Syful Islam - Academia.edu (original) (raw)
Papers by Syful Islam
Third-party package usage has become a common practice in contemporary software development. Deve... more Third-party package usage has become a common practice in contemporary software development. Developers often face different challenges, including choosing the right libraries, installing errors, discrepancies, setting up the environment, and building failures during software development. The risks of maintaining a third-party package are well known, but it is unclear how information from Stack Overflow (SO) can be useful. This paper performed an empirical study to explore npm co-usage in SO. From over 30,000 SO posts, we extracted 2,100 SO posts related to npm and matched them to 217,934 npm library packages. We find that, popular and highly used libraries are not discussed as often in SO. However, we can see that the accepted answers may prove useful, as we believe that the usage examples and executable commands could be reused for tool support.
Computers in Biology and Medicine
Cloud computing is currently one the most hyped IT innovations that promises potential opportunit... more Cloud computing is currently one the most hyped IT innovations that promises potential opportunities for business and social innovation as well as modernizing ICT. For developing countries like Bangladesh, this technology aims to provide the clients a cost effective and convenient means to manage the huge amount of IT resources and thus offer strong possibility of accelerating social and economic development, even in this time of limited resources. As the information technology industry goes through a major shift, founded on the Internet as a platform, new opportunities for Bangladesh are open to employ technology at a lower cost and with much greater ease and success than in the past. The Main purpose of our strategy is to help organizations of public and private sector in Bangladesh to adopt cloud computing technology opportunities and prevent its obstacles through our proposed framework. In this article, we tried to assess different aspects and strengths, weaknesses, opportunities and threats of these strategies for Bangladeshi organizations and enterprises. In addition some recommendations are provided for Bangladeshi organizations and enterprises to help them to adopt cloud computing technology.
Empirical Software Engineering
Although many software development projects have moved their developer discussion forums to gener... more Although many software development projects have moved their developer discussion forums to generic platforms such as Stack Overflow, Eclipse has been steadfast in hosting their self-supported community forums. While recent studies show forums share similarities to generic communication channels, it is unknown how project-specific forums are utilized. In this paper, we analyze 832,058 forum threads and their linkages to four systems with 2,170 connected contributors to understand the participation, content and sentiment. Results show that Seniors are the most active participants to respond bug and non-bug-related threads in the forums (i.e., 66.1% and 45.5%), and sentiment among developers are inconsistent while knowledge sharing within Eclipse. We recommend the users to identify appropriate topics and ask in a positive procedural way when joining forums. For developers, preparing project-specific forums could be an option to bridge the communication between members. Irrespective of...
International Journal of Advanced Computer Science and Applications
For many years, lots of people have been suffering from Parkinson's disease all over the world, a... more For many years, lots of people have been suffering from Parkinson's disease all over the world, and some datasets are generated by recording important PD features for reliable decision-making diagnostics. But a dataset can contain correlated data points and outliers that can affect the dataset's output. In this work, a framework is proposed where the performance of an original dataset is compared to the performance of its reduced version after removing correlated features and outliers. The dataset is collected from UCI Machine Learning Repository, and many machine learning (ML) classifiers are used to evaluate its performance in various categories. The same process is repeated on the reduced dataset, and some improvement in prediction accuracy is noticed. Among ANOVA F-test, RFE, MIFS, and CSFS methods, the Logistic Regression classifier along with RFEbased feature selection technique outperforms all other classifiers. We observed that our improved system demonstrates 82.94% accuracy, 82.74% ROC, 82.9% F-measure, along with 17.46% false positive rate and 17.05% false negative rate, which are better compared to the primary dataset prediction accuracy metric values. Therefore, we hope that this model can be beneficial for physicians to diagnose PD more explicitly.
