|
An Attention Based Approach for Sentiment Analysis of Food Review Dataset
|
Md. Rafiuzzaman Bhuiyan
Mahmudul Hasan mahedi,
Naimul Hossain,
Syed Akhter Hossain,
Zerin Nasrin Tumpa
|
11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020
|
fsit |
cse |
2020 |
Click Here |
|
An automated system in ATM booth using face encoding and emotion recognition process
|
Ashraful Islam,
Eshtiak Ahmed
|
ACM International Conference Proceeding Series
|
fsit |
cse |
2020 |
Click Here |
|
Android malware detection by machine learning apprehension and static feature characterization
|
Md. Rashedul Hasan
Afsana Begum,
Fahad Bin Zamal,
Lamisha Rawshan,
Touhid Bhuiyan
|
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
|
fsit |
swe |
2020 |
Click Here |
|
An effective implementation of web crawling technology to retrieve data from the world wide web (Www)
|
F. M. Javed Mehedi Shamrat
A.K.M Sazzadur Rahman,
Naimul Islam Nobel,
Zarrin Tasnim
|
International Journal of Scientific and Technology Research
|
fsit |
swe |
2020 |
Click Here |
|
An efficient and optimized tracking framework through optimizing algorithm in a deep forest using NFC
|
Md. Abbas Ali Khan
A.K.M. Fazlul Haque,
Mohammad Hanif Ali,
Shohag Kumar Bhowmik
|
Indonesian Journal of Electrical Engineering and Computer Science
|
fsit |
cse |
2020 |
Click Here |
|
An enhancement of kerberos using biometric template and steganography
|
Munira Tabassum
Afjal H. Sarower,
Md. Maruf Hassan
|
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
|
fsit |
swe |
2020 |
Click Here |
|
A new 8-directional pixel selection technique of LSB based image steganography
|
Sheikh Thanbir Alam
Md. Maruf Hassan,
Nusrat Jahan
|
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
|
fsit |
swe |
2020 |
Click Here |
|
A New Approach to Hiding Data in the Images Using Steganography Techniques Based on AES and RC5 Algorithm Cryptosystem
|
Md. Sagar Hossen
Md. Ashiqul Islam,
Md. Mahfujur Rahman,
SHAHED HOSSAIN,
Tania Khatun
|
Proceedings - International Conference on Smart Electronics and Communication, ICOSEC 2020
|
fsit |
cse |
2020 |
Click Here |
|
An exploratory research on grammar checking of Bangla sentences using statistical language models
|
Md. Riazur Rahman
Gazi Zahirul Islam,
Md. Abbas Ali Khan,
Md. Sadekur Rahman,
Md. Tarek Habib
|
International Journal of Electrical and Computer Engineering
|
fsit |
cse |
2020 |
Click Here |
|
An impressive thrombolytic and analgesic effect has been exhibited in the methanolic extract of hygroryza aristata leaves
|
Md. Sarowar Hossain
Md. A.K. Azad,
Md. Mamunur Rashid,
Md. Mizanur Rahman,
Md. Wahed Ferdous
|
Pharmacologyonline
|
fhls |
pharmacy |
2020 |
Click Here |