98 results on '"Anupam Kumar Bairagi"'
Search Results
52. A Game-Theoretic Approach for Fair Coexistence Between LTE-U and Wi-Fi Systems.
- Author
-
Anupam Kumar Bairagi, Nguyen Hoang Tran, Walid Saad, Zhu Han 0001, and Choong Seon Hong
- Published
- 2019
- Full Text
- View/download PDF
53. An approach of cost optimized influence maximization in social networks.
- Author
-
Ashis Talukder, Md. Golam Rabiul Alam, Anupam Kumar Bairagi, Sarder Fakhrul Abedin, Md. Abu Layek, Hoang T. Nguyen, and Choong Seon Hong
- Published
- 2017
- Full Text
- View/download PDF
54. D2D communications under LTE-U system: QoS and co-existence issues are incorporated.
- Author
-
Anupam Kumar Bairagi and Choong Seon Hong
- Published
- 2017
- Full Text
- View/download PDF
55. LTE-U sum-rate maximization considering QoS and co-existence issue.
- Author
-
Anupam Kumar Bairagi, Nguyen Hoang Tran, and Choong Seon Hong
- Published
- 2017
- Full Text
- View/download PDF
56. Coexistence Mechanism between eMBB and uRLLC in 5G Wireless Networks.
- Author
-
Anupam Kumar Bairagi, Md. Shirajum Munir, Madyan Alsenwi, Nguyen Hoang Tran, Sultan S. Alshamrani, Mehedi Masud, Zhu Han 0001, and Choong Seon Hong
- Published
- 2020
57. Intelligent Resource Slicing for eMBB and URLLC Coexistence in 5G and Beyond: A Deep Reinforcement Learning Based Approach.
- Author
-
Madyan Alsenwi, Nguyen Hoang Tran, Mehdi Bennis, Shashi Raj Pandey, Anupam Kumar Bairagi, and Choong Seon Hong
- Published
- 2020
58. Unmanned Aerial Vehicle Assisted Forest Fire Detection Using Deep Convolutional Neural Network
- Author
-
A. K. Z Rasel Rahman, S. M. Nabil Sakif, Niloy Sikder, Mehedi Masud, Hanan Aljuaid, and Anupam Kumar Bairagi
- Subjects
Computational Theory and Mathematics ,Artificial Intelligence ,Software ,Theoretical Computer Science - Published
- 2023
59. QoS aware collaborative communications with incentives in the downlink of cellular network: A matching approach.
- Author
-
Anupam Kumar Bairagi, Nguyen Hoang Tran, Namho Kim, and Choong Seon Hong
- Published
- 2016
- Full Text
- View/download PDF
60. An overlapping coalition formation approach to maximize payoffs in cloud computing environment.
- Author
-
Anupam Kumar Bairagi, Md. Golam Rabiul Alam, Ashis Talukder, Nguyen Hoang Tran, Daeun Lee, and Choong Seon Hong
- Published
- 2016
- Full Text
- View/download PDF
61. SECURING BANGLA TEXT COMMUNICATION USING IMAGE STEGANOGRAPHY WITH DYNAMIC SUBSTITUTION IN IOT ENVIRONMENT
- Author
-
Anupam Kumar Bairagi, Saikat Mondal, and Debashish Chakroborti
- Abstract
Privacy and security of information are the prime concerns of today’s internet users. They want to get better and reliable services without sacrificing privacy from the current paradigm like the Internet of Things (IoT). In order to ensure IoT as a truthful service platform for the vast users, we need to protect the information that evolves throughout the internet and in the storage. In this paper, we propose a steganographic method for Bangla text communication over the unsecured internet based on RGB color image with the help of secret key for better protection of information. The proposed system consists of four main components namely preprocessing, embedding, extraction, and post-processing. We use dynamic positioning in case of substitution of (Bangla) text into the image. The secret key is transmitting throughput the image so that there is no extra hassle for communicating the secret key. We justify our proposed approach by using simulation with respect to imperceptibility, capacity, and robustness. We compare the result of the proposed method with other existing methods and get a better result over several existing efficient methods.