The use of network simulator as a modern tool in analyzing and predicting the behaviour of comput... more The use of network simulator as a modern tool in analyzing and predicting the behaviour of computer networks has grown to reduce the complexity of its accuracy measurement. This attracts researchers and practitioners to share problems and discuss them to improve the features. To communicate the related issues, users move to online question-answering platforms. Although recent studies have shown the popularity and benefits of adopting network simulation tools, the challenges users face in using the network simulator remain unknown. In this research paper, we examine 2,322 network simulator related stack overflow question posts to gain insights into the topics and challenges that users have discussed. We adopt the latent dirichlet allocation model to understand the topics discussed in stack overflow. We then investigate the popularity and difficulty of each topic. The results show that users use stack overflow as an implementation guideline for the network simulation model. We determine 8 discussion topics that are merged into 5 major categories. Simulation model configuration is the most useful topic for users. We also observe that target network protocol modification and network simulator installation are the most popular topics. Network simulator installation and target network protocol modification issues have been challenging for most users. The findings also highlight future research that suggests ways to help the network simulator community in the early stages to overcome the popular and difficult topics faced when using network simulation tools. This is an open access article under the CC BY-SA license.
Managing the processes of prescribing, dispensing, administering and monitoring medicines are fun... more Managing the processes of prescribing, dispensing, administering and monitoring medicines are fundamental parts of ensuring good health outcome. Although improving medication management in Bangladesh is the crucial objective of the National drug policy-2016, there is no effective administration system for effective regulatory control. Our proposed e-Medication Management system (eMM) seeks to support policies and objectives by improving the access and quality of medicines information through the use of digital health service (eMM), enabling consumers and healthcare providers to make safe, informed decisions and achieve better health outcomes. We also investigate how the eMM system relates to the significant improvement in public health service.
Geographical and tectonic settings of Bangladesh make it susceptible to seismic hazard. Besides, ... more Geographical and tectonic settings of Bangladesh make it susceptible to seismic hazard. Besides, historical evidence says that numerous earthquakes with very large magnitude occur in this region. Currently, the Indian plate is gradually moving in the northeast and subduce beneath the Eurasian Plate. So, geologist suspects that a terrible earthquake with greater than eight (>8) magnitude is inevitable in this highly populated region. Therefore, assessing the integrated vulnerability of earthquake in this region is a prime concern for most of the geologists. In this paper, we performed a rigorous assessment of the earthquake's vulnerabilities by analysing the historical earthquakes from the last 118 years (1901-2018) that occurred in Bangladesh and the surrounding regions (20.65° N to 28.00° N latitude and 87.00° E to 93.75° E longitude). Moreover, we also perform probability-based distribution analysis to show the intrinsic relationship among various parameters, especially earthquake magnitude and depth. Here, the necessary data are collected from the USGS (United States Geological Survey).
A reliable end to end communication is a buzzword that is promised by the transport layer protoco... more A reliable end to end communication is a buzzword that is promised by the transport layer protocol TCP. TCP, a Reliable transport protocols are tuned to perform well in different networks but, packet losses occur mostly because of congestion. TCP contains several mechanisms (such as slow start, congestion avoidance, fast retransmit and fast recovery) for ensuring reliability. However, it has reached its limitation in some challenging network environments like-High speed communication, Communication over different media. Thus, it requires further analysis and development of congestion control algorithms. In this paper, we have explored the reliability and robustness of TCP variants (Tahoe, Reno, New-Reno, SACK, FACK and TCP VEGAS, HSTCP, CUBIC TCP) based on different parameters such as throughput, end-to-delay, jitter and packet drop ratio over wired and wireless networks. We have also compared and discussed different congestion control and avoidance mechanisms of TCP variants to show how they affect the throughput and efficiency of different network environments.
Ad-hoc network is an infrastructure less network. It makes network structure dynamically on deman... more Ad-hoc network is an infrastructure less network. It makes network structure dynamically on demand and creates a major security problem of data transferring between the sender and the receiver over the network. This security issue can be analyzed using the different type of attacks on MANET. In this paper, we shown a simulation-based study on the impacts of different kinds of attacks of mobile ad hoc network. Here we consider rushing attack and black hole attack to analyze its performance over the various network scenario; especially, consider performance parameter such as packet delivery ratio, throughput, end-to-end delay, etc. We investigated the impact of these three important parameters under three states of network such as normal state, black-hole attack state and rushing attacked state. This analysis clearly showed which attacking state affected which parameter of network most.
