North South University or NSU is the first private university of Bangladesh. The government of Bangladesh approved the establishment of North South University in 1992 under the Private University Act 1992 . The university was formally inaugurated on 10 February 1993 by the Prime Minister of Bangladesh. Wikipedia.
Ahmed N.,North South University
Conference on Human Factors in Computing Systems - Proceedings | Year: 2016
Technology can play an important role in fighting social problems. We have explored the role of technology in realworld sexual harassment in Bangladesh through a yearlong qualitative study on urban female undergraduate students at North South University. The existing fear, mistrust, and hope that participants felt towards technology affected their reactions to the tool, as presented in our research. © 2016 Authors.
Uddin M.M.,North South University
ECCE 2017 - International Conference on Electrical, Computer and Communication Engineering | Year: 2017
Recently, second-order-To-second-order structure preserving model order reduction (MOR) has received a lot of attention. One of the most prominent techniques of such MOR is balanced truncation (BT). In general, this method does not preserve some essential properties of the system; such as stability and symmetry. This article discusses a new projection method for structure preserving model reduction of second-order systems via projecting the system onto the dominant eigen-space of the Gramians of the systems. The proposed method preserves the stability and symmetry of the systems. Numerical experiments are discussed to show the efficiency of the proposed technique. © 2017 IEEE.
Swazo N.K.,North South University
Medicine, Health Care and Philosophy | Year: 2017
Recent discussions about moral enhancement presuppose and recommend sets of values that relate to both the Western tradition of moral philosophy and contemporary empirical results of natural and social sciences, including moral psychology. It is argued here that this is a typology of thought that requires a fundamental interrogation. Proponents of moral enhancement do not account for important critical analyses of moral discourse, beginning with that of Friedrich Nietzsche and continuing with more prominent twentieth century thinkers such as the poststructuralist Michel Foucault, the deconstructionist Jacques Derrida, and the moral philosopher Alasdair MacIntyre. In this paper, such analyses are taken into account to highlight the need for more fundamental philosophical interrogation of the project of moral enhancement. © 2017 Springer Science+Business Media Dordrecht
Majed N.,Northeastern University |
Majed N.,North South University |
Li Y.,Northeastern University |
Gu A.Z.,Northeastern University
Current Opinion in Biotechnology | Year: 2012
In general, conventional P analysis methods suffer from not only the fastidious extraction and pre-treatment procedures required but also the generally low specificity and poor resolution regarding the P composition and its temporal and spatial dynamics. More powerful yet feasible P analysis tools are in demand to help elucidating the biochemistry nature, roles and dynamics of various phosphorus-containing molecules in vitro and in vivo. Recent advances in analytical chemistry, especially in molecular and atomic spectrometry such as NMR, Raman and X-ray techniques, have enabled unique capability of P analysis relevant to submicron scale biochemical processes in individual cell and in natural samples without introducing too complex and invasive pretreatment steps. Great potential still remains to be explored in wider and more combined and integrated requests of these techniques to allow for new possibilities and more powerful P analysis in biological systems. This review provides a comprehensive summary of the available methods and recent developments in analytical techniques and their applications for characterization and quantification of various forms of phosphorus, particularly polyphosphate, in different biological sources. © 2012 Elsevier Ltd.
Khan M.R.,North South University |
Roberts J.T.,Brown University
Wiley Interdisciplinary Reviews: Climate Change | Year: 2013
Because of the failure of the world to agree an adequate regime to limit greenhouse gas emissions to a safe level, adaptation to climate change has risen rapidly in UN Framework Convention on Climate Change (UNFCCC) negotiations since 2007. We closely review the development of policies, institutions, and financing of adaptation in international agreements from 1992 to the present. We conclude that the way the treaty has been built-first as a mitigation regime with adaptation added on only later-has led to some profound problems for marrying the goals of economic development and building climate resilient societies. Particularly there are two problematic areas. First, following mitigation approaches, technical solutions are often the focus in adaptation projects, when social, political, and cultural problems lie at the roots of vulnerability and should be addressed directly. Second, early requirements that external funding would only come if the adaptation effort was clearly 'additional' to what would have been done without a changing climate have been extremely pernicious. By attempting to divide a development project from the 'additional' costs of adapting to climate change, the global policy has shaped adaptation efforts at the local level. To understand how we ended up with such quirky definitions of what counts as adaptation, we need to review the history of adaptation in the negotiated regimes. Finally, we trace the incomplete negotiations over who will pay for adaptation in developing countries, whether that funding will come as grants or loans, as private investment or public funds, and what say recipient countries will have. © 2013 John Wiley & Sons, Ltd.
