This word cloud was generated using words from abstracts of all accepted papers.
This word cloud was generated using words from abstracts of all accepted papers.

List of Accepted Papers

  • Gazi Zahirul Islam and Mohammod Abul Kashem. An OFDMA-based New MAC Mechanism for IEEE 802.11ax
  • Masud Rana, M. Kaykobad and A. B. M. Alim Al Islam. A New Approach for Selecting Aggregated Multicast Trees to Reduce Forwarding States
  • Tasmiah Tamzid Anannya and Ashikur Rahman. Extended Neighborhood Knowledge based Dominant Pruning (ExDP)
  • Laboni Sarker, Sakshar Chakravarty and Ashikur Rahman. A Graph Theoretic Approach for Maximizing Target Coverage using Minimum Directional Sensors in Randomly Deployed Wireless Sensor Networks
  • Sirat Samyoun, Ashikur Rahman and Raqeebir Rab. Design and Analysis of a Fault-Tolerant Topology Control Algorithm for Wireless Multi-hop Networks
  • Nur Imtizul HaqueKazi Md. Rokibul AlamTasfia Mashiat and Yasuhiko Morimoto. A Technique to Enrich the Secrecy Level of High Capacity Data Hiding Steganography Technique in JPEG Compressed Image
  • A S M Rizvi, Tarik Reza TohaSiddhartha Shankar DasSriram Chellappan and A. B. M. Alim Al Islam. Exploiting a Synergy between Greedy Approach and NSGA for Scheduling in Computing Clusters
  • Shanto Roy, Md. Ashaduzzaman, Mehedi Hassan and Arnab Rahman Chowdhury. BlockChain for IoT Security and Management: Current Prospects, Challenges and Future Directions
  • Mazharul Islam, Md.Nazmuddoha Ansary, Novia Nurain, Salahuddin Parvez Shams and A. B. M. Alim Al Islam. A Sweet Recipe for Consolidated Vulnerabilities : Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm
  • Md Taksir Hasan Majumder and A. B. M. Alim Al Islam. A Tale of a Deep Learning Approach to Image Forgery Detection
  • Samiul Ali Sarker, Masudur Rahman, Nasif Muslim and Salekul Islam. Performance Analysis of Video Streaming at the Edge and Core Cloud
  • Md. Mobasshir Arshed Naved and Md. Yusuf Sarwar Uddin. Adaptive Notifications Generation for Smartphone Users Based on their Physical Activities
  • Md. Saidul Hoque Anik, Md. Adnanul Islam and A. B. M. Alim Al Islam. An Approach Towards Multilingual Translation By Semantic-Based Verb Identification And Root Word Analysis
  • Zaheen Mustakin, Saad Manzur, Tanzila Choudhury, Farzana RahmanSriram Chellappan and A. B. M. Alim Al Islam. Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms
  • Nafis Sadeq, Fazle Rabbi Rahat, Ashikur Rahman, Sheikh Iqbal Ahamed and Kamrul Hasan. Smartphone-based Calorie Estimation From Food Image Using Distance Information

List of Accepted Short Papers

  • Torikul Islam, Jannatul Ferdush and M.M.A. Hashem. Short Paper: Secured Cloud Computing Outsourcing : A Case Study of Constrained Linear Least Square Problem
  • Abdur Rahman, Shanto Roy, M Shamim Kaiser and Md. Shahidul Islam. A lightweight multi-tier S-MQTT framework to secure communication between low-end IoT devices
  • Mayisha Alam, Novia Nurain, Suraiya Tairin, Mahmuda Naznin and A. B. M. Alim Al Islam. Short Paper: Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs)
  • Md. Saeef Abdul Hadi, Abhijit Saha, Faysal Ahmad, Mohammad Shahriyar Hasan, and Mehebub Hasan Milon. A Smart Accident Detection and Control System in Vehicular Networks