A review on VANET research: Perspective of recent emerging technologies

MJN Mahi, S Chaki, S Ahmed, M Biswas… - IEEE …, 2022 - ieeexplore.ieee.org
Recent technology has modeled VANET (vehicular adhoc network) communication well in
terms of privileges to derive vehicular communication technologically to save time, energy …

A review of emerging technologies for IoT-based smart cities

M Whaiduzzaman, A Barros, M Chanda, S Barman… - Sensors, 2022 - mdpi.com
Smart cities can be complemented by fusing various components and incorporating recent
emerging technologies. IoT communications are crucial to smart city operations, which are …

Concept to Reality: An Integrated Approach to Testing Software User Interfaces

M Whaiduzzaman, A Sakib, NJ Khan, S Chaki… - Applied Sciences, 2023 - mdpi.com
This paper delves into the complex task of evaluating a website user interface (UI) and user
experience (UX), a process complicated by gaps in research. To bridge this, we introduced …

Bdps: An efficient spark-based big data processing scheme for cloud fog-iot orchestration

R Hossen, M Whaiduzzaman, MN Uddin, MJ Islam… - Information, 2021 - mdpi.com
The Internet of Things (IoT) has seen a surge in mobile devices with the market and
technical expansion. IoT networks provide end-to-end connectivity while kee** minimal …

An intelligent and multi-functional stick for blind people using IoT

S Ahmed, MM Shaharier, S Roy… - 2022 3rd …, 2022 - ieeexplore.ieee.org
The primary goal of this study is to aid blind people who do not require human assistance.
People who cannot see the world have difficulty perceiving the obstacles in front of them …

Analyzing the effectiveness of several machine learning methods for heart attack prediction

K Oliullah, A Barros, M Whaiduzzaman - Proceedings of the Fourth …, 2023 - Springer
Heart attack or heart failure cases are rising quickly each day, thus it is crucial and
worrisome to anticipate any problems in advance. A heart attack is a significant medical …

An energy-efficient quorum-based locking protocol by omitting meaningless methods on object replicas

T Enokido, D Duolikun… - Journal of High Speed …, 2022 - content.iospress.com
In current information systems, a huge number of IoT (Internet of Things) devices are
interconnected with various kinds of networks like WiFi and 5G networks. A large volume of …

A secured peer-to-peer messaging system based on blockchain

S Ahmed, M Biswas, M Hasanuzzaman… - 2022 3rd …, 2022 - ieeexplore.ieee.org
Nowadays, the messaging system is one of the most popular mobile applications, and
therefore the authentication between clients is essential. Various kinds of such mobile …

Bio-inspired computing techniques for data security challenges and controls

G Sripriyanka, A Mahendran - SN Computer Science, 2022 - Springer
Bio-inspired computing approach is based on the nature and biology for solving complex
real-world challenges with enhanced solutions. In this modern era smart technology …

Quantum-Based QKD and Sugar-Salt Encryption Approach in Cloud-Fog Computing to Strengthen Protection of Online Banking Data

SM Turjya, R Singh, P Sarkar, S Swain… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Cloud computing is swiftly develo**, delivering a diverse spectrum of computing utilities
like databases, storage, and servers. It transfigures the way data storage is done and …