Computer Science and Telecommunication Engineering

EXTERNAL PROFILES
Professor
Md. Javed Hossain
N/A
Computer Science and Telecommunication Engineering
BIOGRAPHY
Md. Javed Hossain received B.Sc. (Honors) and M.Sc. degrees in 1988 and 1990 respectively from the Department of Applied Physics and Electronics, the University of Dhaka, Bangladesh. He completed one year as a research student of Intelligent Information Control & Systems (IICS) Lab under the Department of Electrical, Electronics & Information Engineering Wonkwang University, South Korea, during the whole year of 2005. He served as a teacher on Computer Science courses under Atish Dipankar University of Science and Technology and National University for 7 years. He joined as a Lecturer of the Department of Computer Science and Telecommunication Engineering of Noakhali Science and Technology University on 18th June 2006. He has been serving as a Professor of the same department since 19th March 2023. His research interests include Digital Signal Processing, Fuzzy Logics, Wireless Communication Systems and Machine Learning.
RESEARCH INTERESTS
Last updated on 2025-10-13 13:11:58
No Job information...
No Project information...
No Training information...
No workshop information...
AWARDS AND ACHIEVEMENTS
No award information...
An exploratory analysis of feature selection for malware detection with simple machine learning algorithms
Authors: Rahman, Md Ashikur and Islam, Syful and Nugroho, Yusuf Sulistyo and Al Irsyadi, Fatah Yasin and Hossain, Md JavedDataset of network simulator related-question posts in stack overflow
Authors: Nugroho, Yusuf Sulistyo and Islam, Syful and Gunawan, Dedi and Kurniawan, Yogiek Indra and Hossain, Md JavedFeature ranking and network analysis of global financial indices
Authors: Rakib, Mahmudul Islam and Hossain, Md Javed and Nobi, AshadunMachine learning model to analyze telemonitoring dyphosia factors of Parkinson’s disease
Authors: Fahim, Mohimenol Islam and Islam, Syful and Noor, Sumaiya Tun and Hossain, Md Javed and Setu, Md ShahriarSarcasm Detection in Tweets: A Feature-based Approach using Supervised Machine Learning Models
Authors: Rahaman, Arifur and Kuri, Ratnadip and Islam, Syful and Hossain, Md Javed and Kabir, Mohammed HumayunWhat network simulator questions do users ask? a large-scale study of stack overflow posts
Authors: Islam, Syful and Nugroho, Yusuf Sulistyo and Hossain, M JavedBuilding a secure model of e-Medication management system for optimum pharmaceuticals safety
Authors: Syful Islam, Ratnadip Kuri, Md. Javed Hossain, Dr. Humayun KabirIMPACTS OF VARIATIONS IN CHANNEL LENGTH, WIDTH AND GATE WORK FUNCTION OF GAN FINFET AND SI-FINFETON ESSENTIAL ELECTRICAL PARAMETERS
Authors: HOSSAIN, MD JAVED and SHUBROCHAKROBORTY, ANINDYA and AL MAMUN, SM MOSTAFANetwork Structure of Financial Market of S&P500 around Financial Crises
Authors: Sree Narayan Chakraborty, Md. Javed Hossain, Ashadun Nobi, Mohammed Nizam UddinPERFORMANCE COMPARISON OF ELECTRICAL PARAMETERS BETWEEN GANFINFET AND SI-FINFET NANO DEVICES
Authors: CHAKROBORTY, ANINDYA SHUBRO and HOSSAIN, JAVEDRandom Forest Classifier Based Approach for Next Generation Sequencing Gene Data Classification
Authors: Pathan, AQM Sala Uddin and Riaz, Md Hasnat and Kabir, Mohammad Humayun and Hossain, Md JavedPerformance evaluation of multi-cloud compared to the single-cloud under varying firewall conditions
Authors: Yeasmin, Mahbuba and Akter, Nahida and Kabir, Mohammed Humayun and Hossain, JavedExploring Congestion Control Mechanism of TCP Vari-ants over Wired & Wireless Networks
Authors: Islam, Syful and Kuri, Ratnadip and Kabir, Md Humayun and Hossain, Md JavedA comparative study of sub-10nm Si, Ge and GaAs n-channel FinFET
Authors: 16. Shafiqul Islam, Sharif Uddin, Hasan Ali, Javed Hossain, Zahid Hasan MahmoodCloud computing technology in Bangladesh: a framework of social & economic development
Authors: Islam, Syful and Kabir, MH and Hossain, Md Javed and Chakraborty, Abhijit and Majadi, NaziaDesigning High Bandwidth Connected EH and E-Shaped Microstrip Patch Antennas for S-band Communication
Authors: Uddin, Muhammad Afsar and Hossain, Md Javed and Kabir, Mohammed Humayan and Khan, Md Ashikur RahmanA detail overview of cloud computing with its opportunities and obstacles in developing countries
Authors: 19. Mohammed Humayun Kabir, Syful Islam, Md. Javed Hossain, Sazzad HossainAnalysing the Effects of Transmission Range of Base Station on Mobile WiMAX Network Transport Layer Protocols
Authors: Zayed-Us-Salehin, Md. Javed Hossain, Mohammed Humayun Kabir, Md. Bellal HossainAn Anchorless Cooperative Localization System for Wireless Ad-Hoc Networks
