity Co-Chair, International Workshop on Intelligent Tech-
nologies for HealthCare (ITCare-14), 22-25 September 2014, Hal-
ifax, Canada
• Publicity Chair, The First International Workshop on Social Net-
works Analysis, Management and Security (SNAMS - 2014) in
conjunction with The 2nd International Conference on Future In-
ternet of Things and Cloud (FiCloud-2014), 27-29 August 2014,
Barcelona, Spain
• Publicity Co-Chair, International Symposium on Biometrics and
Security Technologies 2014 (ISBAST 2014), August 26-27, 2014,
Kuala Lumpur, Malaysia
78
• Publicity Chair, The 14th International Conference on Algorithms
and Architectures for Parallel Processing (ICA3PP 2014), August
24-27, 2014, Dalian, China
• Symposium Program Chair, International Symposium on Emerg-
ing Inter-networks, Communication and Mobility (EICM) with
The 9th International Conference on Future Networks and Com-
munications (FNC 2014), August 17-20, 2014, Niagara Falls, Canada
• Publicity Co-Chair, The 2014 International Conference on High
Performance Computing & Simulation (HPCS 2014), July 21 –
25, 2014, The Savoia Hotel Regency, Bologna, Italy
• Program Chair, International Workshop on Secure Peer-to-Peer
Intelligent Networks & Systems (SPINS 2014) in conjunction with
ANT 2014, June 2-5, 2014, Hasselt, Belgium
• Publicity Co-Chairs, The 2014 International Conference on Col-
laboration Technologies and Systems (CTS 2014), May 19-23,
2014, The Commons Hotel, Minneapolis, Minnesota, USA
• Session Chair, Session I, International Conference on Innovations
in Electronics, Communication & Computing (ICIECC 2014),
April 10-11, 2014, Madurai, India
• Program Chair, International Workshop on Security in Self-Organizing
Networks (SelfNet’14), March 13-14, 2014, Trivandrum, India
• Publicity Co-Chair, IEEE International Workshop on Software
Defined Systems, (SDS -2014) in conjunction with 2014 IEEE In-
ternational Conference on Cloud Engineering (IC2E 2014), March
11-14, 2014, Boston, Massachusetts, USA
• Publicity Chair, International Conference on Advanced Computer
Science Applications and Technologies 2013 (ACSAT 2013), De-
cember 22-24, 2013, Kuching, Sarawak, Malaysia
• Track Chair, Grid Computing and Mobile Technology, Interna-
tional Conference on Advanced Computer Science Applications
and Technologies 2013 (ACSAT 2013), December 22-24, 2013,
Kuching, Sarawak, Malaysia
• Publicity Co-Chair, The 10th IEEE International Conference on
Autonomic and Trusted Computing, (ATC-2013), December 18-
23, 2013, Vietri sul Mare, Italy
• Publicity Co-Chair, The 10th IEEE International Conference on
Ubiquitous Intelligence and Computing, (UIC-2013), December
18-23, 2013, Vietri sul Mare, Italy
• Publicity Co-Chair, The 13th International Conference on Algo-
rithm and Architectures for Parallel Processing (ICA3PP-2013),
December 18-21, 2013, Vietri sul Mare, Italy
79
• Publicity Co-Chair, The Fourth IEEE International Symposium
on Trust, Security and Privacy for Emerging Applications (TSP-
13), November 13-15, 2013, Zhangjiajie, China
• Publicity Co-Chair, The 15th IEEE International Conference on
High Performance Computing and Communications (HPCC 2013),
November 13-15, 2013, Zhangjiajie, China
• Chair, Special session on Challenges in Mobile Cloud Computing
(CMCC 2013) in conjunction with NAEC 2013, October 17- 20,
2013, Riva del Garda, Italy
• Tutorial and Demo Chair, 2nd International Conference on Ad-
vances in Computing, Communications and Informatics (ICACCI
2013), August 22-25, 2013, Mysore, India
• Publicity Chair, The 2013 IEEE International Conference on
Green Computing and Communications (GreenCom 2013), Au-
gust 20-23, 2013, Beijing, China
• Workshop Chair, The 2nd International Workshop on Parallel
and Mobile Computing in Future Networks (PMCFN 2013) In
Conjunction with, The 13th International Conference on Compu-
tational Science and Its Applications (ICCSA 2013), June 24-27,
2013, Ho Chi Minh City, Vietnam
• Industry Track Chair, The 7th International Conference on Net-
work and System Security (NSS 2013), co-located with the 6th In-
ternational Conference on Biometrics (ICB 2013, June 4-7, 2013,
Madrid, Spain
• Publicity Chair, The 7th International Conference on Network
and System Security (NSS 2013), co-located with the 6th Inter-
national Conference on Biometrics (ICB 2013, June 4-7, 2013,
Madrid, Spain
• Publicity Co-Chair, The 2013 International Conference on Col-
laboration Technologies and Systems (CTS 2013), May 20-24,
2013, San Diego, California, USA
• Program Co-Chair, The 7th FTRA International Conference on
Multimedia and Ubiquitous Engineering (MUE 2013), May 9-11,
2013, Seoul, Korea
• Program Chair, International Workshop on Converged Networks,
Technologies and Applications (CNTA 2013), In conjunction with
ICNC 2013, January 28-31, 2013, San Diego, USA
2017
80
• TPC, 11th IEEE International Conference on Advanced Networks
and Telecommunications Systems (IEEE ANTS’17), December
17-20, 2017, Bhubaneswar, Odisha, India
• TPC, The 10th International Conference on Security, Privacy
and Anonymity in Computation, Communication and Storage
(SpaCCS 2017), Guangzhou, China, December 12-15, 2017
• TPC, The 4th International Conference on Information and Com-
munication Technologies for Disaster Management (ICT-DM’2017),
December 11-13, 2017, Münster, Germany
• TPC, Globecom2017 CSSMA (2017 IEEE Global Communica-
tions Conference: Communications Software, Services and Mul-
timedia Apps), December 4-8, 2017, Singapore
• TPC, IEEE Globecom 2017 AHSN (2017 IEEE Global Commu-
nications Conference: Ad Hoc and Sensor Networks), December
4-8, 2017, Singapore
• TPC, IEEE Globecom 2017 MWN (2017 IEEE Global Commu-
nications Conference: Mobile and Wireless Networks), December
4-8, 2017, Singapore
• TPC, Sullivan Global Online Conferenc on Information & Com-
puter Technology, November 15-17, 2017, Louisville, KY, USA
• TPC, The 1st International Conference on Signals and Systems
2017 (ICSigSys 2017), November 07-09, 2017, Bali, Indonesia
• TPC, Symposium on Machine Learning and Metaheuristics Tech-
niques and Applications for Dependable Distributed Systems,
November 6-10, Orlando, Florida, USA
• TPC, The International Conference on Wireless Networks and
Mobile Communications (WINCOM’17), November 01-04, 2017,
Rabat, Morocco
• TPC, The annual International Conference on Wireless Commu-
nications and Signal Processing (WCSP 2017), October 11-13,
2017, Nanjing, China
• TPC, The 7th IEEE International Conference on Communica-
tion, Networks and Satellite (IEEE COMNETSAT 2017), Octo-
ber 5-7, 2017, Semarang, Indonesia
• TPC, The 7th International Conference on Current and Future
Trends of Information and Communication Technologies in Health-
care (ICTH 2017), September 18-20, 2017, Lund, Sweden
• TPC, Fifth International Symposium on Security in Computing
and Communications (SSCC 2017), September 13-16, Karnataka,
India
81
• TPC, The International Symposium on Applications of Compu-
tational Intelligence and Machine Learning in Networked Systems
(ACMiNS) with ICACCI 2017, September 13-16, 2017, Manipal,
Karnataka, India
• TPC, The 3rd International Workshop on Future Trends in Com-
puting System Technologies & Applications (FUSION 2017) in
conjunction with UIC 2017, August 4-8, 2017, San Francisco,
CA, USA
• TPC, The 13th International Wireless Communications and Mo-
bile Computing Conference-Wireless Networks 2017 (IWCMC 2017
Wireless Networking Symposium), July 26-30, 2017, Valencia,
Spain
• TPC, 24th International Conference on Wireless Networks and
Mobile Systems (WINSYS 2017), July 26-28, 2017, Madrid, Spain
• TPC, The Thirteenth International Conference on Wireless and
Mobile Communications (ICWMC 2017), July 23 - 27, 2017 -
Nice, France
• TPC, The Sixth International Conference on Advances in Ve-
hicular Systems, Technologies and Applications (VEHICULAR
2017), July 23 - 27, 2017 - Nice, France
• TPC, The Twelfth International Multi-Conference on Computing
in the Global Information Technology (ICCGI 2017), July 23 -
27, 2017 - Nice, France
• TPC, The 2nd International Workshop on Big Data Analytics for
Smart and Connected Health (BIGDATA4HEALTH 2017), July
17, Philadelphia, USA
• TPC, The 7th International Workshop on Future Computing Sys-
tem Technologies and Applications (FiSTA 2017) In conjunction
with ICCSA 2017, July 3-6, 2017, Trieste, Italy
• TPC, The 22nd IEEE Symposium on Computers and Communi-
cations, July 3-6, 2017, Heraklion, Crete, Greece
• TPC, The Twelfth International Conference on Internet and Web
Applications and Services (ICIW 2017), June 25-29, 2017, Venice,
Italy
• TPC, The second IEEE International workshop on Communi-
cation, Computing, and Networking in Cyber Physical Systems
(CCNCPS 2017) with with IEEE the 37th International Confer-
ence on Distributed Computing Systems (IEEE ICDCS 2017),
June 5 - 8, 2017, Buckhead, Atlanta, GA, USA
• TPC, 5th International Conference on Advanced Computing, Net-
working, and Informatics (ICACNI - 2017), June 01-03, 2017
82
• TPC, ICC’17-WT04 (IEEE ICC 2017: WT04 - 5th IEEE Inter-
national Workshop on Smart Communication Protocols and Al-
gorithms (SCPA 2017)), IEEE International Conference on Com-
munications (ICC’17), May 21-25, 2017, Paris, France
• TPC, ICC’17 AHSN (IEEE ICC 2017 Ad-Hoc and Sensor Net-
working Symposium), IEEE International Conference on Com-
munications (ICC’17), May 21-25, 2017, Paris, France
• TPC, ICC’17 MWN (IEEE ICC 2017 Mobile and Wireless Net-
working), May 21-25, 2017, Paris, France
• TPC, 2017 International Symposium on Networks, Computers
and Communications (ISNCC’17): Cloud, Grid and Social Com-
puting and Networking, May 17-19, 2017, Marrakech, Morocco
• TPC, The Third International Symposium on Ubiquitous Net-
working (UNET 2017), May 10-12, 2017, Casablanca, Morocco
• TPC, The Fourth International Conference on Software Defined
Systems (SDS-2017), May 8-11, 2017, Valencia, Spain
• TPC, 24th International conference on Telecommunications (ICT
2017), May 3-5, 2017, Limassol, Cyprus
• TPC, IEEE INFOCOM 2017 Workshop on Integrating Edge Com-
puting, Caching, and Offloading in Next Generation Networks
(IECCO) with IEEE International Conference on Computer Com-
munications (INFOCOM 2017), May 1-4, 2017, Atlanta, GA,
USA
• TPC, IEEE International Workshop on Advances in Software De-
fined and Context Aware Cognitive Networks (IEEE SCAN-2017)
in conjunction with IEEE INFOCOM 2017, May 1-4, 2017, At-
lanta, GA, USA
• TPC, 8th International Symposium on Cybersecurity, 14th Inter-
national Conference on Information Technology : New Genera-
tions (ITNG 2017), April 10-12, 2017, Las Vegas, Nevada, USA
• TPC, The 4th International Doctoral Symposium on Applied
Computation and Security Systems (ACSS), March 17-19, 2017,
Patna, India
• TPC, The International Conference on Information and Commu-
nication Systems (ICICS 2017), April 4-6,2017, Irbid, Jordan
• TPC, 2017 International Conference on Computing, Networking
and Communications (ICNC): Cognitive Computing and Net-
working (ICNC’17 COG), January 26-29, 2017, Silicon Valley,
USA
• TPC, 3rd International Conference on Networking Systems and
Security (NSysS 2017), January 5-8, 2017, Dhaka, Bangladesh
83
2016
84
• TPC, 2nd EAI International Conference on Industrial Networks
and Intelligent Systems (INISCom 2016), October 31–November
2, 2016, Leicester, Great Britain
• TPC, 2016 International Conference on Innovations in Science,
Engineering and Technology (ICISET 2016), October 28-29, 2016,
Chittagong, Bangladesh
• TPC, The International Conference on Wireless Networks and
Mobile Communications (WINCOM’16), October 26-29, 2016,
Fez, Morocco
• TPC, 2016 13th International Conference on Electrical Engineer-
ing, Computing Science and Automatic Control (CCE 2016), ,
September 26-30, 2016, Mexico City, Mexico
• TPC, 4th International Conference on Advanced Computing, Net-
working, and Informatics (ICACNI – 2016), September 22-24,
2016, India
• TPC, Fourth International Symposium on Security in Computing
and Communications(SSCC’16), September 21-24, 2016, Jaipur,
India
• TPC, IEEE 2016 International Conference on Connected Vehicles
and Expo (ICCVE’16), September 12-16, 2016, Seattle, WA, USA
• TPC, 12th IEEE International Wireless Communications & Mo-
bile Computing Conference (IWCMC 2016), September 5-9, 2016,
Paphos, Cyprus
• TPC, The 22nd Asia-Pacific Conference on Communications, Au-
gust 25-27, 2016, Yogyakarta, Indonesia
• TPC, First International Workshop on QoS aware Future Com-
munication Networks (QoS-FCNs’16) in conjunction with the 11th
International Conference on Future Networks and Communica-
tions (FNC’16), August 15-18, 2016, Montreal, Quebec, Canada
• TPC, 3rd International Doctoral Symposium on Applied Compu-
tation and Security Systems (ACSS 2016), August 12-14, 2016,
Kolkata, India
• TPC, 2016 International Workshop on Emerging Dependable Com-
puting System Technologies and Applications (EDCSTA 2016),
in conjunction with the 14th IEEE International Conference on
Dependable, Autonomic and Secure Computing (DASC 2016),
August 8∼12, 2016, Auckland, New Zealand
• TPC, 6th International Workshop on Privacy, Security and Trust
in Mobile and Wireless Systems (MobiPST 2016) with the 25th
International Conference on Computer Communication and Net-
works (ICCCN 2016), August 1-4, 2016, Waikoloa, Hawaii, USA
85
• TPC, 13th International Conference on Wireless Networks and
Mobile Systems (WINSYS 2016), July 26-28, 2016, Lisbon, Por-
tugal
• TPC, 9th International Conference on Security of Information
and Networks (SIN 2016), July 20-22, 2016, Rutgers University,
New Jersey, USA
• TPC, The 2nd International Workshop on Future Trends in Com-
puting System Technologies and Applications (FUSION 2016), in
conjunction with the 13th IEEE International Conference on Ad-
vanced and Trusted Computing (ATC 2016), July 18-21, 2016,
Toulouse, France.
