39 results on '"Nazmus Sakib"'
Search Results
2. A Proposed Technique for Simultaneously Detecting DDoS and SQL Injection Attacks
- Author
-
Istiaque Hashem, Nazmus Sakib, Shazid Morshedul Haque, Minhajul Islam, and Zobaidul Islam Jabed
- Subjects
SQL injection ,Computer science ,Operating system ,Denial-of-service attack ,computer.software_genre ,computer - Published
- 2021
3. A Novel Approach to Predict Diabetes Mellitus by Statistical Analysis and using Advanced Classification Algorithm
- Author
-
Nazmus Sakib, Abdullah Al Momen, Saima Sultana, Mahmudul Hasan Khandaker, and Mohoshi Haque
- Subjects
business.industry ,Computer science ,Diabetes mellitus ,medicine ,Statistical analysis ,Artificial intelligence ,business ,medicine.disease ,Machine learning ,computer.software_genre ,computer - Published
- 2020
4. End-To-End Neural Network for Paraphrased Question Answering Architecture with Single Supporting Line in Bangla Language
- Author
-
Tanvir Rahman, Md. Mohaiminul Hasan, Md. Mohsin Uddin, Mir Tanveer Islam, and Nazmus Sakib Patwary
- Subjects
Artificial neural network ,Computer science ,business.industry ,Supporting line ,computer.software_genre ,language.human_language ,Bengali ,End-to-end principle ,Question answering ,language ,Artificial intelligence ,Architecture ,business ,computer ,Natural language processing - Published
- 2020
5. A Windowless Approach to Recognize Various Modes of Locomotion and Transportation
- Author
-
Atiqur Rahman Ahad, Shahamat Mustavi Tasin, Syed Doha Uddin, A. H. M. Nazmus Sakib, and Promit Basak
- Subjects
Training set ,Computer science ,business.industry ,Machine learning ,computer.software_genre ,Automatic summarization ,Random forest ,Activity recognition ,Set (abstract data type) ,GSM ,Global Positioning System ,Artificial intelligence ,F1 score ,business ,computer - Abstract
Detecting modes of transportation through human activity recognition is important in the effective and smooth operation of smartphone applications or similar portable devices. However, the effectiveness of such tasks depends on the nature and type of data provided, and it can often become quite challenging. “SHL recognition challenge 2021” is an activity recognition challenge that aims to detect eight modes of locomotion and transportation. The dataset in this challenge was based on radio data, including GPS reception, GPS location, Wi-Fi reception, and GSM cell tower scans. The objective was to create a model that was able to recognize the modes in a user-independent manner. In this paper, our team (Team Nirban) gives an appropriate summarization of our methods and approach to the challenge. We processed the data, extracted various features from the dataset, and selected the best ones, which helped our model to be generative and user-independent. We exploited a classical machine learning based approach and achieved 93.4% accuracy and 89.6% F1 score on the training set using 10-fold cross-validation, as well as 62.3% accuracy on the provided validation set.
- Published
- 2021
6. AutoAct: An Auto Labeling Approach Based on Activities of Daily Living in the Wild Domain
- Author
-
Abtahi Mursalin, Iqbal Hassan, Nazmus Sakib, Robin Bin Salam, and H. M. Zabir Haque
- Subjects
Boosting (machine learning) ,business.industry ,Computer science ,Overfitting ,Machine learning ,computer.software_genre ,Domain (software engineering) ,Activity recognition ,Data set ,Annotation ,Benchmark (computing) ,Artificial intelligence ,F1 score ,business ,computer - Abstract
Annotation problem in Human Activity Recognition (HAR) has always been a major concern. The main problem of human-based annotation is that it often leads to misclassification due to uneagerness, hectic working and living conditions, misleading emotional fluctuation, etc. A solution for that can be the use of a fully automated annotation system. Here, we proposed a unique method for developing a pre-trained model which will be used as the auto annotation tool, using two completely different benchmark Activities of Daily Living (ADL) in the wild data sets. Our proposed auto labeling system has been trained in varied conditions which reduce the bias from location, people, and device, and makes our system very robust. Here, we used a unique mixture of augmentation, scaling, and boosting to increase accuracy, reduce overfitting, and handle imbalanced class problems. The accuracy achieved for auto annotation in case of data set 1, data set 2, and combined data set are 92%, 87%, and 73% respectively. Also, performance evaluation has been done using precision, recall, f1 score, and ROC curve, and the results achieved are promising.
- Published
- 2021
7. ATCPiM: Analog to Time Coded Processing in Memory for IoT at the Edge
- Author
-
Tommy Tracy, Vaibhav Verma, Mircea R. Stan, Mohammad Nazmus Sakib, and Rahul Sreekumar
- Subjects
Computer science ,business.industry ,computer.file_format ,Data conversion ,Non-volatile memory ,Analog signal ,Encoding (memory) ,Memory architecture ,Enhanced Data Rates for GSM Evolution ,business ,computer ,Computer hardware ,Energy (signal processing) ,Data transmission - Abstract
Data conversion from analog to digital and time domains and data transfer costs are the main bottlenecks in designing energy & area efficient near-sensor processing architectures. In this paper, we propose a temporal Processing in Memory architecture that addresses both data conversion and data transfer costs. We develop a novel analog to time encoding method that translates the incoming analog signal directly into a time-coded value, reducing data conversion costs. To do this, we exploit the linear kinematics of skyrmions in magnetic racetracks and propose a skyrmion-based non-volatile temporal memory architecture that employs time encoding. We also reduce the data transfer costs by processing the temporally stored data during the memory read operation. A read unit shared between the temporal memory cells acts as the processing element (PE) in our proposed design. Thus, the proposed approach enables the reduction of both data conversion and data transfer costs achieving < 340 fJ/conversion and approximately 530-660 fJ/operation.
