Kazi Zakia Sultana

Kazi Zakia Sultana
Montclair State University · Department of Computer Science

Doctor of Philosophy

About

46
Publications
4,756
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
351
Citations
Introduction
Kazi Zakia Sultana currently works as Assistant Professor at the dept of Computer Science in Montclair State University. She received PhD from the Department of Computer Science and Engineering, Mississippi State University. Kazi Zakia does research in Software Engineering, Software Metrics, Software Mining, Vulnerability Prediction, Software Security and Reliability. Their most recent publication is 'A study examining relationships between micro patterns and security vulnerabilities.'
Additional affiliations
July 2016 - June 2018
Mississippi State University
Position
  • Research Assistant
August 2014 - present
Mississippi State University
Position
  • Graduate Teaching Assistant
August 2014 - present
Mississippi State University
Position
  • Graduate Teaching Assistant
Description
  • I teach a course named as Intro Comp Prog as an instructor of the course. This course mainly focus on problem solving skills and design in Python. I also graded some courses such as Data Communication, Database, Algorithm and Data Structure.
Education
August 2014 - August 2018
Mississippi State University
Field of study
  • Department of Computer Science and Engineering
January 2008 - September 2010
Wayne State University
Field of study
  • Department of Computer Science
June 2001 - June 2006
Bangladesh University of Engineering and Technology
Field of study
  • Department of Computer Science and Engineering

