Dr Morshed Chowdhury

STAFF PROFILE

Position

Senior Lecturer

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

Publications

Filter by

2018

Universal and secure object ownership transfer protocol for the internet of things

B Ray, J Abawajy, M Chowdhury, A Alelaiwi

(2018), Vol. 78, pp. 838-849, Future generation computer systems, Amsterdam, The Netherlands, C1

journal
2017

Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: Magneto optic sensors

P Sarkar, M Chowdhury, K Sakurai

(2017), pp. 1-13, Concurrency Computation, Chichester, Eng., C1

journal

Secure IoT using weighted signed graphs

P Sarkar, M Chowdhury

(2017), Vol. 198 LNICST, pp. 241-256, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, E1

conference

A multi-protocol security framework to support internet of things

B Ray, M Chowdhury, J Abawajy

(2017), Vol. 198, pp. 257-270, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Guangzhou, China, E1

conference

Adjusting matryoshka protocol to address the scalability issue in IoT environment

G Al, R Doss, M Chowdhury

(2017), Vol. 759, pp. 84-94, Communications in Computer and Information Science, E1

conference

Is high performance computing (HPC) ready to handle big data?

B Ray, M Chowdhury, U Atif

(2017), Vol. 759, pp. 97-112, FNSS 2017 : Proceedings of the 3rd International Conference on Future Network Systems and Security 2017, Gainesville, Florida, E1

conference

A smart framework towards providing benefits for one and all

T Hochin, H Nomiya, H Lima, M Chowdhury

(2017), pp. 129-132, ACIT-CSII-BCD 2016 : Proceedings of the 4th International Conference on Applied Computing and Information Technology, 3rd International Conference on Computational Science/Intelligence and Applied Informatics, 1st International Conference on Big Data, Cloud Computing, Data Science and Engineering, Las Vegas, Nevada, E1

conference

Fine-grained energy consumption model of servers based on task characteristics in cloud data center

Z Zhou, J Abawajy, F Li, Z Hu, M Chowdhury, A Alelaiwi, K Li

(2017), pp. 1-11, IEEE access, Piscataway, N.J., C1

journal
2016

Enhancing predictive accuracy of cardiac autonomic neuropathy using blood biochemistry features and iterative multitier ensembles

J Abawajy, A Kelarev, M Chowdhury, H Jelinek

(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1

journal

A clustering-based multi-layer distributed ensemble for neurological diagnostics in cloud services

M Chowdhury, J Abawajy, A Kelarev, H Jelinek

(2016), pp. 1-12, IEEE transactions on cloud computing, Piscataway, N.J., C1

journal

Matrix constructions of centroid sets for classification systems

M Chowdhury, J Abawajy, H Jelinek, A Kelarev, J Ryan

(2016), Vol. 30, pp. 2397-2403, Filomat, Nios, Serbia, C1

journal

Secure object tracking protocol for the internet of things

B Ray, M Chowdhury, J Abawajy

(2016), Vol. 3, pp. 544-553, IEEE journal of internet of things, Piscataway, N.J., C1

journal

Inductive hierarchical identity based key agreement with pre-deployment interactions (I-H-IB-KA-pdi)

P Sarkar, M Chowdhury

(2016), Vol. 651, pp. 106-114, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept

G Al, R Doss, M Chowdhury, B Ray

(2016), Vol. 670, pp. 126-141, FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security, Paris, France, E1

conference

Multilayer hybrid strategy for phishing email zero-day filtering

M Chowdhury, J Abawajy, A Kelarev, T Hochin

(2016), pp. 1-12, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal
2015

Secure object tracking protocol for networked RFID systems

B Ray, M Chowdhury, J Abawajy, M Jesmin

(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1

conference

A novel approach to maximize the sum-rate for MIMO broadcast channels

M Khan, R Islam, M Chowdhury

(2015), pp. 1-5, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1

conference

Connected P-percent coverage in wireless sensor networks based on degree constraint dominating set approach