- Published
- 2021
8. Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons
- Author
-
Mohamed Shehab, Heather Richter Lipford, and Nazmus Sakib Miazi
- Subjects
Behavioral tracking ,business.industry ,Computer science ,computer.internet_protocol ,media_common.quotation_subject ,Internet privacy ,Social relation ,Beacon ,Trustworthiness ,Perception ,Interview study ,Content sharing ,business ,computer ,media_common ,Bluetooth Low Energy - Abstract
We envision a unique social interaction system, ‘users-as-beacons’ built upon Bluetooth Low Energy (BLE) beacon technology, that could provide potential privacy benefits. It leverages BLE to employ the user devices to act as mobile beacons. Its potential applications include community-based social networking, localized advertising, and instant reviewing. To evaluate the potential for this system and inform design, we conducted an exploratory interview study of 27 participants of a hypothetical localized content-creating system. Using a design prototype and multiple scenarios as prompts, we asked questions regarding users’ perceptions of the potential benefits and challenges of a users-as-beacons system, focusing in particular on their privacy concerns and needs. Our results indicate that users do perceive the benefit of increased trustworthiness of user-beacons, but do not have expectations of greater location or behavioral tracking privacy. We highlight multiple design challenges of this system in supporting the trustworthy, relevant, and timely sharing of posts between people in a community.
- Published
- 2021
9. RFID based Security and Home Automation System using FPGA
- Author
-
Mohammad Ehsanul Alim, Sarosh Ahmad, and Nazmus Sakib Bin Alam
- Subjects
Very-large-scale integration ,Record locking ,business.industry ,Computer science ,Computer security ,computer.software_genre ,Automation ,Microcontroller ,Home automation ,VHDL ,Radio-frequency identification ,Field-programmable gate array ,business ,computer ,computer.programming_language - Abstract
Security is the basic need of hour and home automation is useful for the ease of people. There are many security systems which are being used in industry, but these are too expensive and difficult to use. There is another issue in the industry due the sequential processing of microcontrollers, which delays the work and consume more energy. In this paper we are focusing on a security system to reduce security threats by using advanced equipment such as FPGA programmed by VHDL language. Field Programmable Gate Array (FPGA) based security system can be utilized as a door lock in hotels, banks and everywhere etc. When a Radio Frequency Identification Device (RFID) tag is scanned by an its reader, the door lock will open if the tag information is already stored in the database of FPGA otherwise alarm will ring. Moreover, after opening the door lock, light or fan will automatically be turned on according to the need of that specific user. This project is a combination of two features i.e.; security and automation. Both features are basic needs in market. Our project can be commercialized in hotels, restaurants, schools, colleges, universities and many other places.
- Published
- 2020
10. A Machine Learning Approach to Predict Events by Analyzing Bengali Facebook Posts
- Author
-
Md. Nazmus Sakib, Motahara Sabah Mredula, Muha. Nishad Islam, Md. Sazzadur Rahman, and Noyon Dey
- Subjects
Phrase ,business.industry ,Event (computing) ,Computer science ,Sentiment analysis ,Semantic reasoner ,computer.software_genre ,language.human_language ,Naive Bayes classifier ,Bengali ,Tokenization (data security) ,language ,Social media ,Artificial intelligence ,business ,computer ,Natural language processing - Abstract
Facebook is the most popular social media platform all over the world and a huge data repository that can be analyzed to predict events as people express their thoughts on this platform. There are some events that often turn into potential crises and these crises might be avoided if we can predict it earlier. This work aims to predict events that are happening or going to happen by analyzing Bengali Facebook posts and help authorities to take proper security arrangements. In this work, the Naive Bayes Classification model has been used to classify posts as an event. Tokenization, Stopwords removing have been used for data pre-processing. Event phrase matching and 2-Layer Filtering have been used for features collection. Sentiment scores have been measured using Valence Aware Dictionary and Sentiment Reasoner(VADER). Finally, this work predicts four types of events(protesting, celebrating, religious, and neutral) showing 87.5% accuracy.
- Published
- 2020
11. Sensor-Based Human Activity Recognition: A Comparative Study of Machine Learning Techniques
- Author
-
Nazmus Sakib Patwary, Protap Kumar Saha, Mohd. Salman Hossain Bhuiyan, and Md. Tanvir Hossain
- Subjects
Ubiquitous computing ,Biometrics ,Computer science ,business.industry ,Mobile computing ,Machine learning ,computer.software_genre ,Field (computer science) ,Random forest ,Activity recognition ,Phone ,Preprocessor ,Artificial intelligence ,business ,computer - Abstract
Human activity recognition (HAR) is a wide field of study which identifies a person's specific movement or behavior based on sensor data. Recognition of human behavior is the origin of many technologies, such as those concerned with personal biometric signatures, sports training, digital computing, security, health and fitness tracking, ambient-assisted living and management. Studying recognition of human activity shows that researchers are mostly interested in human everyday activities. HAR models input is the reading of the raw sensor data, and output is the prediction of the movement activities of the user. The HAR framework is becoming an evolving discipline in intelligent computing applications in the field of pervasive computing. In our study, we applied several machine learning algorithm along with some preprocessing techniques to identify which algorithm performs better in dataset acquired from the WISDM laboratory, which is available in public domain. The experiment shows that the highest accuracy is achieved in phone accelerometer data using Principal Component Analysis (PCA) with Random Forest (RF) than any other algorithm and preprocessing techniques in terms of human activity recognition. This experiment will help perform more work on the basis of implementing classification and preprocessing techniques to identify human activities.
