Skip to content

Commit

Permalink
Update index.html
Browse files Browse the repository at this point in the history
  • Loading branch information
jahid-jabed authored Jun 12, 2024
1 parent be3a3a9 commit 8cefcd3
Showing 1 changed file with 39 additions and 4 deletions.
43 changes: 39 additions & 4 deletions publications/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -43,24 +43,59 @@
<!--================ Body Area =================-->
<div class="container vertical-center justify">
<div class="row">
<div class="col-md-12 col-12">
<h2><strong><a href="https://link.springer.com/article/10.1007/s42979-024-02824-2" target="_blank" style="text-decoration: none;"><br>1. iTrustBD</a></strong></h2>
<p>
<strong>iTrustBD: Study and Analysis of Bitcoin Networks to Identify the Influence of Trust Behavior Dynamics</strong>
</p>
<p>
<code>cryptocurrency</code> <code>network_analysis</code> <code>epidemic_spread</code> <code>behavior_dynamics</code> <code>trusty</code>
</p>
<p>
<b><br>Citation:</b><br><b>M. J. Islam</b>, M. R. Islam, and M. A. Basar. "iTrustBD: Study and Analysis of Bitcoin Networks to Identify the Influence of Trust Behavior Dynamics", <i>SN Computer Science</i>, 2024, Vol: 5, 476, doi: <a href="https://doi.org/10.1007/s42979-024-02824-2" target="_blank" style="text-decoration: none;">10.1007/S42979-024-02824-2</a>.
</p>
<p>
<b><br>Abstract:</b><br>The concept of cryptocurrency is a significant advancement in digital currencies. “Cryptocurrency” refers to a form of electronic or virtual currency that is secured through the application of encryption. It is a common practice to trade cryptocurrencies on decentralized exchanges where neither governments nor financial institutions can exert any form of authority over them. This being the case that cryptocurrencies are not regulated either by the government or financial institutions presents a potential risk for investors. Although a few nations have authorized cryptocurrency, the vast majority of nations, including Bangladesh, have not recognized it due to concerns over the safety of the cryptocurrency system. In this paper, we analyze cryptocurrency networks, “Bitcoin Alpha trust weighted signed network” and “Bitcoin OTC trust weighted signed network”. Following an investigation into the characteristics of the networks, we came to the conclusion that they are robust and reliable, as well as capable of withstanding any kind of attack. Additionally, we forecast the future condition of the trader’s conduct in terms of trustworthiness; as a consequence, we identified more trustworthy behaviors on the behalf of traders. As a result, this work has the potential to make a contribution to the process of legalizing cryptocurrency transactions.
</p>
<p><br></p>
</div>


<div class="col-md-12 col-12">
<h2><strong><a href="https://ieeexplore.ieee.org/document/10464900/" target="_blank" style="text-decoration: none;"><br>2. Modern GC</a></strong></h2>
<p>
<strong>Performance Analysis of Modern Garbage Collectors using Big Data Benchmarks in the JDK 20 Environment</strong>
</p>
<p>
<code>garbage</code> <code>collectors</code> <code>big_data</code> <code>memory_management</code> <code>jdk_20</code>
</p>
<p>
<b><br>Citation:</b><br><b>M. J. Islam</b>, A. M. Rahman, and S. Rana. "Performance Analysis of Modern Garbage Collectors using Big Data Benchmarks in the JDK 20 Environment", <i>2023 5th International Conference on Sustainable Technologies for Industry 5.0 (STI)</i>, 2023, doi: <a href="https://doi.org/10.1109/STI59863.2023.10464900" target="_blank" style="text-decoration: none;">10.1109/STI59863.2023.10464900</a>.
</p>
<p>
<b><br>Abstract:</b><br>Garbage collection is a fundamental aspect of Java Virtual Machine (JVM) memory management, and choosing the optimal garbage collector is essential for attaining optimal application performance. In this work, we conduct experiments with the big data benchmarks from DaCapo and Renaissance benchmark suites in both fixed and variable heap environments to determine the efficacy of JDK 20's garbage collectors. The ZGC algorithm has the highest throughput and the shortest pause periods, whereas the Serial GC algorithm has the lowest throughput and the longest pause intervals. Additionally, it is discovered that the G1 algorithm manages the previous generation heap and metaspace less efficiently. Our work offers valuable insights into the efficacy of garbage collection algorithms and can aid application developers in selecting the optimal garbage collection algorithm. Our investigation can be expanded by analyzing additional benchmark suites and garbage collection algorithms across a broader range of heap sizes in future work.
</p>
<p><br></p>
</div>

