Dhaka, Bangladesh

North South University

Dhaka, Bangladesh

North South University or NSU is the first private university of Bangladesh. The government of Bangladesh approved the establishment of North South University in 1992 under the Private University Act 1992 . The university was formally inaugurated on 10 February 1993 by the Prime Minister of Bangladesh. Wikipedia.

Time filter

Source Type

Ahmed N.,North South University
Conference on Human Factors in Computing Systems - Proceedings | Year: 2016

Technology can play an important role in fighting social problems. We have explored the role of technology in realworld sexual harassment in Bangladesh through a yearlong qualitative study on urban female undergraduate students at North South University. The existing fear, mistrust, and hope that participants felt towards technology affected their reactions to the tool, as presented in our research. © 2016 Authors.

Majed N.,Northeastern University | Majed N.,North South University | Li Y.,Northeastern University | Gu A.Z.,Northeastern University
Current Opinion in Biotechnology | Year: 2012

In general, conventional P analysis methods suffer from not only the fastidious extraction and pre-treatment procedures required but also the generally low specificity and poor resolution regarding the P composition and its temporal and spatial dynamics. More powerful yet feasible P analysis tools are in demand to help elucidating the biochemistry nature, roles and dynamics of various phosphorus-containing molecules in vitro and in vivo. Recent advances in analytical chemistry, especially in molecular and atomic spectrometry such as NMR, Raman and X-ray techniques, have enabled unique capability of P analysis relevant to submicron scale biochemical processes in individual cell and in natural samples without introducing too complex and invasive pretreatment steps. Great potential still remains to be explored in wider and more combined and integrated requests of these techniques to allow for new possibilities and more powerful P analysis in biological systems. This review provides a comprehensive summary of the available methods and recent developments in analytical techniques and their applications for characterization and quantification of various forms of phosphorus, particularly polyphosphate, in different biological sources. © 2012 Elsevier Ltd.

Khan M.R.,North South University | Roberts J.T.,Brown University
Wiley Interdisciplinary Reviews: Climate Change | Year: 2013

Because of the failure of the world to agree an adequate regime to limit greenhouse gas emissions to a safe level, adaptation to climate change has risen rapidly in UN Framework Convention on Climate Change (UNFCCC) negotiations since 2007. We closely review the development of policies, institutions, and financing of adaptation in international agreements from 1992 to the present. We conclude that the way the treaty has been built-first as a mitigation regime with adaptation added on only later-has led to some profound problems for marrying the goals of economic development and building climate resilient societies. Particularly there are two problematic areas. First, following mitigation approaches, technical solutions are often the focus in adaptation projects, when social, political, and cultural problems lie at the roots of vulnerability and should be addressed directly. Second, early requirements that external funding would only come if the adaptation effort was clearly 'additional' to what would have been done without a changing climate have been extremely pernicious. By attempting to divide a development project from the 'additional' costs of adapting to climate change, the global policy has shaped adaptation efforts at the local level. To understand how we ended up with such quirky definitions of what counts as adaptation, we need to review the history of adaptation in the negotiated regimes. Finally, we trace the incomplete negotiations over who will pay for adaptation in developing countries, whether that funding will come as grants or loans, as private investment or public funds, and what say recipient countries will have. © 2013 John Wiley & Sons, Ltd.

Debnath R.,North South University
Lakes and Reservoirs: Research and Management | Year: 2016

Watershed management has evolved during the 1990s in Bangladesh. However, it has not yet achieved much exposure in the country, even though wetlands play a very significant role in its ecology, economy and stakeholder livelihoods. Several watershed management programmes have been initiated in the country with a co-management and participatory approach, but in a piecemeal basis. Many wetland problems have arisen as a result. This study reviews watershed management programmes and undertakes a sustainability analysis of three recent initiatives, namely MACH, Nishorgo and Tanguar Haor projects, on the basis of the main watershed exchanges. This analysis indicates these projects are/were less environmentally, but more socially and economically, sustainable. Thus, this study suggests first incorporating the unaccounted environmental sustainability indicators. Moreover, the country's future management programme(s) should incorporate stakeholder livelihood improvements and social empowerment via education and training schemes, by ensuring social inclusiveness that makes the management initiatives locally sustainable. © 2016 John Wiley & Sons Australia, Ltd

Islam S.,North South University | Gregoire J.-C.,INRS - Institute National de la Recherche Scientifique
Future Generation Computer Systems | Year: 2012

We present the Edge Cloud architecture and explore how the user's experience of the Internet is enhanced through its use, by moving desktop functionality within the network, in the Void environment. We explore how this model allows us to expand the range of benefits of using the Internet Cloud model, especially when it comes to media processing and user customization. A prototype that transcodes audio/video stream inside the Cloud has been implemented and presented. The prototype is deployed in two different environments: in a local lab and in the Amazon EC2 public Cloud. We also study the performance of the prototype by analyzing the inter-arrival jitter. © 2011 Elsevier B.V. All rights reserved.

