Organization profile

Organisation profile

Three research areas are based in the broad disciplinary area of Computing and Information Technology. These are: Computational Intelligence and Robotics Cyber Security Simulation and Modelling CM3

Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

gravitational waves Physics & Astronomy
LIGO (observatory) Physics & Astronomy
Image coding Engineering & Materials Science
Wireless sensor networks Engineering & Materials Science
Experiments Engineering & Materials Science
detectors Physics & Astronomy
Communication Engineering & Materials Science
Classifiers Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1984 2018

A conceptual framework of personally controlled electronic health record (PCEHR) system to enhance security and privacy

Mamun, Q. 01 Jan 2018 International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Springer-Verlag London Ltd., Vol. 580, p. 304-314 11 p. (Advances in Intelligent Systems and Computing; vol. 580)

Research output: Research - peer-reviewConference paper

Health
Access control
Authentication
Data privacy
Cryptography

Alignment-free fingerprint template protection technique based on minutiae neighbourhood information

Nazmul, R., Islam, M. R. & Chowdhury, A. R. 01 Jan 2018 International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Springer-Verlag London Ltd., Vol. 580, p. 256-265 10 p. (Advances in Intelligent Systems and Computing; vol. 580)

Research output: Research - peer-reviewConference paper

Biometrics
Authentication
Computational complexity

A novel algorithm to protect code injection attacks

Alnabulsi, H., Islam, R. & Mamun, Q. 01 Jan 2018 International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Springer-Verlag London Ltd., Vol. 580, p. 281-292 12 p. (Advances in Intelligent Systems and Computing; vol. 580)

Research output: Research - peer-reviewConference paper

Prizes

Guest Speaker, Texas A&M University, Kingsville, TX, USA

Ashad Kabir (Recipient), 20 Sep 2017

Prize/Award: Other distinction

File

Instructor Excellence Award

Lihong Zheng (Recipient), 12 May 2017

Prize/Award: Award

File

Activities 2011 2018

IEEE Signal Processing Society (External organisation)

Li, C. (Chair)
01 Jan 201831 Dec 2020

Activity: Membership of committee

IEEE Signal Processing Society (External organisation)

Li, C. (Member)
01 Jan 201831 Dec 2020

Activity: Membership of committee

14th International Conference on Mobile Systems and Pervasive Computing (Event)

Kabir, A. (Programme Committee Member)
17 Jul 201725 Jul 2017

Activity: Editorial activity