- Published
- 2022
62. Interoperability Benefits and Challenges in Smart City Services: Blockchain as a Solution
- Author
-
Sujit Biswas, Zigang Yao, Lin Yan, Abdulmajeed Alqhatani, Anupam Kumar Bairagi, Fatima Asiri, and Mehedi Masud
- Subjects
blockchain ,IoT ,Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,smart home ,Signal Processing ,security and privacy ,Electrical and Electronic Engineering ,distributed ledger technology - Abstract
The widespread usage of smart devices with various city-centric services speeds up and improves civic life, in contrast to growing privacy and security concerns. Security issues are exacerbated when e-government service providers trade their services within a centralised framework. Due to security concerns, city-centric centralised services are being converted to blockchain-based systems, which is a very time-consuming and challenging process. The interoperability of these blockchain-based systems is also more challenging due to protocol variances, an excessive amount of local transactions that raise scalability and rapidly occupy memory. In this paper, we have proposed a framework for interoperability across various blockchain-based smart city services. It also summarises how independent service providers might continue self-service choices (i.e., local transactions) without overloading the blockchain network and other organisations. A simulated interoperability network is used to show the network’s effectiveness. The experimental outcomes show the scalability and memory optimization of the blockchain network.
- Published
- 2023
- Full Text
- View/download PDF
63. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures.
- Author
-
Anupam Kumar Bairagi, Rahamatullah Khondoker, and Rafiqul Islam
- Published
- 2016
- Full Text
- View/download PDF
64. AI Powered Asthma Prediction Towards Treatment Formulation: An Android App Approach
- Author
-
Saydul Akbar Murad, Apurba Adhikary, Abu Jafar Md Muzahid, Md. Murad Hossain Sarker, Md. Ashikur Rahman Khan, Md. Bipul Hossain, Anupam Kumar Bairagi, Mehedi Masud, and Md. Kowsher
- Subjects
Computational Theory and Mathematics ,Artificial Intelligence ,Software ,Theoretical Computer Science - Published
- 2022
65. 4D: A Real-Time Driver Drowsiness Detector Using Deep Learning
- Author
-
Israt Jahan, K. M. Aslam Uddin, Saydul Akbar Murad, M. Saef Ullah Miah, Tanvir Zaman Khan, Mehedi Masud, Sultan Aljahdali, and Anupam Kumar Bairagi
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,Electrical and Electronic Engineering ,CNN ,drowsiness detection ,VGG16 ,VGG19 ,4D - Abstract
There are a variety of potential uses for the classification of eye conditions, including tiredness detection, psychological condition evaluation, etc. Because of its significance, many studies utilizing typical neural network algorithms have already been published in the literature, with good results. Convolutional neural networks (CNNs) are employed in real-time applications to achieve two goals: high accuracy and speed. However, identifying drowsiness at an early stage significantly improves the chances of being saved from accidents. Drowsiness detection can be automated by using the potential of artificial intelligence (AI), which allows us to assess more cases in less time and with a lower cost. With the help of modern deep learning (DL) and digital image processing (DIP) techniques, in this paper, we suggest a CNN model for eye state categorization, and we tested it on three CNN models (VGG16, VGG19, and 4D). A novel CNN model named the 4D model was designed to detect drowsiness based on eye state. The MRL Eye dataset was used to train the model. When trained with training samples from the same dataset, the 4D model performed very well (around 97.53% accuracy for predicting the eye state in the test dataset). The 4D model outperformed the performance of two other pretrained models (VGG16, VGG19). This paper explains how to create a complete drowsiness detection system that predicts the state of a driver’s eyes to further determine the driver’s drowsy state and alerts the driver before any severe threats to road safety.
