Skip to main content
    • by 
    •   10  
      Library ScienceDigital LibrariesSouth AsiaDigital Preservation
    • by 
The study conducted at the International Islamic University Chittagong (IIUC) in Bangladesh delves into the intricate process of implementing the Islamization of knowledge. It meticulously traces the historical roots and evolutionary path... more
    • by 
    •   2  
      BangladeshIslamization of Knowledge
The purpose of the study is to describe and analyze the present condition of digital preservation of institutional publications in the libraries of higher educational institutions especially in public universities of Bangladesh. It... more
    • by 
    • Digital Library
Purpose The goal of this paper is to examine the literature published on information literacy (IL) between 2017 and 2021 and reveal the most important trends in IL publication. Design/methodology/approach Scopus database was used to... more
    • by 
    • Social Media
This study evaluated the performance of the central library at International Islamic University Chittagong in Bangladesh and tried to measure the operational process of "Koha open source integrated library system (ILS)" at IIUC,... more
    • by 
    •   5  
      Library ScienceAcademic LibrariesLibrary and Information ScienceDigital Library
Inappropriate use of antimicrobials in the treatment of Covid-19 can result in patient harm and worldwide antimicrobial resistance. The study's objective was to explore the physician choices of empirical antimicrobial treatment in... more
    • by 
ABSTRACT In the past one hundred years,China's librarianship has developed and thrived from scratch and has been widely accepted as an independent discipline within the academia,owing to the strenuous efforts made by generations of... more
    • by 
    • History of Library and Information Science
    • by 
    • by 
In statistics and machine learning, feature selection is the process of picking a subset of relevant attributes for utilizing in a predictive model. Recently, rough set-based feature selection techniques, that employ feature dependency to... more
    • by  and +1
    •   2  
      Machine LearningData Mining
The traditional security risk monitoring technology cannot adapt to cyber-physical power systems (CPPS) concerning evaluation criteria, real-time monitoring, and technical reliability. The aim of this paper is to propose and implement a... more
    • by 
    •   2  
      Intrusion Detection SystemsEnsemble Learning
Personal health records (PHRs) are private and vital assets for every patient. There have been introduced many works on various aspects of managing and organizing the PHR so far. However, there is an uncertain remaining issue for the role... more
    • by 
    •   2  
      Health Care Managementblockchain security
Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and... more
    • by 
    •   3  
      Steganography and CryptographyText SteganographyText Steganalysis
Genetic Programming (GP) is an intelligence technique whereby computer programs are encoded as a set of genes which are evolved utilizing a Genetic Algorithm (GA). In other words, the GP employs novel optimization techniques to modify... more
    • by 
    •   2  
      Genetic ProgrammingGenetic Algorithms
Nowadays, a huge number of images are available. However, retrieving a required image for an ordinary user is a challenging task in computer vision systems. During the past two decades, many types of research have been introduced to... more
    • by 
    •   2  
      Deep LearningImage Annotation
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most... more
    • by 
    •   3  
      Digital CopyrightText WatermarkingCopyrights Protection
With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people's daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking,... more
    • by 
    •   3  
      Applied CryptographyText SteganographyCovert Communication
Nowadays, the usage of smartphones and their applications have become rapidly popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly... more
    • by 
    •   3  
      Malware AnalysisMalware Detectionmobile malware
Blockchain technology is the most trusted all-in-one cryptosystem that provides a framework for securing transactions over networks due to its irreversibility and immutability characteristics. Blockchain network, as a decentralized... more
    • by 
    • Healthcare