International Journal of Computer Science and Information Security, 2020
Managing the processes of prescribing, dispensing, administering and monitoring medicines are fun... more Managing the processes of prescribing, dispensing, administering and monitoring medicines are fundamental parts of ensuring good health outcome. Although improving medication management in Bangladesh is the crucial objective of the National drug policy-2016, there is no effective administration system for effective regulatory control. Our proposed e-Medication Management system (eMM) seeks to support policies and objectives by improving the access and quality of medicines information through the use of digital health service (eMM), enabling consumers and healthcare providers to make safe, informed decisions and achieve better health outcomes. We also investigate how the eMM system relates to the significant improvement in public health service.
International Journal of Engineering and Science Invention(ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726)
In this modern age of science and technology, Cloud Computing has become an emerging technology... more In this modern age of science and technology, Cloud Computing has become an emerging
technology that gains wide influence on information technology (IT) systems by providing a friendly
environment to its user with various services such as SaaS, PaaS,, and IaaS.. The trend of frequently adopting
this technology by many different organizations automatically introduced new security risk on top of inherited
risk. That’s why security is considered as a key requirement for a robust and feasible multipurpose solution in
cloud computing models. Due to the ever growing interest in cloud computing, researchers have explicit and
constant effort to evaluate the current trends in security for such technology, considering both problems already
identified and possible solutions . In our entire paper, we will try to show clear presentations for every cloud
computing service model currently available, and noting how they differ from each other by using head-to-head
presentation table that will further clear our concept about cloud models. At the end of the paper, we will try
our best to discuss and analyze the opportunities & obstacles of cloud computing in developing countries.
International journal of Scientific and Engineering Research(ISSN 2229-5518 )
Simulation software is an important platform of finding results to be expected from a practical h... more Simulation software is an important platform of finding results to be expected from a practical hardware setup
which is costly and tedious to modify frequently. There are a lot of Network Simulators in the communication world. Some of
them are dedicated to wireless network, some of them are dedicated to wired network or both type of networks. Because of
wide variations in operating systems, hardware requirements, programming software requirements, output features and
scalability, it is very difficult to choose a suitable simulator for a specific job. Our aim is to subjugate the barrier. We have
studied and compared the detail features of the Network Simulators for the sake of choosing the absolutely necessary one from the pool of simulators.
Third-party package usage has become a common practice in contemporary software development. Deve... more Third-party package usage has become a common practice in contemporary software development. Developers often face different challenges, including choosing the right libraries, installing errors, discrepancies, setting up the environment, and building failures during software development. The risks of maintaining a third-party package are well known, but it is unclear how information from Stack Overflow (SO) can be useful. This paper performed an empirical study to explore npm co-usage in SO. From over 30,000 SO posts, we extracted 2,100 SO posts related to npm and matched them to 217,934 npm library packages. We find that, popular and highly used libraries are not discussed as often in SO. However, we can see that the accepted answers may prove useful, as we believe that the usage examples and executable commands could be reused for tool support.
Computers in Biology and Medicine
Cloud computing is currently one the most hyped IT innovations that promises potential opportunit... more Cloud computing is currently one the most hyped IT innovations that promises potential opportunities for business and social innovation as well as modernizing ICT. For developing countries like Bangladesh, this technology aims to provide the clients a cost effective and convenient means to manage the huge amount of IT resources and thus offer strong possibility of accelerating social and economic development, even in this time of limited resources. As the information technology industry goes through a major shift, founded on the Internet as a platform, new opportunities for Bangladesh are open to employ technology at a lower cost and with much greater ease and success than in the past. The Main purpose of our strategy is to help organizations of public and private sector in Bangladesh to adopt cloud computing technology opportunities and prevent its obstacles through our proposed framework. In this article, we tried to assess different aspects and strengths, weaknesses, opportunities and threats of these strategies for Bangladeshi organizations and enterprises. In addition some recommendations are provided for Bangladeshi organizations and enterprises to help them to adopt cloud computing technology.
Empirical Software Engineering
Although many software development projects have moved their developer discussion forums to gener... more Although many software development projects have moved their developer discussion forums to generic platforms such as Stack Overflow, Eclipse has been steadfast in hosting their self-supported community forums. While recent studies show forums share similarities to generic communication channels, it is unknown how project-specific forums are utilized. In this paper, we analyze 832,058 forum threads and their linkages to four systems with 2,170 connected contributors to understand the participation, content and sentiment. Results show that Seniors are the most active participants to respond bug and non-bug-related threads in the forums (i.e., 66.1% and 45.5%), and sentiment among developers are inconsistent while knowledge sharing within Eclipse. We recommend the users to identify appropriate topics and ask in a positive procedural way when joining forums. For developers, preparing project-specific forums could be an option to bridge the communication between members. Irrespective of...
International Journal of Advanced Computer Science and Applications
For many years, lots of people have been suffering from Parkinson's disease all over the world, a... more For many years, lots of people have been suffering from Parkinson's disease all over the world, and some datasets are generated by recording important PD features for reliable decision-making diagnostics. But a dataset can contain correlated data points and outliers that can affect the dataset's output. In this work, a framework is proposed where the performance of an original dataset is compared to the performance of its reduced version after removing correlated features and outliers. The dataset is collected from UCI Machine Learning Repository, and many machine learning (ML) classifiers are used to evaluate its performance in various categories. The same process is repeated on the reduced dataset, and some improvement in prediction accuracy is noticed. Among ANOVA F-test, RFE, MIFS, and CSFS methods, the Logistic Regression classifier along with RFEbased feature selection technique outperforms all other classifiers. We observed that our improved system demonstrates 82.94% accuracy, 82.74% ROC, 82.9% F-measure, along with 17.46% false positive rate and 17.05% false negative rate, which are better compared to the primary dataset prediction accuracy metric values. Therefore, we hope that this model can be beneficial for physicians to diagnose PD more explicitly.
The use of network simulator as a modern tool in analyzing and predicting the behaviour of comput... more The use of network simulator as a modern tool in analyzing and predicting the behaviour of computer networks has grown to reduce the complexity of its accuracy measurement. This attracts researchers and practitioners to share problems and discuss them to improve the features. To communicate the related issues, users move to online question-answering platforms. Although recent studies have shown the popularity and benefits of adopting network simulation tools, the challenges users face in using the network simulator remain unknown. In this research paper, we examine 2,322 network simulator related stack overflow question posts to gain insights into the topics and challenges that users have discussed. We adopt the latent dirichlet allocation model to understand the topics discussed in stack overflow. We then investigate the popularity and difficulty of each topic. The results show that users use stack overflow as an implementation guideline for the network simulation model. We determine 8 discussion topics that are merged into 5 major categories. Simulation model configuration is the most useful topic for users. We also observe that target network protocol modification and network simulator installation are the most popular topics. Network simulator installation and target network protocol modification issues have been challenging for most users. The findings also highlight future research that suggests ways to help the network simulator community in the early stages to overcome the popular and difficult topics faced when using network simulation tools. This is an open access article under the CC BY-SA license.
Managing the processes of prescribing, dispensing, administering and monitoring medicines are fun... more Managing the processes of prescribing, dispensing, administering and monitoring medicines are fundamental parts of ensuring good health outcome. Although improving medication management in Bangladesh is the crucial objective of the National drug policy-2016, there is no effective administration system for effective regulatory control. Our proposed e-Medication Management system (eMM) seeks to support policies and objectives by improving the access and quality of medicines information through the use of digital health service (eMM), enabling consumers and healthcare providers to make safe, informed decisions and achieve better health outcomes. We also investigate how the eMM system relates to the significant improvement in public health service.
Geographical and tectonic settings of Bangladesh make it susceptible to seismic hazard. Besides, ... more Geographical and tectonic settings of Bangladesh make it susceptible to seismic hazard. Besides, historical evidence says that numerous earthquakes with very large magnitude occur in this region. Currently, the Indian plate is gradually moving in the northeast and subduce beneath the Eurasian Plate. So, geologist suspects that a terrible earthquake with greater than eight (>8) magnitude is inevitable in this highly populated region. Therefore, assessing the integrated vulnerability of earthquake in this region is a prime concern for most of the geologists. In this paper, we performed a rigorous assessment of the earthquake's vulnerabilities by analysing the historical earthquakes from the last 118 years (1901-2018) that occurred in Bangladesh and the surrounding regions (20.65° N to 28.00° N latitude and 87.00° E to 93.75° E longitude). Moreover, we also perform probability-based distribution analysis to show the intrinsic relationship among various parameters, especially earthquake magnitude and depth. Here, the necessary data are collected from the USGS (United States Geological Survey).