• TPC, 5th International Conference on Theory and Practice in
Modern Computing 2016; Part of the Multi Conference on Com-
puter Science and Information Systems (MCCSIS 2016), July 1-4,
2016, Funchal, Madeira, Portugal
• TPC, The IEEE International Workshop on Urban Mobility &
Intelligent Transportation Systems (UMITS 2016) in conjunction
with the 21st IEEE International Symposium on Computers and
Communications (ISCC 2016), June 27-30, 2016, Italy
• TPC, CoWPER 2016: CoWPER, Toward A City-Wide Pervasive
EnviRonment Workshop with IEEE International Conference on
Sensing, Communication and Networking (IEEE SECON 2016),
June 27-30, 2016, London, UK
• TPC, Safe, Energy-Aware, & Reliable Connected Health (SEARCH
2016) in association with the First IEEE Conference on Con-
nected Health: Applications, Systems and Engineering Technolo-
gies (CHASE 2016), June 27-29, 2016, Washington DC, USA
• TPC, BIGDATA4HEALTH 2016: The International Workshop
on Big Data Analytics for Smart and Connected Health in con-
junction with the First IEEE Conference on Connected Health:
Applications, Systems and Engineering Technologies (CHASE
2016), June 27-29, 2016, Washington DC, USA
• TPC, Ad-hoc and Sensor Networking Symposium, IEEE Inter-
national Conference on Communications (ICC 2016), May 23-27,
2016, Kuala Lumpur, Malaysia
• TPC, The Eleventh International Conference on Internet and
Web Applications and Services (ICIW 2016), May 22-26, 2016
- Valencia, Spain
• TPC, 23rd International Conference on Telecommunications (ICT
2016), May 16-18, 2016, Thessaloniki, Greece
86
• TPC, Track - W8: The First IEEE International Workshop on
User-Centric Networking for 5G and Beyond, 2016 IEEE 83rd
Vehicular Technology Conference: VTC2016-Spring, May 15-18,
2016, Nanjing, China
• TPC, Track - W4: The Second International Workshop on Ad-
vances in Industrial Networks and Intelligent Systems (AINIS
2016), VTC2016-Spring Recent Results & Workshops, May 15-
18, 2016,Nanjing, China
• TPC, 5th International Conference on Informatics, Electronics &
Vision (ICIEV 2016), May 13-14, 2016, Dhaka, Bangladesh
• TPC, The first IEEE/IFIP International Workshop on Urban
Mobility & Intelligent Transportation Systems (UMITS 2016) in
conjunction with the IEEE/IFIP Network Operations and Man-
agement Symposium (NOMS 2016), April 25-29, 2016, Istanbul,
Turkey
• TPC, 7th Symposium on Security and Privacy in Next Gener-
ation Networks (SPNGN2016) in conjunction with ITNG 2016,
April 11-13, 2016, Las Vegas, Nevada, USA
• TPC, Mobile and Wireless Networks track, IEEE Wireless Com-
munications and Networking Conference (WCNC), April 3-6, 2016,
Doha, Qatar
• TPC, International Conference on Internet of things and Cloud
Computing (ICC 2016), March 22-23, 2016, Cambridge, United
Kingdom
• TPC, The Seventh International Conference on Cloud Comput-
ing, GRIDs, and Virtualization (CLOUD COMPUTING 2016),
March 20-24, 2016, Rome, Italy
• TPC, 7th International Conference on Information Science and
Applications (ICISA 2-16), February 15-18, 2016, Ho Chi Minh,
Vietnam
• TPC, 3rd International Conference Applications and Innovations
in Mobile Computing (AIMoC 2016), February 11-13, 2016, Kolkata,
India
• TPC, The 2nd International Conference on Networking Systems
and Security 2016 (NSysS 2016), January 7-9, 2016, Dhaka, Bangladesh
2015
87
• TPC, The 2015 International Conference on Computing and Net-
work Communications (CoCoNet’15), December 16-19, 2015, Trivan-
drum, Kerala, India
• TPC, IEEE International Conference on Advanced Networks and
Telecommunications Systems (IEEE ANTS 2015), December 15-
18, 2015, Kolkata, India
• TPC, 13th International Conference on Frontiers of Information
Technology (FIT’15), December 14-16, 2015, Islamabad, Pakistan
• TPC, Adhoc and Sensor Networks track, IEEE Global Commu-
nications Conference (IEEE GLOBECOM 2015), December 6-10,
2015 San Diego, CA, USA
• PC, IEEE Asia-Pacific World Congress on Computing Science
(APWCCS 2015), December 2-4, 2015, Yanuca, Fiji
• TPC, The 2nd International Conference on Information and Com-
munication Technologies for Disaster Management (ICT-DM’2015),
November 30-December 2, 2015, Rennes, France
• TPC, The First International Workshop on The Advances in In-
dustrial Networks and Intelligent Systems (AINIS 2015) in Con-
junction with The Fourth IEEE/CIC International Conference
on Communications in China (ICCC 2015), Shenzhen, China,
November 2-4, 2015
• TPC, 2015 12th International Conference on Electrical Engineer-
ing, Computing Science and Automatic Control (CCE 2015), Oc-
tober 28-30, 2015, Mexico City, Mexico
• TPC, The 4th International Conference on Connected Vehicles &
Expo (ICCVE 2015) in conjunction with The 2nd APEC Internet
of Vehicles Symposium, October 19-23, 2015, Shenzhen, China
• TPC, International Conference on Civic Technologies for Smart
Cities (CivicTech 2015)with Smart City 360 Summit, October 13,
2015, Bratislava, Slovakia
• TPC, International Conference on E-mobility and Emerging Ve-
hicular Technology (ECARS 2015) with Smart City 360 Summit,
October 13, 2015 Bratislava, Slovakia
• TPC, The Eleventh International Conference on Wireless and
Mobile Communications (ICWMC 2015), October 11-16, 2015,
St. Julians, Malta
• TPC, Track: EMERGING TECHNOLOGIES: Cloud Comput-
ing, 2015 IEEE 82nd Vehicular Technology Conference: VTC2015-
Fall 6–9 September 2015, Boston, USA
• TPC, Wireless Networking Symposium, IEEE IWCMC 2015, Au-
gust 24-27, 2015, Dubrovnik, Croatia
88
• TPC, QoS and QoE in Wireless Communications/Networks Work-
shop (QoS-QoE), in conjunction with IEEE IWCMC 2015, Au-
gust 24-27, 2015, Dubrovnik, Croatia
• TPC, The Ninth International Conference on Emerging Security
Information, Systems and Technologies (SECURWARE 2015),
August 23-28, 2015, Venice, Italy
• TPC, “Track 3: Trusted Security Techniques on Computing De-
vices”, The 12th IEEE International Conference on Advanced
and Trusted Computing (ATC 2015), August 10-14, 2015, Bei-
jing, China
• TPC, “Track 7: Mobile and Pervasive Computing”, The 15th
IEEE International Conference on Scalable Computing and Com-
munications (ScalCom 2015), August 10-14, 2015, Beijing, China
• TPC, 4th International Conference on Advances in Computing,
Communications and Informatics (ICACCI 2015), August 10-13,
2015, Kerala, India
• TPC, 3rd International Workshop on Smart Sensor Protocols and
Algorithms (SSPA 2015) in conjunctions withWMNC 2015, June
23-25, 2015, Novi Sad, Serbia
• TPC, 3rd International Conference on Advanced Computing, Net-
working, and Informatics (ICACNI-2015), June 23-25, 2015, Orissa,
India
• TPC, The 6th International Workshop on Future Computing Sys-
tem Technologies and Applications (FiSTA 2015), in conjunction
with ICCSA 2015, June 22∼25, 2015, Banff, Alberta, Canada
• TPC, 2nd Workshop on Smart Wireless Access Networks for
Smart cITY (SWANSITY 2015) with IEEE SECON 2015, June
22, Seattle, USA
• TPC, The Tenth International Conference on Internet and Web
Applications and Services (ICIW 2015), June 21-26, 2015, Brus-
sels, Belgium
• TPC, 4th International Conference on Informatics, Electronics &
Vision (ICIEV 2015), 15-17 June, Fukuoka, Japan
• TPC, 4th IEEE International Workshop on Smart Communica-
tion Protocols and Algorithms (SCPA 2015) in conjunction with
IEEE International Conference on Communications (ICC 2015),
June 8-12, 2015, London, UK
• TPC, The First IEEE International Workshop on Security and
privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-
Security 2015), in conjunction with IEEE International Confer-
ence on Communications (ICC 2015), June 8-12, 2015, London,
UK
89
• TPC, IEEE International Workshop on Advances in Software De-
fined and Context Aware Cognitive Networks 2015 (IEEE SCAN
2015) in conjunction with IEEE International Conference on Com-
munications (ICC 2015), June 8-12, 2015, London, UK
• TPC, Ad-hoc and Sensor Networking Symposium, IEEE Inter-
national Conference on Communications (ICC 2015), June 8-12,
2015, London, UK
• TPC, Communications Network and Protocols track, The 29th
IEEE International Conference on Advanced Information Net-
working and Applications (AINA-2015), May 24-27, 2015, Gwangju,
Korea
• TPC, 2nd International Conference On Advances in Computing
& Communication Engineering (ICACCE-2015), May1-2, 2015,
Dehradun, India
• TPC, The Eighth International Conference on Communication
Theory, Reliability, and Quality of Service (CTRQ 2015), April
19-24, 2015 - Barcelona, Spain
• TPC, The 6th International Symposium on Security and Privacy
in Next-Generation Networks (SPNGN 2015) in association with
12th International Conference on Information Technology : New
Generations (ITNG 2015), April 13-15, 2015, Las Vegas, Nevada,
USA
• TPC, The Sixth International Conference on Cloud Comput-
ing, GRIDs, and Virtualization (CLOUD COMPUTING 2015),
March 22-27, 2015, Nice, France
• TPC, International Workshop on E2IoT 2015: Energy Efficiency
in the Internet of Things, and Internet of Things for Energy Effi-
ciency, In conjunction with WCNC 2015, New Orleans, LA, USA,
9-12 March 2015
• TPC, Track 3- Mobile and Wireless Networks,IEEE Wireless Com-
munications and Networking Conference (WCNC 2015), March
9-12, 2015, New Orleans, LA, USA
• TPC, 1st International Conference on Industrial Networks and
Intelligent Systems (INISCom 2015), March 2-4, 2015, Tokyo,
Japan
• TPC, International Conference on “Signal Processing & Inte-
grated Networks (SPIN 2015)”, February 19-20, 2015, Noida, In-
dia
• TPC, Internet Services and Applications Symposium, Interna-
tional Conference on Computing, Networking and Communica-
tions (ICNC 2015), February 16-19, 2015, Anaheim, California,
USA
90
• TPC, 2nd IEEE sponsored International Conference on Appli-
cations and Innovations in Mobile Computing (AIMoC 2015),
February 12 - February 14, 2015, Kolkata, India
• SPC, First International Conference on Anti-Cybercrime (ICACC-
2015), February 9-11, 2015, Riyadh, Saudi Arabia
• TPC, International Bio-Metrics & Smart Government Summit,
January 18-20, 2015 (IBMSGS 2015), Sousse, Tunisia
• TPC, The 1st International Conference on Networking Systems
and Security 2015 (NSysS 2015), January 5-7, 2015, Dhaka, Bangladesh
2014
91
• TPC, Second IEEE/CIC ICCC International Workshop on Inter-
net of Things, October 13-15, 2014, Shanghai, China
• TPC, 2014 11th International Conference on Electrical Engineer-
ing, Computing Science and Automatic Control (CCE 2014),
September 29-October 3, 2014, Ciudad del Carmen, Campeche,
Mexico.
• TPC, The 2014 IEEE Symposium on Industrial Electronics & Ap-
plications (ISIEA2014), September 28 to October 1, 2014, Kota
Kinabalu, Sabah, Malaysia
• TPC, ICACCI 2014 Doctoral Consortium with the 3rd Interna-
tional Conference on Advances in Computing, Communications
& Informatics (ICACCI), September 24-27, 2014, Delhi, India
• TPC, 3rd International Conference on Advances in Computing,
Communications & Informatics (ICACCI), September 24-27, 2014,
Delhi, India
• PC, The International Conference on Wireless Information Net-
works and Systems 2014 (WINSYS 2014), September 2-4, Vienna,
Austria
• TPC, Special Session on Networks & Communication Systems
(NCS 2014) Jointly with, Networking and Electronic Commerce
Research Conference (NAEC 2014), August 21-24, 2014, Trieste,
Italy.
• TPC, 2014 International Workshop on the Design and Perfor-
mance of Networks on Chip (DPNoC 2014) August 17-20, 2014,
Niagara Falls, Ontario, Canada in conjunction with the The 9th
International Conference on Future Networks and Communica-
tions (FNC 2014), Niagara Falls, Ontario, Canada
• TPC, 10th International Wireless Communications & Mobile Com-
puting Conference – 2014 (IWCMC 2014), August 4-8, 2014,
Nicosia, Cyprus
• TPC, The Ninth International Conference on Internet and Web
Applications and Services (ICIW 2014), July 20-24, 2014, Paris,
France
• TPC, The 4th International IEEE Workshop on Multimedia Ser-
vices and Technologies for E-health (MUST-EH 2014), In con-
junction with IEEE ICME 2014 (ICME2014), July 14-18, 2014
Chendu, China
• TPC, 2nd Smart Sensor Protocols and Algorithms (SSPA 2014),
June 22-27, 2014, Benidorm, Spain
• TPC, The Ninth International Multi-Conference on Computing
in the Global Information Technology (ICCGI 2014), June 22-26,
2014, Seville, Spain
92
• TPC, Ad Hoc and Sensor Networking Symposium (AHSNS), IEEE
International Conference on Communications (IEEE ICC 2014),
Communications: The Centrepoint of the Digital Economy, June
10-14, 2014, Sydney, Australia
• TPC, The Fifth International Conference on Cloud Computing,
GRIDs, and Virtualization (CLOUD COMPUTING 2014), May
25-29, 2014, Venice, Italy
• IPC, 3rd International Conference on Informatics, Electronics &
Vision (ICIEV), May 23-24, 2014, Dhaka, Bangladesh.
• TPC, Workshop on Mobile and Wireless 2014 Third, April 15-18,
2014, Jeju Island, Korea.