H Mostafaei, M Chowdhury, R Islam, H Gholiadeh

(2015), pp. 157-160, MSWiM 2015: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Cancun, Mexico, E1

conference

Securing sensor networks by moderating frequencies

P Sarkar, P Mahish, M Chowdhury, K Sakurai

(2015), Vol. 153, pp. 173-185, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II, Berlin, Germany, B1

chapter

Defence against code injection attacks

H Alnabulsi, Q Mamun, R Islam, M Chowdhury

(2015), Vol. 153, pp. 237-251, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II, Berlin, Germany, B1

chapter

Image spam classification using neural network

M Chowdhury, J Gao, M Chowdhury

(2015), Vol. 164, pp. 622-632, SecureComm 2015 : Proceedings of the 11th International Conference on Security and Privacy in Communication Networks, Dallas, Texas, E1

conference

Multi-layer attribute selection and classification algorithm for the diagnosis of cardiac autonomic neuropathy based on HRV attributes

H Jelinek, J Abawajy, J Cornforth, A Kowalczyk, M Negnevitsky, M Chowdhury, R Krones, A Kelarev

(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1

journal

Hybrid consensus pruning of ensemble classifiers for big data malware detection

J Abawajy, M Chowdhury, A Kelarev

(2015), Vol. 3, pp. 1-11, IEEE transactions on cloud computing, Piscataway, N.J., C1-1

journal
2014

Fingertips detection for human interaction system

M Alam, G Nasierding, A Sajjanhar, M Chowdhury

(2014), pp. 1-5, ICGIP 2013 : Proceedings of the 5th International Conference on Graphic and Image Processing, Hong Kong, E1

conference

Iterative construction of hierarchical classifiers for phishing website detection

J Abawajy, G Beliakov, A Kelarev, M Chowdhury

(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1

journal

Scalable RFID security framework and protocol supporting Internet of Things

B Ray, J Abawajy, M Chowdhury

(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1

journal

vPELS : An e-learning social environment for VLSI design with content security using DRM

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1

journal

Large iterative multitier ensemble classifiers for security of big data

J Abawajy, A Kelarev, M Chowdhury

(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1

journal

A framework for mobile elearning (mLearning) with analytical decision model

J Dewan, M Chowdhury

(2014), pp. 1-5, SNPD 2014 IEEE/ACIS 15th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing : Proceedings, Las Vegas, Nevada, E1

conference

A competitive three-level pruning technique for information security

M Chowdhury, J Abawajy, A Kelarev, K Sakurai

(2014), Vol. 490, pp. 25-32, Communications in Computer and Information Science, Berlin, Germany, B1

chapter

RFID tag ownership transfer protocol for a closed loop system

G Aliyev, B Ray, M Chowdhury

(2014), pp. 575-579, Proceedings of the 3rd International Conference on Advanced Applied Informatics; IIAI-AAI 2014, Kitakyushu, Japan, E1

conference

Intelligent Billboard Based on Ambient System (IBBAS)

B Alrubaiey, M Chowdhury, A Sajjanhar

(2014), pp. 1-17, Applied computing and information technology, Berlin, Germany, B1

chapter

Securing a smart anti-counterfeit web application

B Chowdhury, M Chowdhury, J Abawajy

(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1

journal

Automatic generation of meta classifiers with large levels for distributed computing and networking

Jemal Abawajy, Andrei Kelarev, Morshed Chowdhury

(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1

journal

Decision Trees and Multi-level Ensemble Classifiers for Neurological Diagnostics

H Jelinek, J Abawajy, A Kelarev, M Chowdhury, A Stranieri

(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1

journal

PUF-based secure checker protocol for Networked RFID Systems

B Ray, M Chowdhury, J Abawajy

(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Subang Jaya, Malaysia, E1

conference

PELS: A noble architecture and framework for a personal E-learning system (PELS)

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1

journal

Impact of Assurance of Learning (AOL) in programming course for novices

S Iqbal Malik, R Mathew, M Chowdhury, J Coldwell-Neilson

(2014), pp. 1-5, BCS 2014 : Proceedings of 2nd BCS The Chartered Institute for IT International Conference, Abu Dhabi, United Arab Emirates, E1

conference
2013

StenoCipher to provide data confidentiality and tampered data recovery for RFID tag

