Personal Information
Organization / Workplace
Dhaka Bangladesh
Occupation
Assistant Professor, Dept. of CSE & Director, ICT Cell, University of Information Technology & Sciences (UITS), Dhaka, Bangladesh
Industry
Education
Website
uits.edu.bd/
About
A. S. M. Shafi currently works as an Assistant Professor at the Department of Computer Science and Engineering and Director of ICT cell, University of Information Technology & Sciences (UITS), Dhaka, Bangladesh. Shafi does research in Medical Imaging, Digital Image Processing, Machine Learning/Deep Learning.
Tags
data structure
algorithm
data mining
sorting
operating system
array
shearing
reflection
rotation
scaling
translation
association rule mining
delete
stack
search
cpu scheduling
cache memory
secondary memory
computer graphics
insert
graph
algorith
searching
linear search
binary search
machine leaning
web mining
supervised learning
what is normalization
why we need normalization?
advantages of normalization
types of normalization
srtos
hrtos
real time os
1nf
2nf
3nf
entity
network os
entity set
attributes
distributed os
set intersection
sattelite
microwave
radio frequency
fiber optic cable
twisted pair cable
benefits of trigger
coaxial cable
syntax of trigger
limitations of trigger
authorization in database
granting privileges
wired and wireless transmission media
transmission media
what is bcnf
condition for bcnf
example of bcnf
join
database system architecture
acid properties of database
what is os
database user and user interface
database administrator
consistency constraints specification
database languages
sequential-heap-hash-cluster-b+ tree organization
types of file organization
file organization in database
ddl
dml
physical
logical and view level
goal and application of database
introduction to database
division and assignment
select
project
union
time sharing os
batch os
rename operation
types of os
keys
primary key
super key
composite key
foreign key
structure of relational model
goal and function of os
database schema
file
history of computer
computer generation
classification of computer
application
disadvantages of computer
similarities and dissimilarities
computer system
components of computer hardware
cpu
cu
alu
registers
instruction set
instruction cycle
primary memory
ram
rom
floppy disk
data abstraction
instance
schema
data model
data dictionary
transaction management
query languages
relational algebra
additional relational algebra
e-r model
strong and weak entity set
degree of relationship
extended e-r features
database vs file system
threads in os
computer
analog and digital computer
characteristics and functionalities of computer
logic gates part 3
logic gates part 4
network topology
computer network
number system part 1
number system part 2
computer software
raid
data stripping
redundancy
paralellism
choice of raid levels
classification of storage device
main memory
jukeboxes
physical characteristics of magnetic devices
performance measure of a disk
what is trigger
hard disk
magnetic disk
optical disk
cd_rom
dvd-rom
input devices
keyboard
mouse
joystick
trackball
touch screen
ocr
omr
printer
monitor
plotter
logic gates part-1
add
push
pop
2d array
diagonal summation
boundary summation
linear array
infix
postfix
round robin
priority scheduling
bankers algorithm
deadlock
file organization
sequential
linked
index
longest common subsequence
lcs
merge sort
divide and conquer
grapg
tree
spanning tree
prims algorithm
kruskals algorithm
n queens problem
quick sort
divide and conquer approach
sum of subset problem
linked list
queue
front
rear
fragmentation
page rank algorithm
inlink
outlink
hits
hubs
authorization
apriori algorithm
dhp
fp growth algorithm
naive bayes
decision tree
classifier
correlation
machine learning
schema in datawarehouse
star schema
snowflake schema
os
internal
external
line drawing
dda
bresenhams
transformation
projection
parallel
perspective
orthographic
oblique
3d transformation
2d transformation
unsupervised learning
clustering
knn
fact constellation schema
computer antivirus
affect of computer antivirus
common computer antivirus
hacker
cracker
black hat hacker
white hat hacker
gray hat hacker
language processig system
preprocessor
compiler
assembler
linker
loader
interpreter
impact of using hll
phases of compiler
logic gates part 2
data transmission modes
introduction to internet
e-mail
telnet
usenet
ftp
uploading
downloading
link
hypertext
internet search engine
application of internet
computer virus
types of virus
effect of computer virus
common computer virus
list of compiler
regular definition
dfa
nfa
transition tables
converting regular expression to nfa
static and dynamic type checking
type system
type expression
type conversion
dynamic programming
graphic design
complexity
asymptotic notation
introduction
selection sort
bubble sort
insertion sort
why learnt about compiler?
translation of an assignment statement
compiler technology
compiler construction tools
parse tree
ambiguity
why separate lexical analyser and parse
role of lexical analysze
lexical analyzer vs parse
token
pattern and lexeme
attributes of token
lexical error
error recovery strategies
operation on string and languages
kleene and positive closure
regular expression
internal and external sorting
See more
Documents
(104)Personal Information
Organization / Workplace
Dhaka Bangladesh
Occupation
Assistant Professor, Dept. of CSE & Director, ICT Cell, University of Information Technology & Sciences (UITS), Dhaka, Bangladesh
Industry
Education
Website
uits.edu.bd/
About
A. S. M. Shafi currently works as an Assistant Professor at the Department of Computer Science and Engineering and Director of ICT cell, University of Information Technology & Sciences (UITS), Dhaka, Bangladesh. Shafi does research in Medical Imaging, Digital Image Processing, Machine Learning/Deep Learning.
