Overview

WUST dreams to become a hub of research excellence recognized globally for advancing knowledge, driving innovation, and contributing to societal development. The WUST Center for Research aspires to nurture global leaders in academia and industry through impactful research and innovation.

Mission

Our mission is to foster a vibrant research culture at Washington University of Science and Technology (WUST) by empowering students, academics, and staff with the tools, resources, and opportunities needed to excel in multidisciplinary research. We aim to bridge the gap between knowledge and practice by facilitating cutting-edge research, collaboration, and innovation.

image

Most Trending Research Works from WUST

S.No Author Name Article Title Journal Name Year #
01 Ahmed, MS, Arman, MS, Tasnim, N, Imran, MH, Sammak, MS, Mahmud, I. Rooftops Detection with YOLOv8 from Aerial Imagery and a Brief Review on Rooftop Photovoltaic Potential Assessment. IAES International Journal of Artificial Intelligence. Vol 14, No 1: February 2025. 2025
Cite
Ahmed, MS, Arman, MS, Tasnim, N, Imran, MH, Sammak, MS, Mahmud, I. (2025). “Rooftops Detection with YOLOv8 from Aerial Imagery and a Brief Review on Rooftop Photovoltaic Potential Assessment. ”. IAES International Journal of Artificial Intelligence. Vol 14, No 1: February 2025.
02 Ahmed, M, Mohamad, AJ, Hassan, MM, Bhuiyan, T. Air Pollutant (CO) Forecasting: A Hybrid Approach Using Gooseneck Barnacle Optimization and Artificial Neural Networks. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA. 2025
Cite
Ahmed, M, Mohamad, AJ, Hassan, MM, Bhuiyan, T. (2025). “Air Pollutant (CO) Forecasting: A Hybrid Approach Using Gooseneck Barnacle Optimization and Artificial Neural Networks. ”. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA.
03 Siam, AA, Hassan, MM, Bhuiyan, T. Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algorithm with Integrated Encryption. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA. 2025
Cite
Siam, AA, Hassan, MM, Bhuiyan, T. “Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algorithm with Integrated Encryption. ”. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA.
04 Siam, AA, Hassan, MM, Bhuiyan, T. Artificial Intelligence for Cybersecurity: A State of the Art. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA. 2025
Cite
Siam, AA, Hassan, MM, Bhuiyan, T. (2025). “Artificial Intelligence for Cybersecurity: A State of the Art. ”. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA.
05 Sarwar, MN, Arman, MS, Bhuiyan, T, Rafiq, FB. Optimizing Intrusion Detection with Hybrid Deep Learning Models and Data Balancing Techniques. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA. 2025
Cite
Sarwar, MN, Arman, MS, Bhuiyan, T, Rafiq, FB. (2025). “Optimizing Intrusion Detection with Hybrid Deep Learning Models and Data Balancing Techniques. ”. 4th IEEE International Conference on AI in Cybersecurity (ICAIC). 5-7 February 2025, Houston, USA.
06 Bhuiyan, T, Ahamed, MA, Mamun, AA, Hassan, MM. Classifying the Educational Impact of ADHD Using Machine Learning Techniques. Nanotechnology Perceptions. 2025
Cite
Bhuiyan, T, Ahamed, MA, Mamun, AA, Hassan, MM. (2025). “Classifying the Educational Impact of ADHD Using Machine Learning Techniques. ”. Nanotechnology Perceptions.
07 Mamun, AA, Bhuiyan, T, Sarker, A, Shahin, Hassan, MM. Breast Cancer Diagnosis Using Wisconsin Dataset: A Non-Feature Selection Approach. Nanotechnology Perceptions. 2025
