Personal Information
Organization / Workplace
Dhaka, Dhaka Bangladesh
Occupation
In charge, Dept. of IT
Industry
Technology / Software / Internet
About
Hey there! 👋 I’m excited to share a bunch of projects, papers, and drafts I’ve put together during my time at university. Each one’s been a learning experience, and I’m hoping they might spark ideas or help someone out. Feel free to browse around, dig in, and reach out if you’ve got questions or just feel like chatting!
Tags
physics
database
programming
computer
computer science
cybercrime
periodic table
worm
software
viruses
motherboard
cpu
web engineering
internet risks
cybersecurity awareness
types of cybercrime
cybercrime examples
cybercrime prevention
internet safety for kids
web application development
cyber threats
fundamentals
safety precautions
examples of cyber crime
categories of cyber crime
internet
chemistry basics
power electronics
database design
electrical engineering
circuit design
semiconductor devices
assembly language
system design
data structures
nyquist theorem
software development
performance optimization
programming concepts
system architecture
online shopping
data transmission
information theory
computer hardware
analog-to-digital conversion
computer architecture
malicious programs
virus
object-oriented programming
c++
known programming problems
variable
system
fiction
dbms
fable
magnetic constant
marketing mix
magnetic flux
market vs. marketing
computer science fundamentals
kernel operations
os security
operating system basics
kernel mode transition
system mode
user mode
dual mode operations
rectifier types
graph algorithms
algorithms
dfs
bfs
graph traversal
strategic planning
success in marketing
marketing concepts
business strategy
science and technology
marketing strategy
basic quantities in magnetism
magnetic induction
porter’s five forces
plc stages
magnetic force
product life cycle
3nf
2nf
1nf
magnetic fields
physics concepts
magnetic properties
normal forms
database normalization
chemical groups
inert gases
halogen group
coinage metals
transition elements
alkaline earth metals
alkali metals
magnetic materials
electric and magnetic fields
rectification process
electronics basics
ac to dc conversion
rectifiers
full-wave rectification
algorithm fundamentals
divide and conquer steps
magneto motive force
algorithmic techniques
problem solving
binary search
magnetic reluctance
algorithm design
electromagnetism
divide and conquer
database management
data organization
halogens
particle physics
astronomy applications
spacecraft technology
food preservation
mathematical applications
advanced mathematics
engineering mathematics
vector analysis
nuclear medicine
biological research
scientific research
calculus
radioactive isotopes
radiometric dating
line integrals applications
superconductors
heike kamerlingh onnes
superconductivity
applications of superconductor
reactive elements
chemical elements
graphical comparison
chemistry education
materials science
quantum physics
geological applications
applications of halogens
archaeological applications
properties of halogens
ecological studies
electron configuration
storage devices
components of a computer
medicine and healthcare
digital transformation
citizen engagement
nuclear technology
government technology
public administration
digital government
disadvantages of e-government
limitations of e-government
benefits of e-government
radiation science
e-government
breadth first search
space missions
definition of line integrals
line integrals
divisibility by 10
environmental studies
divisibility by 9
divisibility by 5
divisibility by 3
divisibility by 2
space exploration
number theory
mathematics education
math skills
divisibility rules
input device
output device
power supply
depth first search
reactions
reduction
oxidation
acid
chemical equilibria
chemical states
stoichiometry
periodic
introduction
chemistry
big data
coding
answer
question
qna
language
oop
high-level
systems
propagate
self-replicate
malicious
worms
hosting
activation
super computer
types
lead generation
hardware
computer network
memory
output devices
input devices
tutorial
nomenclature
chemical kinetics
linked data
example
assignment
slideshare
problems
protest
rape
rural
bangladesh
engineering
first law of thermodynamics
expansion of the gas
internal energy
computing
difference
constant
image defects
physics 101
image formation
data
dbms relation
management
