default search action
Morshed U. Chowdhury
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j39]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
SDN enabled BDSP in public cloud for resource optimization. Wirel. Networks 29(3): 1031-1041 (2023) - 2022
- [j38]Fera Tri Hartanti, Jemal H. Abawajy, Morshed U. Chowdhury:
Evaluating Public Service Delivery Smartness and Impact on Citizens' Well-Being. IEEE Access 10: 69106-69124 (2022) - [j37]Zhou Zhou, Jemal H. Abawajy, Mohammad Shojafar, Morshed U. Chowdhury:
DEHM: An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network. IEEE Trans. Ind. Informatics 18(7): 4944-4953 (2022) - [j36]Zhou Zhou, Kenli Li, Jemal H. Abawajy, Mohammad Shojafar, Morshed Uddin Chowdhury, Fangmin Li, Keqin Li:
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters. IEEE Trans. Sustain. Comput. 7(2): 371-385 (2022) - 2021
- [j35]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy:
Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information. IEEE Access 9: 121686-121697 (2021) - [j34]Fera Tri Hartanti, Jemal H. Abawajy, Morshed U. Chowdhury, Wervyan Shalannanda:
Citizens' Trust Measurement in Smart Government Services. IEEE Access 9: 150663-150676 (2021) - [j33]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed U. Chowdhury, Tahsien Al-Quraishi:
An empirical analysis of graph-based linear dimensionality reduction techniques. Concurr. Comput. Pract. Exp. 33(5) (2021) - [j32]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
An Extended Reselling Protocol for Existing Anti-Counterfeiting Schemes. J. Sens. Actuator Networks 10(1): 12 (2021) - [j31]Morshed U. Chowdhury, Biplob Ray, Sujan Chowdhury, Sutharshan Rajasegarar:
A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things. ACM Trans. Internet Things 2(4): 26:1-26:23 (2021) - 2020
- [b1]Morshed U. Chowdhury:
Reducing blocking artifacts in blockbased transform video coded images. Monash University, Australia, 2020 - [j30]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments. IEEE Access 8: 47952-47962 (2020) - [j29]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise. J. Sens. Actuator Networks 9(1): 16 (2020) - [j28]Zhou Zhou, Fangmin Li, Huaxi Zhu, Houliang Xie, Jemal H. Abawajy, Morshed U. Chowdhury:
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments. Neural Comput. Appl. 32(6): 1531-1541 (2020) - [j27]Yaozhong Zhang, Wencheng Feng, Guoqing Shi, Frank Jiang, Morshed U. Chowdhury, Sai-Ho Ling:
UAV Swarm Mission Planning in Dynamic Environment Using Consensus-Based Bundle Algorithm. Sensors 20(8): 2307 (2020) - [j26]Jemal H. Abawajy, Morshed U. Chowdhury, Andrei Kelarev:
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection. IEEE Trans. Cloud Comput. 8(2): 398-407 (2020) - [j25]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei Kelarev, Herbert F. Jelinek:
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services. IEEE Trans. Cloud Comput. 8(2): 473-483 (2020) - [c76]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed Uddin Chowdhury:
Utility-Aware Graph Dimensionality Reduction Approach. CATA 2020: 327-333 - [c75]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy, Ahmed Raad Al-Sudani:
Yawn Based Driver Fatigue Level Prediction. CATA 2020: 372-382 - [c74]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
BDSP in the cloud: Scheduling and Load Balancing utlizing SDN and CEP. CCGRID 2020: 827-835 - [c73]Ayoob Ayoob, Ghaith Khalil, Yingzhuang Liu, Morshed U. Chowdhury, Torana Al:
Efficiency Broadcast Base Safety Message BSM Through VANET Based on Transmit Packet Coding (TPC). LifeTech 2020: 383-387 - [c72]Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss:
Avoiding Geographic Regions in Tor. TrustCom 2020: 802-809
2010 – 2019
- 2019
- [j24]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems. J. Sens. Actuator Networks 8(3): 37 (2019) - [c71]Waqas Ahmad Piracha, Morshed U. Chowdhury, Biplob Ray, Sutharshan Rajasegarar, Robin Doss:
Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands. ATIS 2019: 77-91 - [c70]Ayoob Ayoob, Ghaith Khalil, Morshed U. Chowdhury, Robin Doss:
Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction. FNSS 2019: 3-22 - [c69]Md Samsul Haque, Morshed U. Chowdhury:
Ad-Hoc Framework for Efficient Network Security for Unmanned Aerial Vehicles (UAV). FNSS 2019: 23-36 - [c68]Ansa Iftikhar Ahmad, Biplob Ray, Morshed U. Chowdhury:
Performance Evaluation of LoRaWAN for Mission-Critical IoT Networks. FNSS 2019: 37-51 - [c67]Morshed U. Chowdhury, Robin Doss, Biplob Ray, Sutharshan Rajasegarar, Sujan Chowdhury:
IoT Insider Attack - Survey. SGIoT 2019: 28-41 - 2018
- [j23]Zhou Zhou, Jemal H. Abawajy, Fangmin Li, Zhigang Hu, Morshed U. Chowdhury, Abdulhameed Alelaiwi, Keqin Li:
Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center. IEEE Access 6: 27080-27090 (2018) - [j22]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. Future Gener. Comput. Syst. 78: 838-849 (2018) - [j21]Zhou Zhou, Jemal H. Abawajy, Morshed U. Chowdhury, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. Future Gener. Comput. Syst. 86: 836-850 (2018) - [j20]Mahmood Javadi, Habib Mostafaei, Morshed U. Chowdhury, Jemal H. Abawajy:
Learning automaton based topology control protocol for extending wireless sensor networks lifetime. J. Netw. Comput. Appl. 122: 128-136 (2018) - [j19]Habib Mostafaei, Morshed U. Chowdhury, Mohammad S. Obaidat:
Border Surveillance With WSN Systems in a Distributed Manner. IEEE Syst. J. 12(4): 3703-3712 (2018) - [c66]Ahmad Shaker Abdalrada, Jemal H. Abawajy, Morshed U. Chowdhury, Sutharshan Rajasegarar, Tahsien Al-Quraishi, Herbert F. Jelinek:
Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population. SCDM 2018: 135-146 - [c65]Tahsien Al-Quraishi, Jemal H. Abawajy, Morshed U. Chowdhury, Sutharshan Rajasegarar, Ahmad Shaker Abdalrada:
Breast Cancer Recurrence Prediction Using Random Forest Model. SCDM 2018: 318-329 - 2017
- [j18]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei V. Kelarev, Teruhisa Hochin:
Multilayer hybrid strategy for phishing email zero-day filtering. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j17]Pinaki Sarkar, Morshed Uddin Chowdhury, Kouichi Sakurai:
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors. Concurr. Comput. Pract. Exp. 29(23) (2017) - [c64]Teruhisa Hochin, Hiroki Nomiya, Hitoshi Iima, Morshed U. Chowdhury:
A Smart Framework towards Providing Benefits for One and All. ACIT/CSII/BCD 2017: 129-132 - [c63]Gaith K. D. Al., Robin Doss, Morshed U. Chowdhury:
Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment. FNSS 2017: 84-94 - [c62]Biplob R. Ray, Morshed U. Chowdhury, Usman Atif:
Is High Performance Computing (HPC) Ready to Handle Big Data? FNSS 2017: 97-112 - [c61]Md Samsul Haque, Morshed U. Chowdhury:
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV). ATCS/SePrIoT@SecureComm 2017: 113-122 - 2016
- [j16]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Secure Object Tracking Protocol for the Internet of Things. IEEE Internet Things J. 3(4): 544-553 (2016) - [j15]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Herbert F. Jelinek:
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles. IEEE J. Biomed. Health Informatics 20(1): 408-415 (2016) - [c60]Pinaki Sarkar, Morshed Uddin Chowdhury:
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi). ATIS 2016: 106-114 - [c59]Gaith K. D. Al., Robin Doss, Morshed U. Chowdhury, Biplob R. Ray:
Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept. FNSS 2016: 126-141 - [c58]Pinaki Sarkar, Morshed Uddin Chowdhury:
Secure IoT Using Weighted Signed Graphs. SecureComm 2016: 241-256 - [c57]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
A Multi-protocol Security Framework to Support Internet of Things. SecureComm 2016: 257-270 - 2015