A reliable end to end communication is a buzzword that is promised by the transport layer protoco... more A reliable end to end communication is a buzzword that is promised by the transport layer protocol TCP. TCP, a Reliable transport protocols are tuned to perform well in different networks but, packet losses occur mostly because of congestion. TCP contains several mechanisms (such as slow start, congestion avoidance, fast retransmit and fast recovery) for ensuring reliability. However, it has reached its limitation in some challenging network environments like-High speed communication, Communication over different media. Thus, it requires further analysis and development of congestion control algorithms. In this paper, we have explored the reliability and robustness of TCP variants (Tahoe, Reno, New-Reno, SACK, FACK and TCP VEGAS, HSTCP, CUBIC TCP) based on different parameters such as throughput, end-to-delay, jitter and packet drop ratio over wired and wireless networks. We have also compared and discussed different congestion control and avoidance mechanisms of TCP variants to show how they affect the throughput and efficiency of different network environments.
Ad-hoc network is an infrastructure less network. It makes network structure dynamically on deman... more Ad-hoc network is an infrastructure less network. It makes network structure dynamically on demand and creates a major security problem of data transferring between the sender and the receiver over the network. This security issue can be analyzed using the different type of attacks on MANET. In this paper, we shown a simulation-based study on the impacts of different kinds of attacks of mobile ad hoc network. Here we consider rushing attack and black hole attack to analyze its performance over the various network scenario; especially, consider performance parameter such as packet delivery ratio, throughput, end-to-end delay, etc. We investigated the impact of these three important parameters under three states of network such as normal state, black-hole attack state and rushing attacked state. This analysis clearly showed which attacking state affected which parameter of network most.
International Journal of Computer Science and Information Security, 2020
Managing the processes of prescribing, dispensing, administering and monitoring medicines are fun... more Managing the processes of prescribing, dispensing, administering and monitoring medicines are fundamental parts of ensuring good health outcome. Although improving medication management in Bangladesh is the crucial objective of the National drug policy-2016, there is no effective administration system for effective regulatory control. Our proposed e-Medication Management system (eMM) seeks to support policies and objectives by improving the access and quality of medicines information through the use of digital health service (eMM), enabling consumers and healthcare providers to make safe, informed decisions and achieve better health outcomes. We also investigate how the eMM system relates to the significant improvement in public health service.
International Journal of Engineering and Science Invention(ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726)
In this modern age of science and technology, Cloud Computing has become an emerging technology... more In this modern age of science and technology, Cloud Computing has become an emerging
technology that gains wide influence on information technology (IT) systems by providing a friendly
environment to its user with various services such as SaaS, PaaS,, and IaaS.. The trend of frequently adopting
this technology by many different organizations automatically introduced new security risk on top of inherited
risk. That’s why security is considered as a key requirement for a robust and feasible multipurpose solution in
cloud computing models. Due to the ever growing interest in cloud computing, researchers have explicit and
constant effort to evaluate the current trends in security for such technology, considering both problems already
identified and possible solutions . In our entire paper, we will try to show clear presentations for every cloud
computing service model currently available, and noting how they differ from each other by using head-to-head
presentation table that will further clear our concept about cloud models. At the end of the paper, we will try
our best to discuss and analyze the opportunities & obstacles of cloud computing in developing countries.
International journal of Scientific and Engineering Research(ISSN 2229-5518 )
Simulation software is an important platform of finding results to be expected from a practical h... more Simulation software is an important platform of finding results to be expected from a practical hardware setup
which is costly and tedious to modify frequently. There are a lot of Network Simulators in the communication world. Some of
them are dedicated to wireless network, some of them are dedicated to wired network or both type of networks. Because of
wide variations in operating systems, hardware requirements, programming software requirements, output features and
scalability, it is very difficult to choose a suitable simulator for a specific job. Our aim is to subjugate the barrier. We have
studied and compared the detail features of the Network Simulators for the sake of choosing the absolutely necessary one from the pool of simulators.