Skip to main content
The government of Bangladesh introduced national ID cards in 2008 for all peoples of age 18 years and above. This card is now a de-facto identity document and finds diverse applications in vote casting, bank account opening, telephone... more
    • by  and +2
The goal of this paper is to present a novel approach for assessment of the quality of Gaming software in terms of factors formulated by correlating its diversified attributes. All possible descriptive properties of customers, users and... more
    • by 
This paper presents a scheme for purposeful enhancement of domain knowledgebases which are supposed to be repositories of public information and also to be subject to frequent interaction by non-technical people through natural languages.... more
    • by 
This paper presents an optimized architecture and weights of three layered ANN designing method using sensitivity analysis and adaptive particle swarm optimization (SA-APSO). The optimized ANN architecture determination means to look for... more
    • by 
This paper presents a functional approach towards the problem domain of Information Retrieval System built upon a narration based search text. The presented system retrieves documents from the background collection by extracting the... more
    • by  and +1
    •   3  
      Information RetrievalDomain Specific KnowledgeLegal documents
Excessive locking and cumulative updates in Distributed Shared Memory (DSM) not only reduces the parallelism for block access but also causes a serious degradation in response time for a dense network. This paper proposes a new... more
    • by 
    • Distributed Shared Memory System
Unlike conventional infrastructure based wireless networks such as, wireless cellular networks, Mobile Ad Hoc Networks (MANET) contains rapidly deployable, self organizing and self maintaining capability features. Moreover, they can be... more
    • by 
    •   4  
      CryptographyElliptic curvesPublic key cryptographyElliptic Curve Cryptography
This paper studies key management and security issues in mobile ad hoc networks (MANETs). Lack of strong identification results in unauthorized entities access to the sensitive data, and leads to loos of confidentiality and integrity,... more
    • by 
    •   3  
      Computer ScienceComputer SecurityComputer and Communication Systems Engineering
Despite being subjected to an economic downturn that is yet to recover, computers and information technology (IT) continue to drive and influence innovation, growth and development in almost all sectors of the world economy. The gains in... more
    • by 
    •   5  
      Computer ScienceAlgorithmsOperating SystemsDistributed Shared Memory System
We design new serial and parallel approximation algorithms for computing a maximum weight b-matching in an edge-weighted graph with a submodular objective function. This problem is NP-hard; the new algorithms have approximation ratio 1/3,... more
    • by 
    • Computer Science
We survey recent work on approximation algorithms for computing degree-constrained subgraphs in graphs and their applications in combinatorial scientific computing. The problems we consider include maximization versions of cardinality... more
    • by 
    •   3  
      Applied MathematicsComputer ScienceNumerical Analysis and Computational Mathematics
We describe two new 3/2-approximation algorithms and a new 2-approximation algorithm for the minimum weight edge cover problem in graphs. We show that one of the 3/2-approximation algorithms, the Dual Cover algorithm, computes the lowest... more
    • by 
    •   2  
      Computer ScienceAPPROXIMATION ALGORITHM
We explore the problem of sharing data that pertains to individuals with anonymity guarantees, where each user requires a desired level of privacy. We propose the first sharedmemory as well as distributed memory parallel algorithms for... more
    • by 
    • Computer Science
We describe a paradigm for designing parallel algorithms via approximation, and illustrate it on the b-Edge Cover problem. A b-Edge Cover of minimum weight in a graph is a subset C of its edges such that at least a specified number b(v)... more
    • by 
    • Computer Science
This presentation was made for Decision Support System course under Dr. Vatcharaporn Esichaikul in Asian Institute of Technology Master's Program. This presentation is on a published paper titled "An ontology-based Web mining method for... more
    • by 
    •   4  
      Ontology (Computer Science)Financial and Investment AnalysisSemantic Web technology - OntologiesDomain Ontologies
Numerous meta-heuristic algorithms have been influenced by nature. Over the past couple of decades, their quantity has been significantly escalating. The majority of these algorithms attempt to emulate natural biological and physical... more
    • by 
    • Swarm Intelligence
The chronicle of prime numbers travel back thousands of years in human history. Not only the traits of prime numbers have surprised people, but also all those endeavors made for ages to find a pattern in the appearance of prime numbers... more
    • by 
    • Mathematics
Dozens of new tools and technologies are being incorporated to help developers, which is becoming a source of consternation as they struggle to choose one over the others. For example, there are at least ten frameworks available to... more
    • by 
    •   3  
      Computer ScienceSoftware EngineeringUsability
In modern capital market the price of a stock is often considered to be highly volatile and unpredictable because of various social, financial, political and other dynamic factors. With calculated and thoughtful investment, stock market... more
    • by 
Stock market investment have been an ideal form of investment for many years. Investing capitals smartly in stock market yields high profit returns. But there are many companies available in a market. Currently there are more than 345... more
    • by 
    • Business