DSpace Repository

Browsing by Author "Arefin, Md. Taslim"

Browsing by Author "Arefin, Md. Taslim"

Sort by: Order: Results:

  • Uddin, Md. Raihan; Evan, Nawshad Ahmad; Alam, Md Raiyan; Arefin, Md. Taslim (Scopus, 2021)
    The virtual private network has become an essential technique used for providing a secure remote connection to exchange information over the Internet Protocol network. As the Internet Protocol version 4 and version 6 have ...
  • Uddin, Md. Raihan; Kabir, Kh. Mohaimenul; Arefin, Md. Taslim (1st International Conference on Advances in Science, Engineering and Robotics Technology 2019, ICASERT 2019, IEEE, 2019-05-05)
    Cloud computing is a spirited topic in this epoch where IOT introducing the modern lifestyle. These embrace cost-effectiveness, time savings and the actual arrangement of computing properties. Conversely, in Cloud Computing ...
  • Rahman, Hasib; Arefin, Md. Taslim (2019 2nd International Conference on Innovation in Engineering and Technology (ICIET), IEEE, 2019)
    This paper describes an experimental multiplexing technique to combine data and clock signal, intended to be used with single wire Bus. The experimental multiplexing technique uses the metastable state of 5v TTL standard ...
  • Arefin, Md. Taslim; Uddin, Md. Raihan; Evan, Nawshad Ahmad; Alam, Md Raiyan (Scopus, 2021)
    Network Security Is Considered As A Major Task In Network Architecture. A Network Administrator Had To Focus, And It Is Defined And Demonstrated As The Rules, Plans, And Procedures Followed By A Network Administrator To ...
  • Rahman, Hasib; Arefin, Md. Taslim (ACM International Conference Proceeding Series, 2020-01-10)
    This paper describes an experimental multiplexing technique to combine data and clock signal, intended for single wire data Bus. The experimental multiplexing technique uses the metastable state of 5v TTL standard to carry ...
  • Firoz, Noor Farjana; Arefin, Md. Taslim; Uddin, Md. Raihan (Scopus, 2020)
    Intrusion Detection System (IDS) is used to protect a system or a computer network from different kinds of anomaly attacks. Different detection techniques have been discussed on network-based IDS. The study has been done ...

Search DSpace

Browse

My Account