- Published
- 2023
- Full Text
- View/download PDF
66. Intelligent Resource Slicing for eMBB and URLLC Coexistence in 5G and Beyond: A Deep Reinforcement Learning Based Approach
- Author
-
Nguyen H. Tran, Anupam Kumar Bairagi, Choong Seon Hong, Madyan Alsenwi, Shashi Raj Pandey, and Mehdi Bennis
- Subjects
Signal Processing (eess.SP) ,FOS: Computer and information sciences ,Mathematical optimization ,Optimization problem ,Computer science ,Reliability (computer networking) ,resource slicing ,02 engineering and technology ,Dynamic priority scheduling ,Scheduling (computing) ,Computer Science - Networking and Internet Architecture ,eMBB ,FOS: Electrical engineering, electronic engineering, information engineering ,0202 electrical engineering, electronic engineering, information engineering ,Reinforcement learning ,Resource management ,Electrical Engineering and Systems Science - Signal Processing ,Electrical and Electronic Engineering ,Latency (engineering) ,URLLC ,Networking and Internet Architecture (cs.NI) ,deep reinforcement learning ,Applied Mathematics ,Mobile broadband ,020206 networking & telecommunications ,Computer Science Applications ,5G NR ,Resource allocation ,risk-sensitive - Abstract
In this paper, we study the resource slicing problem in a dynamic multiplexing scenario of two distinct 5G services, namely Ultra-Reliable Low Latency Communications (URLLC) and enhanced Mobile BroadBand (eMBB). While eMBB services focus on high data rates, URLLC is very strict in terms of latency and reliability. In view of this, the resource slicing problem is formulated as an optimization problem that aims at maximizing the eMBB data rate subject to a URLLC reliability constraint, while considering the variance of the eMBB data rate to reduce the impact of immediately scheduled URLLC traffic on the eMBB reliability. To solve the formulated problem, an optimization-aided Deep Reinforcement Learning (DRL) based framework is proposed, including: 1) eMBB resource allocation phase, and 2) URLLC scheduling phase. In the first phase, the optimization problem is decomposed into three subproblems and then each subproblem is transformed into a convex form to obtain an approximate resource allocation solution. In the second phase, a DRL-based algorithm is proposed to intelligently distribute the incoming URLLC traffic among eMBB users. Simulation results show that our proposed approach can satisfy the stringent URLLC reliability while keeping the eMBB reliability higher than 90%., This work was submitted to the IEEE Transactions on Wireless Communications
- Published
- 2021
67. When CVaR Meets With Bluetooth PAN: A Physical Distancing System for COVID-19 Proactive Safety
- Author
-
Choong Seon Hong, Anupam Kumar Bairagi, Md. Shirajum Munir, and Do Hyeon Kim
- Subjects
Mathematical optimization ,Distancing ,CVAR ,Computer science ,Probabilistic logic ,Linear model ,law.invention ,Bluetooth ,Control flow ,law ,Probability distribution ,Electrical and Electronic Engineering ,Personal area network ,Instrumentation - Abstract
In this work, we propose a risk-aware physical distancing system to assure a private safety distance from others for reducing the chance of being affected by the COVID-19 or such kind of pandemic. In particular, we have formulated a physical distancing problem by capturing Conditional Value-at-Risk (CVaR) of a Bluetooth-enabled personal area network (PAN). To solve the formulated risk-aware physical distancing problem, we propose two stages solution approach by imposing control flow, linear model, and curve-fitting schemes. Notably, in the first stage, we determine a PAN creator's safe movement distance by proposing a probabilistic linear model. This scheme can effectively cope with a tail-risk from the probability distribution by satisfying the CVaR constraint for estimating safe movement distance. In the second stage, we design a Levenberg-Marquardt (LM)-based curve fitting algorithm upon the recommended safety distance and current distances between the PAN creator and others to find an optimal high-risk trajectory plan for the PAN creator. Finally, we have performed an extensive performance analysis using state-of-the-art Bluetooth data to establish the proposed risk-aware physical distancing system's effectiveness. Our experimental results show that the proposed solution approach can effectively reduce the risk of recommending safety distance towards ensuring private safety. In particular, for a 95% CVaR confidence, we can successfully deal with 45.11% of the risk for measuring the PAN creator's safe movement distance.
