U-LEACH: a routing protocol for prolonging lifetime of wireless sensor networks N Majadi International Journal of Engineering Research and Applications 2 (4), 1649-1652, 2012 | 26 | 2012 |
Cloud computing technology in bangladesh: A framework of social &economic development S Islam, MH Kabir, MJ Hossain, A Chakraborty, N Majadi European Scientific Journal 11 (18), 2015 | 8 | 2015 |
Real-time detection of shill bidding in online auctions: A literature review N Majadi, J Trevathan, H Gray, V Estivill-Castro, N Bergmann Computer Science Review 25, 1-18, 2017 | 7 | 2017 |
Cloud computing: Security issues and challenges N Majadi The International Journal of Scientific & Engineering Research 4 (7), 1515-1520, 2012 | 7 | 2012 |
A run-time algorithm for detecting shill bidding in online auctions N Majadi, J Trevathan, H Gray Journal of theoretical and applied electronic commerce research 13 (3), 17-49, 2018 | 6 | 2018 |
uAuction: Analysis, design, and implementation of a secure online auction system N Majadi, J Trevathan, N Bergmann 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 6 | 2016 |
A Real-Time Detection Algorithm for Identifying Shill Bidders in Multiple Online Auctions N Majadi, J Trevathan 51st Hawaii International Conference on System Sciences, 3831-3840, 2018 | 5 | 2018 |
Analysis on Bidding Behaviours for Detecting Shill Bidders in Online Auctions N Majadi, J Trevathan, N Bergmann 2016 IEEE International Conference on Computer and Information Technology …, 2016 | 4 | 2016 |
Energy efficient local search based target localization in an UWSN N Majadi, M Naznin, T Ahmed 2016 IEEE 12th International Conference on Wireless and Mobile Computing …, 2016 | 4 | 2016 |
Real-time collusive shill bidding detection in online auctions N Majadi, J Trevathan, N Bergmann Australasian Joint Conference on Artificial Intelligence, 184-192, 2018 | 3 | 2018 |
Mobile phone SIM card: A security concern in the perspective of Bangladesh N Hasan, MR Ahmed, R Islam, N Majadi 16th Int'l Conf. Computer and Information Technology, 213-217, 2014 | 3 | 2014 |
Collusive shill bidding detection in online auctions using Markov Random Field N Majadi, J Trevathan, N Bergmann Electronic Commerce Research and Applications 34, 100831, 2019 | 2 | 2019 |
Cloud Computing-Research Issues and Challenges N Majadi Proceedings of the Global Engineering, Science and Technology Conference 2012, 2012 | 2 | 2012 |
A comprehensive validation methodology for trajectory pattern mining of GPS Data E Cesario, C Comito, D Talia 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 1 | 2016 |
Uniform Distribution Technique of Cluster Heads in LEACH Protocol N Majadi, SR Mahmud, M Sultana International Journal on Recent Trends in Engineering & Technology 8 (1), 84, 2013 | 1 | 2013 |
Real-Time Detection and Prevention of Shill Bidding in Online Auctions N Majadi | | 2019 |
Detecting Multiple Seller Collusive Shill Bidding J Trevathan, C Aitkenhead, N Majadi, W Read arXiv preprint arXiv:1812.10868, 2018 | | 2018 |
Poster: ETRACK: Energy Efficient Tracking a Mobile Object Using Under Water Sensors N Majadi, M Naznin, T Ahmed Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | | 2016 |
Computational Geometry based Remote Networking SR Mahmud, M Sultana, N Majadi, L Ansari International Journal on Recent Trends in Engineering & Technology 10 (1), 67, 2014 | | 2014 |
Design and Implementation of e-Government Procurement (e-GP) System in the Perspective of Bangladesh R Jahan, ASM Hoque, N Majadi Daffodil International University, 2012 | | 2012 |