<div class="col-md-12 col-12">
<h2><strong><a href="https://www.sciencedirect.com/science/article/pii/S0957417423004207" target="_blank" style="text-decoration: none;"><br>1. Rating Calculation</a></strong></h2>
<h2><strong><a href="https://www.sciencedirect.com/science/article/pii/S0957417423004207" target="_blank" style="text-decoration: none;"><br>3. Rating Calculation</a></strong></h2>
<p>
<strong>Actual rating calculation of the zoom cloud meetings app using user reviews on google play store with sentiment annotation of BERT and hybridization of RNN and LSTM</strong>
</p>
<p>
<code>reviews</code> <code>ratings</code> <code>sentiment</code> <code>zoom_app</code> <code>bert</code> <code>rnn</code> <code>lstm</code>
</p>
<p>
<b><br>Citation:</b><br><b>M. J. Islam</b>, R. Datta, and A. Iqbal. Md. "Actual rating calculation of the zoom cloud meetings app using user reviews on google play store with sentiment annotation of BERT and hybridization of RNN and LSTM", <i>Expert Systems with Applications</i>, 2023, Vol: 223, 119919, ISSN 0957-4174, doi: <a href="https://doi.org/10.1016/J.ESWA.2023.119919" target="_blank" style="text-decoration: none;">10.1016/J.ESWA.2023.119919</a>.
<b><br>Citation:</b><br><b>M. J. Islam</b>, R. Datta, and A. Iqbal. "Actual rating calculation of the zoom cloud meetings app using user reviews on google play store with sentiment annotation of BERT and hybridization of RNN and LSTM", <i>Expert Systems with Applications</i>, 2023, Vol: 223, 119919, ISSN 0957-4174, doi: <a href="https://doi.org/10.1016/J.ESWA.2023.119919" target="_blank" style="text-decoration: none;">10.1016/J.ESWA.2023.119919</a>.
</p>
<p>
<b><br>Abstract:</b><br>The recent outbreaks of the COVID-19 forced people to work from home. All the educational institutes run their academic activities online. The online meeting app the “Zoom Cloud Meeting” provides the most entire supports for this purpose. For providing proper functionalities require in this situation of online supports the developers need the frequent release of new versions of the application. Which makes the chances to have lots of bugs during the release of new versions. To fix those bugs introduce developer needs users’ feedback based on the new release of the application. But most of the time the ratings and reviews are created contraposition between them because of the users’ inadvertent in giving ratings and reviews. And it has been the main problem to fix those bugs using user ratings for software developers. For this reason, we conduct this average rating calculation process based on the sentiment of user reviews to help software developers. We use BERT-based sentiment annotation to create unbiased datasets and hybridize RNN with LSTM to find calculated ratings based on the unbiased reviews dataset. Out of four models trained on four different datasets, we found promising performance in two datasets containing a necessarily large amount of unbiased reviews. The results show that the reviews have more positive sentiments than the actual ratings. Our results found an average of 3.60 stars rating, where the actual average rating found in dataset is 3.08 stars. We use reviews of more than 250 apps from the Google Play app store. The results of our can provide more promising if we can use a large dataset only containing the reviews of the Zoom Cloud Meeting app.
</p>
<p><br></p>
</div>
<div class="col-md-12 col-12">
<h2><strong><a href="https://ieeexplore.ieee.org/abstract/document/9303568" target="_blank" style="text-decoration: none;"><br>2. Patient Cohort</a></strong></h2>
<h2><strong><a href="https://ieeexplore.ieee.org/abstract/document/9303568" target="_blank" style="text-decoration: none;"><br>4. Patient Cohort</a></strong></h2>
<p>
<strong>Improving Patient Cohort Identification using Neural Word Embedding with Structured Analysis</strong>
</p>
Expand All @@ -77,7 +112,7 @@ <h2><strong><a href="https://ieeexplore.ieee.org/abstract/document/9303568" targ
</div>

<div class="col-md-12 col-12">
<h2><strong><a href="https://ieeexplore.ieee.org/abstract/document/8289090" target="_blank" style="text-decoration: none;"><br>3. 12B8T</a></strong></h2>
<h2><strong><a href="https://ieeexplore.ieee.org/abstract/document/8289090" target="_blank" style="text-decoration: none;"><br>5. 12B8T</a></strong></h2>
<p>
<strong>The 12B8T Multilevel Line Coding Scheme in Digital to Digital Data Conversion</strong>
</p>
Expand Down

0 comments on commit 8cefcd3

Please sign in to comment.