- Published
- 2021
68. A Comparative Analysis of Machine Learning Algorithms to Predict Liver Disease
- Author
-
Mounita Ghosh, Sultan S. Alshamrani, Mehedi Masud, Laboni Akter, M. Raihan, Md. Mohsin Sarker Raihan, and Anupam Kumar Bairagi
- Subjects
business.industry ,Computer science ,medicine.disease ,Machine learning ,computer.software_genre ,Theoretical Computer Science ,Liver disease ,Computational Theory and Mathematics ,Artificial Intelligence ,medicine ,Artificial intelligence ,business ,computer ,Software - Published
- 2021
69. Skin Cancer Detection from Low-Resolution Images Using Transfer Learning
- Author
-
Abdul Hasib Uddin, Anupam Kumar Bairagi, Abdullah-Al Nahid, and M. D. Reyad Hossain Khan
- Subjects
Network architecture ,Artificial neural network ,Pixel ,business.industry ,Computer science ,Pattern recognition (psychology) ,RGB color model ,Pattern recognition ,Artificial intelligence ,Transfer of learning ,business ,Grayscale ,Image resolution - Abstract
Skin cancer is one of the worst diseases noticed in humankind. It beholds some types, which even experts find challenging to categorize. In recent times, neural network-based automated systems have been entitled to perform this difficult task for their amazing ability of pattern recognition. However, the challenge remains due to the requirement for high-quality images and thus the necessity of highly configured resources. In this research manuscript, the authors have addressed these issues. They pushed the boundary of neural networks by utilizing a low-resolution (80 × 80, 64 × 64, and 32 × 32 pixels), highly imbalanced, grayscale HAM10000 skin cancer dataset into several pre-trained network architectures (VGG16, DenseNet169, DenseNet161, and ResNet50) that have been successfully used for a similar purpose with a high-resolution, augmented RGB HAM10000 skin cancer image dataset. The image resolution of the original HAM10000 dataset is 800 × 600 pixels. The highest achieved performance for 80 × 80, 64 × 64, and 32 × 32 pixel images were 80.46%, 78.56%, and 74.15%, respectively. All of these results were accomplished from the ImageNet pre-trained VGG16 model. The second-best model in terms of transfer learning was DenseNet169. The performances demonstrate that even within these severe circumstances, neural network-based transfer learning holds promising possibilities.
- Published
- 2021
70. A Vision-Based Lane Detection Approach for Autonomous Vehicles Using a Convolutional Neural Network Architecture
- Author
-
Anupam Kumar Bairagi, Abdullah-Al Nahid, Seong-Hoon Kee, Md. Tariq Hasan, Fatima Tuz Zohora, Md. Al-Masrur Khan, Niloy Sikder, and Md. Abdullah Al Mamun
- Subjects
Scheme (programming language) ,Artificial neural network ,Computer science ,business.industry ,Real-time computing ,Automotive industry ,Convolutional neural network ,Statistical classification ,Geolocation ,Pattern recognition (psychology) ,Architecture ,business ,computer ,computer.programming_language - Abstract
Autonomous vehicles no longer belong to the realm of science fiction. They have become a prominent area of research in the last two decades because of the integration of Artificial Intelligence in the automobile industry. Apart from the development of various complex learning algorithms, the advancement of cameras, sensors, and geolocation technology as well as the escalation in the capacity of machines have played a crucial role in bringing this technology into reality. We have had significant breakthroughs in the development of autonomous cars within the last ten years. However, despite the success of multiple prototypes in navigating within the borders of a delimited area, researchers are yet to overcome several drawbacks before embodying them in the transport system; and one of those hurdles lies in the lane detection system of the cars. Therefore, in this article, we present an intelligent lane detection algorithm incorporating fully-connected Neural Networks with a secondary layer protection scheme to detect the borders of a lane. We achieved over 98% classification accuracy using the proposed lane detection model. We also implemented the model in a small prototype to take a look at its performance. Experimental results infer that the algorithm is capable of lane detection and ready for practical use.
- Published
- 2021
71. A Machine Learning Based Study to Predict Depression with Monitoring Actigraph Watch Data
- Author
-
Shagoto Rahman, M. Raihan, and Anupam Kumar Bairagi
- Subjects
Artificial neural network ,Correlation coefficient ,business.industry ,Computer science ,Deep learning ,food and beverages ,Machine learning ,computer.software_genre ,Random forest ,Cohen's kappa ,Artificial intelligence ,AdaBoost ,Time series ,business ,computer ,Depression (differential diagnoses) - Abstract
The consequences of depression are breathtaking these days. The suicidal tendency, as well as other fatigues, depression has almost soaked the world. A detection system can combat such consequences early. Motor activity sensor values carry out an individual's daily routine activities that can somewhat signify momentary changes in behavior. A consolidation of these motor sensor data with other demographic, clinical data can be very convenient in terms of depression detection. The combination of motor sensor reads as well as demographic data has been obligated in this study with machine learning approaches, namely Random Forest(RF), AdaBoost, and Artificial Neural Networks (ANN), achieving accuracy and Fl-score of 98% in both cases. The Cohen's kappa coefficient and Matthew's correlation coefficient are 0.96 in both factors.