Cite
Mamun, AA, Bhuiyan, T, Sarker, A, Shahin, Hassan, MM. (2025). “Breast Cancer Diagnosis Using Wisconsin Dataset: A Non-Feature Selection Approach. ”. Nanotechnology Perceptions.
08 Mamun, AA, Bhuiyan, T, Sarker, A, Hasan, R, Hassan, MM. Leveraging Machine Learning for Chronic Kidney Disease Prognostics. Nanotechnology Perceptions. 2025
Cite
Mamun, AA, Bhuiyan, T, Sarker, A, Hasan, R, Hassan, MM. (2025). “Leveraging Machine Learning for Chronic Kidney Disease Prognostics. ”. Nanotechnology Perceptions.
09 Hanip, A, Sarower, AH, Bhuiyan, T. The Transformative Role of Generative AI in Education: Challenges and Opportunities for Enhancing Student Learning and Assessment Through Mass Integration. International Journal of Advanced Research in Engineering and Technology (IJARET), 15(5), 161-175. 2024
Cite
Hanip, A, Sarower, AH, Bhuiyan, T. (2024). “The Transformative Role of Generative AI in Education: Challenges and Opportunities for Enhancing Student Learning and Assessment Through Mass Integration. ”. International Journal of Advanced Research in Engineering and Technology (IJARET), 15(5), 161-175.
10 Aziz, MT, Sharif, MM, Farid, SM, Mahmud, T, Uglu, SVO, Arefin, Hanip, A, Hossain, MS. Enhancing Credit Card Fraud Detection: A Machine Learning Framework. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh. 2024
Cite
Aziz, MT, Sharif, MM, Farid, SM, Mahmud, T, Uglu, SVO, Arefin, Hanip, A, Hossain, MS. (2024). “Enhancing Credit Card Fraud Detection: A Machine Learning Framework. ”. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh.
11 Rahman, T, Mizan, MMR, Mahmud, T, Nabila, JN, Roxy, KF, Roy, S, Hanip, A, Hossain, MS. Human vs AI: Evaluating the Effectiveness of Deep Learning in AI Text Detection. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh. 2024
Cite
Rahman, T, Mizan, MMR, Mahmud, T, Nabila, JN, Roxy, KF, Roy, S, Hanip, A, Hossain, MS. (2024). “Human vs AI: Evaluating the Effectiveness of Deep Learning in AI Text Detection. ”. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh.
12 Begum, M, Mahmud, T, Nessa, M, Tajrian, UN, Hanip, A, Hossain, MS. Knee Osteoarthritis Detection on X-rays: A Hybrid Approach Leveraging Deep Learning. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh. 2024
Cite
Begum, M, Mahmud, T, Nessa, M, Tajrian, UN, Hanip, A, Hossain, MS. (2024). “Knee Osteoarthritis Detection on X-rays: A Hybrid Approach Leveraging Deep Learning. ”. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh.
13 Azad, RU, Hossain, MS, Talukdar, M, Nahar, N, Hanip, A. A Stacked Meta-Model Framework for Diabetes Prediction: From Effective Feature Engineering to Meta-Learning. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh. 2024
Cite
Azad, RU, Hossain, MS, Talukdar, M, Nahar, N, Hanip, A. (2024). “A Stacked Meta-Model Framework for Diabetes Prediction: From Effective Feature Engineering to Meta-Learning. ”. 27th International Conference on Computer and Information Technology (ICCIT), 20-22 December 2024, Cox’s Bazar, Bangladesh.
14 Hossain MA, Rahman MZ, Bhuiyan T, Moni MA. Identification of Biomarkers and Molecular Pathways Implicated in Smoking and COVID-19 Associated Lung Cancer Using Bioinformatics and Machine Learning Approaches. Int J Environ Res Public Health. 2024 Oct 22;21(11):1392. 2024
Cite