B Ray, M Chowdhury, J Abawajy

(2013), pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1

chapter

Multimedia stream rate control over MANET based on router feedback

N Zaman, M Chowdhury

(2013), pp. 53-68, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1

chapter

Security risks/vulnerability in a RFID system and possible defenses

M Chowdhury, B Ray

(2013), pp. 1-15, Advanced RFID systems, security, and applications, Hershey, Pa., B1

chapter

Critical analysis and comparative study of security for networked RFID systems

B Ray, M Chowdhury, J Abawajy

(2013), pp. 197-202, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, Honolulu, Hawaii, E1

conference

eLearning content authentication using bipartite matching

J Dewan, M Chowdhury, L Batten

(2013), pp. 51-55, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Honolulu, Hawaii, E1

conference

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy

A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek

(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1

journal

An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents

J Dewan, M Chowdhury, L Batten

(2013), Vol. 10, pp. 236-241, E-Learning and digital media, Oxford, England, C1

journal

Mobile devices supported learning for novice programmers

S Iqbal, M Chowdhury, O Harsh

(2013), pp. 277-282, ICEEE 2013 : Proceedings of the 2nd International Conference on e-Learning and e-Technologies, Lodz, Poland, E1

conference

Securing a web-based anti-counterfeit RFID system

B Chowdhury, M Chowdhury, J Abawajy

(2013), pp. 342-355, Security and privacy in communication networks, Cham, Switzerland, B1

chapter

Smart Interactive Advertising Board (SIAB)

B Al-Rubaie, B Al-Rubaie, M Chowdhury, M Chowdhury, A Sajjanhar, A Sajjanhar

(2013), pp. 312-317, IIAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, Matsue, Japan, E1

conference

A framework for mobile elearning (mlearning) with content security and authentication

J Dewan, M Chowdhury

(2013), pp. 95-99, IIAI AAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, Matsue, Japan, E1

conference

Multistage approach for clustering and classification of ECG data

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 112, pp. 720-730, Computer methods and programs in biomedicine, Amsterdam, The Netherlands, C1

journal

Power graphs : a survey

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, [Indonesia], C1

journal

Detection of fingertips based on the combination of color information and circle detection

M Alam, M Chowdhury

(2013), pp. 572-576, ICIIS 2013 : Proceedings of the 8th IEEE International Conference on Industrial and Information Systems, Peradeniya, Sri Lanka, E1

conference

Predicting cardiac autonomic neuropathy category for diabetic data with missing values

J Abawajy, A Kelarev, M Chowdhury, A Stranieri, H Jelinek

(2013), Vol. 43, pp. 1328-1333, Computers in biology and medicine, Amsterdam, The Netherlands, C1

journal

The challenges of cloud computing technology adoption in e-government

M Abdul Aziz, J Abawajy, M Chowdhury

(2013), pp. 1-5, ACSAT 2013 : Proceedings of the Advanced Computer Science Applications and Technologies 2013 international conference, Sarawak, Malaysia, E1

conference
2012

Secure mobile RFID ownership transfer protocol to cover all transfer scenarios

B Ray, M Chowdhury, J Abawajy

(2012), pp. 1185-1192, ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, Seoul, Korea, E1

conference
2011

Security of RFID systems - a hybrid approach

S Mukherjee, M Hasan, B Chowdhury, M Chowdhury

(2011), pp. 58-63, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1

conference

Smart RFID reader protocol for malware detection

B Ray, S Huda, M Chowdhury

(2011), pp. 64-69, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1

conference

A framework for elearning with social media using DRM

J Dewan, M Chowdhury, S Hossain, J Dewan

(2011), pp. 229-234, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1

conference

Key predistribution scheme using finite fields and reed muller codes

P Sarkar, M Chowdhury

(2011), pp. 67-79, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1

chapter

Web health portal to enhance patient safety in Australian healthcare systems

B Chowdhury, M Chowdhury, C D'Souza, N Sultana

(2011), pp. 91-101, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1

chapter

Detecting unknown anomalous program behavior using API system calls

M Islam, M Islam, M Chowdhury

(2011), pp. 383-394, Informatics engineering and information science, Berlin, Germany, B1

chapter

Detecting unwanted email using VAT

M Islam, M Chowdhury

(2011), pp. 113-126, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1

chapter

Optimization and matrix constructions for classification of data

A Kelarev, J Yearwood, P Vamplew, J Abawajy, M Chowdhury

(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1

journal

vPELS : an eLearning social environment for VLSI design with content security using DRM