Islam S.,North South University |
Gregoire J.-C.,INRS - Institute National de la Recherche Scientifique
Future Generation Computer Systems | Year: 2012
We present the Edge Cloud architecture and explore how the user's experience of the Internet is enhanced through its use, by moving desktop functionality within the network, in the Void environment. We explore how this model allows us to expand the range of benefits of using the Internet Cloud model, especially when it comes to media processing and user customization. A prototype that transcodes audio/video stream inside the Cloud has been implemented and presented. The prototype is deployed in two different environments: in a local lab and in the Amazon EC2 public Cloud. We also study the performance of the prototype by analyzing the inter-arrival jitter. © 2011 Elsevier B.V. All rights reserved.
Hossain M.A.,North South University
Australasian Journal of Information Systems | Year: 2014
The purpose of this study is to explore the measures that may protect privacy of the users - in the context of RFID use in public applications. More specifically, this study investigates what the users perceive to have securing their privacy, particularly for the RFID applications in public uses. Qualitative research approach has been utilised for this study. The author conducted two focus-group discussion sessions and eight in-depth interviews in two countries: one from Australasia region (Australia) and the other from Asia (Bangladesh), assuming that the status, and the perceptions and tolerance of the citizens on privacy issues are different in the stated regions. The explored factors have been analysed from privacy perspectives. The findings show that, in developed and developing countries, the basic perceptions of the users on privacy protection are complimentary; however, privacy is a more serious concern in Australia than in Bangladesh. Data analysis proposed some attributes that may improve users' privacy perceptions when RFID is used in public applications. This study is the single initiative that focuses on privacy of RFID users from national-use context. As practical implication, the proposed attributes can be exercised by the deploying agencies that implement RFID technology for citizens' use.
Rahman R.M.,North South University |
Md. Hasan F.R.,North South University
Expert Systems with Applications | Year: 2011
In this research we have used decision tree induction algorithm on Hospital Surveillance data to classify admitted patients according to their critical condition. Three class labels, low, medium and high, are used to distinguish the criticality of the admitted patients. Several decision tree models are developed, evaluated, and compared with different performance metrics. Finally an efficient classifier is developed to classify records and make decision/predictions on some input parameters. The models developed in this research could be helpful during epidemic when huge number of patients arrive daily. Due to rush of duty doctors and scarcity of required number of physicians, it is hard to diagnose every patient. Any computer application could be helpful to diagnose and measure the criticality of the newly arrived patient with the help of the historical data kept in the surveillance database. The application would ask few questions on physical condition and on history of disease of the patient and accordingly determines the critical condition of the patient as low, medium or high. © 2011 Elsevier Ltd. All rights reserved.
Debnath R.,North South University
Annals of GIS | Year: 2013
This study portrays spatial and temporal vulnerability associated with seismic events for an urban area. It describes the vulnerability of a potentially earthquake-prone area for different time periods. The study assesses changes in earthquake vulnerability in relation to the changing distribution of human population over space with time. It has resulted with vulnerability maps showing vulnerability at working and non-working hours for the study area. The study has performed with a complex methodology linking a set of spatial and non-spatial database onto Geographic Information System environment and then analyzed to derive the study outcome on equal area hexagonal grid. In the outcome, the vulnerability has been presented in five different vulnerability scales ranging from Low to Extremely High. Occupational and residing density of population over available space has been used in computing urban vulnerability. Finally, the study has come up with a combined vulnerability map showing Very High vulnerable areas to earthquake damage throughout a day. As a whole, the study can potentially contribute in effective disaster risk management to minimize losses and thereby improving urban sustainability through the knowledge of spatial and temporal vulnerability. © 2013 Copyright Taylor and Francis Group, LLC.
Das K.,East Carolina University |
Chowdhury A.H.,North South University
International Journal of Production Economics | Year: 2012
This study proposes an integrated, reverse logistics supply chain planning process with modular product design that produces and markets products at different quality levels. A mixed integer programming (MIP) model formulates the overall planning process required to maximize profit by considering the collection of returned products, the recovery of modules and the proportion of the product mix at different quality levels. This paper proposes the collection of returnables (end-of life, defective, product under warranty) through retail outlets combined with the recovery of modules from the collected products using a network of recovery service providers. The proposed modular product design approach would create a design criterion that provides an improved recovery process at a lower cost. This study uses a total supply chain view that considers the production, transportation and distribution of products to customers, while a numerical problem illustrates the applicability of the models. © 2010 Elsevier B.V. All rights reserved.