- Published
- 2020
12. Detecting Emotion of Users’ Analyzing Social Media Bengali Comments Using Deep Learning Techniques
- Author
-
Sanzana Karim Lora, Nazmus Sakib, Shahana Alam Antora, and Nusrat Jahan
- Subjects
Word embedding ,business.industry ,Computer science ,Deep learning ,Recurrent neural nets ,Convolution (computer science) ,computer.software_genre ,language.human_language ,Bengali ,language ,Social media ,Emotion recognition ,Artificial intelligence ,business ,computer ,Word (computer architecture) ,Natural language processing - Abstract
Bengali is one of the most spoken languages in the world. Nowadays, many people share their thoughts, emotions, and ideas through social media using the Bengali language. Facebook comments are one of the sources of sharing opinions among them. The goal of this study is to classify positive and negative emotions accurately with the help of the Facebook comments dataset. For this work, different deep learning models called Stacked Long short-term memory (LSTM), Stacked LSTM with 1D convolution, CNN with pre-trained word embeddings and, RNN with pre-trained word embedding have been used. The RNN model with pre-trained word embeddings has performed the best among all models with 98.3% accuracy. Other models do not perform well as the RNN model.
- Published
- 2020
13. Risk Prediction Of Chronic Kidney Disease Using Machine Learning Algorithms
- Author
-
Pritilata, Nazmus Sakib, Ashikul Islam, Tanzila Islam, Sadaf Salman Pantho, Shanila Yunus Yashfi, and Mohammad Shahbaaz
- Subjects
Artificial neural network ,business.industry ,Computer science ,Interpreted language ,Developing country ,Python (programming language) ,medicine.disease ,Machine learning ,computer.software_genre ,Random forest ,Chronic Kidney Diseases ,medicine ,Artificial intelligence ,business ,computer ,computer.programming_language ,Kidney disease - Abstract
CKD is a serious reason of demise and disability. It was the 27th focal reason in 1990 and became 18th focal reason in 2010. Near about 1 million people lose their life in 2013. In spite of that, people of developing countries are being affected by CKD. We analyzed the data of CKD patient and proposed a system from which it will be possible to predict the risk of CKD. We have used 455 patients' data. Online data set which is collected from UCI Machine Learning Repository and real time dataset which is collected from Khulna City Medical College are used here. We used Python as a high-level interpreted programming language for developing our system. We trained the data using 10-fold CV and applied Random forest and ANN. The accuracy achieved by Random forest algorithm is 97.12% and ANN is 94.5%. This system will help to predict early disclosure of chronic kidney diseases.
- Published
- 2020
14. An Approach Towards Intelligent Accident Detection, Location Tracking and Notification System
- Author
-
Mohammad Nazmus Sakib, Md. Sajedur Rahman, and Supriya Sarker
- Subjects
FOS: Computer and information sciences ,Computer science ,Other Computer Science (cs.OH) ,05 social sciences ,Computer Science - Human-Computer Interaction ,050209 industrial relations ,Process (computing) ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Notification system ,Computer security ,computer.software_genre ,Human-Computer Interaction (cs.HC) ,Vehicle accident ,Accident (fallacy) ,Computer Science - Other Computer Science ,0502 economics and business ,B.1 ,computer ,Location tracking ,Intelligent transportation system ,050203 business & management - Abstract
Advancement in transportation system has boosted speed of our lives. Meantime, road traffic accident is a major global health issue resulting huge loss of lives, properties and valuable time. It is considered as one of the reasons of highest rate of death nowadays. Accident creates catastrophic situation for victims, especially accident occurs in highways imposes great adverse impact on large numbers of victims. In this paper, we develop an intelligent accident detection, location tracking and notification system that detects an accident immediately when it takes place. Global Positioning System (GPS) device finds the exact location of accident. Global System for Mobile (GSM) module sends a notification message including the link of location in the google map to the nearest police control room and hospital so that they can visit the link, find out the shortest route of the accident spot and take initiatives to speed up the rescue process., The 3rd IEEE International Conference on Telecommunications and Photonics (ICTP) 2019
- Published
- 2019
15. Bi-level heterogeneity modeling of functional performance degradation for the aging population
- Author
-
Hongdao Meng, Nan Kong, Mingyang Li, Xuxue Sun, and Nazmus Sakib
- Subjects
Engineering ,Population ageing ,business.industry ,05 social sciences ,Bayesian probability ,Public Health, Environmental and Occupational Health ,Nonparametric statistics ,Functional data analysis ,Inference ,Machine learning ,computer.software_genre ,Bayesian inference ,050105 experimental psychology ,0502 economics and business ,Econometrics ,0501 psychology and cognitive sciences ,Artificial intelligence ,050207 economics ,Safety, Risk, Reliability and Quality ,business ,Safety Research ,computer ,Selection (genetic algorithm) ,Degradation (telecommunications) - Abstract
As the majority of service recipients of the U.S. long-term care system, the elderly with disabilities experience heterogeneous functional limitation and performance degradation. Successful modeling of heterogeneous degradation becomes of great importance for long-term care decision making. Existing heterogeneity modeling approaches are mainly restricted to single-level modeling of functional performance degradation for older adults. This article proposes a novel bi-level heterogeneity modeling and quantification framework to systematically investigate heterogeneous performance degradation at both sub-population and individual levels. Specifically, a Bayesian non-parametric modeling and inference framework is first proposed to characterize sub-population-level degradation heterogeneity. It relaxes the conventional assumption of pre-specifying a fixed number of sub-populations and allows joint model estimation and selection. Functional data analysis techniques are further considered to quantify ind...