J Dewan, M Chowdhury

(2011), pp. 37-42, SSNE 2011 : Proceedings of the 1st ACIS International Symposium on Software and Network Engineering, Seoul, Korea, E1

conference
2010

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal

Faster CRT-RSA Decryption towards RFID applications

S Maitra, S Sarkar, M Chowdhury

(2010), pp. 61-72, RFIDsec'10 : Proceedings of the 2010 Radio Frequency Identification System Security Workshop, Singapore, E1

conference

Enhanced RFID mutual authentication scheme based on shared secret information

B Ray, M Chowdhury

(2010), pp. 208-213, CAINE 2010 : Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nev., E1

conference

Mutual authentication with malware protection for a RFID system

R Biplob, M Chowdhury, T Pham

(2010), pp. 24-29, ITS 2010 : Proceedings of the Annual International Conference on Information Technology Security, Phuket, Thailand, E1

conference

Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes

P Sarkar, A Saha, M Chowdhury

(2010), pp. 507-512, IEEE MASS 2010 : Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, San Francisco, Calif., E1

conference
2009

Improving the qos for information discovery in autonomic wireless sensor networks

R Doss, G Li, V Mak, S Yu, M Chowdhury

(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1

journal

Minimizing the drawbacks of grey-list analyser in synthesis based spam filtering

M Islam, M Chowdhury

(2009), Vol. 11, pp. 89-96, Journal of electronics and computer science, [U.S.A.], C1

journal

Real-time early infectious outbreak detection systems using emerging technologies

B Chowdhury, M Chowdhury, N Sultana

(2009), pp. 506-508, ARTCom 2009 : Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, Kerala, E1

conference
2008

Challenges relating to RFID implementation within the electronic supply chain management - a practical approach

B Chowdhury, M Chowdhury, C D`Souza

(2008), pp. 49-59, Software engineering, artificial intelligence, networking and parallel/distributed computing, Berlin, Germany, B1

chapter

Real-time secured RFID-based smart healthcare management system

B Chowdhury, R Khosla, M Chowdhury

(2008), Vol. 9, pp. 21-28, ACIS international journal of computer & information science, Mt. Pleasant, Mich., C1

journal

Dynamic feature selection for spam filtering using support vector machine

M Islam, W Zhou, M Chowdhury

(2008), Vol. 9, pp. 41-50, ACIS international journal of computer & information science, Mt. Pleasant, Mich., C1

journal

The crossroads approach to information discovery in wireless sensor networks

R Doss, G Li, S Yu, V Mak, M Chowdhury

(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1

journal

Real-time RFID-based secured loan document management system

B Chowdhury, M Chowdhury, C D`Souza

(2008), pp. 484-489, ICITA 2008 : Proceedings of the 5th International Conference on Information Technology and Applications, Cairns, Queensland, E1

conference

Email categorization using (2+1)-tier classification algorithms

M Islam, W Zhou, M Chowdhury

(2008), pp. 276-281, ICIS 2008 : Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science 2008, Portland, Oregon, E1-1

conference
2007

Dynamic feature selection for spam filtering using support vector machine

M Islam, W Zhou, M Chowdhury

(2007), pp. 757-762, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

Acoustic features extraction for emotion recognition

J Rong, Y Chen, M Chowdhury, G Li

(2007), pp. 419-424, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

Fast scene change detection based histogram

M Chowdhury, R Rahman, J Saha, S Kabir

(2007), pp. 229-233, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

Fingerprint recognition system using hybrid matching techniques

A Youssif, M Chowdhury, S Ray, H Nafaa

(2007), pp. 234-240, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

A comparison of bipartite N-Qubit states to classify entangled states under symmetric consideration

