NSTU Logo

Noakhali Science and Technology University

Phone: 02334496522 Fax: 02334496523 registrar@office.nstu.edu.bd
50 years of bangladesh logo Mujib 100 Logo

Department of Computer Science and Telecommunication Engineering

Academic Profile of Dr. Nazia Majadi


Dr. Nazia Majadi

About Dr. Nazia Majadi

I am working as an Assistant Professor at the Department of Computer Science and Telecommunication Engineering (CSTE) of Noakhali Science and Technology University (NSTU) since 2013. Before joining NSTU, I had been working as a faculty member at the Department of Computer Science and Engineering (CSE) of Military Institute of Science and Technology (MIST) for 6 years. I received BSc (Honors) in CSE from MIST in 2006 and MSc in CSE from Bangladesh University of Engineering and Technology (BUET) in 2012. I had been awarded Griffith University International Postgraduate Research Scholarship (GUIPRS) to pursue my higher study (PhD) in 2015. Most Recently, I have received my PhD degree in Information and Communication Technology (ICT) from Griffith University, Australia. Furthermore, I worked as a Lab Instructor at the Griffith School of ICT, Griffith University, Australia in 2015, 2017 and 2018. My research works focus on real-time detection of online auction fraud (i.e., shill bidding) in online auctions. My research interests also include sensor networks and machine learning.

Publications


N. Majadi, J. Trevathan, and N. Bergmann, “Collusive Shill Bidding Detection in Online Auctions using Markov Random Field,” Electronic Commerce Research and Applications, Vol. 34, pp. 1–13.

N. Majadi, J. Trevathan, and H. Gray, “A Run-Time Algorithm for Detecting Shill Bidding in Online Auctions,” Journal of Theoretical and Applied Electronic Commerce Research, Vol. 13(3), pp. 17-49, 2018.

N. Majadi, J. Trevathan, H. Gray, V. E-. Castro, and N. Nergmann, “Real-Time Detection of Shill Bidding in Online Auctions,” Journal of Computer Science Review, Vol. 25, pp. 1-18, 2017.

S. Islam, M. H. Kabir, M. J. Hossain, A. Chakraborty, and N. Majadi, “Cloud Computing Technology In Bangladesh: A Framework Of Social & Economic Development,” European Scientific Journal, Vol. 11(18), pp. 393-410, 2015.

S. R. Mahmud, M. Sultana, N. Majadi, and L. Ansari, “Computational Geometry Based Remote Networking,” International Journal on Recent Trends in Engineering and Technology (IJRTET), vol. 10 no.1, pp.84-91, 2014.

N. Majadi, “Cloud Computing: Security Issues and Challenges,” International Journal of Scientific and Engineering Research (IJSER), vol. 4 no. 7, pp. 1515-1520, 2013.

N. Majadi, S. R. Mahmud, and M. Sultana, “Uniform Distribution Technique of Cluster Heads in LEACH Protocol,” International Joint Journal Conference in Computer, Electronics and Electrical (CEE), vol. 8 no. 1, pp. 1-4, 2012.

N. Majadi, “U-LEACH: A Routing Protocol for Prolonging Lifetime of Wireless Sensor Networks,” International Journal of Engineering Research and Applications, vol.2 no. 4, pp. 1649-1652, 2012.

N. Majadi, J. Trevathan, and N. Bergmann, “Real-Time Collaborative Shill Bidding Detection in Online Auctions,” In: Mitrovic T., Xue B., Li X. (Eds), Proceedings of the 31st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence. Lecture Notes in Computer Science. vol 11320, Springer, pp. 184–192.

N. Majadi, and J. Trevathan, “A Real-Time Detection Algorithm for Identifying Shill Bidders in Multiple Online Auctions,” in the proceedings of 51st Hawaii International Conference on System Sciences, pp. 3831-3840, 2018.

N. Majadi, J. Trevathan, and N. Bergmann, “A Real-Time Detection of Shill Bidding in Online Auction,” in the proceedings of 15th International Conference on e-Society, pp. 229-233, 2017.

N. Majadi, J. Trevathan, and N. Bergmann, “Analysis on Bidding Behaviours for Detecting Shill Bidders in Online Auctions,” in the proceedings of 16th IEEE International Conference on Computer and Information Technology, pp. 383-390, 2016.

N. Majadi, M. Naznin, and T. Ahmed, “Energy Efficient Local Search Based Target Localization in an UWSN,” in the proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, New York, USA, pp. 1-8, 2016.

N. Majadi, J. Trevathan, and N. Bergmann, “uAuction: Analysis, Design and Implementation of a Secure Online Auction System,” in the proceedings of 12th IEEE International Conference on Dependable, Autonomic and Secure Computing, Auckland, New Zealand, pp. 278-285, 2016.

N. Majadi, M. Naznin, and T. Ahmed, “ETRACK: Energy Efficient Tracking a Mobile Object Using Under Water Sensors,” (poster paper) in the proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, pp. 53, 2016.

N. Majadi, S. Islam, and M.H. Kabir, “The Concept of Abusive Content Free Social Media in Perspective of Bangladesh,” in the proceedings of Global Engineering, Science and Technology (GEST), 2015.

N. Hasan, R. Ahmed, R. Islam, and N. Majadi, “Mobile Phone SIM Card: A Security Concern in the Perspective of Bangladesh,” in the proceedings of the 16th International Conference on Computer & Information Technology, pp. 213-217, 2013.

S. R. Mahmud, M. Sultana, and N. Majadi, “Coverage in Wireless Sensor Networks using Voronoi Diagram,” in the proceedings of 3rd International Conference on Advances in Information Technology and Mobile Communication (AIM), published by Elsevier Science and Technology, vol. 1 no. 1, pp. 239-245, 2013.

N. Majadi, “Cloud Computing: Research Issues and Challenges,” Global Engineering, Science and Technology (GEST), vol. 1 no. 1, pp. 1-9, 2012.

N. Majadi, R. Jahan, and Dr. A. S. M. L. Hoque, “Design and Implementation of e-Government Procurement (e-GP) in the perspective of Bangladesh,” in the proceedings of 4th National Conference on Communication and Information Security (NCCIS), vol. 1, pp. 27-30, 2012.

 

Experiences and Activities


Griffith University, Australia (April 2015-March 2019)

PhD Research Scholar, School of Information and Communication Technology

  • Analysing existing fraud detection algorithms and codes.
  • Undertaking research into existing methods and developing new ideas.
  • Writing programming codes using number of high-level programming languages such as C++, PHP, JavaScript, Python, R.
  • Developing methods particularly based on fraud detection methods.

 

Griffith University, Australia (July 2015- June 2016, July 2018- December 2018)

Lab Instructor, School of Information and Communication Technology

  • Demonstrating lab and grading weekly assignments.
  • Supervised Software engineering projects and grading accordingly.

 

 

Noakhali Science and Technology University (August 2013- April 2015)

Assistant Professor, Dept. of Computer Science and Telecommunication Engineering

  • Taught several core courses of Computer Science, such as Programming with C/C++ and Java, Neural Networks, Computer Networks, etc.
  • Responsible for conducting lectures, examinations, and grading.
  • Supervised undergraduate and postgraduate (masters) students in computer networking, database management projects which are now fully functional and in for use by several departments at the University.

Military Institute of Science and Technology (January 2007- August 2013)

Assistant Professor, Dept. of Computer Science and Engineering

  • Taught several core courses of Computer Science, such as Programming with C/C++ and Java, Neural Networks, Computer Networks, Data Communication, Theory of Computation, etc.
  • Responsible for conducting lectures, examinations, and grading.
  • Supervised undergraduate students in database management projects.