- Published
- 2021
72. eMBB-URLLC Resource Slicing: A Risk-Sensitive Approach
- Author
-
Choong Seon Hong, Anupam Kumar Bairagi, Madyan Alsenwi, Nguyen H. Tran, and Mehdi Bennis
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Mathematical optimization ,Markov chain ,Computer science ,Mobile broadband ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,Computer Science - Networking and Internet Architecture ,Puncturing ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Latency (engineering) ,5G - Abstract
Ultra Reliable Low Latency Communication (URLLC) is a 5G New Radio (NR) application that requires strict reliability and latency. URLLC traffic is usually scheduled on top of the ongoing enhanced Mobile Broadband (eMBB) transmissions ( i.e., puncturing the current eMBB transmission) and cannot be queued due to its hard latency requirements. In this letter, we propose a risk-sensitive based formulation to allocate resources to the incoming URLLC traffic, while minimizing the risk of the eMBB transmission ( i.e., protecting the eMBB users with low data rate) and ensuring URLLC reliability. Specifically, the Conditional Value at Risk (CVaR) is introduced as a risk measure for eMBB transmission. Moreover, the reliability constraint of URLLC is formulated as a chance constraint and relaxed based on Markov’s inequality. We decompose the formulated problem into two subproblems in order to transform it into a convex form and then alternatively solve them until convergence. Simulation results show that the proposed approach allocates resources to the incoming URLLC traffic efficiently, while satisfying the reliability of both eMBB and URLLC.
- Published
- 2019
73. A Game-Theoretic Approach for Fair Coexistence Between LTE-U and Wi-Fi Systems
- Author
-
Nguyen H. Tran, Choong Seon Hong, Walid Saad, Anupam Kumar Bairagi, and Zhu Han
- Subjects
Scheme (programming language) ,Computer Networks and Communications ,business.industry ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,020302 automobile design & engineering ,02 engineering and technology ,Maximization ,Spectrum management ,Radio spectrum ,0203 mechanical engineering ,Hardware_GENERAL ,Automotive Engineering ,Cellular network ,Resource management ,Electrical and Electronic Engineering ,business ,computer ,Computer network ,computer.programming_language - Abstract
LTE over unlicensed band (LTE-U) has emerged as an effective technique to overcome the challenge of spectrum scarcity. Using LTE-U along with advanced techniques such as carrier aggregation, one can boost the performance of existing cellular networks. However, if not properly managed, the use of LTE-U can potentially degrade the performance of co-existing Wi-Fi access points, which operate over the unlicensed frequency bands. Moreover, most of the existing works consider single operator in their proposals. In this paper, an effective coexistence mechanism between LTE-U and Wi-Fi systems is studied. The goal is to enable the cellular network to use LTE-U with CA to meet the quality-of-service (QoS) needs of its users while protecting Wi-Fi access points (WAPs) for a network with multiple operators. In particular, the problem of LTE-U sum-rate maximization is addressed under user QoS and WAP-LTE-U coexistence constraints. To solve this problem, a cooperative Nash bargaining game (NBG) and a one-sided matching game are proposed. Here, the NBG solves the coexistence issue between LTE-U and Wi-Fi system, while the matching game solves the resources allocation problem in the LTE-U system. These two games repeat until convergence. Simulation results show the quality of the proposed approach over other comparing methods in terms of the per-user achieved rate, percentage of unsatisfied users, and fairness. The result also shows that the proposed approach can better protect the performance of Wi-Fi users, compared to the conventional listen-before-talk scheme.