A Ahmed, A Rahman, M Anwer, N Haque, M Chowdhury

(2007), pp. 291-295, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

RFID-based real-time smart waste management system

B Chowdhury, M Chowdhury

(2007), pp. 175-180, ATNAC 2007 : Australasian Telecommunication Networks and Applications Conference 2007, Christchurch, New Zealand. Sunday 2 December-Wednesday 5 December 2007., Christchurch, New Zealand, E1

conference
2006

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

Topology based packet marking for IP traceback

H Alwis, R Doss, P Hewage, M Chowdhury

(2006), pp. 224-228, Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, E1

conference

Energy efficient on-demand addressing for wireless sensor networks

P Hewage, R Doss, H Alwis, M Chowdhury

(2006), pp. 324-328, ATNAC : Proceedings of the Australian Telecommuncation Networks and Applications Conference, 2006, Melbourne, Victoria, E1

conference

A new approach for security in internet mobile communication

M Islam, M Chowdhury, M Morogan

(2006), pp. 171-175, ICNEWS 2006 : proceedings of First International Conference on Next-Generation Wireless Systems 2006, Dhaka, Bangladesh, E1

conference

A novel method for person identification by comparing retinal patterns

R Rahman, M Chowdhury, S Kabir, M Khan

(2006), pp. 14-17, CAINE-2006. proceedings : 19th International Conference on Computer Applications in Industry and Engineering : (CAINE-2006) : Nov. 13-15, 2006, Las Vegas, Nevada, USA, Las Vegas, Nevada, E1

conference

Session initiation protocol (SIP) based event notification system architecture for telemedicine applications

A Sadat, S Sorwar, M Chowdhury

(2006), pp. 214-218, 5th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2006) in conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (COMSAR 2006) : proceedings : 10-12, Honolulu, Hawaii, E1

conference
2005

Priority frequency maptable for query optimization using materialized views

M Islam, M Chowdhury

(2005), pp. 15-18, ICIT 2005 : Human computer interaction : Proceedings of the 2nd International Conference on Information Technology, Amman, Jordan, E1

conference

Spam filtering using ML algorithms

M Islam, M Chowdhury

(2005), pp. 419-426, Proceedings of the IADIS international conference WWW/Internet 2005, Lisbon, Portugal, E1

conference

An innovative spam filtering model based on support vector machine

M Islam, M Chowdhury, W Zhou

(2005), pp. 348-353, CIMCA 2005 jointly with IAWTIC 2005 : proceedings, Vienna, Austria, E1

conference

Improved learning algorithm performance using linear kernal transformation

S Ali, M Chowdhury

(2005), pp. 164-167, ISCA 2005 : Computers and their applications : proceedings of the International Society for Computers and their Applications 20th International Conference, New Orleans, Louisiana, USA, March 16-18, 2005, New Orleans, Louisiana, E1

conference

Impact of image organizations on multimedia document retrieval

N Haque, M Chowdhury, S Rahman

(2005), pp. 340-343, Fourth Annual ACIS International Conference on Computer and Information Science, Jeju Island, South Korea, E1

conference

Computer aided analysis of dental radiographic images

A Youssif, M Chowdhury, S Ray

(2005), pp. 43-43, Proceedings of the Digital Image Computing : Techniques and Applications : (DICTA 2005), Cairns, Queensland, E1

conference

An algorithm for efficient and effective retrieval of heterogeneous multimedia document collections

N Haque, M Chowdhury, T Pham

(2005), pp. 438-444, Proceedings of the International Conference on Cognition and Recognition, 22-23 December 2005, Mandya, India, E1

conference
2004

GHIRS: integration of hotel management systems by web services

Y Xiang, W Zhou, M Chowdhury

(2004), Vol. 3033, pp. 1002-1009, Lecture notes in computer science, Berlin, Germany, C1

journal

Filtering mobile spam by support vector machine

Y Xiang, M Chowdhury, S Ali

(2004), pp. 1-4, CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1

conference

Performance of statistical inference for block classification in reducing blocking artefact in video coded images

M Chowdhury, S Ray, T Pham

(2004), pp. 1-4, CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1

conference

Performance analysis of algorithms for frequent pattern generation

M Islam, M Chowdhury, S Khan

(2004), pp. 43-55, Complex 2004: Proceedings of the 7th Asia-Pacific Complex Systems Conference, Cairns, Australia, E1

conference

Medical image classification using an efficient data mining technique

M Islam, M Chowdhury, S Khan

(2004), pp. 34-42, Complex 2004 : Proceedings of the 7th Asia-Pacific Complex Systems Conference, Cairns, Qld., E1

conference

Block identification for reducing blocking artefact in MPEG-1 video coded images using statistical inference and performance measurement using block impairment metric (BIM)