entity-relationship model
attributes
radioisotope and
radioisotope power system
radioisotope techniques
radioisotope
hadoop
cse
mathematics
math
arithmetic expression
style
writing
english
literature
instruction sets
embedded systems
hardware architecture
digital logic design
computer engineering
microprocessors
register organization
computer organization
arm processors
x86 architecture
pipelining
instruction cycle
cpu structure
processor architecture
processes
multithreading
operating systems
user threads
circuit analysis
engineering concepts
electronics fundamentals
transistor applications
current flow
bipolar junction transistor
switches
amplifiers
electronic circuits
transistor working
analog electronics
transistor terminals
electronic components
transistor basics
pnp transistor
npn transistor
processor design
computing technology
kernel threads
db
maintain
create
collection of program
database management system
content marketing
essential
signal
digital
analog
continuously variable
electronic process
adc
offense
tool
criminal
object
crime
thread management
process management
concurrency
parallel processing
thread types
resource sharing
multithreading models
threading benefits
cpu scheduling
threads
theory
limitations
single-source network analysis
linear passive circuit
reciprocity theorem
efficient
convenient
primary
lense
network performance metrics
throughput analysis
network capacity
bandwidth limitations
digital transmission
communication systems
signal processing
network optimization
network efficiency
system performance
network throughput
bandwidth capacity
shannon's theorem
télécommunications
lan design
network security
network reliability
network performance
mesh topology
ring topology
machine code
assembly syntax basics
disadvantages of assembly
advantages of assembly
code optimization
program control
memory management
hardware interaction
language comparison
assembly vs. machine language
code efficiency
system programming
programming languages
low-level programming
syntax in assembly
machine language
connectivity
bandwidth utilization
network theories
database rollback
deadlock recovery
deadlock detection
deadlock prevention
deadlock in dbms
concurrent execution
transaction states
durability in databases
isolation in transactions
consistency in databases
atomicity in transactions
acid properties
transactions in dbms
portable programming language
c for beginners
special operators
conditional operators
decrement operators
increment
bitwise operators
data rate
bus topology
star topology
network topologies
network criteria
full duplex
half duplex
simplex
data flow types
protocol elements
communication protocols
network protocols
data communication
wait-for graph
database recovery
starvation
database consistency
database integrity
transaction processing
jewelry
web based application
collaborative development
web development lifecycle
continuous improvement
agile vs waterfall
software engineering
lean development
scrum framework
web-e framework activities
iterative development
project management
agile benefits
software development process
agile methodology
agile development
framework activities
agile principles
agile process
web-e framework
wireless
risk management
risk
safety
application
future
jewelry online
wishlist
online advertising
online
online business
cart
jewelry products
jewelry shop
information technology
information
application for online jewelry
online jewelry shop
customers
web project management
client-server architecture
web optimization
responsive design
web security
scalability in web apps
web performance
backend development
frontend development
user-centered design
software engineering for web
purpose of web engineering
web categories
types of web applications
web application characteristic
web development
web application
instruction set
direct hardware control
database concurrency
shopping
control flow in cpu
data path architecture
processor efficiency
hardware engineering
system control
memory handling
cpu design
instruction decode
data processing
alu functionality
microprocessor components
bus management unit
memory management unit
pre-fetch unit
decode unit
control unit
arithmetic logic unit (alu)
microprocessor architecture
we
c++ programming concepts
c++ language features
operator functions
dynamic memory allocation
programming basics
applications in programming
function overloading
default argument
what are applications?
