Shareeful Islam | University of East London (original) (raw)

Uploads

Books by Shareeful Islam

Research paper thumbnail of Software Development Risk Management Model – a goal-driven approach

Research paper thumbnail of Software Risk Management Modeling Using Goal-Driven Approach from Early Requirements Engineering

Research paper thumbnail of  A Goal-driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-based  System

Papers by Shareeful Islam

Research paper thumbnail of Comparative Performance and Hemato-Biochemical Profile of Jinding Ducks in Different Production Systems of Bangladesh

Bangladesh has the third largest duck population, dominated by household indigenous domestic duck... more Bangladesh has the third largest duck population, dominated by household indigenous domestic ducks, of 39.8 million in the world (Dolberg, 2009). Household duck rearing, mostly owned and managed by women and children, is an important means of reducing poverty in resource-poor household farmers with low income and livelihood conditions (Akteruzzaman et al., 2012).

Research paper thumbnail of A cross-sectional study on production performance of stall fed dairy cattle at Central Cattle Breeding Station (CCBS), Savar, Dhaka

Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to ass... more Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to associated biological factors such as age of cow, age of first calving, breed and number of parity at Central Cattle Breeding Station, Savar, Dhaka, a cross sectional study was performed on April, 2002 using a structured questionnaire. Local (21%), pure bred" Sahiwal"(12%) and cross bred (L×F1; L×F2; L×F3; SL×F2>)(67%) were the breed of studied cows (n= 62).

Research paper thumbnail of Effect of Dietary Protein and Energy Level on Proximate Composition of Breast and Thigh Meat in White Leghorn Layers at Molt and Post Molt Production Stages

Poultry meat being a high quality animal protein source plays significant role in maintaining the... more Poultry meat being a high quality animal protein source plays significant role in maintaining the health and nutrition of the people (Shahzad et al., 2011). Along with broilers, 35.4 million spent birds (27.4 million layers and 8.0 million breeders) are also being used at the end of egg production cycle contributing more than 46,000 metric tones of poultry meat per annum in Pakistan (Anonymous, 2009).

Research paper thumbnail of Productive and reproductive performance of crossbred and indigenous dairy cows under smallholder farming system

Abstract The present study was undertaken to investigate productive and reproductive performances... more Abstract The present study was undertaken to investigate productive and reproductive performances of crossbreds and Indigenous dairy cows. A total of 400 dairy cows each are equal number of Friesian x indigenous (FI), Sahiwal x indigenous (SaI), Sindhi x indigenous (SiI) and indigenous (I) were selected from eight thanas in Jessore district. The study found that the daily milk yield from FI, SaI, SiI and I cows were 8.39±2.01, 4.63±0.96, 4.35±1.12 and 2.38±0.73 liters, respectively.

Research paper thumbnail of Biochemical Analysis on Blood and Crop Contents of Household Chickens Along With Their Production and Health Status in Bangladesh

Chicken is an important species for human consumption as protein and also plays a major role in p... more Chicken is an important species for human consumption as protein and also plays a major role in poverty alleviation ensuring food security and generating family income at households within substandard management facilities (Mack et al., 2005; Hosseinzadeh et al., 2010). Household poultry production system in many developing counties is mainly based on the scavenging indigenous chickens (Gallus domesticus).

Research paper thumbnail of HAEMATOLOGICAL PICTURES IN CLINICALLY AFFECTED DOGS

Abstract Haematological examination was carried out on 23 clinically affected dogs with various d... more Abstract Haematological examination was carried out on 23 clinically affected dogs with various diseases or conditions at Teaching Veterinary Hospital of Chittagong Government Veterinary College for a period of 5 months from July to November 2003. On haematolo-ical examination, total erythrocyte count, haemoglobin concentration and packed cell volume were recorded to be normal in dog irrespective of types of breed except anaemia.

Research paper thumbnail of To Comply Software and IT System Development with Related Laws

Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's... more Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's information and their maintenance information systems has cost huge amount of financial and other resources loose. Consequently governments take serious actions toward approving protective legislation against cyber crimes and it will be duty of software developers to adopt policies and measures to ensure that their designed systems are compatible with existing laws and their amendments.

Research paper thumbnail of Scaling similarity-based retrieval of semantic workflows

Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. S... more Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. Similarity-based graph-matching approaches have been used in our previous work for the retrieval of semantic workflows. However, their high computational complexity makes it difficult to scale the approach to case bases with a size of more than a few hundred cases. However, many application areas of semantic workflows like scientific workflows or cookery workflows involve a large amount of semantic workflows to be reused.

Research paper thumbnail of Collecting, reusing and executing private workflows on social network platforms

Abstract We propose a personal workflow management service as part of a social network that enabl... more Abstract We propose a personal workflow management service as part of a social network that enables private users to construct personal workflows according to their specific needs and to keep track of the workflow execution. Unlike traditional workflows, such personal workflows aim at supporting processes that contain personal tasks and data.

Research paper thumbnail of Secure end-to-end communication over GSM and PSTN networks

Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in... more Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communication. GSM suffers from various security weaknesses. The GSM voice traffic is secure outside the core network but it has no security over the core network. This system can be made thoroughly secure by encrypting the speech which is to be transmitted on the GSM voice channel.

Research paper thumbnail of Developing and implementing encryption algorithm for addressing GSM security issues

Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in ... more Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in such a way to provide various security features like authentication, data/signaling confidentiality, and secrecy of a user yet the GSM channel is susceptible to replay, interleaving and man-in-the-middle attacks. The GSM speech service is secure up to the point where speech enters the core network.

Research paper thumbnail of Educational Methods for Software and Systems Development

The paper is based on applying the goals of software and systems engineering curriculum as a part... more The paper is based on applying the goals of software and systems engineering curriculum as a part of learning and teaching for an academic degree. The paper also relates to contributions of some of Harlan D. Mills award recipients for software engineering achievement, to address the needs to: i) improve the engineering education in an academic setting, and ii) develop real-life software and system projects. In particular we present the experience of using theory and practice of software engineering education focusing on model and Web based software and systems development from both academic and real life perspective. Hybrid educational methods are applied for student learning that combine class room approach of teaching fundamental theoretical concepts and practice via real world complex projects embedding intelligence in software and systems products. System thinking demanded by modern design philosophies is applied to interlink products, software, and people. Student groups are developing their projects in an interactive and collaborative manner.

Research paper thumbnail of Analyzing Human Factors for an Effective Information Security Management System

Research paper thumbnail of A Framework for Digital Forensics and Investigations: The Goal-Driven Approach

Research paper thumbnail of Implementation of digital forensics investigations using a goal-driven approach for a questioned contract

Research paper thumbnail of Measuring security requirements for software security

… Intelligent Systems (CIS), 2011 IEEE 10th …, Jan 1, 2011

Research paper thumbnail of Extracting security requirements from relevant laws and regulations

Research Challenges in …, Jan 1, 2012

Research paper thumbnail of Comparative Performance and Hemato-Biochemical Profile of Jinding Ducks in Different Production Systems of Bangladesh

Bangladesh has the third largest duck population, dominated by household indigenous domestic duck... more Bangladesh has the third largest duck population, dominated by household indigenous domestic ducks, of 39.8 million in the world (Dolberg, 2009). Household duck rearing, mostly owned and managed by women and children, is an important means of reducing poverty in resource-poor household farmers with low income and livelihood conditions (Akteruzzaman et al., 2012).

Research paper thumbnail of A cross-sectional study on production performance of stall fed dairy cattle at Central Cattle Breeding Station (CCBS), Savar, Dhaka

Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to ass... more Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to associated biological factors such as age of cow, age of first calving, breed and number of parity at Central Cattle Breeding Station, Savar, Dhaka, a cross sectional study was performed on April, 2002 using a structured questionnaire. Local (21%), pure bred" Sahiwal"(12%) and cross bred (L×F1; L×F2; L×F3; SL×F2>)(67%) were the breed of studied cows (n= 62).

Research paper thumbnail of Effect of Dietary Protein and Energy Level on Proximate Composition of Breast and Thigh Meat in White Leghorn Layers at Molt and Post Molt Production Stages

Poultry meat being a high quality animal protein source plays significant role in maintaining the... more Poultry meat being a high quality animal protein source plays significant role in maintaining the health and nutrition of the people (Shahzad et al., 2011). Along with broilers, 35.4 million spent birds (27.4 million layers and 8.0 million breeders) are also being used at the end of egg production cycle contributing more than 46,000 metric tones of poultry meat per annum in Pakistan (Anonymous, 2009).

Research paper thumbnail of Productive and reproductive performance of crossbred and indigenous dairy cows under smallholder farming system

Abstract The present study was undertaken to investigate productive and reproductive performances... more Abstract The present study was undertaken to investigate productive and reproductive performances of crossbreds and Indigenous dairy cows. A total of 400 dairy cows each are equal number of Friesian x indigenous (FI), Sahiwal x indigenous (SaI), Sindhi x indigenous (SiI) and indigenous (I) were selected from eight thanas in Jessore district. The study found that the daily milk yield from FI, SaI, SiI and I cows were 8.39±2.01, 4.63±0.96, 4.35±1.12 and 2.38±0.73 liters, respectively.

Research paper thumbnail of Biochemical Analysis on Blood and Crop Contents of Household Chickens Along With Their Production and Health Status in Bangladesh

Chicken is an important species for human consumption as protein and also plays a major role in p... more Chicken is an important species for human consumption as protein and also plays a major role in poverty alleviation ensuring food security and generating family income at households within substandard management facilities (Mack et al., 2005; Hosseinzadeh et al., 2010). Household poultry production system in many developing counties is mainly based on the scavenging indigenous chickens (Gallus domesticus).

Research paper thumbnail of HAEMATOLOGICAL PICTURES IN CLINICALLY AFFECTED DOGS

Abstract Haematological examination was carried out on 23 clinically affected dogs with various d... more Abstract Haematological examination was carried out on 23 clinically affected dogs with various diseases or conditions at Teaching Veterinary Hospital of Chittagong Government Veterinary College for a period of 5 months from July to November 2003. On haematolo-ical examination, total erythrocyte count, haemoglobin concentration and packed cell volume were recorded to be normal in dog irrespective of types of breed except anaemia.

Research paper thumbnail of To Comply Software and IT System Development with Related Laws

Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's... more Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's information and their maintenance information systems has cost huge amount of financial and other resources loose. Consequently governments take serious actions toward approving protective legislation against cyber crimes and it will be duty of software developers to adopt policies and measures to ensure that their designed systems are compatible with existing laws and their amendments.

Research paper thumbnail of Scaling similarity-based retrieval of semantic workflows

Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. S... more Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. Similarity-based graph-matching approaches have been used in our previous work for the retrieval of semantic workflows. However, their high computational complexity makes it difficult to scale the approach to case bases with a size of more than a few hundred cases. However, many application areas of semantic workflows like scientific workflows or cookery workflows involve a large amount of semantic workflows to be reused.

Research paper thumbnail of Collecting, reusing and executing private workflows on social network platforms

Abstract We propose a personal workflow management service as part of a social network that enabl... more Abstract We propose a personal workflow management service as part of a social network that enables private users to construct personal workflows according to their specific needs and to keep track of the workflow execution. Unlike traditional workflows, such personal workflows aim at supporting processes that contain personal tasks and data.

Research paper thumbnail of Secure end-to-end communication over GSM and PSTN networks

Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in... more Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communication. GSM suffers from various security weaknesses. The GSM voice traffic is secure outside the core network but it has no security over the core network. This system can be made thoroughly secure by encrypting the speech which is to be transmitted on the GSM voice channel.

Research paper thumbnail of Developing and implementing encryption algorithm for addressing GSM security issues

Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in ... more Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in such a way to provide various security features like authentication, data/signaling confidentiality, and secrecy of a user yet the GSM channel is susceptible to replay, interleaving and man-in-the-middle attacks. The GSM speech service is secure up to the point where speech enters the core network.

Research paper thumbnail of Educational Methods for Software and Systems Development

The paper is based on applying the goals of software and systems engineering curriculum as a part... more The paper is based on applying the goals of software and systems engineering curriculum as a part of learning and teaching for an academic degree. The paper also relates to contributions of some of Harlan D. Mills award recipients for software engineering achievement, to address the needs to: i) improve the engineering education in an academic setting, and ii) develop real-life software and system projects. In particular we present the experience of using theory and practice of software engineering education focusing on model and Web based software and systems development from both academic and real life perspective. Hybrid educational methods are applied for student learning that combine class room approach of teaching fundamental theoretical concepts and practice via real world complex projects embedding intelligence in software and systems products. System thinking demanded by modern design philosophies is applied to interlink products, software, and people. Student groups are developing their projects in an interactive and collaborative manner.

Research paper thumbnail of Analyzing Human Factors for an Effective Information Security Management System

Research paper thumbnail of A Framework for Digital Forensics and Investigations: The Goal-Driven Approach

Research paper thumbnail of Implementation of digital forensics investigations using a goal-driven approach for a questioned contract

Research paper thumbnail of Measuring security requirements for software security

… Intelligent Systems (CIS), 2011 IEEE 10th …, Jan 1, 2011

Research paper thumbnail of Extracting security requirements from relevant laws and regulations

Research Challenges in …, Jan 1, 2012

Research paper thumbnail of A Meta-model for Legal Compliance and Trustworthiness of Information Systems

… Information Systems …, Jan 1, 2012

Research paper thumbnail of Dealing with trust and control: A meta-model for trustworthy information systems development

… in Information Science …, Jan 1, 2012

Abstract Information systems exist in every aspect of our life and our society depends on them en... more Abstract Information systems exist in every aspect of our life and our society depends on them enormously. Despite this reliance, these systems are often unreliable, prone to errors, and pose vulnerabilities for potential security attacks. We are often faced with a choice between using a valuable (or even an essential) system, which is not fully trustworthy, or else forgoing the services it provides. Developing a trustworthy software system is a challenging task. The system's overall trustworthiness depends on trust relationships that ...

Research paper thumbnail of Model based Process to Support Security and Privacy Requirements Engineering,