M Chowdhury, S Ray, T Pham

(2004), pp. 143-147, Computer applications in industry and engineering : proceedings of the ISCA 17th international conference : Orlando, Florida, USA, November 17-19, 2004, Orlando, USA, E1

conference

A performance comparison of three wireless multi hop ad-hoc network routing protocols when streaming MPEG4 traffic

M Chowdhury, D Perera, T Pham

(2004), pp. 516-521, Proceedings of INMIC 2004 : 8th International Multitopic Conference : December 24-26, 2004, National University of Computer and Emerging Sciences, Lahore, Pakistan, Lahore, Pakistan, E1

conference

A comparative study of image cropping algorithms on multimedia retrieval

N Haque, M Chowdhury

(2004), pp. 1-5, International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1

conference
2003

A simulation model for video traffic performance via ATM over TCP/IP

M Chowdhury, Y Tu, T Pham

(2003), pp. 197-202, ISCA 2003 : Computer applications in industry and engineering : proceedings of the ISCA 16th international conference, Las Vegas, USA, E1

conference

Block identification using entropic method for reducing blocking artefacts in block based transform coded images

M Chowdhury, S Ray, T Pham

(2003), pp. 454-457, CSITeA`03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1

conference

MPEG Traffic Performance via TCP over ATM

M Chowdhury, Y Tu, T Pham

(2003), pp. 128-132, CSITeA`03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1

conference

Web service based wagering system for the best odds

A Sajjanhar, Z Ying, M Chowdhury

(2003), pp. 242-245, Intelligent and adaptive systems and software engineering : Proceedings of the ISCA, 12th International Conference, San Francisco, CA, USA, July 9-11, 2003, San Francisco, California, E1

conference

A vision for a multimedia knowledge management framework

W Dai, M Chowdhury, D Prager, M Alam

(2003), pp. 430-433, Computers and their applications : proceedings of the ISCA 18th international conference, Honolulu, Hawaii, USA March 26-28, 2003, Honolulu, Hawaii, USA, E1

conference

Reducing blocking artefacts in MPEG video coded images using entropic methods

M Chowdhury, S Ray, T Pham

(2003), pp. 213-216, Advances in Pattern Recognition (ICAPR-2003), Kolkata, India, E1

conference

The major drawbacks to the use of wireless communication products in education

L Batten, M Chowdhury, J Drew

(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Quality-of-service routing for web-based multimedia servers

S Yu, W Zhou, M Chowdhury

(2003), pp. 1349-1353, Proceedings of the 7th Joint Conference on Information Sciences : September 26 - 30, 2003, Research Triangle Park, North Carolina, USA, Cary, N. C., E1

conference

Image semantic classification by using SVM

H Wan, M Chowdhury

(2003), Vol. 14, pp. 1891-1899, Journal of software, Beijing, China, C1

journal

?????????CBIR????

W Hualin, M Chowdhury, H Hong, S Zhongzhi

(2003), Vol. 15, pp. 195-199, Journal of computer aided design and computer graphics, Beijing, China, C1

journal

A parameter adjustment method for relevance feedback

H Wan, M Chowdhury, A Sajjanhar

(2003), pp. 619-625, CISST 2003 : Proceedings of the international conference on imaging science, systems, and technology, Las Vegas, Nevada, E1

conference

A scheme for content based retrieval of music data in MIDI format

S Subramanya, M Chowdhury, T Pham, S Shankar

(2003), pp. 159-162, ISCA 2003 : Computer applications in industry and engineering : proceedings of the ISCA 16th international conference, Las Vegas, USA, E1

conference

Image retrieval based on the combination of color and keyword

Y Jiang, Z Zhou, M Chowdhury

(2003), pp. 450-453, CSITeA'03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1

conference

Nonlinear discrimination using support vector machine

A Ali, M Chowdhury, S Subramanya

(2003), pp. 287-290, Computers and their applications: proceedings of the ISCA 18th international conference, Honolulu, Hawaii, E1

conference
2002

A new approach for reducing blocking artefacts using linear filter for block based transform coded images

