Shareeful Islam | University of East London (original) (raw)
Uploads
Books by Shareeful Islam
Papers by Shareeful Islam
Bangladesh has the third largest duck population, dominated by household indigenous domestic duck... more Bangladesh has the third largest duck population, dominated by household indigenous domestic ducks, of 39.8 million in the world (Dolberg, 2009). Household duck rearing, mostly owned and managed by women and children, is an important means of reducing poverty in resource-poor household farmers with low income and livelihood conditions (Akteruzzaman et al., 2012).
Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to ass... more Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to associated biological factors such as age of cow, age of first calving, breed and number of parity at Central Cattle Breeding Station, Savar, Dhaka, a cross sectional study was performed on April, 2002 using a structured questionnaire. Local (21%), pure bred" Sahiwal"(12%) and cross bred (L×F1; L×F2; L×F3; SL×F2>)(67%) were the breed of studied cows (n= 62).
Poultry meat being a high quality animal protein source plays significant role in maintaining the... more Poultry meat being a high quality animal protein source plays significant role in maintaining the health and nutrition of the people (Shahzad et al., 2011). Along with broilers, 35.4 million spent birds (27.4 million layers and 8.0 million breeders) are also being used at the end of egg production cycle contributing more than 46,000 metric tones of poultry meat per annum in Pakistan (Anonymous, 2009).
Abstract The present study was undertaken to investigate productive and reproductive performances... more Abstract The present study was undertaken to investigate productive and reproductive performances of crossbreds and Indigenous dairy cows. A total of 400 dairy cows each are equal number of Friesian x indigenous (FI), Sahiwal x indigenous (SaI), Sindhi x indigenous (SiI) and indigenous (I) were selected from eight thanas in Jessore district. The study found that the daily milk yield from FI, SaI, SiI and I cows were 8.39±2.01, 4.63±0.96, 4.35±1.12 and 2.38±0.73 liters, respectively.
Chicken is an important species for human consumption as protein and also plays a major role in p... more Chicken is an important species for human consumption as protein and also plays a major role in poverty alleviation ensuring food security and generating family income at households within substandard management facilities (Mack et al., 2005; Hosseinzadeh et al., 2010). Household poultry production system in many developing counties is mainly based on the scavenging indigenous chickens (Gallus domesticus).
Abstract Haematological examination was carried out on 23 clinically affected dogs with various d... more Abstract Haematological examination was carried out on 23 clinically affected dogs with various diseases or conditions at Teaching Veterinary Hospital of Chittagong Government Veterinary College for a period of 5 months from July to November 2003. On haematolo-ical examination, total erythrocyte count, haemoglobin concentration and packed cell volume were recorded to be normal in dog irrespective of types of breed except anaemia.
Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's... more Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's information and their maintenance information systems has cost huge amount of financial and other resources loose. Consequently governments take serious actions toward approving protective legislation against cyber crimes and it will be duty of software developers to adopt policies and measures to ensure that their designed systems are compatible with existing laws and their amendments.
Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. S... more Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. Similarity-based graph-matching approaches have been used in our previous work for the retrieval of semantic workflows. However, their high computational complexity makes it difficult to scale the approach to case bases with a size of more than a few hundred cases. However, many application areas of semantic workflows like scientific workflows or cookery workflows involve a large amount of semantic workflows to be reused.
Abstract We propose a personal workflow management service as part of a social network that enabl... more Abstract We propose a personal workflow management service as part of a social network that enables private users to construct personal workflows according to their specific needs and to keep track of the workflow execution. Unlike traditional workflows, such personal workflows aim at supporting processes that contain personal tasks and data.
Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in... more Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communication. GSM suffers from various security weaknesses. The GSM voice traffic is secure outside the core network but it has no security over the core network. This system can be made thoroughly secure by encrypting the speech which is to be transmitted on the GSM voice channel.
Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in ... more Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in such a way to provide various security features like authentication, data/signaling confidentiality, and secrecy of a user yet the GSM channel is susceptible to replay, interleaving and man-in-the-middle attacks. The GSM speech service is secure up to the point where speech enters the core network.
