Abstract is missing.
- Robust nonlinear adaptive backstepping controller design for unmanned autonomous vehiclesT. K. Roy, M. F. Pervej, F. K. Tumpa, L. C. Paul, M. I. Sarkar. 1-6 [doi]
- Cloud-based solution for improvement of response time of MySQL RDBMSSayed Md. Fahim Fahad, Mohammad Shorif Uddin. 7-10 [doi]
- An android based security alert system for femaleSanjida Sharmin, Md. Khaliluzzaman, Sayeda Fauzia Khatun, Shajeda Khanam. 11-14 [doi]
- Analyzing MRI segmentation based on wavelet and BEMD using fuzzy c-means clusteringMd. Khaliluzzaman, Lamia Iqbal Dolon, Kaushik Deb. 15-20 [doi]
- RFI and SQLi based local file inclusion vulnerabilities in web applications of BangladeshAfsana Begum, Md. Maruf Hassan, Touhid Bhuiyan, Md. Hasan Sharif. 21-25 [doi]
- Design and optimization of an e-shaped wearable antenna working in ISM bandMd. Saheb Ali, Khaleda Ali. 26-29 [doi]
- Lip contour extraction using elliptical modelShahnewaz Ali. 30-34 [doi]
- Multiclass motor imagery classification for BCI applicationMd. Mamun-Or-Rashid, Mohiuddin Ahmad. 35-40 [doi]
- Multiple sensors based fire extinguisher robot based on DTMF, bluetooth and GSM technology with multiple mode of operationHumayun Rashid, Iftekhar Uddin Ahmed, Aasim Ullah, Md. Fahim Newaz, Mohammad Sijanur Rahaman Robin, S. M. Taslim Reza. 41-46 [doi]
- Stroke matching based approach to recognize bangla offline conjunct charactersShamima Nasrin, Tasneem Zerin, Mohammad Mahadi Hassan. 47-50 [doi]
- Sentiment analysis on bangla and romanized bangla text using deep recurrent modelsAsif Hassan, Mohammad Rashedul Amin, Abul Kalam al Azad 0002, Nabeel Mohammed. 51-56 [doi]
- Design and simulation of a novel classification framework for separating sentiment from assorted game related tweetsSyeda Tasmiah Islam, Ahmad Al-Sajid, Molla Rashied Hussein. 58-63 [doi]
- Bangla handwritten digit recognition using autoencoder and deep convolutional neural networkMd. Shopon, Nabeel Mohammed, Md Anowarul Abedin. 64-68 [doi]
- Pseudo random sequence over finite field using Möbius FunctionFatema Akhter, Yasuyuki Nogami. 69-73 [doi]
- Transparency - A key feature integration in existing privacy frameworks for online userSeraj Al Mahmud Mostafa, Sheak Rashed Haider Noori, Saujanna Jafreen. 74-78 [doi]
- Learning from tagoreShimul Hassan, Nabeel Mohammed, Sifat Momen. 79-84 [doi]
- Memory forensics tools: Comparing processing time and left artifacts on volatile memoryKhaleque Md Aashiq Kamal, Mahmoud Alfadel, Munawara Saiyara Munia. 84-90 [doi]
- Design and implementation of smart attendance management system using multiple step authenticationDhiman Kumar Sarker, Nafize Ishtiaque Hossain, Insan Arafat Jamil. 91-95 [doi]
- Krill herd based clustering algorithm for wireless sensor networksMd. Shopon, Md. Akhtaruzzaman Adnan, Md. Firoz Mridha. 96-100 [doi]
- Automated textile defect classification by Bayesian classifier based on statistical featuresMd. Tarek Habib, Shaon Bhatta Shuvo, Mohammad Shorif Uddin, Farruk Ahmed. 101-105 [doi]
- Maligant kidney tumor ablation using electric probe heatingM. Tanseer Ali, Reazul Hasan Rasel, Mantasha Mubasshir, Salauddin Mahamood, Rafa Jarin, S. M. Basitur Rashid. 106-109 [doi]
- Algorithms efficiency measurement on imbalanced data using geometric mean and cross validationMustakim Al Helal, Mohammad Salman Haydar, Seraj Al Mahmud Mostafa. 110-114 [doi]
- Line profile-based fingerprint matchingHafsa Moontari Ali, Sonia Corraya. 115-119 [doi]
- Discovering knowledge regarding academic profile of students pursuing graduate studies in world's top universitiesShibbir Ahmed, Abu Sayed Md. Latiful Hoque, Mahamudul Hasan, Rahnuma Tasmin, Deen Md. Abdullah, Anika Tabassum. 120-125 [doi]
- Sequence classification: A regression based generalization of two-stage clusteringNusrat Jahan Farin, Nafees Mansoor, Sifat Momen, Iftekharul Mobin, Nabeel Mohammed. 126-130 [doi]