Hossain M.A.,North South University
Australasian Journal of Information Systems | Year: 2014

The purpose of this study is to explore the measures that may protect privacy of the users - in the context of RFID use in public applications. More specifically, this study investigates what the users perceive to have securing their privacy, particularly for the RFID applications in public uses. Qualitative research approach has been utilised for this study. The author conducted two focus-group discussion sessions and eight in-depth interviews in two countries: one from Australasia region (Australia) and the other from Asia (Bangladesh), assuming that the status, and the perceptions and tolerance of the citizens on privacy issues are different in the stated regions. The explored factors have been analysed from privacy perspectives. The findings show that, in developed and developing countries, the basic perceptions of the users on privacy protection are complimentary; however, privacy is a more serious concern in Australia than in Bangladesh. Data analysis proposed some attributes that may improve users' privacy perceptions when RFID is used in public applications. This study is the single initiative that focuses on privacy of RFID users from national-use context. As practical implication, the proposed attributes can be exercised by the deploying agencies that implement RFID technology for citizens' use.

Rahman R.M.,North South University | Md. Hasan F.R.,North South University
Expert Systems with Applications | Year: 2011

In this research we have used decision tree induction algorithm on Hospital Surveillance data to classify admitted patients according to their critical condition. Three class labels, low, medium and high, are used to distinguish the criticality of the admitted patients. Several decision tree models are developed, evaluated, and compared with different performance metrics. Finally an efficient classifier is developed to classify records and make decision/predictions on some input parameters. The models developed in this research could be helpful during epidemic when huge number of patients arrive daily. Due to rush of duty doctors and scarcity of required number of physicians, it is hard to diagnose every patient. Any computer application could be helpful to diagnose and measure the criticality of the newly arrived patient with the help of the historical data kept in the surveillance database. The application would ask few questions on physical condition and on history of disease of the patient and accordingly determines the critical condition of the patient as low, medium or high. © 2011 Elsevier Ltd. All rights reserved.

Hasib A.,North South University | Fapojuwo A.O.,University of Calgary
Computer Networks | Year: 2010

This paper proposes a mobility adaptive network selection scheme in the context of wireless wide area network (WWAN) and wireless local area network (WLAN) radio access technologies (RATs) that supports both real-time (RT) and non-real-time (NRT) service classes. Physical layer information based call admission control (CAC) is considered for the two RATs to enforce service specific QoS requirements. The effectiveness of the cross-protocol-layer information for radio resource management (RRM) in integrated WWAN and WLAN networks is assessed analytically for individual service classes in a multi-service environment using the theory of Markov chains. The impact of non-uniform user and mobility distributions due to the existence of hotspot in the macro-cell area and the effect of network selection parameter measurement errors on the RRM performance are also evaluated. Numerical results show that the proposed network selection scheme minimizes the rate of unnecessary vertical handoffs, thereby providing stable communication without degrading the call blocking probability and call outage probability performance metrics. © 2009 Elsevier B.V. All rights reserved.

This study portrays spatial and temporal vulnerability associated with seismic events for an urban area. It describes the vulnerability of a potentially earthquake-prone area for different time periods. The study assesses changes in earthquake vulnerability in relation to the changing distribution of human population over space with time. It has resulted with vulnerability maps showing vulnerability at working and non-working hours for the study area. The study has performed with a complex methodology linking a set of spatial and non-spatial database onto Geographic Information System environment and then analyzed to derive the study outcome on equal area hexagonal grid. In the outcome, the vulnerability has been presented in five different vulnerability scales ranging from Low to Extremely High. Occupational and residing density of population over available space has been used in computing urban vulnerability. Finally, the study has come up with a combined vulnerability map showing Very High vulnerable areas to earthquake damage throughout a day. As a whole, the study can potentially contribute in effective disaster risk management to minimize losses and thereby improving urban sustainability through the knowledge of spatial and temporal vulnerability. © 2013 Copyright Taylor and Francis Group, LLC.

Das K.,East Carolina University | Chowdhury A.H.,North South University
International Journal of Production Economics | Year: 2012

This study proposes an integrated, reverse logistics supply chain planning process with modular product design that produces and markets products at different quality levels. A mixed integer programming (MIP) model formulates the overall planning process required to maximize profit by considering the collection of returned products, the recovery of modules and the proportion of the product mix at different quality levels. This paper proposes the collection of returnables (end-of life, defective, product under warranty) through retail outlets combined with the recovery of modules from the collected products using a network of recovery service providers. The proposed modular product design approach would create a design criterion that provides an improved recovery process at a lower cost. This study uses a total supply chain view that considers the production, transportation and distribution of products to customers, while a numerical problem illustrates the applicability of the models. © 2010 Elsevier B.V. All rights reserved.

Loading North South University collaborators
Loading North South University collaborators