Authors: Iftekhar Mahmud Towhid, Md. Javed Hossain, Mohammed Humayun KabirDetail comparison of network simulators
Authors: Kabir, Mohammed Humayun and Islam, Syful and Hossain, Md Javed and Hossain, SazzadSymbol Generation and Enhanced Capacity in LTE-A Network using MIMO-OFDM
Authors: Hasan, Md Faizan and Hossain, Md Javed and Kabir, Mohammed Humayun and Uddin, Mohammed NizamImplementation and Performance Analysis of Mobile Cloud Computing based on Java and Cloud Analyst
Authors: Wahab, Md Abdul and Hossain, Md Javed and Kabir, Mohammed HumayunVirtualization of Campus LAN and analyzing traffic issues of these VLANs
Authors: Islam, Mohammad Serazul and Hossain, Md Javed and Kabir, Mohammed HumayunPerformance Comparison and Improvement of Broadcasting Protocols in Mobile Ad-Hoc Network
Authors: Md. Saifur Rahman, Md. Bellal Hossain, Md. Javed Hossain, Mrinal Kanti BaowalyAccessibility analysis and evaluation of government-websites’ in developing countries: Case study Bangladesh
Authors: Baowaly, Mrinal Kanti and Hossain, M and Bhuiyan, MoniruzzamanPROTEIN STRUCTURE ALIGNMENT USING DYNAMIC PROGRAMMING
Authors: AKTER, NASRIN and HOSSAIN, MD JAVED and HOSSAIN, MOHAMMAD SALIMDesigning a high bandwidth Patch Antenna and comparison with the former Patch Antennas
Authors: Kazi Tofayel Ahmed, Md. Bellal Hossain, Md. Javed HossainA Comprehensive Method to design Fuzzy Inference System using SAHN based Algorithm
Authors: Md. Javed Hossain, Mohammed Humayun Kabir, Shahed AnwerImplementation and comparison of routing protocol RIVER with other VANET protocols
Authors: Riaz, Md Hasnat and Kabir, Mohammed Humayun and Shaon, Md Fahidul Islam and Hossain, Md JavedA new approach of Fuzzy Inference System with the aid of SAHN based algorithm
Authors: Md. Javed Hossain, Kyung-Won Jang, Ho-Sung Park, Sung-Kwun Oh, Tae-Chon AhnA study of e-commerce platform issues shared by developers on stack overflow
Authors: Nugroho, Yusuf Sulistyo and Islam, Syful and Gunawan, Dedi and Kurniawan, Yogiek Indra and Hossain, Md Javed and Kabir, Mohammed HumayunDOI: https://doi.org/10.1007/978-981-19-4193-1_28
Dynamic trade flow of selected commodities using entropy technique
Authors: Milu, Sharmin Akter and Hossain, Javed and Nobi, AshadunDOI: https://doi.org/10.1007/978-981-33-4543-0_38
No Data Found
No Data Found
No Data Found
No Courses Found....
No Course Materials Found....
Md Ashikur Rahman
Completed M.Sc.(Engg) Degree
Thesis Title: An Exploratory Analysis of Feature Selection for Malware Detection with Simple Machine Learning Algorithms
Overview: Computers have become increasingly vulnerable to malicious attacks with an increase in popularity and the proliferation of open system architectures. There are numerous malware detection technologies available to protect the computer operating system from such attacks. This type of malware detector targets programs based on patterns detected in the properties of computer applications. As the amount of analytical data increases, the computer defense system is adversely affected. The performance of the detection mechanism has been hindered due to the presence of numerous irrelevant characteristics. The goal of this study is to provide a feature selection approach that will help malware detection systems be more accurate by detecting pertinent and significant traits. Furthermore, by selecting the most important features, it is possible to maintain an acceptable level of accuracy in the detection of malware while significantly lowering the computational cost. The proposed method displays the most important features (MIFs) obtained from each machine learning method, including data cleaning and feature selection. Furthermore, the method applies six machine learning classification techniques to the selected feature set. Several classifiers were evaluated based on several characteristics for malware detection, including Support Vector Machines (SVM), Logistic Regression (LR), K-nearest neighbor (K-NN), Decision Tree (DT), Naive Bayes (NB), and Random Forest (RF). Our suggested model was tested on two malware datasets to determine its effectiveness. In terms of accuracy, precision, F1 scores, and recall, the experimental findings show that RF and DT classifiers beat other techniques.
- Institutional Email: javed@nstu.edu.bd
- Personal Email: javed.nstu@gmail.com
- Mobile number: 01718175139
- Emergency Contact: 01883009974
- PABX: 0321-61444
- Website: N/A
SOCIAL PROFILES
Department
Computer Science and Telecommunication Engineering
Noakhali Science and Technology University