- Published
- 2017
16. An Expedition on Implementing the Cloud Data Centre using Shared Memory of Mobile Storage by Virtualization
- Author
-
Raihan Ahmed, Nazmus Sakib, Tanvir Ahmed, and Fahad Bin Islam
- Subjects
World Wide Web ,Shared memory ,Computer science ,business.industry ,Operating system ,Cloud computing ,Data center ,business ,Virtualization ,computer.software_genre ,computer - Published
- 2017
17. A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization
- Author
-
Tanvir Ahmed, Raihan Ahmed, Nazmus Sakib, Fahad Bin Islam, and Bijoya Das
- Subjects
Computer science ,business.industry ,Cloud computing ,02 engineering and technology ,Storage virtualization ,Virtualization ,computer.software_genre ,030507 speech-language pathology & audiology ,03 medical and health sciences ,Shared memory ,Converged storage ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,020201 artificial intelligence & image processing ,Data center ,0305 other medical science ,business ,computer ,Data virtualization ,Computer network - Published
- 2017
18. Estimating Public Speaking Anxiety from Speech Signals Using Unsupervised Transfer Learning
- Author
-
Amir H. Behzadan, Nazmus Sakib, Megha Yadav, Theodora Chaspari, and Kexin Feng
- Subjects
050103 clinical psychology ,Source data ,Artificial neural network ,Computer science ,business.industry ,05 social sciences ,computer.software_genre ,Task (project management) ,Correlation ,030507 speech-language pathology & audiology ,03 medical and health sciences ,Public speaking ,medicine ,Unsupervised learning ,Anxiety ,0501 psychology and cognitive sciences ,Artificial intelligence ,medicine.symptom ,0305 other medical science ,Transfer of learning ,business ,computer ,Natural language processing - Abstract
Public speaking anxiety (PSA) ranks as a top social phobia across the world caused by various confounding factors. Motivated by the inherent data sparsity and lack of annotations in human-related applications, we propose unsupervised learning techniques to estimate PSA from speech signals. The labeled source data come from the publicly available CREMA-D dataset, while the unlabeled target data come from real-life public speaking tasks. Since fear is one of the major factors of PSA, the goal of this study is to build fear-specific representations from the labeled source data to estimate the degree of fear in the target data, and examine the extent to which the latter is associated with anxiety during the public speaking encounter. Transfer learning is performed through the domain-adversarial neural network (DANN) and Wasserstein generative adversarial network (WGAN). Results indicate that the proposed unsupervised fear- specific estimates can detect public speaking anxiety with Pearson’s correlation coefficient of 0.28 (p
- Published
- 2019
19. Active Voltage Clamping of Series Connected 1.2kV SiC MOSFETs for Solid State Circuit Breaker Application
- Author
-
Ehab Shoubaki, Nazmus Sakib, Muhammad Foyazur Rahman, Tiancan Pang, and Madhav Manjrekar
- Subjects
Computer science ,business.industry ,Voltage clamp ,020208 electrical & electronic engineering ,05 social sciences ,Electrical engineering ,02 engineering and technology ,Series and parallel circuits ,computer.software_genre ,Simulation software ,0202 electrical engineering, electronic engineering, information engineering ,Snubber ,0501 psychology and cognitive sciences ,Transient-voltage-suppression diode ,Unavailability ,business ,Low voltage ,computer ,050107 human factors ,Voltage - Abstract
SiC based Solid State Circuit Breakers (SSCBs) have recently entered into the market at the low voltage end of the network, and their adoption is slowly moving upstream as higher voltage offerings mature. Unavailability of commercial medium voltage SiC devices and their low current handling capability and high dv/dt hinder medium voltage SSCB designs. However, series connection of low voltage devices can meet the required voltage level if dynamic and static voltage balancing is possible. In this paper, an active voltage clamping method is proposed to achieve balanced dynamic turn-off voltage sharing between cascaded devices (CREE 1.2kV/30A SiC MOSFETs). Also, this method minimizes the number of components, overall switching losses and delay time by avoiding bulky and expensive RC snubbers. Different possible reasons behind dynamic voltage unbalancing and the proposed balancing technique have been verified in the LTspice simulation software. In addition, experimental results have been carried out to validate the effectiveness of the proposed technique.
- Published
- 2019
20. Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
- Author
-
Nazmus Sakib Miazi, Emmanuel Bello-Ogunu, and Mohamed Shehab
- Subjects
Information privacy ,Computer science ,business.industry ,Privacy policy ,Privacy laws of the United States ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,law.invention ,Bluetooth ,User experience design ,law ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Bluetooth Low Energy (BLE) beacons are an emerging type of technology in the Internet-of-Things (IoT) realm, which use BLE signals to broadcast a unique identifier that is detected by a compatible device to determine the location of nearby users. Beacons can be used to provide a tailored user experience with each encounter, yet can also constitute an invasion of privacy, due to their covertness and ability to track user behavior. Therefore, we hypothesize that user-driven privacy policy configuration is key to enabling effective and trustworthy privacy management during beacon encounters. We developed a framework for beacon privacy management that provides a policy configuration platform. Through an empirical analysis with 90 users, we evaluated this framework through a proof-of-concept app called Beacon Privacy Manager (BPM), which focused on the user experience of such a tool. Using BPM, we provided users with the ability to create privacy policies for beacons, testing different configuration schemes to refine the framework and then offer recommendations for future research.