new operator
delete operator
data protection
digital connectivity
digital privacy
online scams
identity theft
computer security
prevention tips
disadvantages of the internet
advantages of the internet
e-commerce
atomic theory
pauli-exclusion principle
hund's rule
aufbau principle
quantum number
isotone
isobar
isotope
atomic number
limitations of bohr’s atomic m
bohr’s atomic model
limitations of rutherford’s
rutherford’s atomic model
nucleus is positive of charge
composite fundamental particle
temporary fundamental particle
permanent fundamental particle
fundamental particle
java security
java programming
java classes and methods
java encapsulation
default access in java
protected modifier
private modifier
public modifier
java access modifiers
logic rules in math
logical equivalences examples
operations
discrete mathematics
logical equivalence
electromagnetic force
magnetic moment
magnetic field lines
magnetism in physics
magnetic circuit
magnetic flux density
atom
computer science concepts
dynamic arrays
array indexing
programming fundamentals
memory layout
linear data structures
array data structure
ub-lb+1 formula
array length calculation
linear array representation
array’s length = ub-lb+1
benefits
drawbacks
linear arrays in programming
linear arrays
java methods and variables
java data protection
java access levels
project planning
data model design
sdlc phases
interface design
architecture design
requirements analysis
design phase
system development life cycle
sdlc
real-world applications
intelligent systems
soft computing
advantages
membership functions
fuzzification defuzzification
fuzzy inference system
linguistic variables
uncertainty handling
decision-making
control systems
logical operators
relational operators
assignment operators
arithmetic operators
types of operators
variable rules
constants in c
variables in c
c language disadvantages
c language advantages
c applications
history of c
c programming language
software design process
user interface design
functional design
prototyping
system interfaces
system specifications
serial transmission
transmission modes
digitize the human voice
types of sampling
sampling
pulse code modulation (pcm)
e-commerce trends
payment gateways
e-commerce challenges
customer reach
e-commerce security
digital business
e-commerce disadvantages
e-commerce advantages
internet banking
online ticketing
online auctions
electronic payments
electronic commerce
java visibility control
technical specifications
artificial intelligence
fuzzy logic applications
approximate reasoning
fuzzy control
fuzzy systems
set theory
concepts fuzzy
fuzzy logic
pros and cons of psk
pros and cons of fsk
pros and cons of ask
ask vs fsk vs psk
carrier wave
digital-to-analog conversion
parallel transmission
isochronous
synchronous
asynchronous
serial transmission occurs
See more
Presentations
(39)Documents
(16)Personal Information
Organization / Workplace
Dhaka, Dhaka Bangladesh
Occupation
In charge, Dept. of IT
Industry
Technology / Software / Internet
About
Hey there! 👋 I’m excited to share a bunch of projects, papers, and drafts I’ve put together during my time at university. Each one’s been a learning experience, and I’m hoping they might spark ideas or help someone out. Feel free to browse around, dig in, and reach out if you’ve got questions or just feel like chatting!
Tags
physics
database
programming
computer
computer science
cybercrime
periodic table
worm
software
viruses
motherboard
cpu
web engineering
internet risks
cybersecurity awareness
types of cybercrime
cybercrime examples
cybercrime prevention
internet safety for kids
web application development
cyber threats
fundamentals
safety precautions
examples of cyber crime
categories of cyber crime
internet
chemistry basics
power electronics
database design
electrical engineering
circuit design
semiconductor devices
assembly language
system design
data structures
nyquist theorem
software development
performance optimization
programming concepts
system architecture
online shopping
data transmission
information theory
computer hardware
analog-to-digital conversion
computer architecture
malicious programs
virus
object-oriented programming
c++
known programming problems
variable
system
fiction
dbms
fable
magnetic constant
marketing mix
magnetic flux
market vs. marketing
computer science fundamentals
kernel operations
os security
operating system basics
kernel mode transition
system mode
user mode
dual mode operations
rectifier types
graph algorithms
algorithms
dfs
bfs
graph traversal
strategic planning
success in marketing
marketing concepts
business strategy
science and technology
marketing strategy
basic quantities in magnetism
magnetic induction
porter’s five forces
plc stages
magnetic force
product life cycle
3nf
2nf
1nf
magnetic fields
physics concepts
magnetic properties
normal forms
database normalization