- Generation and verification of digital signature with two factor authenticationNarayan Ranjan Chakraborty, Muhammad Taifur Rahman, Md. Ekhlasur Rahman, Mohammad Shorif Uddin. 131-135 [doi]
- An efficient approach of identifying tourist by call detail record analysisRatul Sikder, Md. Jamal Uddin, Sajal Halder. 136-141 [doi]
- Enhancing Performance of naïve bayes in text classification by introducing an extra weight using less number of training examplesShahnaj Parvin Shathi, Md. Delowar Hossain, Md. Nadim, Sayed Golam Rasul Riayadh, Tangina Sultana. 142-147 [doi]
- A framework for event anomaly detection in cognitive radio based smart communityS. M. Nadim Uddin, Nafees Mansoor, Musfiqur Rahman, Nabeel Mohammed, Sazzad Hossain. 148-152 [doi]
- PSO-NF based vertical handoff decision for ubiquitous heterogeneous wireless network(UHWN)Nurjahan, Saoreen Rahman, Tanusree Sharma, S. M. Reza, M. M. Rahman, M. S. Kaiser. 153-158 [doi]
- A comprehensive approach towards user-based collaborative filtering recommender systemMahamudul Hasan, Shibbir Ahmed, Md. Ariful Islam Malik, Shabbir Ahmed. 159-164 [doi]
- Comparison of cyclostationary and energy detection in cognitive radio networkRisala Tasin Khan, Md. Imdadul Islam, Shakila Zaman, M. R. Amin. 165-168 [doi]
- Noise aware level based routing protocol for underwater sensor networksArnisha Akhter, Md. Ashraf Uddin, Md. Anwarul Islam Abir, Md. Manowarul Islam. 169-174 [doi]
- Sentiment analysis of students feedback: A study towards optimal toolsMohammad Aman Ullah. 175-180 [doi]
- Underwater network cardinality estimation using cross-correlation: Effect of unequal sensor spacingB. K. Dash, S. A. H. Chowdhury, A. H. M. M. Kamal, Md. Shamim Anower, A. Halder. 181-186 [doi]
- Cross-gender acoustic differences in hypernasal speech and detection of hypernasalityShahina Haque, Md. Hanif Ali, A. K. M. Fazlul Haque. 187-191 [doi]
- Image based drinks identification for dietary assessmentRubaiya Hafiz, Saiful Islam, Roksana Khanom, Mohammad Shorif Uddin. 192-197 [doi]
- Feature-based image stitching algorithmsMoushumi Zaman Bonny, Mohammad Shorif Uddin. 198-203 [doi]
- A framework for dynamic vehicle pooling and ride-sharing systemNusrat Jahan Farin, Md. Nur Ahsan Ali Rimon, Sifat Momen, Mohammad Shorif Uddin, Nafees Mansoor. 204-208 [doi]
- Modified spider monkey optimizationGarima Hazrati, Harish Sharma, Nirmala Sharma, Jagdish Chand Bansal. 209-214 [doi]
- Embedding of (i, j)-regular signed graphs in (i + k, j + l)-regular signed graphsDeepa Sinha, Anita Kumari Rao, Pravin Garg. 215-217 [doi]
- On 2-path signed graphsDeepa Sinha, Deepakshi Sharma. 218-220 [doi]
- Stability analysis of differential evolutionAnshul Gopal, Jagdish Chand Bansal. 221-223 [doi]
- Grey wolf gravitational search algorithmSusheel Kumar Joshi, Jagdish Chand Bansal. 224-231 [doi]
- A similarity measure for atanassov intuitionistic fuzzy sets and its application to clusteringMohd Shoaib Khan, Q. M. Danish Lohani. 232-239 [doi]
- A third (four)-order accurate nine-point compact EEM-FDM for coupled system of mildly non-linear elliptic equationsNavnit Jha. 240-245 [doi]
- Analysis of a delayed HIV infection modelSaroj Kumar Sahani, Yashi. 246-251 [doi]
- Vehicle speed determination from video streams using image processingMohammad Reduanul Haque, Md. Golam Moazzam, Saiful Islam, Rony Das, Mohammad Shorif Uddin. 252-255 [doi]
- A new spline in compression technique of order four in space and order two in time for the solution of 1D wave equation in polar coordinatesGunjan Khurana, R. K. Mohanty 0003. 256-258 [doi]
- Relay selection and beamwidth adaptation to overcome blockage in mm-wave wireless private area networkAnindita Saha, Farah Ashrafi, Sadia Islam, Risala Tasin Khan, M. S. Kaiser. 259-263 [doi]