• TPC, “Mobile and Wireless Networks” track, IEEE Wireless Com-
munications and Networking Conference (IEEE WCNC), April
6-9, 2014, Istanbul, Turkey
• TPC, Second International Conference on Security in Computer
Networks and Distributed Systems (SNDS-2014), March 13-14,
2014, Thiruvananthapuram (Trivandrum), India
• TPC, IEEE sponsored International Conference on Applications
and Innovations in Mobile Computing (AIMoC 2014), February
27-March 01, 2014, Kolkata, India
• TPC, 2014 International Conference on Computing, Networking
and Communications, Internet Services and Applications Sym-
posium, February 3-6, 2014, Honolulu, Hawaii, USA
• PC, The 1st International Conference on ICTs for Disaster Man-
agement (ICT-DM’2014), January 18-20, 2014, Algiers, Algeria
2013
93
• TPC, The 2nd International Conference on Connected Vehicles
& Expo (ICCVE 2013), December 2-6, 2013, Las Vegas, Nevada,
USA
• TPC, "Security and Privacy" track, 5th IEEE International Con-
ference on Cloud Computing Technology and Science (IEEE Cloud-
Com 2013), December 2-5, 2013, Bristol, UK
• TPC, IEEE 7th International Symposium on Embedded Multi-
core/Manycore System-on-Chip (MCSoC-13), September 26-28,
2013, Tokyo, Japan
• TPC, The Seventh International Conference on Emerging Secu-
rity Information, Systems and Technologies, SECURWARE 2013,
August 25-31, 2013, Barcelona, Spain
• PC, The Annual International Conference on Science and En-
gineering in Biology, Medical and Public Health (BioMedPub),
August 16-18 , 2013, Jakarta, Indonesia
• TPC, The second IEEE&CIC International Conference on Com-
munications in China (ICCC2013), August 12-14, 2013, Xi’an,
China
• TPC, 10th International Conference on Wireless Information Net-
works and Systems (WINSYS 2013), July 29-31, 2013, Reykjavík,
Iceland
• TPC, Eighth International Multi-Conference on Computing in
the Global Information Technology (ICCGI 2013), July 21-26,
2013 - Nice, France
• TPC, The 9th IEEE International Wireless Communications and
Mobile Computing Conference (IWCMC 2013), July 1-5, 2013,
Cagliari, Sardinia, Italy
• TPC, IEEE International Conference on Communications 2013:
IEEE ICC’13 - 3rd IEEE International Workshop on Smart Com-
munication Protocols and Algorithms (SCPA’13), June 9-13, 2013,
Budapest, Hungary
• TPC, 1st IEEE Workshop on electric vehicle networks for Smart
grid applications (IEEE EVN-SGA 2013), jointly with 2013 IEEE
77th Vehicular Technology Conference: VTC2013-Spring, June
2-5, 2013, Dresden, Germany
• IPC, 2nd International Conference on Informatics, Electronics &
Vision, May 17-18, 2013, Dhaka, Bangladesh
• PC, Information Communication Technology-EurAsia Conference
2013, March 25-29, 2013, Yogyakarta, Indonesia
94
• PC, "Grid, P2P and Scalable Computing" Track, The 27th IEEE
International Conference on Advanced Information Networking
and Applications (AINA-2013), March 25-28, 2013, Barcelona,
Spain
• TPC, Internet Services and Applications (ISA) Symposium with
International Conference on Computing, Networking and Com-
munications (ICNC 2013), January 28-31, 2013, San Diego, USA
• ITPC, 9th International Conference on Heterogeneous Network-
ing for Quality, Reliability, Security and Robustness (Qshine 2013),
January 11-12, 2013, Greater Noida, NCR Delhi, India.
Publication list
95
• JE18. Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah,
Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip
Korn, “Information integrity in smart grid systems”, Guest Edi-
torial of the Special Issue of Information Systems, 53 (2015), El-
sevier, 2015, pp. 145-146, DOI:10.1016/j.is.2015.05.002. [SCIE-
Indexed]
• JE17. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,
Hani Alzaid, and Mohammad Asadul Hoque, “Editorial: Con-
verged Networks, Technologies and Applications”, Guest Edito-
rial of the Special Issue on Converged Networks, Technologies and
Applications of International Journal of Computational Science
and Engineering, Inderscience Publishers, Vol. 10, No. 3, 2015,
pp. 231-233. [ESCI-Indexed]
• JE16. Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr.,
and Riaz Ahmed Shaikh, “Editorial: Critical Applications in Ve-
hicular Ad Hoc/Sensor Networks”, Guest Editorial of the Special
Issue on Critical Applications in Vehicular Ad Hoc/Sensor Net-
works of Telecommunication Systems, Volume 58, Issue 4,April
2015, Springer, pp. 275-277, DOI: 10.1007/s11235-014-9876-5.
[SCIE-Indexed]
• JE15. Al-Sakib Khan Pathan, “On the Boundaries of Trust and
Security in Computing and Communications Systems”, Interna-
tional Journal of Trust Management in Computing and Commu-
nications, Vol. 2, No. 1, 2014, Inderscience Publishers, pp. 1-6,
DOI: 10.1504/IJTMCC.2014.063272.
• JE14.Mohammad Mehedi Hassan, Al-Sakib Khan Pathan, Eui-
Nam Huh, and Jemal Abawajy, “Emerging Sensor-Cloud Tech-
nology for Pervasive Services and Applications”, Guest Editorial
of the Special Issue of International Journal of Distributed Sen-
sor Networks, Volume 2014, Article ID 610106, Hindawi Pub-
lishing Corporation, 2 pages, DOI:10.1155/2014/610106. [SCIE-
Indexed]
• JE13. Al-Sakib Khan Pathan and Muhammad Mostafa Monowar,
“Preface: Future Trends in Security Issues in Internet and Web
Applications”, Guest Editorial of the Special Issue of Interna-
tional Journal of Computational Science and Engineering, Vol.
9, No. 4, 2014, Inderscience Publishers, pp. 275-277. [ESCI-
Indexed]
• JE12. Al-Sakib Khan Pathan, Rashid A. Saeed, Mohamed Ali
Feki, and Nguyen H. Tran, “Guest Editorial: Special Issue on
Integration of IoT with Future Internet”, Guest Editorial of the
Special Issue on Integration of IoT with Future Internet, Journal
96
of Internet Technology, Volume 15, No.2, March 2014, pp.145-
147. [SCIE-Indexed]
• JE11. Hyung Seok Kim, Waleed Ejaz, Khalid Al-Begain, Al-
Sakib Khan Pathan, and Najam ul Hasan, “Advances in Cog-
nitive Radio Sensor Networks”, Special Issue of International
Journal of Distributed Sensor Networks, Volume 2014, Article ID
631624, Hindawi Publishing Corporation, 3 pages, DOI: 10.1155/2014/631624.[SCIE-
Indexed]
• JE10. Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah,
Mostafa M. Fouda, and Hae Young Lee, “Defending against Wire-
less Network Intrusion”, Guest Editorial of the Special Issue on
Wireless Network Intrusion of Journal of Computer and Sys-
tem Sciences, Elsevier, Volume 80, Issue 3, 2014, pp. 499-501,
DOI:10.1016/j.jcss.2013.06.006. [SCI-Indexed]
• JE09. Guangjie Han, Lei Shu, Al-Sakib Khan Pathan, Joel Ro-
drigues, and Abdelhamid Mellouk, “Wireless Sensor Networks
based on Environmental Energy Harvesting”, Special Issue of
International Journal of Distributed Sensor Networks, Volume
2013, Article ID 816063, Hindawi Publishing Corporation, 2 pages,
DOI: 10.1155/2013/816063. [SCIE-Indexed]
• JE08. Al-Sakib Khan Pathan, “Editorial: When the Cloud Com-
puting Becomes Mobile!”, International Journal of Internet and
Distributed Systems, Volume 1, Number 3, August 2013,Scientific
Research Publishing Inc., p. 17, DOI: 10.4236/ijids.2013.13003.
• JE07. Al-Sakib Khan Pathan, “Tackling the Threats of Internet
Worms”, (Editor-in-Chief’s Foreword) International Journal on
Internet and Distributed Computing Systems, Volume 3, Number
1, 2013, pp. i-ii.
• JE06. Lei Shu, Athanasios V. Vasilakos, Jaime Lloret, and Al-
Sakib Khan Pathan, “Guest Editorial: Special Issue on Recent
Advance on Mobile Sensor Systems”, Telecommunication Sys-
tems, Volume 52, Issue 4, April 2013, Springer, pp. 2407-2409,
DOI: 10.1007/s11235-011-9560-y. [SCIE-Indexed]
• JE05. Al-Sakib Khan Pathan, “Multi-Dimensional Networking
andDistributed Computing Services”, (Editor-in-Chief’s Foreword)
International Journal on Internet and Distributed Computing
Systems, Volume 2, Number 1, 2012, pp. i-ii.
• JE04. Syed Obaid Amin, Al-Sakib Khan Pathan, and Syed M.
Rahman, “Editorial: Recent Advances in Next-Generation and
Resource-Constrained Converged Networks”, Special Issue of In-
ternational Journal of Communication Networks and Distributed
Systems, Vol. 8, Nos. 1/2, 2012.
97
• JE03. Al-Sakib Khan Pathan, “Internet and Distributed Com-
puting Knowledge in Today’s World”, (Editor-in-Chief’s Fore-
word) International Journal on Internet and Distributed Com-
puting Systems, Volume 1, Issue 1, June 1, 2011, p. i.
• JE02. Sudip Misra, N. Balakrishnan, and Al-Sakib Khan Pathan,
“Preface: Recent advances in simulation and mathematical mod-
eling of wireless networks”, Special Issue of Mathematical and
Computer Modelling Journal, Elsevier (with Sudip Misra and N.
Balakrishnan), Volume 53, Issues 11-12, June 2011, pp. 2057-
2058, DOI:10.1016/j.mcm.2011.03.020. [SCI-Indexed]
• JE01. Jemal H. Abawajy, Mukaddim Pathan, Al-Sakib Khan
Pathan, and Mustafizur Rahman,“Network Management in Dis-
tributed Systems”, Guest Editorial of the Special Issue of Scalable
Computing: Practice and Experience, Volume 11 Nr 4, 2010.
98
• J.50. Mounya Smara, Makhlouf Aliouat, Al-Sakib Khan Pathan,
and Zibouda Aliouat, “Acceptance Test for Fault Detection in
Component-based Cloud Computing and Systems”, Future Gen-
eration Computer Systems, Volume 70, May 2017, pp. 74–93,
Elsevier, DOI: 10.1016/j.future.2016.06.030 [SCI-Indexed]
• J.49. Matin Saad Abdullah, Al-Sakib Khan Pathan, and Imad
Fakhri Al Shaikhli, “A Web and Software-based Approach Blend-
ing Social Networks for Online Qur’anic Arabic Learning”, The
International Arab Journal of Information Technology, Volume
14, No. 1, 2017, pp. 80-90. [SCIE-Indexed]
• J.48. Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mo-
hammed, and Al-Sakib Khan Pathan, “Detecting Zero-day Poly-
morphic Worms with Jaccard Similarity Algorithm”, Interna-
tional Journal of Communication Networks and Information Se-
curity, Vol. 8, No. 3, December 2016, pp. 203-214. [SCOPUS-
Indexed]
• J.47. N.M. Masoodhu Banu, S. Sujatha, and Al-Sakib Khan
Pathan, “Skip Block based Distributed Source Coding for Hy-
perspectral Image Compression”, Multimedia Tools and Appli-
cations, Volume 75, Issue 18, September 2016, pp 11267-11289,
Springer US, DOI: 10.1007/s11042-015-2852-6. [SCIE-Indexed]
• J.46. Kalpana Murugan and Al-Sakib Khan Pathan, “Prolonging
the Lifetime of Wireless Sensor Networks using Secondary Sink
Nodes”, Telecommunication Systems, Volume 62, Issue 2, June
2016, Springer US, pp. 347-361, DOI: 10.1007/s11235-015-0079-
5. [SCIE-Indexed]
• J.45. Djallel Eddine Boubiche, Sabrina Boubiche, HomeroToral-
Cruz, Al-Sakib Khan Pathan, Azzedine Bilami, and Samir Ath-
mani, “SDAW: Secure Data Aggregation Watermarking-based
Scheme in Homogeneous WSNs”, Telecommunication Systems,
Volume 62, Issue 2, Springer, June 2016, pp. 277-288, DOI:10.1007/s11235-
015-0047-0. [SCIE-Indexed]
• J.44. Imran Yusof and Al-Sakib Khan Pathan, “Mitigating Cross-
Site Scripting Attacks with a Content Security Policy”, IEEE
Computer, Volume: 49, Issue: 3, March 2016, pp. 56-63. [SCI-
Indexed]
• J.43. Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Shafkat
Ahmed, “Learning Algorithms for Anomaly Detection from Im-
ages”, International Journal of System Dynamics Applications,
Volume 4, Issue 3, IGI Global, July-September 2015, pp. 43-69.
[ESCI-Indexed]
99
• J.42. Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat,
and Al-Sakib Khan Pathan, “A New Efficient Checkpointing Al-
gorithm for Distributed Mobile Computing”, Journal of Control
Engineering and Applied Informatics, Vol.17, No.2 2015, pp. 43-
54. [SCIE-Indexed]
• J.41. Al-Sakib Khan Pathan and Mohssen M. Z. E. Mohammed,
“Building Customer Trust in Cloud Computing with an ICT-
enabled Global Regulatory Body”, Wireless Personal Communi-
cations, Volume 85, Issue 1, November 2015, Springer, pp. 77-99,
DOI:10.1007/s11277-015-2729-z. [SCIE-Indexed]
• J.40. Saiful Azad, Khandaker Tabin Hasan, Dip Nandi, and Al-
Sakib Khan Pathan, “A High-Throughput Routing Metric for
Multi-Hop Underwater Acoustic Networks”, Computers and Elec-
trical Engineering, Volume 44, May 2015, Elsevier, pp. 24-33,
DOI:10.1016/j.compeleceng.2015.03.020. [SCIE-Indexed]
• J.39. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“Key Revocation in Wireless Sensor Networks – A Survey on
a Less-addressed yet Vital Issue”, International Journal of Ad
Hoc and Ubiquitous Computing, Vol. 18, Nos. 1/2, Inderscience
Publishers, 2015, pp. 3-22, DOI:10.1504/IJAHUC.2015.067789.
[SCIE-Indexed]
• J.38. Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache,
and Samira Moussaoui, “On the Medium Access Control Proto-
cols Suitable for Wireless Sensor Networks – A Survey”, Inter-
national Journal of Communication Networks and Information
Security, Vol. 6, No. 2, August 2014, pp. 89-103. [SCOPUS-
Indexed]
• J.37. Al-kindy Athman Abdalla and Al-Sakib Khan Pathan, “On
Protecting Data Storage in Mobile Cloud Computing Paradigm”,
IETE Technical Review, Volume 31, Issue 1, 2014, pp. 82-91,
DOI:10.1080/02564602.2014.891382. [SCIE-Indexed] [ Recognized
as the “Most Read” article during the period of May 2014-August
2016]
• J.36. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and
Al-Sakib Khan Pathan, “Mix Column Transform based on Ir-
reducible Polynomial Mathematics for Color Image Steganogra-
phy: A Novel Approach”, Computers and Electrical Engineering,
Volume 40, Issue 4, Elsevier, May 2014, pp. 1390-1404, DOI:
10.1016/j.compeleceng.2014.02.007. [SCIE-Indexed]
• J.35. Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah,
and Al-Sakib Khan Pathan, “Routing Protocol Design for Secure
WSN: Review and Open Research Issues”, Journal of Network
100
and Computer Applications, Volume 41, 2014, Elsevier, pp. 517-
530, DOI: 10.1016/j.jnca.2014.02.008. [SCIE-Indexed]
• J.34. Al-Sakib Khan Pathan and Diallo Abdoulaye Kindy, “Lethal-
ity of SQL Injection against Current and Future Internet-Technologies”,
International Journal of Computational Science and Engineer-
ing, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 386-394,
DOI:10.1504/IJCSE.2014.060720. [ESCI-Indexed]
• J.33. Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan,
“Automated Surveillance in Distributed, Visual Networks: An
Empirical Comparison of Recent Algorithms”, International Jour-
nal of Control and Automation, Vol.7, No.3, SERSC, 2014,pp.389-
400, DOI:10.14257/ijca.2014.7.3.37. (Conference version appeared
in Mobile2013SE) [SCOPUS-Indexed]
• J.32. Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache,
and Samira Moussaoui, “Strengths and Weaknesses of Prominent
Data Dissemination Techniques in Wireless Sensor Networks”, In-
ternational Journal of Communication Networks and Information
Security, Vol. 5, No. 3, 2013, pp. 158-177. [SCOPUS-Indexed]
• J.31. Al-Sakib Khan Pathan, “Fi-Wi Network for Future Cloud”,
International Journal of Applied Research on Information Tech-
nology and Computing, Volume 4, Issue 3, December 2013, pp.
122-132, DOI:10.5958/j.0975-8089.4.3.012.
• J.30. Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz,
and Mohamad Badra, “Towards Privacy Protection in Smart
Grid”, Wireless Personal Communications, Volume 73, Issue 1,
Springer, November 2013, pp 23-50, DOI:10.1007/s11277-012-
0939-1. [SCIE-Indexed] [ Included in IEEE Communications So-
ciety’s (IEEE ComSoc) Best Readings Topics on Communica-
tions and Information Systems Security, 2013 under the category
of “Privacy”]
• J.29. Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A
Detailed Survey on various aspects of SQL Injection in Web Ap-
plications: Vulnerabilities, Innovative Attacks and Remedies”,
International Journal of Communication Networks and Informa-
tion Security, Vol. 5, No. 2, August 2013, pp. 80-92. [SCOPUS-
Indexed]
• J.28. Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou,
Rodrigo Roman, and Wai-Choong Wong, “On the Vital Areas of
Intrusion Detection Systems in Wireless Sensor Networks”, IEEE
Communications Surveys & Tutorials, Volume: 15, Issue: 3,
Third Quarter 2013, pp. 1223-1237, DOI: 10.1109/SURV.2012.121912.00006
101
[SCI-Indexed]. This article was included in IEEE Communica-
tions Society’s (IEEE ComSoc) Best Readings Topics on Com-
munications and Information Systems Security, 2013 under the
category of “Intrusion Detection Systems”]
• J.27. Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C.
Ramírez Pacheco, “Accurate Modeling of VoIP Traffic QoS Pa-
rameters in Current and Future Networks with Multifractal and
Markov Models”, Mathematical and Computer Modelling Jour-
nal, Volume 57, Issues 11–12, Elsevier, June 2013, pp. 2832-2845,
DOI:10.1016/j.mcm.2011.12.007. [SCI-Indexed]
• J.26. Feyza Gündüz and Al-Sakib Khan Pathan, “On the Key
Factors of Usability in Small-sized Mobile Touch-Screen Applica-
tion”, International Journal of Multimedia and Ubiquitous En-
gineering, Vol. 8, No. 3, SERSC, May, 2013, pp. 115-137.
[SCOPUS-Indexed]
• J.25. Harry Tin Win and Al-Sakib Khan Pathan, “On the Issues
and Challenges of Fiber-Wireless (Fi-Wi) Networks”, Journal of
Engineering, Volume 2013, Hindawi Publishing Corporation, Ar-
ticle ID 645745, 11 pages, 2013, DOI:10.1155/2013/645745.
• J.24. Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, and
Al-Sakib Khan Pathan, “SMART: A Subspace based Malicious
Peers Detection algorithm for P2P Systems”, International Jour-
nal of Communication Networks and Information Security, Vol.
5, No. 1, April 2013, pp. 1-9. [SCOPUS-Indexed]
• J.23. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and
Al-Sakib Khan Pathan, “A New Data Hiding Technique Based
on Irreducible Polynomials”, Journal of Emerging Technologies
in Web Intelligence, Volume 5, No. 1, Academy Publisher, 2013,
DOI:10.4304/jetwi.5.1.45-51. [SCOPUS-Indexed]
• J.22. Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla
Khanam, and Habibullah Yusuf Saleem, “A Pay-and-Stay Model
for Tackling Intruders in Hybrid Wireless Mesh Networks”, SIM-
ULATION: Transactions of The Society for Modeling and Sim-
ulation International, Volume 89, Issue 5, SAGE Publishing, May
2013, pp. 616-633, DOI:10.1177/0037549712467827. [SCIE-Indexed]
[This article was ranked as one of the "SIMULATION: Most-Read
Full-Text Articles" consecutively for the months of June 2013-
August 2013 under the category of "Modeling & Simulation" by
The Cyber Security and Information Systems Information Analy-
sis Center (CSIAC), USA (https://www.thecsiac.com/aggregator/sources/22)]
• J.21. Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-
Sakib Khan Pathan, “Efficient and Effective Automated Surveil-
102
lance Agents using Kernel Tricks”, SIMULATION: Transactions
of The Society for Modeling and Simulation International, Vol-
ume 89, Issue 5, SAGE Publishing, May 2013, pp. 562-577,
DOI:10.1177/0037549712460908. [SCIE-Indexed]. This article
was ranked as one of the "SIMULATION: Most-Read Full-Text
Articles" consecutively for the months of June 2013-August 2013
under the category of "Modeling & Simulation" by The Cyber
Security and Information Systems Information Analysis Center
(CSIAC), USA (https://www.thecsiac.com/aggregator/sources/22)]
• J.20. Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, and
Al-Sakib Khan Pathan, “IDPS: An Integrated Intrusion Handling
Model for Cloud Computing Environment”, International Journal
of Computing & Information Technology, Volume 4, Number 1,
International Science Press, Serials Publications, Jan-June 2012,
pp. 1-16.
• J.19. Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-
Sakib Khan Pathan, “Automated Intruder Detection from Image
Sequences using Minimum Volume Sets”, International Journal
of Communication Networks and Information Security, Volume
4, Number 1, April 2012, pp. 11-17. [SCOPUS-Indexed]
• J.18. Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-
Sakib Khan Pathan, and Choong Seon Hong, “Prioritized Hetero-
geneous Traffic-oriented Congestion Control Protocol for Wireless
Sensor Network”, The International Arab Journal of Information
Technology, Volume 9, No. 1, January 2012, pp. 39-48 [SCIE-
Indexed]
• J.17. Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Mo-
hiuddin Ahmed, and Shariq Haseeb, “Experimental Analysis of
MIPL Based Mobile IPv6 Using Single vs Dual Interface with
Practical Test-Beds”, International Journal of Applied Research
on Information Technology and Computing, Volume 2, Issue 3,
December 2011, pp. 61-79, DOI:10.5958/j.0975-8070.2.3.021.
• J.16. Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-
Sakib Khan Pathan, Ariff Abdullah, and Shariq Haseeb, “Per-
formance Analysis of a Highly Available Home Agent in Mo-
bile Networks”, American Journal of Applied Sciences, Volume
8, Issue 12, Science Publications, USA, 2011, pp. 1388-1397,
DOI:10.3844/ajassp.2011.1388.1397. [SCOPUS and ISI Indexed]
• J.15. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,
Jinfang Jiang, Lei Shu, and Guangjie Han, “An Efficient Ap-
proach of Secure Group Association Management in Densely De-
ployed Heterogeneous Distributed Sensor Network”, Security and
103
Communication Networks, Volume 4, Issue 9, Wiley InterScience,
August 2011, pp. 1013-1026, DOI:10.1002/sec.277. [SCIE-Indexed]
[Invited Paper]
• J.14. Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib
Khan Pathan, “ViSim: A User-Friendly Graphical Simulation
Tool for Performance Analysis of MANET Routing Protocols”,
Mathematical and Computer Modelling, Volume 53, Issues 11-12,
Elsevier, June 2011, pp. 2204-2218, DOI:10.1016/j.mcm.2010.08.026.
[SCI-Indexed]
• J.13. Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan,
“Securing Wireless Sensor Networks with An Efficient B+ Tree-
Based Key Management Scheme”, International Journal of Com-
munication Networks and Information Security, Volume 2, Num-
ber 3, December 2010, pp. 162-168. [SCOPUS-Indexed]
• J.12. Mohammad Ziaur Rahman and Al-Sakib Khan Pathan,
“A Case Study - Establishing Redundant Access Networks in the
Telecommunication Sector of a Developing Country”, Interna-
tional Journal of Information Technology, Communications, and
Convergence, Volume 1, No. 1, Inderscience Publishers, 2010, pp.
108-126, DOI:10.1504/IJITCC.2010.035230.
• J.11. Mohammad Ziaur Rahman and Al-Sakib Khan Pathan,
“A Case Study: Submarine Cable in Bangladesh - Its Prospects,
Present Status, and Challenges Ahead”, International Journal
of Applied Research on Information Technology and Computing,
Volume 1, Number 2, May-August 2010, pp. 209-223, DOI:10.5958/j.0975-
8070.1.2.016.
• J.10. Al-Sakib Khan Pathan, “A Review and Cryptanalysis of
Similar Timestamp-Based Password Authentication Schemes Us-
ing Smart Cards”, International Journal of Communication Net-
works and Information Security, Volume 2, Number 1, April 2010,
pp. 15-20. [SCOPUS-Indexed]
• J.09. Al-Sakib Khan Pathan and Choong Seon Hong, “Weakly
connected dominating set-based secure clustering and operation
in distributed sensor networks”, International Journal of Commu-
nication Networks and Distributed Systems, Volume 3, Number 2,
Inderscience Publishers, 2009, pp. 175-195, DOI:10.1504/IJCNDS.2009.026825.
(Conference version appeared in HPCC 2006)
• J.08. Al-Sakib Khan Pathan and Choong Seon Hong, “Design-
ing an Efficient DMCIS with Wireless Sensor and Ad Hoc Net-
works”, Ubiquitous Computing and Communication Journal, Oc-
tober 2008. (Conference version appeared in IEEE MILCOM
2006) [Open Access, available online]
104
• J.07. Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong
Seon Hong, and Eui-Nam Huh, “An Asymmetric Key-Based Se-
curity Architecture for Wireless Sensor Networks”, KSII Transac-
tions on Internet and Information Systems, Volume 2, Number 5,
October 2008, pp. 265–279, DOI:10.3837/tiis.2008.05.004. (Con-
ference version appeared in IEEE MILCOM 2007) [Open Access]
(One of the top 10 downloaded papers in May-June 2009) [SCIE-
Indexed]
• J.06. Al-Sakib Khan Pathan and Choong Seon Hong, “SERP:
Secure Energy-efficient Routing Protocol for Densely Deployed
Wireless Sensor Networks”, Annals of Telecommunications, Vol-
ume 63, Numbers 9-10, Springer, October 2008, pp. 529–541,
DOI:10.1007/s12243-008-0042-5. (Conference version appeared
in ISPA 2007) [SCI-Indexed]
• J.05. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,
Md. Forhad Rabbi, Muhammad Mahbub Alam, and Choong
Seon Hong, “NAMP: Neighbor Aware Multicast Routing Protocol
for Mobile Ad Hoc Networks”, The International Arab Journal
of Information Technology, Vol. 5, No. 1, January 2008, pp.
102-107. (Conference version appeared in IEEE E-Tech 2004)
[SCIE-Indexed]
• J.04. Al-Sakib Khan Pathan and Choong Seon Hong, “A Security
Enhanced Timestamp-Based Password Authentication Scheme
Using Smart Cards”, IEICE Transactions on Information and
Systems, Volume E90-D, No. 11, November, 2007, pp. 1885-1888.
(Conference version appeared in IEEE ICACT 2007) [SCIE-Indexed]
• J.03. Tran Thanh Dai, Al-Sakib Khan Pathan, and Choong
Seon Hong, “A Resource-Optimal Key Pre-distribution Scheme
with Improved Security for Wireless Sensor Networks”, The 9th
Asia-Pacific Network Operations and Management Symposium
(APNOMS 2006), Busan, Korea, (Y.-T. Kim and M. Takano
(Eds.)), Lecture Notes in Computer Science (LNCS), Volume
4238, Springer-Verlag 2006, pp. 546-549. (acceptance rate: 26.7%)
[SCIE-Indexed]
• J.02. Al-Sakib Khan Pathan and Choong Seon Hong, “A Key-
Predistribution-Based Weakly Connected Dominating Set for Se-
cure Clustering in DSN”, The 2006 International Conference on
High Performance Computing and Communications (HPCC 2006),
Munich, Germany, (M. Gerndt and D. Kranzlmüller (Eds.)), Lec-
ture Notes in Computer Science (LNCS), Volume 4208, Springer-
Verlag 2006, pp. 270-279. (acceptance rate: 29%) [SCIE-Indexed]
• J.01. Al-Sakib Khan Pathan and Humayun Kadir Islam, “A
105
Study on the Key Factors for Effective E-Learning”, Asian Jour-
nal of Information Technology, Volume 4 Number 1, 2005, pp.
49-52.
106
Evaluation of MANET Routing Protocols”, The 2010 Interna-
tional Symposium on Frontiers of Parallel and Distributed Com-
puting (FPDC 2010) In conjunction with The 10th ICA3PP 2010,
23 May, 2010, Busan, Korea, (C.-H. Hsu et al. (Eds.)): ICA3PP
2010, Part II, Lecture Notes in Computer Science (LNCS), Vol-
ume 6082, Springer-Verlag 2010, pp. 208–217, 2010. [SCOPUS-
Indexed][Invited Paper]
• LN.4. Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel
Haque, and Choong Seon Hong, “Security Management in Wire-
less Sensor Networks with a Public Key Based Scheme”, The
10th Asia-Pacific Network Operations and Management Sympo-
sium (APNOMS 2007), 10-12 October, 2007, Sapporo, Japan,
(Shingo Ata and Choong Seon Hong (Eds.)) Lecture Notes in
Computer Science (LNCS), Volume 4773, Springer-Verlag 2007,
pp. 503-506. (acceptance rate: 48.4%) [SCOPUS-Indexed]
• LN.3. Al-Sakib Khan Pathan and Choong Seon Hong, “A Se-
cure Energy-Efficient Routing Protocol for WSN”, The Fifth In-
ternational Symposium on Parallel and Distributed Processing
and Applications (ISPA 2007), August 29-31, Niagara Falls, On-
tario, Canada, (Ivan Stojmenovic, Ruppa K. Thulasiram, Lau-
rence T. Yang, Weijia Jia, Minyi Guo and Rodrigo F. de Mello
(Eds.)), Lecture Notes in Computer Science (LNCS), Volume
4742, Springer-Verlag 2007, pp. 407-418. (acceptance rate: 34%)
[SCOPUS-Indexed]
• LN.2. Al-Sakib Khan Pathan and Choong Seon Hong, “Securing
Sensor Reports in Wireless Sensor Networks”, European Confer-
ence on Parallel and Distributed Computing (Euro-Par 2007),
August 28-31, Rennes, France, (A.-M. Kermarrec, L. Bougé, and
T. Priol (Eds.)), Lecture Notes in Computer Science (LNCS),
Volume 4641, Springer-Verlag 2007, pp. 881-890. (acceptance
rate: 27%) [SCOPUS-Indexed]
• LN.1. Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong
Seon Hong, “A Key Management Scheme with Encoding and Im-
proved Security for Wireless Sensor Networks”, The 2006 Interna-
tional Conference on Distributed Computing and Internet Tech-
nology (ICDCIT 2006), December 20-23, Bhubaneswar, India, (S.
Madria, K. Claypool, R. Kannan, and P. Uppuluri (Eds.)), Lec-
ture Notes in Computer Science (LNCS), Volume 4317, Springer-
Verlag 2006, pp. 102-115. (acceptance rate: 12%)
107
Aliouat, “A Snapshot Security Protocol for Radar Network Pro-
tection”, 7th Seminar on Detection Systems: Architectures and
Technologies (DAT 2017), February 20-22, 2017, Algiers, Algeria.
(To Appear)
• C.48. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“ECL-EKM: An Enhanced Certificateless Effective Key Manage-
ment Protocol for Dynamic WSN”, International Conference on
Networking, Systems and Security (NSysS 2017), January 5-8,
2017, Dhaka, Bangladesh, pp. 150-155.
• C.47. Houssem Mansouri and Al-Sakib Khan Pathan, “An Ef-
ficient Minimum-Process Non-Intrusive Snapshot Algorithm for
Vehicular Ad Hoc Networks”, 13th ACS/IEEE International Con-
ference on Computer Systems and Applications (AICCSA 2016),
November 29-December 2, 2016, Agadir, Morocco. (acceptance
rate: 26%)
• C.46. Matin Saad Abdullah, M.M. Hafizur Rahman, Al-Sakib
Khan Pathan, and Imad Fakhri Al Shaikhli, “A Practical and In-
teractive Web-based Software for Online Qur’anic Arabic Learn-
ing”, International Conference on Information & Communication
Technology For the Muslim World (ICT4M’16), November 22-24,
2016, Jakarta, Indonesia, pp. 76-81.
• C.45. Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan
Pathan, Nadjib Badache, and Samira Moussaoui, “MMSMAC: A
Multi-mode Medium Access Control Protocol for Wireless Sen-
sor Networks”, IEEE Wireless Communications and Networking
Conference (IEEE WCNC 2016), April 3-6, 2016, Doha, Qatar.
• C.44. Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat,
and Al-Sakib Khan Pathan, “A Non-Blocking Coordinated Check-
pointing Algorithm for Message-Passing Systems”, International
Conference on Intelligent Information Processing, Security and
Advanced Communication (IPAC 2015), Article No. 34, ACM,
November 23-25, 2015, Batna, Algeria.
• C.43. Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat,
and Al-Sakib Khan Pathan, “Adaptive Fault Tolerant Check-
pointing Algorithm for Cluster Based Mobile Ad Hoc Networks”,
International Conference on Advanced Wireless, Information, and
Communication Technologies (AWICT 2015), September 20-23,
2015, Sousse, Tunisia, Procedia Computer Science, Elsevier, Vol-
ume 73, 2015, pp. 40-47.
• C.42. A. Babu Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram,
and Al-Sakib Khan Pathan, “Energy-Efficient Sybil Node Detec-
tion Algorithm for Wireless Sensor Networks”, 3rd International
108
Conference on Eco-Friendly Computing and Communication Sys-
tems (ICECCS), December 18-21, 2014, Mangalore, India, pp.
95-98.
• C.41. Mohssen M. Z. E. Mohammed, and Al-Sakib Khan Pathan,
“International Center for Monitoring Cloud Computing Providers
(ICMCCP) for Ensuring Trusted Clouds”, The 11th IEEE In-
ternational Conference on Autonomic and Trusted Computing
(ATC-2014), December 9-12, 2014, Ayodya Resort, Bali, Indone-
sia, pp. 571-576.
• C.40. Md. Rafiqul Islam, M.A.E. Shakib, Md. Azizur Rahaman,
Md. Obaidur Rahman, and Al-Sakib Khan Pathan, “A Neigh-
bour Discovery Approach for Cognitive Radio Network Using
Tower of Hanoi (ToH) Sequence Based Channel Rendezvous”,
The 5th International Conference on Information and Communi-
cation Technology for the Muslim World (ICT4M 2014), Novem-
ber 17-19, 2014, Kuching, Sarawak, Malaysia.
• C.39. Imran Yusof and Al-Sakib Khan Pathan, “Preventing Per-
sistent Cross-Site Scripting (XSS) Attack By Applying Pattern
Filtering Approach”, The 5th International Conference on In-
formation and Communication Technology for the Muslim World
(ICT4M 2014), November 17-19, 2014, Kuching, Sarawak, Malaysia.
• C.38. Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Ahmed,
“Adaptive Algorithms for Automated Intruder Detection in Surveil-
lance Networks”,ICACCI 2014 Doctoral Consortium; 3rd Interna-
tional Conference on Advances in Computing, Communications
& Informatics (ICACCI 2014), September 24-27, 2014, Delhi, In-
dia, pp. 2775-2780.
• C.37. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“SECRET: A Secure and Efficient Certificate Revocation Scheme
for Mobile Ad Hoc Networks”, International Symposium on Bio-
metric and Security Technologies 2014 (ISBAST’14), August 26-
27, 2014, Kuala Lumpur, Malaysia, pp. 137-143.
• C.36. Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco
Ventura, and Al-Sakib Khan Pathan, “An Automated Signature
Generation Method for Zero-day Polymorphic Worms Based on
Multilayer Perceptron Model”, 2nd International Conference on
Advanced Computer Science Applications and Technologies (AC-
SAT2013), December 22-24, 2013, Kuching, Sarawak, Malaysia,
pp. 450-455.
• C.35. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and
Al-Sakib Khan Pathan, “Data Hiding within Color Images based
on MCT with X-OR Operations”, 2nd International Conference
109
on Advanced Computer Science Applications and Technologies
(ACSAT2013), December 22-24, 2013, Kuching, Sarawak, Malaysia,
pp. 19-24. [Invited Paper]
• C.34. Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan,
“Automated Surveillance in Distributed, Wireless Visual Net-
works: A Comparative Study”, Workshop on Mobile and Wire-
less 2013 Second (Mobile2013SE), December 11-13, 2013, Jeju
National University International Center, Jeju Island, Korea; Ad-
vanced Science and Technology Letters, Volume 42 (Mobile and
Wireless 2013), DOI: 10.14257/astl.2013.42.01, pp.1-4. [Invited
Paper]
• C.33. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan,
“On the Key Revocation Schemes in Wireless Sensor Networks”,
The 2013 IEEE International Conference on Green Computing
and Communications (GreenCom 2013): Security, Privacy, and
Trust Computing, Beijing, China, August 20-23, 2013, pp. 290-
297.
• C.32. Matin Saad Abdullah and Al-Sakib Khan Pathan, “Learn-
ing Qur’anic Arabic through Interactive Web-Based Software: A
case-study in Languages for Specific Purposes”, The 4th Inter-
national Conference on Information and Communication Tech-
nology for the Muslim World (ICT4M 2013), March 25-27, 2013,
Rabat, Morocco, pp. 1-6. (CD Proceedings)
• C.31. Feyza Gündüz and Al-Sakib Khan Pathan, “Usability Im-
provements for Touch-Screen Mobile Flight Booking Application:
A Case Study”, International Conference on Advanced Computer
Science Applications and Technologies (ACSAT2012), November
26-28 2012, Kuala Lumpur, Malaysia, pp. 49-54.
• C.30. Muhammad Faheem Mohd Ezani, Al-Sakib Khan Pathan,
and Shariq Haseeb, “Comparative Analysis of IEEE 802.11g Mul-
timedia Multicast Performance Using RTP with an Implemented
Test-bed”, The 2012 IEEE Conference on Open Systems (ICOS
2012), October 21-24, 2012, Kuala Lumpur, Malaysia, pp. 1-5
(CD Proceedings).
• C.29. Matin Saad Abdullah, Al-Sakib Khan Pathan, and Muham-
mad Abdur Rahman, “Using the Web for Critical Learning of Al-
Qur’an’s Language: an Exploratory Case Study”, (Poster) World
Conference on Islamic Thought 2012 (WCIT’12), September 11-
12, 2012, Perak, Malaysia.
• C.28. Imad Al Shaikhli, Akram M. Zeki, Rusydi Makarim, and
Al-Sakib Khan Pathan, “Protection of Integrity and Ownership
110
of PDF Documents Using Invisible Signature”, UKSim 14th In-
ternational Conference on Computer Modelling and Simulation
(UKSim2012), Cambridge University (Emmanuel College), March
28-30, 2012, UK, pp.533-537.
• C.27. Xianglin Wei, Tarem Ahmed, Ming Chen, and Al-Sakib
Khan Pathan, “PeerMate: A Malicious Peer Detection Algorithm
for P2P Systems based on MSPCA”, International Conference
on Computing, Networking and Communications (IEEE ICNC
2012), January 30 - February 2, 2012, Maui, Hawaii, USA, pp.
815-819. (acceptance rate: 35%)
• C.26. Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-
Sakib Khan Pathan, “Intruder Detection in Camera Networks
using the One-Class Neighbor Machine”, American Telecommu-
nications Systems Management Association (ATSMA), Network-
ing and Electronic Commerce Research Conference 2011 (NAEC
2011), October 13-16, 2011, Riva del Garda, Italy, pp. 115-118.
[ Invited Paper]
• C.25. Leopoldo Estrada-Vargas, Homero Toral-Cruz, Al-Sakib
Khan Pathan, and Deni Torres-Román, “A Generator of Cauchy-
distributed Time Series with Specific Hurst Index”, American
Telecommunications Systems Management Association (ATSMA),
Networking and Electronic Commerce Research Conference 2011
(NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp.
8-14. [Invited Paper]
• C.24. Mohammad Moshee Uddin, Shariq Haseeb, Mohiuddin
Ahmed, and Al-Sakib Khan Pathan, “Comprehensive QoS Analy-
sis of MIPL Based Mobile IPv6 Using Single VS.Dual Interfaces”,
Proceedings of 1st International Conference on Electrical, Con-
trol and Computer Engineering 2011 (IEEE InECCE 2011), June
21-22, 2011, Kuantan, Pahang, Malaysia, pp. 388-393.
• C.23. Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A
Survey on SQL Injection: Vulnerabilities, Attacks, and Preven-
tion Techniques”, (Poster) Proceedings of The 15th IEEE Sym-
posium on Consumer Electronics (IEEE ISCE 2011), June 14-17,
2011, Singapore, pp. 468-471.
• C.22. Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Shariq
Haseeb, and Mohiuddin Ahmed, “A Test-Bed Analysis for Seam-
less MIPV6 Handover in Heterogeneous Environment”, Proceed-
ings of The 15th IEEE Symposium on Consumer Electronics
(IEEE ISCE 2011), June 14-17, 2011, Singapore, pp. 89 - 94.
• C.21. Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-
Sakib Khan Pathan, Ariff Abdullah, Shariq Haseeb, and Omar
111
Al-Mushayt, “Performance Analysis of a Highly Available Home
Agent in Mobile Networks”, Proceedings of 14th Communica-
tions and Networking Symposium (CNS 2011) with SpringSim’11,
April 4-7, 2011, Boston, MA, USA, pp. 62-70.
• C.20. Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan,
“An Enhanced Tree-based Key Management Scheme for Secure
Communication in Wireless Sensor Network”, Proceedings of the
3rd IEEE International Workshop on Internet and Distributed
Computing Systems (IDCS’10) in conjunction with the 12th IEEE
International Conference on High Performance Computing and
Communications (HPCC 2010) September 01-03, 2010, Melbourne,
Australia, pp. 671-676.
• C.19. Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-
Sakib Khan Pathan, “Demo Abstract: ViSiM, A MANET Rout-
ing Simulation Demonstration Tool for Naive Users”, The 29th
IEEE Conference on Computer Communications (IEEE INFO-
COM 2010), March 15-19, 2010, San Diego, CA, USA. [Paper in
Demo Session]
• C.18. Al-Sakib Khan Pathan and Choong Seon Hong, “Bilinear-
Pairing-Based Remote User Authentication Schemes Using Smart
Cards”, Proceedings of the Third International Conference on
Ubiquitous Information Management and Communication (ACM
ICUIMC 2009), ACM SIGKDD and ACM SIGMOD, January 15-
16, 2009, SKKU, Suwon, Korea, pp. 366-371.
• C.17. Al-Sakib Khan Pathan and Choong Seon Hong, “Feasibil-
ity of PKC in Resource-Constrained Wireless Sensor Networks”,
Proceedings of the IEEE International Workshop on Internet
and Distributed Computing Systems (IEEE IDCS’08) in con-
junction with 11th IEEE ICCIT’08, December 24, 2008, Khulna,
Bangladesh, pp. 13-20. (acceptance rate: 25.45%)
• C.16. Muhammad Mostafa Monowar, Md. Obaidur Rahman,
Al-Sakib Khan Pathan, and Choong Seon Hong, “Congestion
Control Protocol for Wireless Sensor Networks Handling Prior-
itized Heterogeneous Traffic”, Proceedings of the 2nd Interna-
tional Symposium on Security and Multimodality in Pervasive
Environments (SMPE’08) Workshop in conjunction with MobiQ-
uitous 2008, July 21-25, 2008, Trinity College Dublin, Ireland,
2008. (acceptance rate: 24%)
• C.15. Al-Sakib Khan Pathan and Choong Seon Hong, “Crypt-
analysis of Yang-Wang-Chang’s Password Authentication Scheme
with Smart Cards”, Proceedings of the 10th International Con-
ference on Advanced Communication Technology (IEEE ICACT
112
2008), Volume III, February 17-20, 2008, Phoenix Park, Korea,
pp. 1618-1620.
• C.14. Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong
Seon Hong, “Securing U-Healthcare Sensor Networks using Public
Key Based Scheme”, Proceedings of the 10th International Con-
ference on Advanced Communication Technology (IEEE ICACT
2008), Volume II, February 17-20, 2008, Phoenix Park, Korea,
pp. 1108-1111.