- Published
- 2019
74. Coexistence of LTE-U and Wi-Fi System Considering the User’s QoE
- Author
-
Anupam Kumar Bairagi, Ashis Talukder, Do Hyeon Kim, and Choong Seon Hong
- Subjects
Nash bargaining game ,Computer science ,business.industry ,business ,Computer network - Published
- 2018
75. Reverse Path Activation-based Reverse Influence Maximization in Social Networks
- Author
-
Do Hyeon Kim, Choong Seon Hong, Anupam Kumar Bairagi, and Ashis Talukder
- Subjects
Mathematical optimization ,Computer science ,Path (graph theory) ,Maximization - Published
- 2018
76. A Pneumonia Diagnosis Scheme Based on Hybrid Features Extracted from Chest Radiographs Using an Ensemble Learning Algorithm
- Author
-
Niloy Sikder, Saeed Rubaiee, Abdullah-Al Nahid, Anupam Kumar Bairagi, Divya Anand, Anas Ahmed, and Mehedi Masud
- Subjects
Medicine (General) ,Article Subject ,Computer science ,Biomedical Engineering ,Health Informatics ,Feature selection ,02 engineering and technology ,Machine Learning ,03 medical and health sciences ,R5-920 ,Classifier (linguistics) ,Medical technology ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Humans ,R855-855.5 ,Child ,030304 developmental biology ,0303 health sciences ,medicine.diagnostic_test ,business.industry ,Deep learning ,Bacterial pneumonia ,Reproducibility of Results ,Pattern recognition ,Pneumonia ,medicine.disease ,Ensemble learning ,Radiography ,Sample size determination ,020201 artificial intelligence & image processing ,Surgery ,Artificial intelligence ,business ,Chest radiograph ,Algorithms ,Biotechnology ,Research Article - Abstract
Pneumonia is a fatal disease responsible for almost one in five child deaths worldwide. Many developing countries have high mortality rates due to pneumonia because of the unavailability of proper and timely diagnostic measures. Using machine learning-based diagnosis methods can help to detect the disease early and in less time and cost. In this study, we proposed a novel method to determine the presence of pneumonia and identify its type (bacterial or viral) through analyzing chest radiographs. We performed a three-class classification based on features containing diverse information of the samples. After using an augmentation technique to balance the dataset’s sample sizes, we extracted the chest X-ray images’ statistical features, as well as global features by employing a deep learning architecture. We then combined both sets of features and performed the final classification using the RandomForest classifier. A feature selection method was also incorporated to identify the features with the highest relevance. We tested the proposed method on a widely used (but relabeled) chest radiograph dataset to evaluate its performance. The proposed model can classify the dataset’s samples with an 86.30% classification accuracy and 86.03% F-score, which assert the model’s efficacy and reliability. However, results show that the classifier struggles while distinguishing between viral and bacterial pneumonia samples. Implementing this method will provide a fast and automatic way to detect pneumonia in a patient and identify its type.
- Published
- 2021
- Full Text
- View/download PDF
77. A Machine Learning Approach to Diagnosing Lung and Colon Cancer Using a Deep Learning-Based Classification Framework
- Author
-
Niloy Sikder, Mohammed A. AlZain, Abdullah-Al Nahid, Mehedi Masud, and Anupam Kumar Bairagi
- Subjects
medicine.medical_specialty ,Colorectal cancer ,02 engineering and technology ,Disease ,lung cancer detection ,lcsh:Chemical technology ,Biochemistry ,Article ,Analytical Chemistry ,Health care ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Medical physics ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Stage (cooking) ,Instrumentation ,Cause of death ,Contextual image classification ,business.industry ,Deep learning ,Cancer ,deep learning ,020206 networking & telecommunications ,histopathological image analysis ,medicine.disease ,Atomic and Molecular Physics, and Optics ,colon cancer detection ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,image classification - Abstract
The field of Medicine and Healthcare has attained revolutionary advancements in the last forty years. Within this period, the actual reasons behind numerous diseases were unveiled, novel diagnostic methods were designed, and new medicines were developed. Even after all these achievements, diseases like cancer continue to haunt us since we are still vulnerable to them. Cancer is the second leading cause of death globally, about one in every six people die suffering from it. Among many types of cancers, the lung and colon variants are the most common and deadliest ones. Together, they account for more than 25% of all cancer cases. However, identifying the disease at an early stage significantly improves the chances of survival. Cancer diagnosis can be automated by using the potential of Artificial Intelligence (AI), which allows us to assess more cases in less time and cost. With the help of modern Deep Learning (DL) and Digital Image Processing (DIP) techniques, this paper inscribes a classification framework to differentiate among five types of lung and colon tissues (two benign and three malignant) by analyzing their histopathological images. The acquired results show that the proposed framework can identify cancer tissues with a maximum of 96.33% accuracy. Implementation of this model will help medical professionals to develop an automatic and reliable system capable of identifying various types of lung and colon cancers.
