scispace - formally typeset
S

S. M. Riazul Islam

Researcher at Sejong University

Publications -  133
Citations -  8093

S. M. Riazul Islam is an academic researcher from Sejong University. The author has contributed to research in topics: Computer science & Communication channel. The author has an hindex of 24, co-authored 125 publications receiving 5501 citations. Previous affiliations of S. M. Riazul Islam include University of Dhaka & Inha University.

Papers
More filters
Journal ArticleDOI

Fuzzy Domain Ontology-based Opinion Mining for Transportation Network Monitoring and City Features Map

TL;DR: A FDO-based opinion mining system to monitor the transportation network in real-time as well to make a city polarity map for travelers and the experimental result shows satisfactory improvement in tweets and review`s analyzing and opinion mining.
Proceedings ArticleDOI

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

TL;DR: In this paper, the authors proposed an en-route filtering scheme to counter false report injection attacks on designated verification nodes, which improves the network lifetime and energy efficiency while having comparable false report filtering efficiency.
Journal ArticleDOI

On Non-Orthogonal Multiple Access (NOMA) in 5G Systems

TL;DR: A survey of the state of the art in NOMA for 5G systems in a categorized manner and analysis of the NOMa performances with numerical examples are provided.
Journal ArticleDOI

Introducing Cloud-Assisted Micro-Service-Based Software Development Framework for Healthcare Systems

TL;DR: In this research, an approach for development and deployment properly in the cloud for healthcare applications is developed and contributes to the system design approach and system analysis.
Proceedings ArticleDOI

An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions

TL;DR: In this paper, the authors analyze security vulnerabilities of UPnP-based IoT systems and identify attack opportunities by the adversaries leveraging the vulnerabilities, and propose prospective solutions to secure UPnp-based systems from adversarial operations.