DSpace Repository

Browsing Articles by Author "Kabir, S. Rayhan"

Browsing Articles by Author "Kabir, S. Rayhan"

Sort by: Order: Results:

  • Sadeq, Muhammad Jafar; Kabir, S. Rayhan; Haque, Rafita; Ferdaws, Jannatul; Akhtaruzzaman, Md.; Forhat, Rokeya; Allayear, Shaikh Muhammad (Lecture Notes in Networks and Systems, Springer, 2020-05-15)
    Price hike is common and one of the major issues all over the world. The prices of daily necessities are increasing day by day. Many shops, restaurants and transport systems are charging extra price from the customers over ...
  • Hasan, Md. Samaun; Kabir, S. Rayhan; Akhtaruzzaman, Md.; Sadeq, Muhammad Jafar; Alam, Mirza Mohtashim; Allayear, Shaikh Muhammad; Uddin, Md. Salah; Rahman, Mizanur; Forhat, Rokeya; Haque, Rafita; Arju, Hosne Ara; Ali, Mohammad (Springer, 2020-10-22)
    The Indian subcontinent is a south geographic part of Asia continent which consists of India, Bangladesh, Pakistan, Sri Lanka, Bhutan, Nepal, and Maldives. Different rulers or the empire of different periods have built ...
  • Hasan, Md. Samaun; Kabir, S. Rayhan; Akhtaruzzaman, Md.; Sadeq, Muhammad Jafar; Alam, Mirza Mohtashim; Allayear, Shaikh Muhammad; Uddin, Md. Salah; Rahman, Mizanur; Forhat, Rokeya; Haque, Rafita; Arju, Hosne Ara; Ali, Mohammad (Scopus, 2021)
    The Indian subcontinent is a south geographic part of Asia continent which consists of India, Bangladesh, Pakistan, Sri Lanka, Bhutan, Nepal, and Maldives. Different rulers or the empire of different periods have built ...
  • Sadeq, Muhammad Jafar; Kabir, S. Rayhan; Akter, Marjan; Forhat, Rokeya; Haque, Rafita; Akhtaruzzaman, Md. (, 2021)
    Many companies are relying on software to manage their businesses. Usually, the software, especially those used by smaller companies, is not secure against unauthorized or unethical data manipulation on the database level. ...
  • Sadeq, Muhammad Jafar; Kabir, S. Rayhan; Akter, Marjan; Forhat, Rokeya; Haque, Rafita; Akhtaruzzaman, Md. (Fifth International Congress on Information and Communication Technology, Springier, 2020-10-10)
    Many companies are relying on software to manage their businesses. Usually, the software, especially those used by smaller companies, is not secure against unauthorized or unethical data manipulation on the database level. ...

Search DSpace


Browse

My Account