Search Results - "Narman, Husnu S"

Refine Results
  1. 1

    A Review of Sensing and Communication, Human Factors, and Controller Aspects for Information-Aware Connected and Automated Vehicles by Sarker, Ankur, Shen, Haiying, Rahman, Mizanur, Chowdhury, Mashrur, Dey, Kakan, Li, Fangjian, Wang, Yue, Narman, Husnu S.

    “…Information-aware connected and automated vehicles (CAVs) have drawn great attention in recent years due to their potentially significant positive impacts on…”
    Get full text
    Journal Article
  2. 2

    Use of Machine Learning in Interactive Cybersecurity and Network Education by Loftus, Neil, Narman, Husnu S

    Published in Sensors (Basel, Switzerland) (09-03-2023)
    “…Cybersecurity is a complex subject for students to pursue. Hands-on online learning through labs and simulations can help students become more familiar with…”
    Get full text
    Journal Article
  3. 3

    Popularity-Aware Multi-Failure Resilient and Cost-Effective Replication for High Data Durability in Cloud Storage by Liu, Jinwei, Shen, Haiying, Narman, Husnu S.

    “…Large-scale data stores are an increasingly important component of cloud datacenter services. However, cloud storage system usually experiences data loss,…”
    Get full text
    Journal Article
  4. 4

    Random Partition Based Adaptive Distributed Kernelized SVM for Big Data by Pal, Amrit, Chowdhury, Abishi, Satakshi, Narman, Husnu S., Chowdhury, Arkabandhu, Kumar, Manish

    Published in IEEE access (2022)
    “…In this paper, we present a distributed classification technique for big data by efficiently using distributed storage architecture and data processing units…”
    Get full text
    Journal Article
  5. 5

    A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage by Liu, Jinwei, Shen, Haiying, Chi, Hongmei, Narman, Husnu S., Yang, Yongyi, Cheng, Long, Chung, Wingyan

    Published in IEEE/ACM transactions on networking (01-08-2021)
    “…Data availability is one of the most important performance factors in cloud storage systems. To enhance data availability, replication is a common approach to…”
    Get full text
    Journal Article
  6. 6

    DA-DRLS: Drift adaptive deep reinforcement learning based scheduling for IoT resource management by Chowdhury, Abishi, Raut, Shital A., Narman, Husnu S.

    “…In order to fulfill the tremendous resource demand by diverse IoT applications, the large-scale resource-constrained IoT ecosystem requires a robust resource…”
    Get full text
    Journal Article
  7. 7

    An enhanced ride sharing model based on human characteristics, machine learning recommender system, and user threshold time by Narman, Husnu S., Malik, Haroon, Yatnalkar, Govind

    “…The ubiquitous availability of the Internet and advanced computing systems has resulted in the rapid development of smart cities. From connected devices to…”
    Get full text
    Journal Article
  8. 8

    Scheduling internet of things applications in cloud computing by Narman, Husnu S., Hossain, Md. Shohrab, Atiquzzaman, Mohammed, Shen, Haiying

    Published in Annales des télécommunications (01-02-2017)
    “…Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in…”
    Get full text
    Journal Article
  9. 9

    A Feasibility Study of Real-Time Image Processing Techniques for Small Flying Object Detection in Drones by Loftus, Neil, Parlato, Cade, McGinty, Amelia, Kizilay, Furkan, Narman, Husnu S.

    “…Drone usage is increasing significantly in our daily life, from military to delivery purposes. Although drones are also used to detect objects by using…”
    Get full text
    Conference Proceeding
  10. 10

    Evaluating fine tuned deep learning models for real-time earthquake damage assessment with drone-based images by Kizilay, Furkan, Narman, Mina R., Song, Hwapyeong, Narman, Husnu S., Cosgun, Cumhur, Alzarrad, Ammar

    Published in AI in civil engineering (01-12-2024)
    “…Earthquakes pose a significant threat to life and property worldwide. Rapid and accurate assessment of earthquake damage is crucial for effective disaster…”
    Get full text
    Journal Article
  11. 11

    Joint and selective periodic component carrier assignment for LTE-A by Narman, Husnu S., Atiquzzaman, Mohammed, Rahmani-andebili, Mehdi, Shen, Haiying

    “…The bandwidth demand for mobile Internet access is significantly increased with the number of mobile users. Carrier aggregation has been proposed to answer…”
    Get full text
    Journal Article
  12. 12

    Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network by Ashiq, Md. Ishtiaq, Bhowmick, Protick, Hossain, Md. Shohrab, Narman, Husnu S.

    “…Botnets have been a major area of concern in the field of cybersecurity. There have been a lot of research works for detection of botnets. However, everyday…”
    Get full text
    Conference Proceeding
  13. 13

    An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks by Jonas, Mainduddin Ahmad, Hossain, Md. Shohrab, Islam, Risul, Narman, Husnu S., Atiquzzaman, Mohammed

    “…An intelligent system to prevent SSL Stripping based session hijacking attacks is proposed in this paper. The system is designed to strike a delicate balance…”
    Get full text
    Conference Proceeding
  14. 14

    Preventing Session Hijacking using Encrypted One-Time-Cookies by Prapty, Renascence Tarafder, Azmin Md, Shuhana, Hossain, Shohrab, Narman, Husnu S.

    “…Hypertext Transfer Protocol (HTTP) cookies are pieces of information shared between HTTP server and client to remember stateful information for the stateless…”
    Get full text
    Conference Proceeding
  15. 15

    The Cybersecurity Packet Control Simulator: CSPCS by Loftus, Neil, Green, Cameron, Narman, Husnu S.

    “…Games have been used as a learning tool for centuries. Through game-based learning, students actively learn and practice the right way to do things. A project…”
    Get full text
    Conference Proceeding
  16. 16

    A Hybrid Encryption Technique based on DNA Cryptography and Steganography by Hassan, Shahriar, Muztaba, Md. Asif, Hossain, Md. Shohrab, Narman, Husnu S.

    “…The importance of data and its transmission rate are increasing as the world is moving towards online services every day. Thus, providing data security is…”
    Get full text
    Conference Proceeding
  17. 17

    Designing Crowdsourcing Software to Inform Municipalities About Infrastructure Condition by Shoemaker, Eric, Randolph, Harrison, Bryce, James, Narman, Husnu S.

    “…Determining how to utilize and allocate budgets for public infrastructure is an essential issue that local governments face. For a beneficial budgeting plan to…”
    Get full text
    Conference Proceeding
  18. 18

    A Machine Learning-Based Automatic Feedback System to Teach Cybersecurity Principles to K-12 and College Students by Dillon, Eric M., Carpenter, Craig, Cook, John, Wills, Thomas D., Narman, Husnu S.

    “…Feedback is an essential part of education to help students understand and learn from their mistakes. However, while students learn new content, there is…”
    Get full text
    Conference Proceeding
  19. 19

    An IoT-Based Complete Smart Drainage System for a Smart City by Zaki, Tarannum, Jahan, Ismat Tarik, Hossain, Md Shohrab, Narman, Husnu S.

    “…With the technological advancements, every application from our day to day life is becoming Internet-oriented, leading to the concept of Internet of Things…”
    Get full text
    Conference Proceeding
  20. 20

    Impacts of Positive and Negative Comments of Social Media Users to Cryptocurrency by Narman, Husnu S., Uulu, Alymbek Damir

    “…Blockchain implementation brought several benefits to many areas. One of the usages of blockchain is in digital currencies. Digital currency (cryptocurrency)…”
    Get full text
    Conference Proceeding