M Chowdhury, S Ray, T Pham

(2002), pp. 1-4, ACIS 2002 : International Conference on Computer Science, Information Technology, e-Business, and Applications (CSITeA '02), Foz do Iguazu, Brazil, E1

conference

A new texture spectrum descriptor and its application in image semantic classification

H Wan, M Chowdhury, H Hu, Z Shi

(2002), pp. 176-179, Computers and their applications : proceedings of the ISCA 17th International Conference, San Francisco, California, USA, April 4-6, 2002, San Francisco, California, E1

conference

Adaptive DCT coding of images using block categorization

S Subramanya, M Chowdhury, T Pham

(2002), pp. 386-390, CISST'02 : proceedings of the International Conference on Imaging Science, Systems, and Technology : Las Vegas, Nevada, USA, June 24-27, 2002, Las Vegas, Nevada, E1

conference

Eliminating of the drawback of existing testing technique of easily testable PLAs using an improved testing algorithm with product line rearrangement

M Islam, M Chowdhury

(2002), pp. 239-242, International Society for Computers and their Applications : 15th International conference on computer applications in industry and engineering, San Diego, California, USA, E1

conference
2001

Block identifications for minimising inter-block discontinuity in MPEG-1 video coded images using statistical inference

M Chowdhury, T Pham

(2001), pp. 189-192, Computer applications in industry and engineering : proceedings of the ISCA 14th International Conference, Las Vegas, Nevada, U.S.A., November 27-29, 2001, Las Vegas, Nevada, USA, E1

conference

Retrieval of multimedia documents using low cost image ranking algorithms

N Haque, M Chowdhury

(2001), pp. 41-44, Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering., Las Vegas, Nevada, E1

conference

Designing wave digital filters with finite word length coefficient in the time and frequency domain

S Sorwar, M Chowdhury

(2001), pp. 250-253, The Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nevada, USA, E1

conference

Image featuring for retrieval of multimedia documents

N Haque, M Chowdhury

(2001), pp. 427-432, 2001 International Conferences on Info-Tech and Info-Net : proceedings : ICCII 2001-Beijing, October 29-November 1, 2001, Beijing, China, Beijing, China, E1

conference

An intelligent forex monitoring system

A Abraham, M Chowdhury

(2001), pp. 523-528, 2001 International Conferences on Info-Tech and Info-Net : proceedings : ICCII 2001-Beijing, October 29-November 1, 2001, Beijing, China, Beijing, China, E1

conference

Funded Projects at Deakin

No Funded Projects at Deakin found

Supervisions

Principal Supervisor
2017

Jahangir Dewan

Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Biplob Ray

Thesis entitled: Security framework and protocols for the internet of things

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2016

Benjamin Jonathan Townsend

Thesis entitled: A Carrier Agnostic Bio-Monitoring Communications Platform

Doctor of Philosophy (Information Technology), School of Information Technology

Baker Alrubaiey

Thesis entitled: Assuring Virtual Network Reliability and Resilience

Doctor of Philosophy (Information Technology), School of Information Technology

Sara Ghanavati

Thesis entitled: Congestion Control Mechanism for Sensor-Cloud Infrastructure

Master of Science (Information Technology), School of Information Technology

2015

Isredza Rahmi A Hamid

Thesis entitled: Phishing Detection and Traceback Mechanism

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Davood Izadi

Thesis entitled: Enhancing Wireless Sensor Networks Functionalities

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Mahbub Ahmed

Thesis entitled: Security in cloud computing

Doctor of Philosophy (Information Technology), School of Information Technology

2010

Yiqing Tu

Thesis entitled: Efficient Dimensionality Reduction and One-class Classification for Content-based Image Retrieval

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ke Li

Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems

Doctor of Philosophy (Information Technology), School of Information Technology

2007

Yang Xiang

Thesis entitled: A Distributed Active Defense System against DDoS Attacks

Doctor of Philosophy (Information Technology), School of Information Technology