Saiful Azad, PhD
Saiful Azad, PhD
Professor, Department of Computer Science and Engineering, Green University of Bangladesh
Verified email at - Homepage
Cited by
Cited by
DESERT Underwater: an NS-Miracle-based framework to DEsign, Simulate, Emulate and Realize Test-beds for Underwater network protocols
R Masiero, S Azad, F Favaro, M Petrani, G Toso, F Guerra, P Casari, ...
2012 Oceans-Yeosu, 1-10, 2012
TeKET: a Tree-Based Unsupervised Keyphrase Extraction Technique
G Rabby, S Azad, M Mahmud, KZ Zamli, MM Rahman
Cognitive Computation 12 (4), 811-833, 2020
iWorksafe: Towards Healthy Workplaces During COVID-19 With an Intelligent Phealth App for Industrial Settings
MS Kaiser, M Mahmud, MBT Noor, NZ Zenia, S Al Mamun, KMA Mahmud, ...
Ieee Access 9, 13814-13828, 2021
Performance Analysis of Ad hoc Routing Protocols in Mobile WiMAX Environment
SA Farhat Anwar
IAENG International Journal of Computer Science 35 (3), 353-360, 2008
Open source suites for underwater networking: WOSS and DESERT underwater
P Casari, C Tapparello, F Guerra, F Favaro, I Calabrese, G Toso, S Azad, ...
IEEE Network 28 (5), 38-46, 2014
Jamming-resistant multi-path routing for reliable intruder detection in underwater networks
M Goetz, S Azad, P Casari, I Nissen, M Zorzi
Proceedings of the 6th international workshop on underwater networks, 1-5, 2011
A performance investigation on IoT enabled intra-vehicular wireless sensor networks
MA Rahman, J Ali, MN Kabir, S Azad
International Journal of Automotive and Mechanical Engineering 14 (1), 3970-3984, 2017
A flexible keyphrase extraction technique for academic literature
G Rabby, S Azad, M Mahmud, KZ Zamli, MM Rahman
Procedia computer science 135, 553-563, 2018
Blockchain security hole: issues and solutions
N Suhaliana bt Abd Halim, MA Rahman, S Azad, MN Kabir
Recent Trends in Information and Communication Technology: Proceedings of …, 2018
Practical cryptography: algorithms and implementations using C++
S Azad, ASK Pathan
CRC Press, 2014
MySQL performance analysis on a limited resource server: Fedora vs. Ubuntu Linux
M Ahmed, MM Uddin, S Azad, S Haseeb
Proceedings of the 2010 Spring Simulation Multiconference, 99, 2010
A performance comparison of proactive and reactive routing protocols of Mobile Ad-hoc NETwork (MANET)
S Azad, M Rahman, F Anwar
Journal of Engineering and Applied Sciences 2 (5), 891-896, 2007
VAP code: A secure graphical password for smart devices
S Azad, M Rahman, MSAN Ranak, BMFK Ruhee, NN Nisa, N Kabir, ...
Computers & Electrical Engineering 59, 99-109, 2017
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
MA Rahman, MN Kabir, S Azad, J Ali
2015 4th International Conference on Software Engineering and Computer …, 2015
A simple and effective technique for human verification with Hand Geometry
MA Rahman, F Anwar, MS Azad
2008 International Conference on Computer and Communication Engineering …, 2008
Collab-SAR: A collaborative avalanche search-and-rescue missions exploiting hostile alpine networks
MA Rahman, S Azad, AT Asyhari, MZA Bhuiyan, K Anwar
IEEE Access 6, 42094-42107, 2018
The underwater selective repeat error control protocol for multiuser acoustic networks: Design and parameter optimization
S Azad, P Casari, M Zorzi
IEEE Transactions on Wireless Communications 12 (10), 4866-4877, 2013
Performance comparison of proactive and reactive multicast routing protocols over wireless mesh networks
S Azad, F Anwar, MA Rahman, AH Abdalla, AU Priantoro, O Mahmoud
Journal of Computer Science and Network Security 9 (6), 55-62, 2009
Multibiometric systems based verification technique
F Anwar, MA Rahman, S Azad
European Journal of Scientific Research 34 (2), 260-270, 2009
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
MA Rahman, AT Asyhari, S Azad, MM Hasan, CPC Munaiseche, ...
IEEE Access 7, 100318-100331, 2019
The system can't perform the operation now. Try again later.
Articles 1–20