- Published
- 2021
78. IoT based Low-Cost Gas Leakage, Fire, and Temperature Detection System with Call Facilities
- Author
-
Anupam Kumar Bairagi, Sourav Debnath, Suprio Das, Samin Ahmed, and Abdullah-Al Nahid
- Subjects
Computer science ,business.industry ,Information industry ,Computer security ,computer.software_genre ,Phone call ,ALARM ,Work (electrical) ,The Internet ,business ,Internet of Things ,computer ,Gsm module ,Leakage (electronics) - Abstract
IoT (Internet of Things) is dominating all over the world for developing technology. It is another information industry following the computer, internet, and mobile connection. In modern society, we must ensure security for leading a comfortable life. Nowadays, security has been affected by different types of matters. Gas leakage and fire incidents are considered among them. At present, there are many undesirable accidents from gas leakage and fire incidents. One way to prevent accidents involving gas leakage and fire incident detection is to affix a gas leakage and fire incident detection device at adequate places. Indeed, when the gas leakage or fire incident occurs, then the temperature can be increased naturally. Our proposed work, a simple system using low-cost devices, has been designed to send a phone call to the user via the GSM module in case of any gas or smoke leakage. It also sends data to the alarm, alerting the users and sending a graphical alert to the server via NodeMCU. Besides, a temperature sensor also detects the temperature of that hazardous situation at the same time and sends data to the web server. We are using different algorithms to know the sensor's early predictions' overall accuracy in real-life-critical situations through the machine learning approach. This proposed work will contribute if gas leaks or fires occur at home or in the industry, then people can take the necessary precaution in advance.
- Published
- 2020
79. An Automatic Computer-Based Method for Fast and Accurate Covid-19 Diagnosis
- Author
-
Abdullah-Al Nahid, Ibrahim Rafi, M. A. Parvez Mahmud, Md. Sanaullah Chowdhury, Kangkan Bhakta, Saeed Rubaie, Niloy Sikder, Anupam Kumar Bairagi, Mehedi Masud, and Abdullah Al Jaid Jim
- Subjects
education.field_of_study ,Coronavirus disease 2019 (COVID-19) ,Computer science ,Population ,Computer based ,Outbreak ,Economic shortage ,Disease ,medicine.disease ,Effective solution ,Pandemic ,medicine ,Medical emergency ,education - Abstract
At present, the whole world is witnessing a horrifying outbreak caused by the Coronavirus Disease 2019 (COVID-19). The virus responsible for this disease is called SARS-CoV-2. It affects its victims’ respiratory system and causes severe lung inflammation, making it harder for them to breathe. The virus is airborne, and so has a high infection rate. Originated in China last December, the virus has spread across seven continents, affecting the population of over 210 countries, making it one of the fiercest pandemics ever recorded. Despite multiple independent and collaborative attempts to develop a vaccine or a cure, an effective solution is yet to come out. While the disease has put the world in a standstill, detecting the positive subjects and isolating them from the others as soon as possible is the only way to minimize its spread. However, many countries are currently experiencing a massive shortage of diagnostic equipment and medical personals. This insufficiency inspired us to work on a computer-based automatic method for the diagnosis of COVID-19. In this paper, we proposed a sequential Convolutional Neural Network (CNN)-based model to detect COVID-19 through analyzing Computed Tomography (CT) scan images. The model is capable of identifying the disease with almost 92.5% accuracy. We believe the implementation of this model will help the physicians and pathologists all over the world to single out the victims quickly and thus reduce the prevalence of COVID-19.