Hossain MA, Rahman MZ, Bhuiyan T, Moni MA. (2024). “Identification of Biomarkers and Molecular Pathways Implicated in Smoking and COVID-19 Associated Lung Cancer Using Bioinformatics and Machine Learning Approaches. ”. Int J Environ Res Public Health. 2024 Oct 22;21(11):1392.
15 Prince, UN, Masum, A.A., Abdullah, S.M., Bhuiyan, T. Voice recognition by deep transfer learning and vision transformers to secure voice authentication. World Journal of Advanced Research and Reviews, 2024, 23(03), 1365–1377 2024
Cite
Prince, UN, Masum, A.A., Abdullah, S.M., Bhuiyan, T. (2024). “Voice recognition by deep transfer learning and vision transformers to secure voice authentication. ”. World Journal of Advanced Research and Reviews, 2024, 23(03), 1365–1377
16 Sarker, RP, Chowdhury, S, Bhuiyan, T, Mollah, MSH, Hassan, MM, Paul, BK Unveiling Shared Gene Regulatory Networks and Pathways in Bipolar Disorder and Alzheimer’s Disease: Identifying Novel Therapeutic Targets and Drug Candidates. International Conference on Biomedical Engineering, Computer and Information Technology for Health 2024 (BECITHCON 2024). 28-29 November 2024, Dhaka, Bangladesh. 2024
Cite
Sarker, RP, Chowdhury, S, Bhuiyan, T, Mollah, MSH, Hassan, MM, Paul, BK (2024). “Unveiling Shared Gene Regulatory Networks and Pathways in Bipolar Disorder and Alzheimer’s Disease: Identifying Novel Therapeutic Targets and Drug Candidates. ”. International Conference on Biomedical Engineering, Computer and Information Technology for Health 2024 (BECITHCON 2024). 28-29 November 2024, Dhaka, Bangladesh.
17 Bose, U, Rooman, MH, Bhuiyan, T, Mollah, MSH, Hassan, MM, Paul, BK Leveraging Machine Learning for Early Detection and Intervention in Polycystic Ovary Syndrome (PCOS): A Predictive Model Approach. International Conference on Biomedical Engineering, Computer and Information Technology for Health 2024 (BECITHCON 2024). 28-29 November 2024, Dhaka, Bangladesh. 2024
Cite
Bose, U, Rooman, MH, Bhuiyan, T, Mollah, MSH, Hassan, MM, Paul, BK (2024). “Leveraging Machine Learning for Early Detection and Intervention in Polycystic Ovary Syndrome (PCOS): A Predictive Model Approach. ”. International Conference on Biomedical Engineering, Computer and Information Technology for Health 2024 (BECITHCON 2024). 28-29 November 2024, Dhaka, Bangladesh.
18 Chy, MKA, Masum, AKM, Alam, MS, Azad, MAK, Hassan, MM, Bhuiyan, T. Predicting Stock Prices in Bangladesh: A Deep Learning Approach. 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS 2024) 12-13, December 2024, Tamil Nadu, India. 2024
Cite
Chy, MKA, Masum, AKM, Alam, MS, Azad, MAK, Hassan, MM, Bhuiyan, T. (2024). “Predicting Stock Prices in Bangladesh: A Deep Learning Approach. ”. 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS 2024) 12-13, December 2024, Tamil Nadu, India.
19 Hossain, S, Hasan, MZ, Jim, RI, …, Moni, MA. GDRNet: A Novel Graph Neural Network Architecture for Diabetic Retinopathy Detection. International Conference on Data Mining (ICDM), 9-12 December 2024, Abu Dhabi, UAE. 2024
Cite
Hossain, S, Hasan, MZ, Jim, RI, …, Moni, MA. (2024). “GDRNet: A Novel Graph Neural Network Architecture for Diabetic Retinopathy Detection. ”. International Conference on Data Mining (ICDM), 9-12 December 2024, Abu Dhabi, UAE.
20 Hossain, MM, Hossain, MS, Chaki, S, Rahman, MS, Moni, MA. Bengali Cyberbullying: Detection, Categorization, and Gender Bias Analysis. International Conference on Data Mining (ICDM), 9-12 December 2024, Abu Dhabi, UAE. 2024
Cite
