Md. Moniruzzaman

Learn More
Sensor nodes deployed in hostile environments are vulnerable to capture and compromise. Due to the inexpensive hardware components, an attacker can easily obtain cryptographic information from these sensors, clone them and surreptitiously insert these clones back in the network. Cloning provides the adversary an easy way to build an army of malicious nodes(More)
Delegation is a process of sharing access rights by users of an access control model. It facilitates the distribution of authorities in the model. It is also useful in collaborative environments. Despite the advantages, delegation may have an impact on the access control model's security. Allowing users to share access rights without the control of an(More)
BACKGROUND Alzheimer's disease (AD) is a progressive neurodegenerative disorder clinically characterized by loss of memory and cognition. Cholinergic deficit and oxidative stress have been implicated in the pathogenesis of AD. Therefore, inhibition of acetylcholinesterase and oxidation are the two promising strategies in the development of drug for AD.(More)
Glinus oppositifolius is a small herb, widely used in the traditional medicine of Bangladesh in treatment of a variety of diseases and disorders such as insomnia, pain, inflammation, jaundice, and fever. The present study evaluated the sedative and anxiolytic potentials of the ethanol extract of leaves of G. oppositifolius (EEGO) in different behavioral(More)
Adaptive filtering constitutes one of the core technologies in the field of digital signal processing and finds numerous application in the areas of science and technology viz. echo cancellation, channel equalization, adaptive noise cancellation, adaptive beam-forming, biomedical signal processing etc. Noise of ECG signal will minimize by using two(More)
Users are encouraged to check in to commercial places in Geo-social networks (GSNs) by offering discounts on purchase. These promotions are commonly known as deals. When a user checks in, GSNs share the check-in record with the merchant. However, these applications, in most cases, do not explain how the merchants handle check-in histories nor do they take(More)
Cryptography is the technique which is utilized for secure communication over the network. By using Cryptography technique readable information is converted into an unreadable form. Cryptography is used to protect data from unauthorized access. Universality of security in modern internet based application is an explicit motivation to contribute in the area(More)
  • 1