• C.13. Al-Sakib Khan Pathan, Gihyuk Heo, and Choong Seon
Hong, “A Secure Lightweight Approach of Node Membership
Verification in Dense HDSN”, Proceedings of the IEEE Military
Communications Conference (IEEE MILCOM 2007), October 29-
31, Orlando, Florida, USA, p. 99 (CD).
• C.12. Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung
Goo Choi, and Choong Seon Hong, “An Efficient PKC-Based Se-
curity Architecture for Wireless Sensor Networks”, Proceedings
of the IEEE Military Communications Conference (IEEE MIL-
COM 2007), October 29-31, Orlando, Florida, USA, p. 72 (CD).
[This article received IEEE Student Travel Grant Award]
• C.11. Brian J. d’Auriol, Nguyen Thi Thanh Tuyen, Vo Quoc
Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, S.M.K.R.
Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan,
Sunghyun Kim, Shu Lei, Sakib Pathan, Tran Van Phuong, Sungy-
oung Lee and Young-Koo Lee, “Embedded Processor Security”,
Proceedings of the 2007 International Conference on Security and
Management (SAM’07), June 25-28, Las Vegas, Nevada, USA,
pp. 591-594.
• C.10. Al-Sakib Khan Pathan and Choong Seon Hong, “An Im-
proved Timestamp-Based Password Authentication Scheme with
Two-Party Verification using Smart Cards”, Proceedings of the
9th International Conference on Advanced Communication Tech-
nology (IEEE ICACT 2007), Volume I, February 12-14, 2007,
Phoenix Park, Korea, pp. 804-809.
• C.09. Al-Sakib Khan Pathan, Choong Seon Hong, and Tatsuya
Suda, “A Novel and Efficient Bilateral Remote User Authentica-
tion Scheme Using Smart Cards”, Proceedings of the 2007 IEEE
International Conference on Consumer Electronics (IEEE ICCE
2007), January 10-14, Las Vegas, USA, pp. 1-2. (acceptance rate:
41.9%)
• C.08. Al-Sakib Khan Pathan and Choong Seon Hong, “Devel-
oping an Efficient DMCIS with Next-Generation Wireless Net-
works”, Proceedings of the IEEE Military Communications Con-
113
ference (IEEE MILCOM 2006), October 23-25, Washington, DC,
USA, p. 92 (CD). [This article received IEEE Student Travel
Grant Award]
• C.07. Al-Sakib Khan Pathan and Choong Seon Hong, “Secure
Clustering in DSN with Key Predistribution and WCDS”, Pro-
ceedings of the IEEE Military Communications Conference (IEEE
MILCOM 2006), October 23-25, Washington, DC, USA, p. 93
(CD).
• C.06. Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon
Hong, “An Efficient LU Decomposition-based Key Pre-distribution
Scheme for Ensuring Security in Wireless Sensor Networks”. Pro-
ceedings of the 2006 IEEE International Conference on Computer
and Information Technology (IEEE CIT 2006), September 20-22,
Seoul, Korea, 2006, pp. 227-232. (acceptance rate: 40%)
• C.05. Al-Sakib Khan Pathan, Choong Seon Hong, and Hyung-
Woo Lee, “Towards Developing Smart Environment using Wire-
less Sensor and Ad Hoc Networks”, Accepted as Poster in the
International Conference on Computational Science and its Ap-
plications 2006, Glasgow, Scotland (UK), ICCSA 2006 (IEE),
May 8-11, 2006.
• C.04. Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon
Hong, “Security in Wireless Sensor Networks: Issues and Chal-
lenges”, Proceedings of the 8th International Conference on Ad-
vanced Communication Technology (IEEE ICACT 2006), Vol-
ume II, 20-22 February, Phoenix Park, Korea, 2006, pp. 1043-
1048. [This article was included in IEEE Communications Soci-
ety’s (IEEE ComSoc) Best Readings Topics on Communications
and Information Systems Security, 2013 under the category of
“Wireless Sensor Networks”]{This article has got 401 citations as
of 13 September, 2016 according to Google Scholar}
• C.03. Al-Sakib Khan Pathan, Choong Seon Hong, and Hyung-
Woo Lee, “Smartening the Environment using Wireless Sensor
Networks in a Developing Country”, Proceedings of the 8th In-
ternational Conference on Advanced Communication Technology
(IEEE ICACT 2006), Volume I, 20-22 February, Phoenix Park,
Korea, 2006, pp. 705-709.
• C.02. Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit An-
jum Sayeed, Farruk Ahmed, and Choong Seon Hong, “A Frame-
work for Providing E-Services to the Rural Areas Using Wireless
Ad Hoc and Sensor Networks”, Proceedings of the First Interna-
tional Conference on Next-Generation Wireless Systems (IEEE
ICNEWS 2006), 2-4 January, Dhaka, Bangladesh, 2006, pp. 282-
286.
114
• C.01. Al-Sakib Khan Pathan, Md. Mahbub Alam, Md. Mostafa
Monowar, and Md. Forhad Rabbi, “An Efficient Routing Proto-
col for Mobile Ad Hoc Networks with Neighbor Awareness and
Multicasting”. Proceedings of IEEE E-Tech, pp. 97-100, Karachi,
Pakistan, 31 July, 2004.
115
1. Name: Shahriar Manzoor
3. Degrees obtained:
University Degree Field of Special-
ization
Bangladesh University of En- BSc CSE
gineering and Technology
116
Year Organization Project
Amount re-
ceived
2006-2009 Was involved with Did not receive
edujudge project any direct fund
http://www.edujudge.eu/ .It
is a joint project of European
Commission and CEDETEL
(http://www.cedetel.es/ ).
7. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
3 3
Publications List:
International Journal:
117
• “Competitive Learning in Informatics: The UVa Online Judge
Experience”, Miguel A. REVILLA, Shahriar MANZOOR, Rujia
LIU, published in OLYMPIADS IN INFORMATICS, 2008, Vol.
2, 131-148
• “Common Mistakes in Online and Real-time Programming Con-
tests” – published in ACM Magazine Crossroads August 2001
Edition and republished in Summer 2008 edition.
International Conference:
118
1. Name: Md. Ashiqur Rahman
3. Degrees obtained:
University Degree Field of Special-
ization
North South University M.Sc. Computer Science
& Engineering.
American International Uni- B.Sc. Computer Engi-
versity – Bangladesh neering
5. Publications:
Papers Pub- Papers presented in Review Pa-
lished in Conferences pers
Refereed Jour-
nals
5 3 N/A
6. Membership of Scientific and Professional Societies: Institution of En-
gineers, Bangladesh, M – 31249
Publications List:
International Journal:
119
• Md. Ashiqur Rahman, M. Rashedur Rahman, “CAPM Indexed
Hybrid E-Negotiation for Resource Allocation in Grid Comput-
ing”, IJGHPC, Volume 5, Issue 2. 2013, IGI, ISSN: 1938-0259
• Md. Ashiqur Rahman, Roksana Akter, M. Rashedur Rahman,
“Fuzzy-Logic Based Self Adaptive Grid Architecture”, Journal of
Computing (JOC), Vol. 3, Issue 6, June 2011, ISSN: 2151-9617.
• Md. Ashiqur Rahman, Shaffat Sheik Giasuddin, M. Rashuedur
Rahman, “Decision Tree Based Routine Generation (DRG) Al-
gorithm: A Data Mining Advancement to Generate Academic
Routine and Exam-time Tabling for Open Credit System”, Jour-
nal of Computers (JCP), Vol. 5, No. 1, Academy Publisher (AP
Journal), 2010.
• Mohammad Shahidul Karim, Md. Ashiqur Rahman, Abul Kalam
Azad, “Discovering Models from Event-Based Data Basis on a
Survey of Issues and Application”, WeST 2010, Springer.
• Abul Kalam Azad, Md. Ashiqur Rahman, Subrata Kumar Aditya,
“Estimation of the Maximum Power and the Normal Operating
Power of a PV Module using Artificial Neural Network”, Vol. 1
No. 1, SEUJSE, 2008, ISSN 1999-1630
• Md. Ashiqur Rahman, Shaffat S. Giasuddin, M. Shamim, Abul
Kalam Azad, “Hardware Implementation for Data Encryption
Standard using VerilogHDL”, Vol. 1 No. 1, SEUJSE, 2008, ISSN
1999-1630
International Conference:
120
1. Name: Roksana Akter
International Journal:
121
• Roksana Akter, M. Lufar Rahman; “A Geometric Model to Re-
duce Interference Computations in Simulation of Large Ad hoc
Networks”. Journal of Networks by Academy Publisher; Vol 6,
No 1, Jan 2011; ISSN 1796-2056, page: 46-53. IEEE Xplored.
• Roksana Akter, M. Lufar Rahman; “Simulation of Large Ad hoc
Networks: Reducing Complexity of Interference Computations
through Adaptive Node Grouping.” Journal of the Bangladesh
Electronics Society; Volume 9, Number1-2, June-December 2009,
ISSN: 1816-1510; page: 01-08.
• Roksana Akter, M. Lufar Rahman; “Minimal Rectangle Approach:
A Dynamic Range Selection Model for Node Discovery in Sim-
ulating Large Mobile Ad-hoc Networks.” Southeast University
Journal of Science & Engineering (SEUJSE), volume 1, issue 1,
2008. ISSN: 1999-1630; page: 1-8.
• M. Lutfar Rahman, Farzana Yasmeen, Roksana Akter; "Com-
parative Study of the AODV, DSDV and DSR Wireless Ad-Hoc
Network Routing Protocols". Journal of The People’s Univer-
sity of Bangladesh, Volume 3, Number 1, Janury 2008. ISSN:
1812-4747; pp. 40-59
• Md. Minhajul Abedin, Roksana Akter, Shah Mostafa Khaled,
Md. Rashedul Bari; “A Low Cost Effective Leader Election Al-
gorithm based on AODV.” Journal of Computer Science; IBAIS
University. Volume 1 Number 2, December 2007. Page: 45-52.
International Conference:
122
1. Name: Rezwan-Al-Islam Khan
3. Degrees obtained:
University Degree Field of Specialization
Independent Univer- M. Sc. Telecommunication Engi-
sity Bangladesh neering
Independent Univer- B. Sc. (Hons.) Computer Science
sity Bangladesh
6. Publications:
Papers Published in Papers pre- Review Papers
Refereed Journals sented in Con-
ferences
05 03 01
123
• Chancellor’s Gold Medal 2006 for Master of Science in Telecom-
munication Engineering
• "Magna Cum Laude" Bachelor of Science (Honors) in Computer
Science
124
1. Name: Md. Mijanur Rahman
3. Degrees obtained:
University Degree Field of Specialization
Islamic University of Ph.D. Computer Science and Engi-
Technology (Ongoing) neering
East West University M.Sc. Computer Science and Engi-
neering
East West University B.Sc. Computer Science and Engi-
neering
6. Publications:
Papers Published in Papers presented in Books
Refereed Journals Conferences
08 02 07
125
• Merit scholarship for the year 2005-2006, East West University
• ND place in an Intra University Programming Contest organized
by EWU
• 1st place for English speech competition organized by EWUECC.
• 2nd NC Intra College Debating Championship, 2001.
• Member of ACM (Association for Computing Machinery).
• Moderator of APPSO (Mobile Apps Development), Department
of SWE, Daffodil International University, 2013
• Summit on Leadership and Entrepreneurship, Dhrubotara, 2013
• Key Speaker of Outsourcing Workshop, DIU, Department of SWE,
Daffodil International University, 2012
Publications List:
Books:
International Journal:
126
• Md. Mijanur Rahman , Subarata Chandra Talukder; "Customer
requirements oriented component based software development life
cycle model"; IEEE - 2015 International Conference on Comput-
ers, Communications and System (ICCCS), ISBN: 978-1-4673-
9756-8, 2015
• Md. Mijanur Rahman , Md. Alamgir Kabir; "A Survey on Secu-
rity Requirements Elicitation and Presentation in Requirements
Engineering Phase"; American Journal and Engineering Research
(AJER), PP 360-366, Volume 2, Issue 12, 2013, USA;
• Md.Mijanur Rahman, Md.NazimUddin, Sujan Chandra Sarker;
"Abrupt Software Cost Estimation Technique Based on Basic Re-
quirement"; International Journal of Research in Computer and
Communication Technology (IJRCT) ISSN: 2278-5841, 2015
• Shariful Islam Majumdar, Md. Mijanur Rahman, Md. Saidur
Rahman; "Stakeholder Prioritization in Requirement Engineering
Process: A Case Study on School Management System"; Scientific
Academic Publishing, USA ISSN: 2163-1484, 2014
• Shariful Islam Majumdar, Md. Mijanur Rahman, Md. Saidur
Rahman; "Thorny Issues of Stakeholder Identification and Prior-
itization in Requirement Engineering Process"; IOSR Journal of
Computer Engineering (IOSR-JCE), 2013
• Md. Mijanur Rahman1, Kazi Imdadul Islam2, Tapushe; "Adapt-
ing Social Network to Make Effective Class Room Learning: A
Case Study Facebook"; IOSR Journal of Research Method in
Education, 2013
• Md. Mijanur Rahman and Shamim Ripon; "Eliciting and Model-
ing Non-Functional Requirements-A POS Case Study"; Interna-
tional Journal of Future Computer and Communication (IJFCC),
Singapore, Vol.2(5):485-489 ISSN: 2010-3751, 2013
• Md. Mijanur Rahman , Md. Alamgir Kabir and Md. Ismail
Jabiullah; "Model for Identifying the Security of a System: A
Case Study of Point of Sale System"; International Organization
of Scientific Research (IOSR)-Journal of Computer Engineering
(IOSR-JCE), Volume 11, Issue 6 (May. - Jun. 2013), PP 75-82,
2013
International Conference:
127
• Md. Mijanur Rahman and Subarata Chandra Talukder, "Cus-
tomer Requirements Oriented Component based Software De-
velopment Life Cycle Model", 2015, International Conference on
Computers, Communications, and Systems
128
1. Name: Monirul Hasan
3. Degrees obtained:
University Degree Field of Specialization
University of Manitoba Master of Sci- Computer Science
ence (course
work com-
pleted)
North South University Bachelor of Computer Science
Science
129
6. Publications:
Papers Published in Papers pre- Review Papers
Refereed Journals sented in
Conferences
1 3 N/A
Publications List:
International Journal:
International Conference:
130
• Christel Kemke, Richard Galka and Monirul Hasan, “Towards an
Intelligent Interior Design System”, Workshop "Intelligent Vir-
tual Design Environments (IVDEs)", at the Second International
Conference on Design Computing and Cognition (DCC-06), 9
July 2006, Eindhoven, The Netherlands.