Hossain, MM, Hossain, MS, Chaki, S, Rahman, MS, Moni, MA. (2024). “Bengali Cyberbullying: Detection, Categorization, and Gender Bias Analysis. ”. International Conference on Data Mining (ICDM), 9-12 December 2024, Abu Dhabi, UAE.
21 Veeramani, H, Thapa, S, Salman, M, Moni, MA, Naseem, U. UMML: Layout-aware Text-Image Fusion for Unified Multilingual Multimodal Learning. International Conference on Data Mining (ICDM), 9-12 December 2024, Abu Dhabi, UAE. 2024
Cite
Veeramani, H, Thapa, S, Salman, M, Moni, MA, Naseem, U. (2024). “UMML: Layout-aware Text-Image Fusion for Unified Multilingual Multimodal Learning. ”. International Conference on Data Mining (ICDM), 9-12 December 2024, Abu Dhabi, UAE.
22 SL Priyadharshini, MA Al Mamun, S Khandakar, NNU Prince, AH Shnain. Unlocking Cybersecurity Value through Advance Technology and Analytics from Data to Insight. Nanotechnology Perceptions, 202-210. 2024
Cite
SL Priyadharshini, MA Al Mamun, S Khandakar, NNU Prince, AH Shnain. (2024). “Unlocking Cybersecurity Value through Advance Technology and Analytics from Data to Insight. ”. Nanotechnology Perceptions, 202-210.
23 MAAM Muhammad Ashraf Faheem, Nabeel Zafar, Parkash Kumar, Md Mehedi Hassan. AI and Robotics: About the Transformation of Construction Industry Automation as well as Labor Productivity. Remittances Review, 9 2024
Cite
MAAM Muhammad Ashraf Faheem, Nabeel Zafar, Parkash Kumar, Md Mehedi Hassan. (2024). “AI and Robotics: About the Transformation of Construction Industry Automation as well as Labor Productivity. ”. Remittances Review, 9.
24 RH Chowdhury, NU Prince, SM Abdullah, LA Mim. The role of predictive analytics in cybersecurity: Detecting and preventing threats. World Journal of Advanced Research and Reviews 23 (2), 1615-1623 2024
Cite
RH Chowdhury, NU Prince, SM Abdullah, LA Mim. (2024). “The role of predictive analytics in cybersecurity: Detecting and preventing threats. ”. World Journal of Advanced Research and Reviews 23 (2), 1615-1623
25 NU Prince, MAA Mamun, AO Olajide, OU Khan, AB Akeem, AI Sani. IEEE Standards and Deep Learning Techniques for Securing Internet of Things (IoT) Devices Against Cyber Attacks. Journal of Computational Analysis and Applications (JoCAAA). 2024
Cite
NU Prince, MAA Mamun, AO Olajide, OU Khan, AB Akeem, AI Sani. (2024). “IEEE Standards and Deep Learning Techniques for Securing Internet of Things (IoT) Devices Against Cyber Attacks. ”. Journal of Computational Analysis and Applications (JoCAAA).
26 MA Tamal, K Islam, T Bhuiyan, A Sattar, NU Prince. Unveiling Suspicious Phishing Attacks: Enhancing Detection with an Optimal Feature Vectorization Algorithm and Supervised Machine Learning. Frontiers in Computer Science, 6, 1428013. 2024
Cite
MA Tamal, K Islam, T Bhuiyan, A Sattar, NU Prince. (2024). “Unveiling Suspicious Phishing Attacks: Enhancing Detection with an Optimal Feature Vectorization Algorithm and Supervised Machine Learning. ”. Nanotechnology Perceptions, 1428013.
27 NU Prince, MA Faheem, OU Khan, K Hossain, A Alkhayyat, A Hamdache, AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction. Frontiers in Computer Science, 6, 20, 332-353. 2024
Cite
NU Prince, MA Faheem, OU Khan, K Hossain, A Alkhayyat, A Hamdache, (2024). “AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction. ”. Nanotechnology Perceptions, 20, 332-353.
28 S Shrestha, N Basaula, RB Thapa, P Adhikari, NU Prince. Prescribing pattern of psychotropic drug among schizophrenia and related psychotic disorder patients. World journal of pharmacy and pharmaceutical sciences, 13 (8), 734-45 2024
