Morshed U.Chowdhury
Morshed U.Chowdhury
Senior Lecturer, School of Information Technology, Deakin University
Verified email at
Cited by
Cited by
Power graphs: a survey
J Abawajy, A Kelarev, M Chowdhury
Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013
RFID-based real-time smart waste management system
B Chowdhury, MU Chowdhury
2007 Australasian telecommunication networks and applications conference …, 2007
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, AA Alelaiwi, F Li
Future Generation Computer Systems 86, 836-850, 2018
A survey of active and passive defence mechanisms against DDoS attacks
X Yang, W Zhou, M Chowdhury
Deakin University, School of Information Technology, 2004
Multistage approach for clustering and classification of ECG data
JH Abawajy, AV Kelarev, M Chowdhury
Computer methods and programs in biomedicine 112 (3), 720-730, 2013
Scalable RFID security framework and protocol supporting Internet of Things
BR Ray, J Abawajy, M Chowdhury
Computer Networks 67, 89-103, 2014
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy
A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, HF Jelinek
Artificial intelligence in medicine 58 (3), 185-193, 2013
Large iterative multitier ensemble classifiers for security of big data
JH Abawajy, A Kelarev, M Chowdhury
IEEE Transactions on Emerging Topics in Computing 2 (3), 352-363, 2014
Image semantic classification by using SVM
HL Wan, M Chowdhury
Journal of software 14 (11), 1891-1899, 2003
图像纹理特征及其在 CBIR 中的应用
W Hualin, M Chowdhury, H Hong, S Zhongzhi
Journal of computer aided design and computer graphics 15 (2), 195-199, 2003
Border surveillance with WSN systems in a distributed manner
H Mostafaei, MU Chowdhury, MS Obaidat
IEEE Systems Journal 12 (4), 3703-3712, 2018
Acoustic features extraction for emotion recognition
J Rong, YPP Chen, M Chowdhury, G Li
6th IEEE/ACIS International Conference on Computer and Information Science …, 2007
Secure object tracking protocol for the Internet of Things
BR Ray, MU Chowdhury, JH Abawajy
IEEE Internet of things Journal 3 (4), 544-553, 2016
An innovative spam filtering model based on support vector machine
MR Islam, MU Chowdhury, W Zhou
International Conference on Computational Intelligence for Modelling …, 2005
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments
Z Zhou, F Li, H Zhu, H Xie, JH Abawajy, MU Chowdhury
Neural Computing and Applications 32 (6), 1531-1541, 2020
Universal and secure object ownership transfer protocol for the Internet of Things
BR Ray, J Abawajy, M Chowdhury, A Alelaiwi
Future Generation Computer Systems 78, 838-849, 2018
Fine-grained energy consumption model of servers based on task characteristics in cloud data center
Z Zhou, JH Abawajy, F Li, Z Hu, MU Chowdhury, A Alelaiwi, K Li
IEEE access 6, 27080-27090, 2017
A performance comparison of three wireless multi hop ad-hoc network routing protocols when streaming MPEG4 traffic
MU Chowdhury, D Perera, T Pham
8th International Multitopic Conference, 2004. Proceedings of INMIC 2004 …, 2004
Medical image classification using an efficient data mining technique
MR Islam, M Chowdhury, S Khan
Complex 2004: Proceedings of the 7th Asia-Pacific Complex Systems Conference …, 2004
Energy-efficient virtual machine consolidation algorithm in cloud data centers
Z Zhou, Z Hu, J Yu, J Abawajy, M Chowdhury
Journal of Central South University 24 (10), 2331-2341, 2017
The system can't perform the operation now. Try again later.
Articles 1–20