chemical groups
inert gases
halogen group
coinage metals
transition elements
alkaline earth metals
alkali metals
magnetic materials
electric and magnetic fields
rectification process
electronics basics
ac to dc conversion
rectifiers
full-wave rectification
algorithm fundamentals
divide and conquer steps
magneto motive force
algorithmic techniques
problem solving
binary search
magnetic reluctance
algorithm design
electromagnetism
divide and conquer
database management
data organization
halogens
particle physics
astronomy applications
spacecraft technology
food preservation
mathematical applications
advanced mathematics
engineering mathematics
vector analysis
nuclear medicine
biological research
scientific research
calculus
radioactive isotopes
radiometric dating
line integrals applications
superconductors
heike kamerlingh onnes
superconductivity
applications of superconductor
reactive elements
chemical elements
graphical comparison
chemistry education
materials science
quantum physics
geological applications
applications of halogens
archaeological applications
properties of halogens
ecological studies
electron configuration
storage devices
components of a computer
medicine and healthcare
digital transformation
citizen engagement
nuclear technology
government technology
public administration
digital government
disadvantages of e-government
limitations of e-government
benefits of e-government
radiation science
e-government
breadth first search
space missions
definition of line integrals
line integrals
divisibility by 10
environmental studies
divisibility by 9
divisibility by 5
divisibility by 3
divisibility by 2
space exploration
number theory
mathematics education
math skills
divisibility rules
input device
output device
power supply
depth first search
reactions
reduction
oxidation
acid
chemical equilibria
chemical states
stoichiometry
periodic
introduction
chemistry
big data
coding
answer
question
qna
language
oop
high-level
systems
propagate
self-replicate
malicious
worms
hosting
activation
super computer
types
lead generation
hardware
computer network
memory
output devices
input devices
tutorial
nomenclature
chemical kinetics
linked data
example
assignment
slideshare
problems
protest
rape
rural
bangladesh
engineering
first law of thermodynamics
expansion of the gas
internal energy
computing
difference
constant
image defects
physics 101
image formation
data
dbms relation
management
entity-relationship model
attributes
radioisotope and
radioisotope power system
radioisotope techniques
radioisotope
hadoop
cse
mathematics
math
arithmetic expression
style
writing
english
literature
instruction sets
embedded systems
hardware architecture
digital logic design
computer engineering
microprocessors
register organization
computer organization
arm processors
x86 architecture
pipelining
instruction cycle
cpu structure
processor architecture
processes
multithreading
operating systems
user threads
circuit analysis
engineering concepts
electronics fundamentals
transistor applications
current flow
bipolar junction transistor
switches
amplifiers
electronic circuits
transistor working
analog electronics
transistor terminals
electronic components
transistor basics
pnp transistor
npn transistor
processor design
computing technology
kernel threads
db
maintain
create
collection of program
database management system
content marketing
essential
signal
digital
analog
continuously variable
electronic process
adc
offense
tool
criminal
object
crime
thread management
process management
concurrency
parallel processing
thread types
resource sharing
multithreading models
threading benefits
cpu scheduling
threads
theory
limitations
single-source network analysis
linear passive circuit
reciprocity theorem
efficient
convenient
primary
lense
network performance metrics
throughput analysis
network capacity
bandwidth limitations
digital transmission
communication systems
signal processing
network optimization
network efficiency
system performance
network throughput
bandwidth capacity
shannon's theorem
télécommunications
lan design
network security
network reliability
network performance
mesh topology
ring topology
machine code
assembly syntax basics
disadvantages of assembly
advantages of assembly
code optimization
program control
memory management
hardware interaction
language comparison
assembly vs. machine language
code efficiency
system programming
programming languages
low-level programming
syntax in assembly
machine language
connectivity
bandwidth utilization
network theories
database rollback
deadlock recovery
deadlock detection
deadlock prevention
deadlock in dbms
concurrent execution
transaction states
durability in databases
isolation in transactions
consistency in databases
atomicity in transactions
acid properties
transactions in dbms
portable programming language
c for beginners