Cite
S Shrestha, N Basaula, RB Thapa, P Adhikari, NU Prince. (2024). “Prescribing pattern of psychotropic drug among schizophrenia and related psychotic disorder patients. ”. World journal of pharmacy and pharmaceutical sciences, 13 (8), 734-45
29 RB Thapa, S Shrestha, NU Prince, S Karki. Knowledge of practicing drug dispensers about medication safety during pregnancy. European Journal of Biomedical, 11 (7), 428-434 2024
Cite
RB Thapa, S Shrestha, NU Prince, S Karki. (2024). “Knowledge of practicing drug dispensers about medication safety during pregnancy. ”. European Journal of Biomedical, 11 (7), 428-434
30 A Saleem, M Aleem, NU Prince, MMH Melon, SM Abdullah, SMW Faisal, Predicting Mobile App Success Using a Robust Hard Voting Ensemble Learning Approach. Letters in High Energy Physics 2024
Cite
A Saleem, M Aleem, NU Prince, MMH Melon, SM Abdullah, SMW Faisal, (2024). “Predicting Mobile App Success Using a Robust Hard Voting Ensemble Learning Approach. ”. Letters in High Energy Physics
31 S Ali, SA Wadho, A Yichiet, NU Prince, ML Gan, CK Lee. Cutting-edge Secret Sharing Techniques for Secure Cloud Collaboration: Reducing Communication Overhead and Enhancing Resource Efficiency. Engineering Science and Technology an International Journal. 2024
Cite
S Ali, SA Wadho, A Yichiet, NU Prince, ML Gan, CK Lee. (2024). “Cutting-edge Secret Sharing Techniques for Secure Cloud Collaboration: Reducing Communication Overhead and Enhancing Resource Efficiency. ”. Engineering Science and Technology an International Journal.
32 NU Prince, MAA Mamun, RBS Ahmed, WMM Asim, SKMAHR Sijjad Strengthening Enterprise Cybersecurity: A Survey on Ransomware Mitigation and Recovery Strategies. Nanotechnology Perceptions. 2024
Cite
NU Prince, MAA Mamun, RBS Ahmed, WMM Asim, SKMAHR Sijjad (2024). “Strengthening Enterprise Cybersecurity: A Survey on Ransomware Mitigation and Recovery Strategies. ”. Nanotechnology Perceptions.
33 NU Prince, MNH Shawon, ZK Shahed, RI Nupur, FA Mele, MA Al Mamun. E-commerce clothing review analysis by advanced ML Algorithms. World Journal of Advanced Research and Reviews. 2024
Cite
NU Prince, MNH Shawon, ZK Shahed, RI Nupur, FA Mele, MA Al Mamun. (2024). “E-commerce clothing review analysis by advanced ML Algorithms. ”. World Journal of Advanced Research and Reviews.
34 SM Abdullah, AA Masum, NU Prince, LA Mim. Deep Learning-Based Ovarian Cancer Subtype Classification Using VGG16 and MobileNetV2 with Squeeze-and-Excitation Blocks. Journal of Angiotherapy (ANGIO). 2024
Cite
SM Abdullah, AA Masum, NU Prince, LA Mim. (2024). “Deep Learning-Based Ovarian Cancer Subtype Classification Using VGG16 and MobileNetV2 with Squeeze-and-Excitation Blocks. ”. Journal of Angiotherapy (ANGIO).
35 NU Prince, MR Rahman, MDS HOSSEN, MM Sakib. Deep Transfer Learning Approach to Detect Dragon Tree Disease. IEEE 2024
Cite
NU Prince, MR Rahman, MDS HOSSEN, MM Sakib. (2024). “Deep Transfer Learning Approach to Detect Dragon Tree Disease. ”. IEEE
36 NU Prince, MAA Mamun, MTM Shagar, MRK Emon, MSH Sajib. Lychee Leaf Disease Detection by Vision Transformer and Computer Vision. IEEE 2024
Cite
NU Prince, MAA Mamun, MTM Shagar, MRK Emon, MSH Sajib. (2024). “Lychee Leaf Disease Detection by Vision Transformer and Computer Vision. ”. IEEE
37 Joseph, S., Arar, K., Karaburk, H., & Elbedour, S. Superintendents as social justice advocates for African American female students in STEM. International Journal of Leadership in Education, 1–19. 2023