- Published
- 2019
21. A Robust DWT-Based Compressed Domain Video Watermarking Technique
- Author
-
Mohammad Nazmus Sakib, Satyendra N. Biswas, and Shuvashis Das Gupta
- Subjects
Discrete wavelet transform ,Computer science ,Data_MISCELLANEOUS ,020208 electrical & electronic engineering ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Wavelet transform ,02 engineering and technology ,computer.file_format ,Computer Graphics and Computer-Aided Design ,Computer Science Applications ,Domain (software engineering) ,Robustness (computer science) ,MPEG-2 ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,computer ,Algorithm ,Digital watermarking ,Computer Science::Cryptography and Security - Abstract
To achieve robustness and imperceptibility, an adaptive compressed domain blind video watermarking method based on Discrete Wavelet Transform (DWT) is proposed in this research. In this technique, multiple binary images derived from a single watermark image are first embedded in a video sequence. The spatial spread spectrum watermark is directly incorporated in the compressed bit streams by modifying the four sets of discrete wavelet coefficients. Comprehensive simulation experiments demonstrate that the developed approach is efficient and also robust against spatial attacks such as scaling and frame averaging, noise attacks such as Gaussian and salt pepper noise, and temporal attacks like frame dropping and shifting. Moreover, the proposed approach can also withstand against rotation attacks of arbitrary angle.
- Published
- 2020
22. The Design of Cyber Threat Hunting Games: A Case Study
- Author
-
Bill Chu, Nazmus Sakib Miazi, Jinpeng Wei, Mohamed Shehab, and Mir Mehedi A. Pritom
- Subjects
021110 strategic, defence & security studies ,ComputingMilieux_THECOMPUTINGPROFESSION ,Process (engineering) ,Computer science ,business.industry ,Internet privacy ,0211 other engineering and technologies ,02 engineering and technology ,Computer security ,computer.software_genre ,Competition (economics) ,Forensic science ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Cyber threats - Abstract
Cyber Threat Hunting is an emerging cyber security activity. Recent studies show that, although similar actions like threat hunting are being actively practiced in some organization, security administrator and policy makers are far from being satisfied with their effectiveness. Most security professionals lack expertise in data analytics while most people with data analytics skills lack security knowledge. To understand the necessity of threat hunting education at university level, we organized a \textit{Threat Hunting Competition} on campus with generated logs. In this paper, we identify skills needed for cyber threat hunting, describe the data generation process as well as the usage of logs to teach threat hunting at universities.
- Published
- 2017
23. A Novel Approach to Signal Encryption: Improved Version of Conventional Direct Sequence Spread Spectrum Scheme
- Author
-
Nayan Sarker, Saiful Bahri Mohamed, Mohd Rashid, Md. Nurunnabi Mollah, Nazmus Sakib, and Avijit Hira
- Subjects
Scheme (programming language) ,Health (social science) ,General Computer Science ,business.industry ,Computer science ,General Mathematics ,General Engineering ,Direct-sequence spread spectrum ,Encryption ,Signal ,Education ,General Energy ,Electronic engineering ,business ,computer ,General Environmental Science ,computer.programming_language - Published
- 2014
24. Human Cognition in Automated Truing Test Design
- Author
-
Md. Mamunur Rashid Akand, Nazmus Sakib, Wasi Ul Kabir, and Mir Tafseer Nayeem
- Subjects
CAPTCHA ,Test design ,business.industry ,Computer science ,Usability ,Denial-of-service attack ,computer.software_genre ,Readability ,World Wide Web ,Robustness (computer science) ,The Internet ,Web service ,business ,computer - Abstract
Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by malicious automated programs (e.g., web bots) is becoming a serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism that generates and grades tests to determine whether the user is a human or a malicious computer program. Unfortunately, the existing HIPs tried to maximize the difficulty for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for potential users too. So there is a tradeoff between the usability and robustness in designing HIP tests. In their propose technique the authors tried to balance the readability and security by adding contextual information in the form of natural conversation without reducing the distortion and noise. In the result section, a microscopic large-scale user study was conducted involving 110 users to investigate the actual user views compare to existing state of the art CAPTCHA systems like Google's reCAPTCHA and Microsoft's CAPTCHA in terms of usability and security and found the authors' system capable of deploying largely over internet.
- Published
- 2014
25. Achieving Convergence through Deployment of IPTV in Cellular Network
- Author
-
Tanveer M. Haque, Hasib-Bin-Shakur Hasib-Bin-Shakur, and Nazmus Sakib
- Subjects
Multicast ,business.industry ,computer.internet_protocol ,Computer science ,Quality of service ,Retransmission ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPTV ,Multiprotocol Label Switching ,Packet loss ,Convergence (routing) ,Bandwidth (computing) ,Cellular network ,business ,computer ,Computer network - Abstract
Present IPTV system fails to establish QoS due to packet loss, server congestion and limited bandwidth. To overcome these drawbacks an implementation of IPTV is presented here using MPLS in 3GPP LTE release 8 networks. This implementation will provide multicast capability and FEC along with retransmission to minimize packet loss. Deploying IPTV in LTE makes LTE capable of transmitting voice, data and audio/video which will ensure convergence.
- Published
- 2014
26. Enabling the Internet of Things in developing countries: Opportunities and challenges
- Author
-
Zenville Erasmus, Antoine Bagula, Md. Abdur Razzaque, Nazmus Sakib Miazi, and Marco Zennaro
- Subjects
Vision ,business.industry ,020208 electrical & electronic engineering ,Internet privacy ,Developing country ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Software deployment ,0202 electrical engineering, electronic engineering, information engineering ,Internet of Things ,business ,computer - Abstract
This paper presents an overview of the enablement of IoT in developing countries and discusses the visions, general applications, opportunities and challenges of IoT in these countries. It also touches on issues relating to security, privacy, trust and the accompanied complexity. The potential applications for IoT are countless and can optimize processes with a direct impact on society. Certain challenges have to be addressed to make IoT deployment successful. It will be shown that some of the challenges can be turned into opportunities and that IoT has good chances to succeed in developing countries.