Publications

Publications (46)
Conference Paper
Full-text available
Security patterns are proven solutions to recurring problems in software development. The growing importance of secure software development has introduced diverse research efforts on security patterns that mostly focused on classification schemes, evolution and evaluation of the patterns. Despite a huge mature history of research and popularity amo...
Preprint
Context: Security is vital to software developed for commercial or personal use. Although more organizations are realizing the importance of applying secure coding practices, in many of them, security concerns are not known or addressed until a security failure occurs. The root cause of security failures is vulnerable code. While metrics have been...
Article
[Context ]A software vulnerability becomes harmful for software when an attacker successfully exploits the insecure code and reveals the vulnerability. A single vulnerability in code can put the entire software at risk. Therefore, maintaining software security throughout the software life cycle is an important and at the same time challenging task...
Conference Paper
Full-text available
The work focuses on the multi-document text summarization task based on data mining and some statistical approaches. We primarily employ the method for documents written in Bengali as no such summarization tool has been proved yet to work out for this language. Bengali is a rich language in terms of its vocabulary and grammar but it lacks any autom...
Conference Paper
Full-text available
The work focuses on the multi-document text summarization task based on data mining and some statistical approaches. We primarily employ the method for documents written in Bengali as no such summarization tool has been proved yet to work out for this language. Bengali is a rich language in terms of its vocabulary and grammar but it lacks any autom...
Article
Full-text available
Software security is an integral part of software quality and reliability. Software vulnerabilities make the software susceptible to attacks which violates software security. Metric-based software vulnerability prediction is one way to evaluate vulnerabilities beforehand so that developers can take preventative measures against attacks. In this stu...
Preprint
Full-text available
Background: As most of the software development organizations are male-dominated, female developers encountering various negative workplace experiences reported feeling like they "do not belong". Exposures to discriminatory expletives or negative critiques from their male colleagues may further exacerbate those feelings. Aims: The primary goal of t...
Article
Full-text available
It is important to maintain software quality as a software system evolves. Managing code smells in source code contributes towards quality software. While metrics have been used to pinpoint code smells in source code, we present an empirical study on the correlation of code smells with class-level (micro pattern) and method-level (nano-pattern) tra...
Conference Paper
Full-text available
The work focuses on the multi-document text summarization task based on data mining and some statistical approaches. We primarily employ the method for documents written in Bengali as no such summarization tool has been proved yet to work out for this language. Bengali is a rich language in terms of its vocabulary and grammar but it lacks any autom...
Article
Understanding the interaction patterns among biological entities in a pathway can potentially reveal the role of the entities in biological systems. Although considerable effort has been contributed to this direction, querying biological pathways remained relatively unexplored. Querying is principally different in which we retrieve pathways satisfy...
Article
Full-text available
The correlation and interactions among different biological entities comprise the biological system. Although already revealed interactions contribute to the understanding of different existing systems, researchers face many questions everyday regarding inter-relationships among entities. Their queries have potential role in exploring new relations...
Article
Improving the stability of proteins is an important goal in many biomedical and industrial applications. A logical approach is to emulate stabilizing molecular interactions found in nature. Disulfide bonds are covalent interactions that provide substantial stability to many proteins and conform to well-defined geometric conformations, thus making t...
Chapter
Detection of stair region from a stair image is very crucial for autonomous climbing navigation and alarm system for blinds and visually impaired. In this regard, a framework is proposed in this paper for detecting stairways from stair images. For detection of the stair region, a natural property of stair is utilized that is steps of a stair appear...
Conference Paper
Full-text available
The work focuses on the integration of text categorization and text summarization tasks based on some existing algorithms. We primarily employ the method for bioinformatics literatures to categorize them in relevant domains of bioinformatics and then get a summarized overview of each of the documents in the domain. For text categorization we have c...
Article
Full-text available
This is an open access article. Unrestricted non-commercial use is permitted provided the original work is properly cited. Aberrant microRNA activity has been reported in many diseases, and studies often find numerous microRNAs concurrently dysregulated. Most target genes have binding sites for multiple microRNAs, and mounting evidence indicates th...
Conference Paper
Understanding the interaction patterns among a set of biological entities in a pathway is an important exercise because it potentially could reveal the role of the entities in biological systems. Although a considerable amount of effort has been directed to the detection and mining of patterns in biological pathways in contemporary research, queryi...
Article
A recent report identified six microRNAs with repressed expression in highly metastatic MDA-MB-231 breast cancer cell derivatives (miRs 335, 126, 206, 122a, 199a*, and 489). Expression of all six miRs was consistently decreased in cells that produced aggressive lung and bone metastases, as compared to parental cells, indicating that metastatic colo...
Conference Paper
Epistasis usually contributes to many well known diseases making the traits more complex and harder to study. The interactions between multiple genes and their alleles of different loci often mask the effects of a single gene at particular locus resulting in a complex trait. So the analysis of epistasis uncovers the facts about the mechanisms and p...
Conference Paper
In computer based internet services, queries are usually submitted in a context. Either the contexts are created, or are assumed - e.g., a purchase order, or an airline reservation. Unfortunately, there is little theoretical foundation for contexts, and systems usually do not use them formally. In this paper, we propose a model for context represen...
Conference Paper
Given a connected graph G = (V, E), two distinct base vertices u <sub>1</sub>, u<sub>2</sub> isin V, a set V<sub>r</sub> sube V of r special vertices and two natural numbers r<sub>1</sub>, r<sub>2</sub> such that r<sub>1</sub> + r<sub>2</sub> = r, we wish to find a partition V<sub>1</sub>, V<sub>2</sub> of the vertex set V such that u<sub>1</sub> i...
Conference Paper
Full-text available
Phylogenetic trees are commonly constructed based on hard optimization problems such as Maximum Parsimony (MP), Maximum Likelihood (ML) and ZAZ method. Conventional MP heuristics for producing phylogenetic trees produce good solutions within reason-able time on small database while ML heuristics are limited to smaller datasets. Dynamic ZAZ approach...
Conference Paper
Full-text available
Researchers of bioinformatics, nowadays, focus on various applications of well-known algorithms in different fields of bioinformatics. One of the most famous algorithms in this regard is genetic algorithm. In this paper, we enhance the application of genetic algorithm on gene sequence related problems. Given two sets of gene sequences A and B, we a...
Conference Paper
Full-text available
In this paper, we introduce new algorithms for selecting taxon samples from large evolutionary trees, maintaining uniformity and randomness, under certain new constraints on the taxa. The algorithms are efficient as their runtimes and space complexities are polynomial. The algorithms have direct applications to the evolution of phylogenetic tree an...
Conference Paper
Full-text available
Phylogenetic trees are commonly reconstructed based on hard optimization problems such as maximum parsimony (MP) and maximum likelihood (ML). Conventional MP heuristics for producing phylogenetic trees produce good solutions within reasonable time on small databases (up to a few thousand sequences) while ML heuristics are limited to smaller dataset...

Questions

Question (1)
Question
Suppose a murder can be caused by political reason, personal reason or family reason. Each murder is a separate instance and I know the reason (political/personal/family). In this way, each crime type (murder/burglary/robbery) will be a vector where vector members will indicate the frequencies of the causes(political/personal/family for murder). For example. murder vector is [20 30 10] means 20 murders for political, 30 for personal and 10 for family reasons. This is the data that I have right now. Is there any way to formulate a clustering problem with this scenario?

Network

Cited By