The paper is based on applying the goals of software and systems engineering curriculum as a part... more The paper is based on applying the goals of software and systems engineering curriculum as a part of learning and teaching for an academic degree. The paper also relates to contributions of some of Harlan D. Mills award recipients for software engineering achievement, to address the needs to: i) improve the engineering education in an academic setting, and ii) develop real-life software and system projects. In particular we present the experience of using theory and practice of software engineering education focusing on model and Web based software and systems development from both academic and real life perspective. Hybrid educational methods are applied for student learning that combine class room approach of teaching fundamental theoretical concepts and practice via real world complex projects embedding intelligence in software and systems products. System thinking demanded by modern design philosophies is applied to interlink products, software, and people. Student groups are developing their projects in an interactive and collaborative manner.
… Intelligent Systems (CIS), 2011 IEEE 10th …, Jan 1, 2011
For the last decade's software security has gained attention by industries, experts and all other... more For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature. This is because properties and metrics for measuring security are not properly defined and methods are lacking to provide a complete picture for measuring software security. Here we identify security requirements through asset based risk management process to describe soft ware security goal. Then based on the Goal-Question-Metric approach the identified security requirements are evaluated for measuring software security.
Research Challenges in …, Jan 1, 2012
For software systems that process and manage sensitive information, compliance with laws has beco... more For software systems that process and manage sensitive information, compliance with laws has become not an option but a necessity. Analysing relevant laws and aligning them with the system requirements is necessary for attaining compliance issues. But analyzing laws within the context of software system requirements is a difficult task, mainly because the concepts used in legal texts are different compared to the concepts used in requirements engineering. This paper contributes to that direction. In particular it presents a process to model and analyse laws and regulations and to support the elicitation of security requirements based on the relevant legal and system context. Finally a case study is used to demonstrate the applicability of the proposed approach.
Bangladesh has the third largest duck population, dominated by household indigenous domestic duck... more Bangladesh has the third largest duck population, dominated by household indigenous domestic ducks, of 39.8 million in the world (Dolberg, 2009). Household duck rearing, mostly owned and managed by women and children, is an important means of reducing poverty in resource-poor household farmers with low income and livelihood conditions (Akteruzzaman et al., 2012).
Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to ass... more Abstract To evaluate milk production performance in stall feeding dairy cattle in relation to associated biological factors such as age of cow, age of first calving, breed and number of parity at Central Cattle Breeding Station, Savar, Dhaka, a cross sectional study was performed on April, 2002 using a structured questionnaire. Local (21%), pure bred" Sahiwal"(12%) and cross bred (L×F1; L×F2; L×F3; SL×F2>)(67%) were the breed of studied cows (n= 62).
Poultry meat being a high quality animal protein source plays significant role in maintaining the... more Poultry meat being a high quality animal protein source plays significant role in maintaining the health and nutrition of the people (Shahzad et al., 2011). Along with broilers, 35.4 million spent birds (27.4 million layers and 8.0 million breeders) are also being used at the end of egg production cycle contributing more than 46,000 metric tones of poultry meat per annum in Pakistan (Anonymous, 2009).
Abstract The present study was undertaken to investigate productive and reproductive performances... more Abstract The present study was undertaken to investigate productive and reproductive performances of crossbreds and Indigenous dairy cows. A total of 400 dairy cows each are equal number of Friesian x indigenous (FI), Sahiwal x indigenous (SaI), Sindhi x indigenous (SiI) and indigenous (I) were selected from eight thanas in Jessore district. The study found that the daily milk yield from FI, SaI, SiI and I cows were 8.39±2.01, 4.63±0.96, 4.35±1.12 and 2.38±0.73 liters, respectively.
Chicken is an important species for human consumption as protein and also plays a major role in p... more Chicken is an important species for human consumption as protein and also plays a major role in poverty alleviation ensuring food security and generating family income at households within substandard management facilities (Mack et al., 2005; Hosseinzadeh et al., 2010). Household poultry production system in many developing counties is mainly based on the scavenging indigenous chickens (Gallus domesticus).
Abstract Haematological examination was carried out on 23 clinically affected dogs with various d... more Abstract Haematological examination was carried out on 23 clinically affected dogs with various diseases or conditions at Teaching Veterinary Hospital of Chittagong Government Veterinary College for a period of 5 months from July to November 2003. On haematolo-ical examination, total erythrocyte count, haemoglobin concentration and packed cell volume were recorded to be normal in dog irrespective of types of breed except anaemia.
Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's... more Abstract. Accretion procedure of crimes and security breaches against the privacy of individual's information and their maintenance information systems has cost huge amount of financial and other resources loose. Consequently governments take serious actions toward approving protective legislation against cyber crimes and it will be duty of software developers to adopt policies and measures to ensure that their designed systems are compatible with existing laws and their amendments.
Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. S... more Abstract. This paper presents an approach for scaling the retrieval of semantic workflow cases. Similarity-based graph-matching approaches have been used in our previous work for the retrieval of semantic workflows. However, their high computational complexity makes it difficult to scale the approach to case bases with a size of more than a few hundred cases. However, many application areas of semantic workflows like scientific workflows or cookery workflows involve a large amount of semantic workflows to be reused.
Abstract We propose a personal workflow management service as part of a social network that enabl... more Abstract We propose a personal workflow management service as part of a social network that enables private users to construct personal workflows according to their specific needs and to keep track of the workflow execution. Unlike traditional workflows, such personal workflows aim at supporting processes that contain personal tasks and data.
Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in... more Abstract GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communication. GSM suffers from various security weaknesses. The GSM voice traffic is secure outside the core network but it has no security over the core network. This system can be made thoroughly secure by encrypting the speech which is to be transmitted on the GSM voice channel.
Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in ... more Abstract GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in such a way to provide various security features like authentication, data/signaling confidentiality, and secrecy of a user yet the GSM channel is susceptible to replay, interleaving and man-in-the-middle attacks. The GSM speech service is secure up to the point where speech enters the core network.
The paper is based on applying the goals of software and systems engineering curriculum as a part... more The paper is based on applying the goals of software and systems engineering curriculum as a part of learning and teaching for an academic degree. The paper also relates to contributions of some of Harlan D. Mills award recipients for software engineering achievement, to address the needs to: i) improve the engineering education in an academic setting, and ii) develop real-life software and system projects. In particular we present the experience of using theory and practice of software engineering education focusing on model and Web based software and systems development from both academic and real life perspective. Hybrid educational methods are applied for student learning that combine class room approach of teaching fundamental theoretical concepts and practice via real world complex projects embedding intelligence in software and systems products. System thinking demanded by modern design philosophies is applied to interlink products, software, and people. Student groups are developing their projects in an interactive and collaborative manner.
… Intelligent Systems (CIS), 2011 IEEE 10th …, Jan 1, 2011
For the last decade's software security has gained attention by industries, experts and all other... more For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature. This is because properties and metrics for measuring security are not properly defined and methods are lacking to provide a complete picture for measuring software security. Here we identify security requirements through asset based risk management process to describe soft ware security goal. Then based on the Goal-Question-Metric approach the identified security requirements are evaluated for measuring software security.
Research Challenges in …, Jan 1, 2012
For software systems that process and manage sensitive information, compliance with laws has beco... more For software systems that process and manage sensitive information, compliance with laws has become not an option but a necessity. Analysing relevant laws and aligning them with the system requirements is necessary for attaining compliance issues. But analyzing laws within the context of software system requirements is a difficult task, mainly because the concepts used in legal texts are different compared to the concepts used in requirements engineering. This paper contributes to that direction. In particular it presents a process to model and analyse laws and regulations and to support the elicitation of security requirements based on the relevant legal and system context. Finally a case study is used to demonstrate the applicability of the proposed approach.
… Information Systems …, Jan 1, 2012
Information systems manage and hold a huge amount of important and critical information. For this... more Information systems manage and hold a huge amount of important and critical information. For this reason, information systems must be trustworthy and should comply with relevant laws and regulations. Legal issues should be incorporated into the system development process and there should be a systematic and structured assessment of a system's trustworthiness to fulfil relevant legal obligations. This paper presents a novel meta-model, which combines legal and trust related concepts, to enable information systems developers to model and reason about the trustworthiness of a system in terms of its law compliance. A case study is used to demonstrate the applicability and benefits of the proposed meta-model.
… in Information Science …, Jan 1, 2012
Abstract Information systems exist in every aspect of our life and our society depends on them en... more Abstract Information systems exist in every aspect of our life and our society depends on them enormously. Despite this reliance, these systems are often unreliable, prone to errors, and pose vulnerabilities for potential security attacks. We are often faced with a choice between using a valuable (or even an essential) system, which is not fully trustworthy, or else forgoing the services it provides. Developing a trustworthy software system is a challenging task. The system's overall trustworthiness depends on trust relationships that ...