- Published
- 2016
27. A unique framework to integrate secured BAN and could computing to monitor patient
- Author
-
M Shamim Kaisert, Syed Nazmus Sakib, Muhammad R. Ahmed, and Mohammed Aseeri
- Subjects
0106 biological sciences ,business.industry ,Computer science ,Remote patient monitoring ,010604 marine biology & hydrobiology ,Cloud computing ,Cryptography ,Computer security ,computer.software_genre ,010603 evolutionary biology ,01 natural sciences ,Body area network ,Web application ,Entropy (information theory) ,business ,computer ,Publication ,Wireless sensor network ,Computer network - Abstract
Body Area Networks (BAN) is a special purpose Wireless Sensor Network (WSN) which is designed for patient monitoring. BAN requires to transmit the monitored data to the medical personals as quick as possible in real time. It is possible to make it web based. The integration of the BAN and cloud computing allows the sensors to transmit their data in a short time and show it in the web application. The technology is low cost as it is distributed and shared system. Even though the system will work in real time with integration but there is a concern to get the secure data from the sensor. So to get the real time secured data an efficient security mechanism is necessary. It is a challenge to secure the network from malicious or internal attacks. To mitigate tis problem several work is been proposed but most of it based on the cryptography or based on predefined tanning data. Which has drawbacks, as it is a challenging task for any dynamic networks to find the internal attacks without fixed infrastructure such as BAN. In this paper we proposed the integration of BAN and cloud computing using content-based publish/subscribe (pub/sub) broker model and security mechanisms for BAN based on entropy. The simulation result shows the evaluation.
- Published
- 2016
28. Necessity, challenges and development opportunities of smart grid technology in perspective of Bangladesh
- Author
-
Quazi Aquib Ferdaus, Ahasanul Siam, Nafisa Matin, Naymur Rahman, and Syed Nazmus Sakib
- Subjects
Engineering ,Smart system ,business.industry ,020209 energy ,Perspective (graphical) ,02 engineering and technology ,Computer security ,computer.software_genre ,Electric power system ,Smart grid ,Risk analysis (engineering) ,Home automation ,0202 electrical engineering, electronic engineering, information engineering ,Production (economics) ,Electricity ,business ,Management process ,computer - Abstract
This paper represents the necessity, challenges and development opportunities of smart grid technology in perspective of Bangladesh. In Bangladesh, power has been one of the major concerns from a long time. Smart grid technology is the modern concept of the grid system that has self-detection and management process. In the current power system, there has been a lot of mismanagements, lot of hazardous situations. So the necessity of smart grid technology establishment is very high now. In establishing the smart grid technology, there are lot of challenges to handle, lot of problems to solve. This paper gives an overall idea about the challenges that can be faced in establishing the smart grid technology. It also offers some suggestions about the establishment. In power system, security is a big issue. This paper focuses on all the possible security issues with the solution. Different development opportunities are also mentioned in the paper. The smart grid is not only associated with the production of electricity but also it has smart system of storage, transmission, distribution and use. From a smart home to a smart industry, a smart grid technology incorporates all the necessary things. For country like Bangladesh, smart grid technology can make the country to flourish for the further developments.
- Published
- 2016
29. Phoneme based Bangla text to speech conversion
- Author
-
Md. Afzal Hossain, Md. Nurul Huda, Esrat Farjana Rupu, Nazmus Sakib, and Mir Ashraf Uddin
- Subjects
business.industry ,Computer science ,Speech recognition ,Speech synthesis ,Diphone ,computer.software_genre ,Unicode ,language.human_language ,Bengali ,Text normalization ,language ,Artificial intelligence ,Syllable ,business ,Natural sounds ,computer ,Word (computer architecture) ,Natural language processing - Abstract
This paper presents a phoneme based Bangla Text to Speech (TTS) Synthesis framework which uses a new approach for recording Bangla phoneme to improve the speech quality. Main objective of our method is to produce more natural speech sound during Bangla text to speech conversion. In this approach, the size of the dictionary remains small, but produces more smooth and natural sounds than any other phoneme, syllable or diphone based approaches. In the proposed framework, the voice sound of each Bangla alphabet is recorded. Afterwards, the recorded voice sound is separated into their constituent phonemes by a voice cutter. This dataset can be used for future conversion of input text into its corresponding natural sounding speech from a sequence of phonemes. Before generating the phonemes sequence for each word, we normalized the text by considering numbers, abbreviations, acronyms, currency, dates and URLs. Our implemented system supports UNICODE input for Bangla text.
- Published
- 2015
30. Comparative Analysis of Improved Cuckoo Search(ICS) Algorithm and Artificial Bee Colony (ABC) Algorithm on Continuous Optimization Problems
- Author
-
Biswajit Panday, Nasif Shawkat, Nazmus Sakib, Md. Arman Ahmed, and Shariba Islam Tusiy
- Subjects
Continuous optimization ,Computer science ,business.industry ,Machine learning ,computer.software_genre ,Swarm intelligence ,Artificial bee colony algorithm ,Meta heuristic ,Artificial intelligence ,business ,Cuckoo search ,Algorithm ,computer ,Bees algorithm - Abstract
This work is related on two well-known algorithm, Improved Cuckoo Search and Artificial Bee Colony Algorithm which are inspired from nature. Improved Cuckoo Search (ICS) algorithm is based on Levy flight and behavior of some birds and fruit flies and they have some assumptions and each assumption is highly observed to maintain their characteristics. Besides Artificial Bee Colony (ABC) algorithm is based on swarm intelligence, which is based on bee colony with the way the bees maintain their life in that colony. Bees’ characteristics are the main part of this algorithm. This is a theoretical result of this topic and a quantitative research paper.