131
1. Name: Md. Rakibul Hasan
3. Degrees obtained:
University Degree Field of Special-
ization
Bangladesh University of Engineer- M. Phil Applied Mathe-
ing and Technology (BUET) ( Continu- matics
ing)
University of Dhaka M.S. Applied Mathe-
matics
University of Dhaka B.Sc. Mathematics
5. Publications:
Papers Published in Papers presented in Review Pa-
Refereed Journals Conferences pers
3 2 N/A
Publication List:
International Journal
132
• Md. Rakibul Hasan, “Some Characterization of Neutral n-ideals
andDistributive n-ideals of a Lattices”, Annals of Pure and Ap-
plied Mathematics, Vol. 10, No.2, 2015, 141-146, ISSN: 2279-
087X (P), 2279-0888(online), August 2015
• Md. Rakibul Hasan, “A Singular Non-Linear Boundary Value
Problem Arising in the Boundary Layer flow”, SEU Journal of
Science and Engineering, Vol. 9, No. 1-2, December 2015, pp.
14-17.
International Conference
133
1. Name: MD. Hasan Tareque
3. Degrees obtained:
University Degree Field of Spe-
cialization
Bangladesh University of En- M.Sc. in Computer Wireless & Ad-
gineering and Technology Science & Engineer- hoc networks
(BUET) ing (Course work com-
pleted)
Military Institute of Science B.Sc. in Computer Computer Sci-
& Technology (MIST) Science & Engineering ence & Engi-
neering
134
8. Honours and Awards:
Publication List:
International Journals
135
• S. A. Hasan, Md. Hasan Tareque, Fatema Tuz Zohra, Com-
parison among Different Routing Protocols of Vehicular Ad Hoc
Networks, Global Journal of Computer Science and Technology
Network, Web & Security (GJCST), Vol.13, Issue 17, pp. 22-28,
November-December 2013.
International Conferences:
Review Papers
136
1. Name: Mohammad Ashraful Hoque
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
London South Bank Univer- M.Sc. in Computer Net-
sity, UK Computer works & Telecom-
Networks munication Engi-
& Telecom- neering
munication
Engineering
Ahsanullah University of Sci- B.Sc. in Computer Science
ence and Technology Computer and Engineering
Science and
Engineering
5. Publications:
Papers Published in Papers presented Review Papers
Refereed Journals in Conferences
4 N/A N/A
137
Publication List:
International Journal
138
1. Name: Rajon Bardhan
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
Ahsanullah University of Sci- B. Sc Computer Science
ence & Technology and Engineering
5. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
N/A 3 N/A
139
• Participated in seminar titled “The Role of Programming Con-
tests in Shaping up Career in CSE” at Southeast University.
• Participated in seminar titled “Digital Bangladesh: Vision 2021”
at Southeast University.
Publications List:
International Journal
140
1. Name: Md Tawseef Alam
3. Degrees obtained:
University Degree Field of Special-
ization
Ahsanullah University of Sci- B.Sc. in Software Engineer-
ence and Technology Computer ing
Science and
Engineering
6. Publications:
Papers Published in Papers presented Review Papers
Refereed Journals in Conferences
N/A N/A N/A
141
• Dean’s Merit Award in B.Sc. from Ahsanullah University of Sci-
ence and Technology in 2013.
142
1. Name: Mou Mahmood
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
Karlsruhe Institute of Tech- Masters in En- Electrical Energy
nology (KIT), Germany ergy Technolo- and High Voltage
gies Technology
Universidade de Lisboa (Uni- Masters in En- Renewable Energy
versity of Lisbon, Portugal) ergy Engineer-
ing and Man-
agement
Ahsanullah University of Sci- B.Sc. in Elec- Power and Commu-
ence and Technology (AUST) trical and nication
Electronic
Engineering
(EEE)
4. Employment record (starting from present position):
University/College Designation Period
Southeast University Lecturer October, 2015 to till
date
5. Employment record (starting from present position):
143
7. Honours and Awards:
Publication List:
International Journal:
International Conference:
144
1. Name: Maksuda Rabeya
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
University of Dhaka M. Sc Computer Science
and Engneering
University of Dhaka B. Sc Computer Science
and Engneering
145
1. Name: Md. Shohel Babu
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
Jahangirnagar University M.Sc Mathematics
Jahangirnagar University B.Sc Mathematics
5. Publications:
Papers Published in Papers presented in Review Pa-
Refereed Journals Conferences pers
2 N/A N/A
Publication List:
International Journal:
146
• Md. Shohel Babu, Dr. Abeda Sultana, Md. Abdul Alim, “Con-
tinuous Functions as the Generators of T-norms”, IOSR Jour-
nal of Mathematics (IOSR-JM) e-ISSN: 2278-5728, p-ISSN: 2319-
765X. Volume 11, Issue 2 Ver. I (Mar - Apr. 2015), PP 35-38
147
1. Name: Shifat Ahmed
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
Jahangirnagar University M.S Mathematics
Jahangirnagar University BSc(Hons) Mathematics
5. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
04
Publication List:
International Journal:
148
• Md. Shafiqul Islam, Md. Saiduzzaman, Sobuj Kumar Ray, Shi-
fat Ahmed, Professor Dr. Laek Sazzad Andallah : “A NUMER-
ICAL EXPERIMENT ON BURGER’S EQUATION” , Interna-
tional Journal of Scientific amp; Engineering Research, Volume
5, Issue 4, April-2014, ISSN 2229- 5518.
• Shifat Ahmed : “AN APPROACH TO MAXIMIZE PROFIT OF
A CONSTRUCTING PROJECT WITHIN LIMITED BUDGET
BY USING SIMPLEX METHOD”, International Journal of Sci-
entific amp; Engineering Research, Volume 6, Issue 11, November
- 2015, ISSN 2229-5518.
• Shifat Ahmed : “SENSITINITY ANALYSIS OF A LARGE CON-
STRUCTING PROJECT”, International Journal of Advanced
Research and Review, Volume 1, Issue 4, April-2016, ISSN 2455-
7277.
• Md. Shohel Babu, Shifat Ahmed : “FUNCTION AS THE GEN-
ERATOR OF PARAMETRIC T-NORMS”, American Journal of
Applied Mathematics, 2017; 5(4): 114 - 118, doi: 10.11648/j.ajam.20170504.13,
ISSN: 2330-0043 (Print); ISSN: 2330-006X (Online).
149
1. Name: Md. Moshiur Rahman
3. Degrees obtained:
University Degree Field of Special-
ization
Ahsanullah University of Sci- Bachelor of Electronics, De-
ence and Technology Science in vices and Nan-
Electrical and otechnology
Electronic
Engineering
5. Publications:
Papers Published in Papers presented in Review
Refereed Journals Conferences Papers
1 N/A N/A
Publication List:
International Journal:
150
• Performance Analysis of Current Ratio under Different Dielec-
tric Constant for Carbon Nano Tube Field Effect Transistor- Md.
Moshiur Rahman, Md. Motiur Rahman Sagar, Shafkat Tasnim,
Mohammad Farhan, Md. Tahmidur Rahman-International Jour-
nal of Advanced Research in Computer and Communication En-
gineering, Vol. 5, Issue 1, January 2016.
151
1. Name: Kimia Aksir
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
University of Greenwich, UK MSc Bigdata and Busi-
ness Intelligence
American International BSc Computer Science
University- Bangladesh and Engineering
6. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
N/A N/A N/A
152
• Took part in the workshop on Project Development and Manage-
ment organized by CMS department of University of Greenwich
for the year 2015.
153
1. Name: Mahbub Hasan
2. Designation: Lecturer
3. Degrees obtained:
University Degree Field of Special-
ization
Southeast University BSc in CSE Software engineer-
ing and implemen-
tation
6. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
N/A N/A N/A
154
1. Name: M. Saiful Bari
5. Publications:
Papers Published in Papers presented in Review Papers
Refereed Journals Conferences
1 N/A N/A
155
• “Human Expedition on Mars Timeline 2018” – MD. Wasif Za-
man, Fahad Al Mamun, Faisal Hussain, M. Saiful Bari, MD. Ab-
dullah Al Joha, MD. Muhtady Muhaisin, Mohammad Abdullah
Matin Khan, Muhammad Usama Islam, Raihan Uddin Ahmed ,
Shabab Bin Karim, Tanzil Bin Hassan. Inspirational Mars Design
Contest. Mars society online journal. DOI:10.13140/RG.2.1.2908.4563
156
1. Name: Badhan Das
2. Designation: Lecturer
157
1. Name: Sadman Sakib
2. Designation: Lecturer
158
1. Name: Md. Siyam Sajeeb Khan
2. Designation: Lecturer
5. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
1 N/A N/A
159
Publication List:
International Journal:
160
1. Name: Ishrat Jahan
2. Designation: Lecturer
161
1. Name: A.S.M. Ahsan-Ul-Haque
2. Designation: Lecturer
162
1. Name: Raghad Rowaida
2. Designation: Lecturer
3. Degrees obtained: Bachelor of Science
University Degree Field of Specialization
Bangladesh University M. Sc. ICT
of Engineering and
Technology (BUET)
Ahsanullah Univer- B. Sc. CSE
sity of Science and
Technology
4. Employment record (starting from present position):
University/College Designation Period
Southeast University Lecturer May 2018 - Present
Bangladesh Univer- Lecturer 1 October 2014 - 14 May
sity of Business and 2018
Technology
5. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
2 N/A N/A
Publication List:
International Journal:
163
• 1. Raghad Rowaida and Afsana Ahmed Munia, ‘A New Ranking
Algorithm for a Round-Robin Tournament’, Global Journal of
Computer Science and Technology, Volume 17 Issue 2 Version
1.0 Year 2017, pp.31-33
• Sheikh Tania and Raghad Rowaida, ‘A Comparative Study of
Various Image Filtering Techniques for Removing Various Noisy
Pixels in Aerial Image’, International Journal of Signal Process-
ing, Image Processing and Pattern Recognition (IJSIP), SERSC,
2016, Vol.9, No.3 (2016), pp.113-124
164
1. Name: Anurata Prabha Hridi
2. Designation: Lecturer
3. Degrees obtained: Bachelor of Science
University Degree Field of Specialization
Bangladesh University Bachelor of Computer Science and
of Engineering and Science Engineering
Technology
4. Employment record (starting from present position):
University/College Designation Period
Southeast University Lecturer May 2018 - Present
Reve Systems Limited Junior Soft- November 2017 - May
ware Engineer 2018
5. Publications:
Papers Published in Papers presented Review Pa-
Refereed Journals in Conferences pers
N/A 2 N/A
165
• 1st Runners up in Intra Varsity Idea Contest 2015 organised by
Dept of CSE, BUET.
• ’Best Girl 2010’ of Viqarunnisa Noon School and College for over-
all outstanding performance.
Publication List:
International Conferences:
166
5.2 Various Committees of CSE Department
167
Committee Members Terms of Reference
Name
[KMH] Monirul Hasan 1. To assess the applications of
the waiver wanting students
Course Waiver [RB] Rajon Bardhan 2. To select eligible students
Committee for waiver
[RBH] Md. Rakibul Hasan
[SM] Shahriar Manzoor 1. To prepare a document on
the basis of the applications of
the tuition waiver seeking stu-
dents and send it to exam of-
fice
[KMH] Monirul Hasan
Tuition Waiver [RAJ] Roksana Akter Jolly
Committee [RBH] Md. Rakibul Hasan
Admission [SM] Shahriar Manzoor 1. Dedicated to set admission
Test test questions
Committee [SBB] Md. Shohel Babu 2. To take admission test
3. To check the exam scripts
4. To prepare the result of the
admission test
Course [SM] Shahriar Manzoor
Distribution [KMH] Monirul Hasan 1. To distribute courses
Committee among the faculties according
to their expertise, preference
and student’s feedback
[KMH] Monirul Hasan 1. To prepare the class rou-
tine with an automated rou-
tine generator
Class & Exam [SM] Shahriar Manzoor 2. To prepare exam schedule
Scheduling
Committee
[RB] Rajon Bardhan 3. Assignment of invigilation
duties by the Chairman
168
for the students. In total, there are 8 labs. The browsing lab is always
open to the students. Students can access other 7 labs for practising, given
the availability of the labs, and in the presence of a Lab Assistant, who is
responsible for maintaining the lab. All of the labs are air conditioned, facil-
itated with multimedia access and updated with almost all possible modern
tools and softwares.
169
6
Vision:
The vision of this club is to make an impact on the total department to grow
the club in active members count and inspire them to participate more in
various activities. And with such activities of the club we shall spread the
name of our department to the world.
Mission:
Mission of this club will be to arrange one big event in each semester from
the list below to keep the club and i’s members active:
• Animation Contest
170
• Math Olympiad
• Idea Contest
Moderators:
[HT] Hasan Tareque
Senior Lecturer, Department of CSE.
171
7
172
7.1 Course Registration Flow Chart
173
7.2 Academic Adviser
A faculty member of the department of CSE is assigned to a group of stu-
dents. He/she works as an academic adviser for those students. Students
can consult him/her for academic purposes like course registration, adding
or dropping courses. The students can also seek advises regarding non-
academic matters such as choosing career paths, learning other skills that
will help him/her in the long run and others. To summarize, academic
adviser acts as a guide for the students.
a) The student will have to pay full registration fee for the re-taken course.
b) The student will be required to attend the classes, submit the assign-
ments, and appear at the Mid Term and Final examinations.
174
approved by the Chairman/Director of the department/program.
d) Grade "I" (Incomplete Result) will remain valid for one semester. Af-
ter one semester the "I" grade will be treated as a "F" grade and the student
will have to take the course as Re-take on payment of full registration fee.
e) Medical certificate, in general, will not be accepted for giving and "I"
(Incomplete) grade. Only then the course teacher will be satisfied at the
ground shown by the student and the documents presented by him, a stu-
dent may be allowed "I" Grade with the approval of the Chairman/Director.
Course Duration
14 weeks (3.5 months)
• Identify the lacks in the previous works and suggest possible improve-
ments
Research Types
175
1. The study of what is possible – and its scope and limits including
both mathematical and less formal modes of theories
Methodology of Research
• The assigned supervisor must keep the record of the progress of se-
lected research work
• The supervisor must proof read the research report before final sub-
mission
Paper
For report examination, high-quality, long lived white A4 sized paper must
be used. Three ‘hard bound’ copies to be provided to the department for
distribution to examiners at least 2 working days prior to the final presenta-
tion. Students must also submit a soft copy of the report to the department
chair.
176
Typeface
Type size should be at least 10 points. Students must not use script, or
ornamental forms. Print must be letter quality or near letter quality with
dark black characters that are consistently clear, crisp and easy to read.
Margins
Margins on the binding side (left edge) must be 4 cm; all other margins
must be 2.5 cm. Headers and/or footers must be placed within the 2.5 cm
margin, Pagination must be placed 1.25 cm from bottom of page.
Spacing
One and a half or double spacing is required in the main body of the
manuscript except where conventional usage calls for single spacing; e.g.,
footnotes, indented quotations, tables etc.
Language
The report must be in English.
Binding, Order and Content
1. Binding
(a) Soft binding only is required for report examination by the su-
pervisor.
(b) Full/hard binding is required for final submission ie, (after exam-
ination and/or emendations).
(c) Students must submit three copies in black cover with gold let-
tering on the spine and the cover.
2. Preliminary Pages
177
(g) List of Illustrations/figures, with titles and page references.
3. Text
(a) Introduction
(b) Main body, with the larger divisions and more importantly sub-
divisions indicated by suitable chapter (suggested chapter head-
ings can be found in the writing guideline sides in the appendix),
section and consistent headings
(c) Conclusion
(d) Appendices
(e) Bibliography or List of References
4. Pagination
Each page of the report except for the title, letter of transmittal and
certificate should be numbered. For the preliminary pages, use small
Roman numerals (i, ii, iii, iv, etc.). For the remainder of the report,
use continuous pagination for text, illustrations, images, appendices,
and bibliography, using Arabic numbers (1,2,3, etc.). The main body
must start with page 1, as this is not a continuation of the Roman
numeral numbering.
5. Images and Graphs
All images and graphs should be of professional quality. If it is not
their own work students must provide full reference to the source.
6. Scholarly Reference
The report should follow the reference prescribed for IEEE Transac-
tions.
Guidelines for Students
• Research work can be done in a group of at most 3 students
• The research work must be completed within the semester (14 weeks)
• Every student must contact with the supervisor at least twice a week
with updates about the researches
• Each group of student must submit 3 copies of the final report within
the deadline announced
• Each group of student must present their research twice – once as a
midterm presentation to show progress of the research midway through
the semester, and finally at the end of the semester to present their
final findings
• Any kind of unethical practices and plagiarism is strictly prohibited
178
Evaluation Policy
Grading Scheme for the Report
The report will receive straight zero if
• it is not submitted 2 working days prior to the final presentation date
Item Marks(%)
Supervisor’s discretion
Attendance 10
Knowledge about the topic 20
Interview panel’s marks
Midterm presentation 20
Final presentation 10
Knowledge about the topic & Q/A 20
Report (Marks obtained as per the previous table 20
Total 100
179
final grade of the course will be awarded as per UGC rules:
7.4.2 Project
Details of Project and Guidelines
Course Description
This course introduces the students to carry out project implementation in
the particular area of choice. The students will do implement a substantial
piece of work – be it a software tool or hardware device to solve some real
life problem.
Course Duration
14 weeks (3.5 months)
Methodology of Project
180
• Department will announce the supervisor assignment for students
• The assigned supervisor must keep the record of the progress of se-
lected project work
• The supervisor must proof read the project report before final submis-
sion
Paper
For report examination, high-quality, long lived white A4 sized paper must
be used. Three ‘hard bound’ copies to be provided to the department for dis-
tribution to examiners at least 2 working days prior to the final presentation.
Students must also submit a soft copy of the report to the department chair.
Typeface
Type size should be at least 10 points. Students must not use script, or
ornamental forms. Print must be letter quality or near letter quality with
dark black characters that are consistently clear, crisp and easy to read.
Margins
Margins on the binding side (left edge) must be 4 cm; all other margins
must be 2.5 cm. Headers and/or footers must be placed within the 2.5 cm
margin, Pagination must be placed 1.25 cm from bottom of page.
Spacing
One and a half or double spacing is required in the main body of the
manuscript except where conventional usage calls for single spacing; e.g.,
footnotes, indented quotations, tables etc.
181
Language
The report must be in English.
1. Binding
(a) Soft binding only is required for report examination by the su-
pervisor.
(b) Full/hard binding is required for final submission ie, (after exam-
ination and/or emendations).
(c) Students must submit three copies in black cover with gold let-
tering on the spine and the cover.
2. Preliminary Pages
3. Text
(a) Introduction
(b) Main body, with the larger divisions and more importantly sub-
divisions indicated by suitable chapter (suggested chapter head-
ings can be found in the writing guideline sides in the appendix),
section and consistent headings
(c) Conclusion
(d) Appendices
(e) Bibliography or List of References
4. Pagination
Each page of the report except for the title, letter of transmittal and
certificate should be numbered. For the preliminary pages, use small
Roman numerals (i, ii, iii, iv, etc.). For the remainder of the report,
use continuous pagination for text, illustrations, images, appendices,
and bibliography, using Arabic numbers (1,2,3, etc.). The main body
must start with page 1, as this is not a continuation of the Roman
numeral numbering.
182
5. Images and Graphs
All images and graphs should be of professional quality. If it is not
their own work students must provide full reference to the source.
6. Scholarly Reference
The report should follow the reference prescribed for IEEE Transac-
tions.
Guidelines for Students
• Project work can be done in a group of at most 3 students
• Under special recommendation by the Chairman of the department at
most 4 students can work in the same group
• The project work must be completed within the semester (14 weeks)
• Every student must contact with the supervisor at least twice a week
with updates about the researches
• Each group of student must submit 3 copies of the final report within
the deadline announced
• Each group of student must present their project twice – once as a
midterm presentation to show progress of the project midway through
the semester, and finally at the end of the semester to present their
final findings
• Any kind of unethical practices and plagiarism is strictly prohibited
Evaluation Policy
Grading Scheme for the Report
The report will receive straight zero if
• it is not submitted 2 working days prior to the final presentation date
• it is missing signature of the supervisor or the students on the letter
of transmittal and the certificate pages. By signing the report, the
student confirms that the report submitted is their work. As for the
supervisor, their signature is confirming that they have in fact reviewed
the report before submission and that they are accepting the work as
satisfactory.
• the report is plagiarized in parts or full. We expect that all figures
and tables (if not created by the students themselves) must be prop-
erly referenced. The text itself should not be copy/pasted from any
source, even if reference is properly cited. Students should be able to
paraphrase what they understood. Supervisor must ensure that the
students are complying with this expectation.
183
• soft copy of the report is not provided in pdf format.
The report review committee will grade the reports out of 20. A suggested
breakdown of the grading criteria is presented here:
Criteria Marks(%)
Document organization in chapters, 20
sections, subsections
Formatting 10
Originality of work 20
Grammar and writing style 20
Content of the report 20
Citation and References 10
Total 100
Grading Scheme for the Course
Students will be individually graded based on the following grading scheme:
Item Marks(%)
Supervisors discretion
Attendance 10
Knowledge about the topic 10
Interview panel’s marks
Midterm presentation 30
Final presentation 10
Knowledge about the topic & Q/A 20
Report 20
Total 100
The final grade of the course will be awarded as per UGC rules:
184
Format of Project Report
The Writing Guide presentation and output of Latex template are the same
as for the Research Methodology course.
7.4.3 Internship
Course Code: CSE433 or CSE4056
3 Credits
Course Goals
• An internship is a structured learning experience in a work setting
that enhances a student’s understanding of their career field of choice.
185
the clear examples of leadership styles that either promote good work-
ing relationships or hinder a productive working environment. They
will also learn how to handle pressure, tension and praise in work
relationships.
Course Schedule
This course has no particular schedule as the student can complete it within
one or two semester. But if the student wants to complete it within one
semester he is expected to collect forwarding letter from department within
first week, apply for internship and start internship within week two. Stu-
dent can also collect forwarding letter before the semester starts if he wants.
Schooling Method
• After the student applies for forwarding letter, the department will
issue him/her a forwarding letter and assign a supervisor for him.
• The respective supervisor will direct and assist the student to perform
his/her internship.
• The person who guides the student at internship site is named as co-
supervisor.
Internship Guidelines
• Every student must be regular and punctual in internship.
• Every student must submit 3 copies of final paper report within depart-
ment specified timeline. Students will also need to submit a softcopy
of their report (Preferably in PDF format).
• Every student must contact with supervisor at least once a week with
internship advancement.
186
Evaluation Policy
Basis Percentage
Internship Report 20%
Feedback from co-supervisor 20%
Presentation 40%
Viva 20
Total 100%
• Computer Control
• Internet of Things
• Information System
• Robotics Automation
• Computer Vision
• Image Processing
• Human-Computer Interaction
• Network Security
• Electronics
• Pattern Recognition
• VLSI Design
• Mobile Applications
187
• Others
3. Place your Paper Title, Paper Title and Authors’ names prominently
at the top of the poster to allow viewers to identify your paper easily.
1. Each poster must contain a title of the poster, name of group members,
university name and logo.
5. Any content of the poster should not negatively criticize any social
issue or any person
188
8
• Systems analyst
• Systems consultant
• Software engineer
• Systems programmer
189
• Database analyst
• Database administrator
• Systems administrator
• Management/IT consultants
• Network engineer/consultant
• Network administrator
• Computer scientist/researcher
• Data miner
• Bioinformatics specialist
190
• Animation/Special effects developer
• Multimedia developer
• Technical writer
• Systems integrator
• IT recruitment consultant
• IT sales professional
These are just a few examples. There are many more emerging and exciting
fields which the prospective graduates can choose for their career. Depart-
ment of CSE of SEU is up for the challenge, and always try to keep the
curriculum up to date so that the students can be ready to build their ca-
reer in whatever path they want. So, choosing CSE will be the smartest
choice one has made and if he/she works diligently, nothing but shiny days
are ahead.
191
192
9
193
194
195
196
10
Contact Address
A.R. Tower
24, Kamal Ataturk Avenue
7th floor to 12th floor
Banani, Dhaka-1213
Phone: +88029822040
Mobile: +8801718211738
197
Appendix A
198
Department of Computer Science & Engineering
SOUTHEAST UNIVERSITY
Submitted by
Abul Babul Kabul
ID: 1 ID: 2 ID: 3
Supervised by
Faculty Name
Rank, Department of CSE
Southeast University
The Chairman,
Department of Computer Science & Engineering,
Southeast University,
Banani, Dhaka.
Write a letter asking for permission to work on whatever you are working.
Thank you.
Abstract goes here. Abstract should stand on it’s own, without any references.
The abstract should not exceed 150 words.
i
Acknowledgements
Thanks everyone.
ii
Contents
Abstract i
Acknowledgements ii
List of Tables iv
List of Figures v
1 Introduction 1
1.1 Some section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Some subsection . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Another section . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Literature Review 2
3 Problem 3
4 Implementation 4
6 Conclusion 6
Appendix A 7
Bibliography 8
iii
List of Tables
iv
List of Figures
v
Chapter 1
Introduction
The chapter headings presented here are roughly what should appear in a the-
sis. You may need to change the names to suit your work. Cite researches you
reviewed [1].
1
Chapter 2
Literature Review
2
Chapter 3
Problem
Clearly present the problem with all necessary details. Present a schematic view
of it. Precisely mention what present systems do and what it fails to accomplish.
State what might be a desirable goal in the present environment.
3
Chapter 4
Implementation
4
Chapter 5
Mention what your results were compared against, how data was gathered and
what factors affect the result.
5
Chapter 6
Conclusion
Your conclusion must be relevant to what has been done. Make no recommenda-
tions that has not been addressed in the work.
6
Appendix A
Whatever you need to add. Add further appendices if you need more. Anything
you add in the appendix must be mentioned in the body of the report.
7
Bibliography
8
Appendix B
215
Department of Computer Science & Engineering
SOUTHEAST UNIVERSITY
Internship Report
on
Title
Submitted by
[student name]
ID:......
Batch
Supervised by
Faculty Name
Designation
Department of CSE
Southeast University
Write a letter asking for permission to work on whatever you are working.
Thank you.
Supervisor: Co-Supervisor:
name Name
Designation Position
Department of CSE
Southeast University
Executive Summary
This is a most important part of your report. It summarizes the body of the
report, outlining its scope, purpose and major findings, highlighting the key con-
clusions and recommendations.
i
Acknowledgements
You may address all the people (parents, teachers, friends, others) who have con-
tributed to the success of this document. Expression of thanks to the people, to
the company and others who have made invaluable contribution to the completion
of this report.
ii
Contents
Executive Summary i
Acknowledgements ii
List of Tables iv
List of Figures v
1 Introduction 1
1.1 Presentation of the company/organization . . . . . . . . . . . . . 1
1.2 Objective of the Internship . . . . . . . . . . . . . . . . . . . . . 1
1.3 Scope and Methodology . . . . . . . . . . . . . . . . . . . . . . . 2
2 Literature Review 3
6 Conclusion 7
Glossary 8
Appendix A 8
Bibliography 10
iii
List of Tables
iv
List of Figures
....
v
Chapter 1
Introduction
a. Brief history
b. Nature of the organization/competition
c. Product lines
d. Business volume/ employee
The purpose the study should provide a Specific and accurate synopsis of the
overall purpose of the study. It stresses the reader why you performed the study.
In other words, the reader should be informed of the importance of the study. Key
points to keep in mind when preparing a purpose statement. Try to incorporate a
sentence that begins with ”the purpose of this study is...”. This will clarify your
own mind as to purpose and it will inform the reader directly and explicitly.
1
CHAPTER 1. INTRODUCTION
The purpose of this section is to describe in detail how you performed the study.
This includes sample, data collection, and data analyzing method. This section
should not be very lengthy. The writer has to give separate details of survey
methodology if he/she has conducted a survey in the study.
2
Chapter 2
Literature Review
3
Chapter 3
• Your work, time table, what you did, when, where and who had supervised
you.
• Who was your overall internship supervisor and how he or she had con-
tributed to the program.
4
Chapter 4
5
Chapter 5
Limitations and
Recommendations
Recommendations must follow logically from the conclusion and findings. They
should not be vague, abstract, idealistic or ambitious. Instead they should be
specific, concrete, to the point, practical, relevant to the organization and the
study
6
Chapter 6
Conclusion
Conclusion must be based on findings of the study and link them to your research
objectives/purpose.
REMEMBER that conclusions deal with the present, recommendations with the
future
7
Glossary
Provide a glossary if the text is necessarily heavy with specialized terms, math-
ematical symbols. If there is only the occasional term in the report, define it as
part of the text.
8
Appendix A
Whatever you need to add. Add further appendices if you need more.
9
Text Format in the Report
10
Appendix C
234
Annexure VIII
Southeast University
Teaching Evaluation Form
THIS IS AN ANONYMOUS EVALUATION. THE SYSTEM DOES NOT ALLOW
DISCLOSURE OF YOUR IDENTITY.
Strongly Strongly
Disagree Neutral Agree
Disagree Agree
About the Teacher
1
The Teacher was adequateley 1 2 3 4 5
prepared for the class.
2
Classes began and ended on time. 1 2 3 4 5
3
The Teacher presented and
explained materials clearly 1 2 3 4 5
through examples.
4
The Teacher encouraged class
participation and responded to 1 2 3 4 5
questions.
5
The Teacher's teaching methods 1 2 3 4 5
were effective.
6
The Teacher was available for help 1 2 3 4
outside class, if needed.
7
The Teacher demonstrated good
knowledge of the subject matter of 1 2 3 4 5
the course.
8
The Teacher's English
communication and delivery skills 1 2 3 4 5
were very good.
9
The exams, quizzes and
assignments covered the meterial 1 2 3 4 5
taught in class.
10
The Teacher graded and showed
mid-term exam, class tests, quizzes 1 2 3 4 5
and assignments within a
reasonable time.
Page 1 of 2
Annexure VIII
Comments
(You can write anything about your Course
Teacher)
Page 2 of 2