Tags
data structure
algorithm
data mining
sorting
operating system
array
shearing
reflection
rotation
scaling
translation
association rule mining
delete
stack
search
cpu scheduling
cache memory
secondary memory
computer graphics
insert
graph
algorith
searching
linear search
binary search
machine leaning
web mining
supervised learning
what is normalization
why we need normalization?
advantages of normalization
types of normalization
srtos
hrtos
real time os
1nf
2nf
3nf
entity
network os
entity set
attributes
distributed os
set intersection
sattelite
microwave
radio frequency
fiber optic cable
twisted pair cable
benefits of trigger
coaxial cable
syntax of trigger
limitations of trigger
authorization in database
granting privileges
wired and wireless transmission media
transmission media
what is bcnf
condition for bcnf
example of bcnf
join
database system architecture
acid properties of database
what is os
database user and user interface
database administrator
consistency constraints specification
database languages
sequential-heap-hash-cluster-b+ tree organization
types of file organization
file organization in database
ddl
dml
physical
logical and view level
goal and application of database
introduction to database
division and assignment
select
project
union
time sharing os
batch os
rename operation
types of os
keys
primary key
super key
composite key
foreign key
structure of relational model
goal and function of os
database schema
file
history of computer
computer generation
classification of computer
application
disadvantages of computer
similarities and dissimilarities
computer system
components of computer hardware
cpu
cu
alu
registers
instruction set
instruction cycle
primary memory
ram
rom
floppy disk
data abstraction
instance
schema
data model
data dictionary
transaction management
query languages
relational algebra
additional relational algebra
e-r model
strong and weak entity set
degree of relationship
extended e-r features
database vs file system
threads in os
computer
analog and digital computer
characteristics and functionalities of computer
logic gates part 3
logic gates part 4
network topology
computer network
number system part 1
number system part 2
computer software
raid
data stripping
redundancy
paralellism
choice of raid levels
classification of storage device
main memory
jukeboxes
physical characteristics of magnetic devices
performance measure of a disk
what is trigger
hard disk
magnetic disk
optical disk
cd_rom
dvd-rom
input devices
keyboard
mouse
joystick
trackball
touch screen
ocr
omr
printer
monitor
plotter
logic gates part-1
add
push
pop
2d array
diagonal summation
boundary summation
linear array
infix
postfix
round robin
priority scheduling
bankers algorithm
deadlock
file organization
sequential
linked
index
longest common subsequence
lcs
merge sort
divide and conquer
grapg
tree
spanning tree
prims algorithm
kruskals algorithm
n queens problem
quick sort
divide and conquer approach
sum of subset problem
linked list
queue
front
rear
fragmentation
page rank algorithm
inlink
outlink
hits
hubs
authorization
apriori algorithm
dhp
fp growth algorithm
naive bayes
decision tree
classifier
correlation
machine learning
schema in datawarehouse
star schema
snowflake schema
os
internal
external
line drawing
dda
bresenhams
transformation
projection
parallel
perspective
orthographic
oblique
3d transformation
2d transformation
unsupervised learning
clustering
knn
fact constellation schema
computer antivirus
affect of computer antivirus
common computer antivirus
hacker
cracker
black hat hacker
white hat hacker
gray hat hacker
language processig system
preprocessor
compiler
assembler
linker
loader
interpreter
impact of using hll
phases of compiler
logic gates part 2
data transmission modes
introduction to internet
e-mail
telnet
usenet
ftp
uploading
downloading
link
hypertext
internet search engine
application of internet
computer virus
types of virus
effect of computer virus
common computer virus
list of compiler
regular definition
dfa
nfa
transition tables
converting regular expression to nfa
static and dynamic type checking
type system
type expression
type conversion
dynamic programming
graphic design
complexity
asymptotic notation
introduction
selection sort
bubble sort
insertion sort
why learnt about compiler?
translation of an assignment statement
compiler technology
compiler construction tools
parse tree
ambiguity
why separate lexical analyser and parse
role of lexical analysze
lexical analyzer vs parse
token
pattern and lexeme
attributes of token
lexical error
error recovery strategies
operation on string and languages
kleene and positive closure
regular expression
internal and external sorting
See more