- Published
- 2015
31. Design of a Human Interaction Proof (HIP) using human cognition in contextual natural conversation
- Author
-
Nazmus Sakib, Mir Tafseer Nayeem, Md. Wasi Ul Kabir, and Md. Mamunur Rashid Akand
- Subjects
CAPTCHA ,Computer science ,business.industry ,media_common.quotation_subject ,Usability ,Denial-of-service attack ,computer.software_genre ,Electronic mail ,World Wide Web ,Robustness (computer science) ,Conversation ,The Internet ,Web service ,business ,computer ,media_common - Abstract
Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by malicious automated programs (e.g., web bots) is becoming a serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism that generates and grades tests to determine whether the user is a human or a malicious computer program. Unfortunately, the existing HIPs tried to maximize the difficulty for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for potential users too. So there is a tradeoff between the usability and robustness in designing HIP tests. In our proposed technique we tried to balance the readability and security by adding contextual information in the form of natural conversation without reducing the distortion and noise. In the result section, a microscopic large-scale user study was conducted involving 110 users to investigate the actual user views compare to existing state of the art CAPTCHA systems like Google's reCAPTCHA and Microsoft's CAPTCHA in terms of usability and security and found our system capable of deploying largely over internet.
- Published
- 2014
32. PCM based audio signal security system
- Author
-
Nazmus Sakib, Avijit Hira, and Nayan Sarker
- Subjects
Audio signal ,business.industry ,Computer science ,Audio signal flow ,computer.software_genre ,Encryption ,Multiple encryption ,40-bit encryption ,Electronic engineering ,Link encryption ,On-the-fly encryption ,business ,computer ,Computer hardware ,Digital audio - Abstract
In the age of digital world, the issue of multimedia data security (such as digital audio signals, images, and videos) is a major concern due to the rapid development of digital communications and networking technologies. The available methods and algorithms to assure data protection are sincerely based on cryptography. To illustrate, the data protection methodology is inherently involved with the cryptographic primitives for secure data transmission and reception by assuming that both sides must trust on each other. Now, in the high time of modern communication technology, the range of cryptography has been drastically expanded after the development of communication means. Cryptography is essentially required to ensure data protection against penetrations and to prevent espionage. In this proposal, an illustrative conception on pulse code modulation (PCM) based audio signal encryption, undoubtedly a new technique of encryption, is given to provide a wider range of security. This very effective technique of encryption is applied in the original domain of the signal; so both encryption & decryption become much easily executable. In a brief, in this method, the audio signal samples will be encrypted using very common arithmetic algorithms & the total no of bits will be kept unaffected. So, the bandwidth required to transmit the encrypted signal will be as same as the original signal. In receiver section, the encrypted signal will be decrypted using exactly the reverse algorithm used earlier for encryption. The performance of this encryption scheme is very similar to the binary PCM system except that the audio samples are encrypted after sampling. The PCM based audio signal security system, thus, will ensure both the secure and better communication.
- Published
- 2013
33. Analysis of a security protocol in a cluster storage system
- Author
-
Mais Nijim and A. K. M. Nazmus Sakib
- Subjects
Authentication ,Computer science ,business.industry ,Cryptographic protocol ,Computer security ,computer.software_genre ,Encryption ,Security service ,Security association ,Authentication protocol ,Key (cryptography) ,Challenge–response authentication ,business ,computer - Abstract
This paper represents a review of security vulnerabilities in a cluster storage system. In particular, we focus on identifying the different network level vulnerabilities including attack on the authentication, key exchange and data transfer protocol. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the security of the existing system. This paper proposes a secure authentication technique for the network layer of DAS, SAN and NAS. We also bring unencrypted data communication under an encryption process. We implement the concept of shared key by using a one way chain algorithm for block transfer of data. We integrate a new protocol to maintain the level of security according to the data priority concept.
- Published
- 2013
34. Digital security algorithm for GSM incorporated virtual e-banking protocol using watermarking technique
- Author
-
A B M Rafi Sazzad, Celia Shahnaz, Syed Bahauddin Alam, Md. Nazmus Sakib, and Shaikh Anowarul Fattah
- Subjects
business.product_category ,Transaction processing ,business.industry ,Computer science ,Mobile computing ,Computer security ,computer.software_genre ,Mobile phone ,SMS banking ,Internet access ,The Internet ,business ,Internet appliance ,Database transaction ,computer - Abstract
Cashless electronic transaction is getting immense popularity nowadays due to its procedural and bureaucratic simplicity. Almost each and every organization and financial institutes prefers electronic transaction in lieu of pen-paper based banking approach, which depends on high speed internet technology. However, this online monetary transaction is a long cherished blessing for the developed countries. In developing and underdeveloped countries, SMS banking gets rapid popularity over the internet banking via mobile phone, since internet based m-banking suffers from several limitations of internet connectivity, such as inaccessibility, slow speed, intermittent disruptions, and need for costly handset. In this paper, we propose a scheme where even without having an internet connection within the mobile handset, a client can virtually get the advantage of high speed internet banking via a GSM incorporated SMS transaction. Moreover, security over internet is a burning issue irrespective of the type of transaction, especially when the internet based transactions are operated at the user end. In the proposed scheme, we also offer a newly dimensioned security protocol using digital watermarking technique.