- [j14]Gaith K. D. Al., Biplob Rakshit Ray, Morshed U. Chowdhury:
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System. Int. J. Networked Distributed Comput. 3(2): 128-136 (2015) - [c56]Habib Mostafaei, Morshed U. Chowdhury, Md. Rafiqul Islam, Hojjat Gholizadeh:
Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach. MSWiM 2015: 157-160 - [c55]Mozammel Chowdhury, Junbin Gao, Morshed U. Chowdhury:
Image Spam Classification Using Neural Network. SecureComm 2015: 622-632 - [c54]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy, Monika Jesmin:
Secure object tracking protocol for Networked RFID Systems. SNPD 2015: 135-141 - [c53]M. Arif Khan, Md. Rafiqul Islam, Morshed U. Chowdhury:
A novel approach to maximize the sum-rate for MIMO broadcast channels. SNPD 2015: 155-159 - 2014
- [j13]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury:
Scalable RFID security framework and protocol supporting Internet of Things. Comput. Networks 67: 89-103 (2014) - [j12]Jemal H. Abawajy, Gleb Beliakov, Andrei V. Kelarev, Morshed U. Chowdhury:
Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. J. Networks 9(8): 2089-2098 (2014) - [j11]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. J. Networks 9(9): 2259-2268 (2014) - [j10]Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Smart Anti-counterfeit Web Application. J. Networks 9(11): 2925-2933 (2014) - [j9]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Large Iterative Multitier Ensemble Classifiers for Security of Big Data. IEEE Trans. Emerg. Top. Comput. 2(3): 352-363 (2014) - [c52]Sohail Iqbal Malik, Roy Mathew, Morshed U. Chowdhury, Jo Coldwell-Neilson:
Impact of Assurance of Learning (AOL) in Programming Course for Novices. BCS International IT Conferenc 2014 - [c51]Gaith K. D. Al., Biplob Rakshit Ray, Morshed U. Chowdhury:
RFID Tag Ownership Transfer Protocol for a Closed Loop System. IIAI-AAI 2014: 575-579 - [c50]Pinaki Sarkar, Priyatosh Mahish, Morshed Uddin Chowdhury, Kouichi Sakurai:
Securing Sensor Networks by Moderating Frequencies. SecureComm (2) 2014: 173-185 - [c49]Hussein Alnabulsi, Quazi Mamun, Md. Rafiqul Islam, Morshed U. Chowdhury:
Defence Against Code Injection Attacks. SecureComm (2) 2014: 237-251 - [c48]Jahangir Dewan, Morshed U. Chowdhury:
A framework for mobile elearning (mLearning) with analytical decision model. SNPD 2014: 1-5 - 2013
- [j8]Andrew Stranieri, Jemal H. Abawajy, Andrei V. Kelarev, Md. Shamsul Huda, Morshed U. Chowdhury, Herbert F. Jelinek:
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy. Artif. Intell. Medicine 58(3): 185-193 (2013) - [j7]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Andrew Stranieri, Herbert F. Jelinek:
Predicting cardiac autonomic neuropathy category for diabetic data with missing values. Comput. Biol. Medicine 43(10): 1328-1333 (2013) - [j6]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Multistage approach for clustering and classification of ECG data. Comput. Methods Programs Biomed. 112(3): 720-730 (2013) - [j5]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Power graphs: A survey. Electron. J. Graph Theory Appl. 1(2): 125-147 (2013) - [j4]Nazia Zaman, Morshed U. Chowdhury:
Explicit Rate Control for MANET. Int. J. Networked Distributed Comput. 1(1): 37-45 (2013) - [j3]Biplob Rakshit Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag. Int. J. Networked Distributed Comput. 1(2): 79-88 (2013) - [c47]Jahangir Dewan, Morshed U. Chowdhury:
A Framework for Mobile eLearning (mLearning) with Content Security and Authentication. IIAI-AAI 2013: 95-99 - [c46]Baker Alrubaiey, Morshed U. Chowdhury, Atul Sajjanhar:
Smart Interactive Advertising Board (SIAB). IIAI-AAI 2013: 312-317 - [c45]Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Web-Based Anti-counterfeit RFID System. SecureComm 2013: 342-355 - [c44]Jahangir Dewan, Morshed U. Chowdhury, Lynn Margaret Batten:
e-Learning Content Authentication Using Bipartite Matching. SNPD 2013: 51-55 - [c43]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Critical Analysis and Comparative Study of Security for Networked RFID Systems. SNPD 2013: 197-202 - 2011
- [c42]Subhasis Mukherjee, Maynul Hasan, Belal Chowdhury, Morshed U. Chowdhury:
Security of RFID Systems - A Hybrid Approach. SNPD 2011: 58-63 - [c41]Biplob R. Ray, Md. Shamsul Huda, Morshed U. Chowdhury:
Smart RFID Reader Protocol for Malware Detection. SNPD 2011: 64-69 - [c40]Pinaki Sarkar, Morshed U. Chowdhury:
Key Predistribution Scheme Using Finite Fields and Reed Muller Codes. SNPD (Selected Papers) 2011: 67-79 - [c39]Belal Chowdhury, Morshed U. Chowdhury, Clare D'Souza, Nasreen Sultana:
Web Health Portal to Enhance Patient Safety in Australian Healthcare Systems. SNPD (Selected Papers) 2011: 91-101 - [c38]Md. Rafiqul Islam, Morshed U. Chowdhury:
Detecting Unwanted Email Using VAT. SNPD (Selected Papers) 2011: 113-126 - [c37]Jahangir Dewan, Morshed U. Chowdhury, Shak Hossain, Jessy Dewan:
A Framework for eLearning with Social Media Using DRM. SNPD 2011: 229-234 - [e1]Morshed U. Chowdhury, Sid Ray, Roger Y. Lee:
12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel & Distributed Computing, SNPD 2011, Sydney, Australia, July 6-8, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0896-1 [contents] - 2010
- [j2]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Addressing in Wireless Sensor Networks without Location Awareness. J. Inf. Sci. Eng. 26(2): 443-460 (2010) - [c36]Biplob R. Ray, Morshed U. Chowdhury:
Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information. CAINE 2010: 208-213 - [c35]Pinaki Sarkar, Amrita Saha, Morshed U. Chowdhury:
Secure connectivity model in Wireless Sensor Networks (WSN) using first order Reed-Muller codes. MASS 2010: 507-512 - [i1]Pinaki Sarkar, Amrita Saha, Morshed U. Chowdhury:
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes. IACR Cryptol. ePrint Arch. 2010: 356 (2010)
2000 – 2009
- 2009
- [j1]Robin Doss, Gang Li, Vicky Mak, Shui Yu, Morshed U. Chowdhury:
Improving the QoS for information discovery in autonomic wireless sensor networks. Pervasive Mob. Comput. 5(4): 334-349 (2009) - [c34]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
MVGL Analyser for Multi-classifier Based Spam Filtering System. ACIS-ICIS 2009: 394-399 - [c33]Belal Chowdhury, Morshed U. Chowdhury, Nasreen Sultana:
Real-time Early Infectious Outbreak Detection Systems Using Emerging Technologies. ARTCom 2009: 506-508 - 2008
- [c32]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
Email Categorization Using (2+1)-Tier Classification Algorithms. ACIS-ICIS 2008: 276-281 - [c31]Robin Doss, Gang Li, Shui Yu, Vicky Mak, Morshed U. Chowdhury:
The Crossroads Approach to Information Discovery in Wireless Sensor Networks. ICDCN 2008: 310-321 - [p1]Belal Chowdhury, Morshed U. Chowdhury, Clare D'Souza:
Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 49-59 - 2007
- [c30]Morshed U. Chowdhury, Rezwanur Rahman, Joydip Saha, S. M. Raiyan Kabir:
Fast Scene Change Detection Based Histogram. ACIS-ICIS 2007: 229-233 - [c29]Aliaa A. A. Youssif, Morshed U. Chowdhury, Sid Ray, Howida Youssry Nafaa:
Fingerprint Recognition System Using Hybrid Matching Techniques. ACIS-ICIS 2007: 234-240 - [c28]Alauddin Ahmed, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury:
A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration. ACIS-ICIS 2007: 291-295 - [c27]Jia Rong, Yi-Ping Phoebe Chen, Morshed U. Chowdhury, Gang Li:
Acoustic Features Extraction for Emotion Recognition. ACIS-ICIS 2007: 419-424 - [c26]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. ACIS-ICIS 2007: 757-762 - [c25]Alauddin Ahmed, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury:
Two Logical Verification of Quantum NOT Gate. ACIS-ICIS 2007: 1124-1128 - 2006
- [c24]Anwar Sadat, Golam Sorwar, Morshed U. Chowdhury:
Session Initiation Protocol (SIP) based Event Notification System Architecture for Telemedicine Applications. ACIS-ICIS 2006: 214-218 - [c23]Rezwanur Rahman, Morshed U. Chowdhury, S. M. Raiyan Kabir, M. Rezwan Khan:
A novel method for person identification by comparing retinal patterns. CAINE 2006: 14-17 - [c22]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Lease Based Addressing for Event-Driven Wireless Sensor Networks. ISCC 2006: 251-256 - 2005
- [c21]Nazmul Haque, Morshed U. Chowdhury, Syed Mahbubur Rahman:
Impact of Image Organizations on Multimedia Document Retrieval. ACIS-ICIS 2005: 340-343 - [c20]Morshed U. Chowdhury:
Improved Learning Algorithm Performance Using Linear Kernel Transformation. CATA 2005: 164-167 - [c19]Md. Rafiqul Islam, Morshed U. Chowdhury, Wanlei Zhou:
An Innovative Spam Filtering Model Based on Support Vector Machine. CIMCA/IAWTIC 2005: 348-353 - [c18]Aliaa A. A. Youssif, Morshed U. Chowdhury, Sid Ray:
Computer Aided Analysis of Dental Radiographic Images. DICTA 2005: 43 - 2004
- [c17]Morshed U. Chowdhury, Sid Ray, Thao Pham:
Block Identification for Reducing Blocking Artefact in MPEG-1 Video Coded Images Using Statistical Inference and Performance Measurement Using Block Impairment Metric (BIM). CAINE 2004: 143-147 - [c16]Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury:
Toward Pervasive Computing in Restaurant. ICETE (1) 2004: 312- - [c15]Safwan Mahmud Khan, Md. Rafiqul Islam, Morshed U. Chowdhury:
Medical image classfication using an efficient data mining technique. ICMLA 2004: 397-402 - 2003
- [c14]S. R. Subramanya, Morshed U. Chowdhury, Thao Pham, Sanjay Shankar:
A Scheme for Content Based Retrieval of Music Data in MIDI Format. CAINE 2003: 159-162 - [c13]Morshed U. Chowdhury, Yiqing Tu, Thao Pham:
A Simulation Model for Video Traffic Performance via ATM over TCP/IP. CAINE 2003: 197-202 - [c12]A. B. M. Shawkat Ali, Morshed U. Chowdhury, S. R. Subramanya:
Nonlinear Discrimination Using Support Vector Machine. CATA 2003: 287-290 - [c11]Wei Dai, Morshed U. Chowdhury, Daniel Prager, M. G. Mahbub Alam:
A Vision for a Multimedia Knowledge Management Framework. CATA 2003: 430-433 - [c10]Hualin Wan, Morshed U. Chowdhury, Atul Sajjanhar:
A Parameter Adjustment Method for Relevance Feedback. CISST 2003: 619-625 - [c9]Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury:
GHIRS: Integration of Hotel Management Systems by Web Services. GCC (2) 2003: 1002-1009 - [c8]Atul Sajjanhar, Zhao Ying, Morshed U. Chowdhury:
Web Services Based Wagering System for the Best Odds. IASSE 2003: 242-245 - 2002
- [c7]Md. Rafiqul Islam, Morshed U. Chowdhury:
Eliminating of the Drawback of Existing Testing Technique of Easily Testable PLAs Using an Improved Testing Algorithm with Product Line Rearrangement. CAINE 2002: 239-242 - [c6]Hualin Wan, Morshed U. Chowdhury, Hong Hu, Zhongzhi Shi:
A New Texture Spectrum Descriptor and its Application in Image Semantic Classification. CATA 2002: 176-179 - 2001
- [c5]Nazmul Haque, Morshed U. Chowdhury:
Retrieval of Multimedia Documents using Low Cost Image Ranking Algorithms. CAINE 2001: 41-44 - [c4]Morshed U. Chowdhury, Thao Pham:
Block Identifications for Minimising Inter-Block Discontinuity in MPEG-1 Video Coded Images Using Statistical Inference. CAINE 2001: 189-192 - [c3]S. M. Golam Sorwar, Morshed U. Chowdhury:
Designing Wave Digital Filters with Finite Word Length Coefficient in Time and Frequency Domain. CAINE 2001: 250-253 - 2000
- [c2]Morshed U. Chowdhury:
Evaluation of linear filters used with statistical inference for reducing blocking artifacts in video coded images. CATA 2000: 198-202
1990 – 1999
- 1998
- [c1]Morshed U. Chowdhury, Syed Mahbubur Rahman, Baikunth Nath:
Block classification for reducing artefacts in video images using statistical correlation. CATA 1998: 102-105
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint