S
S. M. Riazul Islam
Researcher at Sejong University
Publications - 133
Citations - 8093
S. M. Riazul Islam is an academic researcher from Sejong University. The author has contributed to research in topics: Computer science & Communication channel. The author has an hindex of 24, co-authored 125 publications receiving 5501 citations. Previous affiliations of S. M. Riazul Islam include University of Dhaka & Inha University.
Papers
More filters
Journal ArticleDOI
Fuzzy Domain Ontology-based Opinion Mining for Transportation Network Monitoring and City Features Map
TL;DR: A FDO-based opinion mining system to monitor the transportation network in real-time as well to make a city polarity map for travelers and the experimental result shows satisfactory improvement in tweets and review`s analyzing and opinion mining.
Proceedings ArticleDOI
A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs
TL;DR: In this paper, the authors proposed an en-route filtering scheme to counter false report injection attacks on designated verification nodes, which improves the network lifetime and energy efficiency while having comparable false report filtering efficiency.
Journal ArticleDOI
On Non-Orthogonal Multiple Access (NOMA) in 5G Systems
TL;DR: A survey of the state of the art in NOMA for 5G systems in a categorized manner and analysis of the NOMa performances with numerical examples are provided.
Journal ArticleDOI
Introducing Cloud-Assisted Micro-Service-Based Software Development Framework for Healthcare Systems
John F. W. Zaki,S. M. Riazul Islam,Norah Saleh Alghamdi,Mohammad Abdullah-Al-Wadud,Kyung Sup Kwak +4 more
TL;DR: In this research, an approach for development and deployment properly in the cloud for healthcare applications is developed and contributes to the system design approach and system analysis.
Proceedings ArticleDOI
An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions
TL;DR: In this paper, the authors analyze security vulnerabilities of UPnP-based IoT systems and identify attack opportunities by the adversaries leveraging the vulnerabilities, and propose prospective solutions to secure UPnp-based systems from adversarial operations.