Article
Sl. | Author/s | Title | Publisher | Type | Publication Date | Action |
---|---|---|---|---|---|---|
1 | Tushar Kanti saha, A.B.M. Shawkat Ali, DR. MD. SAIFUL ISLAM | Novel Algorithm for detecting Bipartite and complete Bipertite Graph | International Journal of Applied Research on Information Technology and Computing | Article | May-August 2016 |
Not Available
|
2 | DR. MD. SAIFUL ISLAM , Tushar Kanti saha | A Novel Approach for Redemption of Trapezoidal Rule | Journal of Computing Technologies | Article | February 2015 |
Not Available
|
3 | Tushar Kanti saha, DR. MD. SAIFUL ISLAM | SIAM - A Proposed Model to Improve the Performance of Software Professionals | Journal of Computing Technologies | Article | February 2015 |
Not Available
|
4 | DR. MD. SAIFUL ISLAM , Dr. Md. Asaduzzaman and Dr. Md. Nazrul Islam Mondal | Stability of an SVI Epidemic Model | IOSR Journal of Mathematics | Article | May-June 2014 |
Not Available
|
5 | DR. MD. SAIFUL ISLAM , Dr. Md. Asaduzzaman and Dr. Md. Nazrul Islam Mondal | Stability Analysis at DFE of an Epidemic Model in the Presence of a Preventive Vaccine | IOSR Journal of Mathematics | Article | September-October 2012 |
Not Available
|
6 | DR. MD. SAIFUL ISLAM | Bisectional Circle Method | Journal of Nazrul University | Article | June-December 2012 |
Not Available
|
7 | DR. MD. SAIFUL ISLAM | Bisectional Interpolation Method for Solving Algebraic and transcendental equation | Journal of Nazrul University | Article | January-June 2012 |
Not Available
|
8 | DR. MD. SAIFUL ISLAM , Dr. AHM Kamal | Ratio Method for Solving Any Equation of Single Variable | International Journal of Engineering and Technology | Article | April-June 2009 |
Not Available
|
9 | DR. MD. MIJANUR RAHMAN | Continuous Bangla Speech Segmentation using Short-term Speech Features Extraction Approaches | International Journal of Advanced Computer Science and Applications | Article | 01 Nov 2012 |
Read More |
10 | DR. MD. MIJANUR RAHMAN | Implementation of RSA algorithm for Speech Data Encryption and Decryption | International Journal of Computer Science and Network Security | Article | 01 March 2012 |
Read More |