Nanjing University
Information management
The study conducted at the International Islamic University Chittagong (IIUC) in Bangladesh delves into the intricate process of implementing the Islamization of knowledge. It meticulously traces the historical roots and evolutionary path... more
The purpose of the study is to describe and analyze the present condition of digital preservation of institutional publications in the libraries of higher educational institutions especially in public universities of Bangladesh. It... more
Purpose The goal of this paper is to examine the literature published on information literacy (IL) between 2017 and 2021 and reveal the most important trends in IL publication. Design/methodology/approach Scopus database was used to... more
This study evaluated the performance of the central library at International Islamic University Chittagong in Bangladesh and tried to measure the operational process of "Koha open source integrated library system (ILS)" at IIUC,... more
Inappropriate use of antimicrobials in the treatment of Covid-19 can result in patient harm and worldwide antimicrobial resistance. The study's objective was to explore the physician choices of empirical antimicrobial treatment in... more
ABSTRACT In the past one hundred years,China's librarianship has developed and thrived from scratch and has been widely accepted as an independent discipline within the academia,owing to the strenuous efforts made by generations of... more
The traditional security risk monitoring technology cannot adapt to cyber-physical power systems (CPPS) concerning evaluation criteria, real-time monitoring, and technical reliability. The aim of this paper is to propose and implement a... more
Personal health records (PHRs) are private and vital assets for every patient. There have been introduced many works on various aspects of managing and organizing the PHR so far. However, there is an uncertain remaining issue for the role... more
Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and... more
Genetic Programming (GP) is an intelligence technique whereby computer programs are encoded as a set of genes which are evolved utilizing a Genetic Algorithm (GA). In other words, the GP employs novel optimization techniques to modify... more
Nowadays, a huge number of images are available. However, retrieving a required image for an ordinary user is a challenging task in computer vision systems. During the past two decades, many types of research have been introduced to... more
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most... more
With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people's daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking,... more
Nowadays, the usage of smartphones and their applications have become rapidly popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly... more
Blockchain technology is the most trusted all-in-one cryptosystem that provides a framework for securing transactions over networks due to its irreversibility and immutability characteristics. Blockchain network, as a decentralized... more