- Published
- 2010
35. Secured cellular banking protocols using virtual internet with digital watermarking
- Author
-
Shaikh Anowarul Fattah, A B M Rafi Sazzad, Md. Nazmus Sakib, Syed Bahauddin Alam, and Celia Shahnaz
- Subjects
business.product_category ,Mobile banking ,business.industry ,Computer science ,Mobile computing ,Computer security ,computer.software_genre ,Cellular communication ,Server ,SMS banking ,Internet access ,The Internet ,Mobile telephony ,business ,computer - Abstract
In this paper, a GSM based cellular communication scheme with encompassing security is proposed for electronic banking. In order to demonstrate the detailed steps of the scheme in a quick but convenient manner, Warnier-Orr representation of the proposed protocols is used. The proposed SMS based mobile banking scheme provides opportunity to every client of a financial institution to use modern facilities available nowadays via internet banking. The key advantage of our scheme is that the users do not need any sophisticated cellular phone or internet connectivity within the mobile handset. They can get major services, like balance enquiry, balance transfer between authenticated customers, and bill payment without going to the bank physically and saving the precious time. Security at the level of internet based communication between the mobile server and the banking server, which is beyond the control of the clients, is a crucial issue to be handled. In view of providing a high level of security, in addition to voice authentication, the digital audio watermarking technique is employed. There is no doubt that such a secured but easy to handle system can attract clients towards e-banking, especially in developing countries.
- Published
- 2010
36. Manipulation and transparency control of ICT constituted e-administrative protocol via digital watermarking for LDC's
- Author
-
Celia Shahnaz, Md. Nazmus Sakib, Syed Bahauddin Alam, A B M Rafi Sazzad, Shaikh Anowarul Fattah, and Hussain Mohammed Dipu Kabir
- Subjects
education.field_of_study ,business.industry ,Computer science ,media_common.quotation_subject ,Population ,Data security ,E-governance ,Computer security ,computer.software_genre ,E-Administration ,Information and Communications Technology ,The Internet ,Bureaucracy ,education ,business ,computer ,Digital watermarking ,media_common - Abstract
Theme of E-Governance admits agile and ameliorated citizen service from a quantitative and qualitative point of view. An efficacious e-Governance system ascertains completion of administrative tasks in a nimble way reducing bureaucracy through a transparent protocol being robust against corruption. With the increased utilization and adaptation of the information and communication technologies (ICT), especially through the overhauls of the Internet, the idea of e-governance becomes easy to implement and lucrative for both the administrators and mass population. In this paper, a four dimensional e-governance approach for any administrative entity is proposed. This protocol provides a better control for decision makers over their employees as well as defends employees against over dominance and victimization from high officials. Proper sharing of work and organizational hierarchy is also ensured for the Least Developed Countries (LDC's) using their existing infrastructure in the proposed scheme. Most importantly security and integrity of emergency data are enhanced using digital watermarking based on DCT coefficients replacement method.
- Published
- 2010
37. A secured electronic transaction scheme for mobile banking in Bangladesh incorporating digital watermarking
- Author
-
Md. Nazmus Sakib, Celia Shahnaz, A B M Rafi Sazzad, Hussain Mohammed Dipu Kabir, Shaikh Anowarul Fattah, and Syed Bahauddin Alam
- Subjects
Mobile banking ,Short Message Service ,business.product_category ,business.industry ,Computer science ,Mobile computing ,Computer security ,computer.software_genre ,Mobile phone ,SMS banking ,Internet access ,The Internet ,Mobile telephony ,business ,computer - Abstract
Nowadays internet-based banking is getting popularity because of its several advantages, such as ease of operation and virtual monetary activities, i.e., client's physical presence at different bank locations is no more required. However, because of scarcity of accessibility at different locations, cost, and slow speed, number of people using internet communication is a small percentage of the mobile phone users, especially in the developing countries. Moreover, security in internet-based banking is still a major concern. Most of the financial institutions have their own domain and offer web-based transaction facilities. In this paper, we propose a scheme to utilize the internet based existing banking facility via short message service (SMS) available in mobile phone technology without having the internet connection. In view of ensuring a high level of security, we introduce two-level security scheme: voice verification and digital watermarking.
- Published
- 2010
38. Shared key vulnerability in IEEE 802.16e: Analysis & solution
- Author
-
Mir Md. Saki Kowsar and A.K.M. Nazmus Sakib
- Subjects
IEEE 802 ,Authentication ,business.industry ,Computer science ,Cryptography ,Encryption ,Computer security ,computer.software_genre ,WiMAX ,Diffie–Hellman key exchange ,Wireless broadband ,Key (cryptography) ,Message authentication code ,business ,computer ,Computer network - Abstract
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as eliminate existing weakness in original DH key exchange protocol.
- Published
- 2010
39. Security Enhancement Protocol in SMS-Banking using Digital Watermarking Technique
- Author
-
Syed Bahauddin Alam, Celia Shahnaz, Md. Nazmus Sakib, Shaikh Anowarul Fattah, and A B M Rafi Sazzad
- Subjects
Authentication ,Short Message Service ,Security service ,GSM ,Computer science ,SMS banking ,Mobile computing ,Message authentication code ,Computer security ,computer.software_genre ,Digital watermarking ,computer - Abstract
Banking service is a part and parcel in the reformist human society. Due to the proliferation of communication tech- nology, instead of conventional paper based banking system, sms-banking and m-banking are getting immense popularity. However, regardless of nature of transactions, maintaining security is a major concern in this sector. In this paper, a short message service (SMS) based m-banking protocol under GSM technology is presented. In view of ensuring a high level of security during client authentication and data transmission, in the proposed SMS-banking scheme, a digital watermarking technique is introduced. The proposed scheme, because of wide- spread use of cellular phones, offers an ease of implementation in conjunction with a high level of security.
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.