Cite
Joseph, S., Arar, K., Karaburk, H., & Elbedour, S. (2023). “Superintendents as social justice advocates for African American female students in STEM. ”. International Journal of Leadership in Education, 1–19.
38 AH Hussain, MN Hasan, NU Prince, MM Islam, S Islam, SK Hasan. Enhancing Cyber Security Using Quantum Computing and Artificial Intelligence: A Review. World Journal of Advanced Research and Reviews (WJARR). 2021
Cite
AH Hussain, MN Hasan, NU Prince, MM Islam, S Islam, SK Hasan. (2021). “Enhancing Cyber Security Using Quantum Computing and Artificial Intelligence: A Review. ”. World Journal of Advanced Research and Reviews (WJARR).
39 OS Tuoyo, NU Prince, MAA Mamun, AHK Hossain. The Intersection of AI And Cybersecurity: Leveraging Machine Learning Algorithms for Real- Time Detection And Mitigation Of Cyber Threats. Educational Administration: Theory and Practice, 26 (4), 974-987. 2020
Cite
OS Tuoyo, NU Prince, MAA Mamun, AHK Hossain. (2020). “The Intersection of AI And Cybersecurity: Leveraging Machine Learning Algorithms for Real- Time Detection And Mitigation Of Cyber Threats. ”. Educational Administration: Theory and Practice, 26 (4), 974-987.
40 NU Prince, MAA Mamun, MMH Melon, A Hossain, Y Arafat, MA Hasan. A data-driven approach to gas demand prediction in the USA using machine learning. World Journal of Advanced Research and Reviews, 5 (Issue 2). 2020
Cite
NU Prince, MAA Mamun, MMH Melon, A Hossain, Y Arafat, MA Hasan. (2020). “A data-driven approach to gas demand prediction in the USA using machine learning. ”. World Journal of Advanced Research and Reviews, 5 (Issue 2).
41 Mark Robinson Marketing ‘Big Oil’: Marketing and Brand Lessons from the World’s Companies The W.U.S.T. Journal of International Business. Vol 1, Issue 1: Quarter 1 2025. 2025
Cite
Robinson, M. (2025). Marketing ‘big oil’: Marketing and brand lessons from the world’s companies. The W.U.S.T. Journal of International Business, 1(1), 4
42 Randall Stevens Creating the Happy Student: Why Student Experience Will Revolutionize Higher Education The W.U.S.T. Journal of International Business. Vol 1, Issue 1: Quarter 1 2025. 2025
Cite
Stevens, R. (2025). Creating the happy student: Why student experience will revolutionize higher education. The W.U.S.T. Journal of International Business, 1(1), 11
43 Lori Crever The Myth of Seeking an Omnipotent Mentor The W.U.S.T. Journal of International Business. Vol 1, Issue 1: Quarter 1 2025. 2025
Cite
Crever, L. (2025). The myth of seeking an omnipotent mentor. The W.U.S.T. Journal of International Business, 1(1), 17

Major Research Areas

Student Research Activities at WUST

At WUST, student research starts on the 1st Year

The university awards funding to many students who each year who contributing to quality research; a majority of these students are engaged in independent research, research with WUST, and also other innovative projects.

If you have any questions or concerns, please feel free to email us directly at [email protected].

2900 Eisenhower Ave, Alexandria, VA 22314

WUST is certified to operate by SCHEV. Accredited by ACCSC.

This institution is approved to offer GI Bill® educational benefits by the Virginia State Approving Agency. “GI Bill® is a registered trademark of the U.S Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the official U.S. government Website at https://www.benefits.va.gov/gibill/"