special operators
conditional operators
decrement operators
increment
bitwise operators
data rate
bus topology
star topology
network topologies
network criteria
full duplex
half duplex
simplex
data flow types
protocol elements
communication protocols
network protocols
data communication
wait-for graph
database recovery
starvation
database consistency
database integrity
transaction processing
jewelry
web based application
collaborative development
web development lifecycle
continuous improvement
agile vs waterfall
software engineering
lean development
scrum framework
web-e framework activities
iterative development
project management
agile benefits
software development process
agile methodology
agile development
framework activities
agile principles
agile process
web-e framework
wireless
risk management
risk
safety
application
future
jewelry online
wishlist
online advertising
online
online business
cart
jewelry products
jewelry shop
information technology
information
application for online jewelry
online jewelry shop
customers
web project management
client-server architecture
web optimization
responsive design
web security
scalability in web apps
web performance
backend development
frontend development
user-centered design
software engineering for web
purpose of web engineering
web categories
types of web applications
web application characteristic
web development
web application
instruction set
direct hardware control
database concurrency
shopping
control flow in cpu
data path architecture
processor efficiency
hardware engineering
system control
memory handling
cpu design
instruction decode
data processing
alu functionality
microprocessor components
bus management unit
memory management unit
pre-fetch unit
decode unit
control unit
arithmetic logic unit (alu)
microprocessor architecture
we
c++ programming concepts
c++ language features
operator functions
dynamic memory allocation
programming basics
applications in programming
function overloading
default argument
what are applications?
new operator
delete operator
data protection
digital connectivity
digital privacy
online scams
identity theft
computer security
prevention tips
disadvantages of the internet
advantages of the internet
e-commerce
atomic theory
pauli-exclusion principle
hund's rule
aufbau principle
quantum number
isotone
isobar
isotope
atomic number
limitations of bohr’s atomic m
bohr’s atomic model
limitations of rutherford’s
rutherford’s atomic model
nucleus is positive of charge
composite fundamental particle
temporary fundamental particle
permanent fundamental particle
fundamental particle
java security
java programming
java classes and methods
java encapsulation
default access in java
protected modifier
private modifier
public modifier
java access modifiers
logic rules in math
logical equivalences examples
operations
discrete mathematics
logical equivalence
electromagnetic force
magnetic moment
magnetic field lines
magnetism in physics
magnetic circuit
magnetic flux density
atom
computer science concepts
dynamic arrays
array indexing
programming fundamentals
memory layout
linear data structures
array data structure
ub-lb+1 formula
array length calculation
linear array representation
array’s length = ub-lb+1
benefits
drawbacks
linear arrays in programming
linear arrays
java methods and variables
java data protection
java access levels
project planning
data model design
sdlc phases
interface design
architecture design
requirements analysis
design phase
system development life cycle
sdlc
real-world applications
intelligent systems
soft computing
advantages
membership functions
fuzzification defuzzification
fuzzy inference system
linguistic variables
uncertainty handling
decision-making
control systems
logical operators
relational operators
assignment operators
arithmetic operators
types of operators
variable rules
constants in c
variables in c
c language disadvantages
c language advantages
c applications
history of c
c programming language
software design process
user interface design
functional design
prototyping
system interfaces
system specifications
serial transmission
transmission modes
digitize the human voice
types of sampling
sampling
pulse code modulation (pcm)
e-commerce trends
payment gateways
e-commerce challenges
customer reach
e-commerce security
digital business
e-commerce disadvantages
e-commerce advantages
internet banking
online ticketing
online auctions
electronic payments
electronic commerce
java visibility control
technical specifications
artificial intelligence
fuzzy logic applications
approximate reasoning
fuzzy control
fuzzy systems
set theory
concepts fuzzy
fuzzy logic
pros and cons of psk
pros and cons of fsk
pros and cons of ask
ask vs fsk vs psk
carrier wave
digital-to-analog conversion
parallel transmission
isochronous
synchronous
asynchronous
serial transmission occurs
See more