- Published
- 2020
80. A Novel Method to Identify Pneumonia through Analyzing Chest Radiographs Employing a Multichannel Convolutional Neural Network
- Author
-
Niloy Sikder, Abdullah-Al Nahid, Md. Abdur Razzaque, M. A. Parvez Mahmud, Abbas Z. Kouzani, Mehedi Masud, and Anupam Kumar Bairagi
- Subjects
medicine.medical_specialty ,Radiography ,02 engineering and technology ,Disease ,lcsh:Chemical technology ,Biochemistry ,Convolutional neural network ,Measles ,medical image processing ,Article ,Analytical Chemistry ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Humans ,pneumonia ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Child ,Intensive care medicine ,Instrumentation ,Survival rate ,chest radiograph ,medicine.diagnostic_test ,business.industry ,Deep learning ,deep learning ,020206 networking & telecommunications ,medicine.disease ,Atomic and Molecular Physics, and Optics ,Pneumonia ,Radiography, Thoracic ,020201 artificial intelligence & image processing ,Neural Networks, Computer ,Artificial intelligence ,Chest radiograph ,business - Abstract
Pneumonia is a virulent disease that causes the death of millions of people around the world. Every year it kills more children than malaria, AIDS, and measles combined and it accounts for approximately one in five child-deaths worldwide. The invention of antibiotics and vaccines in the past century has notably increased the survival rate of Pneumonia patients. Currently, the primary challenge is to detect the disease at an early stage and determine its type to initiate the appropriate treatment. Usually, a trained physician or a radiologist undertakes the task of diagnosing Pneumonia by examining the patient&rsquo, s chest X-ray. However, the number of such trained individuals is nominal when compared to the 450 million people who get affected by Pneumonia every year. Fortunately, this challenge can be met by introducing modern computers and improved Machine Learning techniques in Pneumonia diagnosis. Researchers have been trying to develop a method to automatically detect Pneumonia using machines by analyzing and the symptoms of the disease and chest radiographic images of the patients for the past two decades. However, with the development of cogent Deep Learning algorithms, the formation of such an automatic system is very much within the realms of possibility. In this paper, a novel diagnostic method has been proposed while using Image Processing and Deep Learning techniques that are based on chest X-ray images to detect Pneumonia. The method has been tested on a widely used chest radiography dataset, and the obtained results indicate that the model is very much potent to be employed in an automatic Pneumonia diagnosis scheme.
- Published
- 2020
81. A Noncooperative Game Analysis for Controlling COVID-19 Outbreak
- Author
-
Choong Seon Hong, Kazi Masudul Alam, Abdullah-Al Nahid, Sultan S. Alshamrani, Sarder Fakhrul Abedin, Mehedi Masud, Zhu Han, Sujit Biswas, Md. Shirajum Munir, Do Hyeon Kim, and Anupam Kumar Bairagi
- Subjects
Microeconomics ,Game analysis ,Incentive ,Coronavirus disease 2019 (COVID-19) ,Social distance ,Sustainability ,Control (management) ,Isolation (psychology) ,Outbreak ,Business - Abstract
COVID-19is a global epidemic. Till now, there is no remedy for this epidemic. However, isolation and social distancing are seemed to be effective to control this pandemic. In this paper, we provide an analytical model on the effectiveness of the sustainable lockdown policy that accommodates both isolation and social distancing features of the individuals. To promote social distancing, we analyze a noncooperative game environment that provides an incentive for maintaining social distancing. Furthermore, the sustainability of the lockdown policy is also interpreted with the help of a game-theoretic incentive model for maintaining social distancing. Finally, an extensive numerical analysis is provided to study the impact of maintaining a social-distancing measure to prevent the Covid-19 outbreak. Numerical results show that the individual incentive increases more than 85% with an increasing percentage of home isolation from 25% to 100% for all considered scenarios. The numerical results also demonstrate that in a particular percentage of home isolation, the individual incentive decreases with an increasing number of individuals.
- Published
- 2020
82. Coexistence Mechanism between eMBB and uRLLC in 5G Wireless Networks
- Author
-
Mehedi Masud, Anupam Kumar Bairagi, Zhu Han, Nguyen H. Tran, Sultan S. Alshamrani, Choong Seon Hong, Madyan Alsenwi, and Md. Shirajum Munir
- Subjects
Networking and Internet Architecture (cs.NI) ,Signal Processing (eess.SP) ,FOS: Computer and information sciences ,Mathematical optimization ,021103 operations research ,Wireless network ,Computer science ,Mobile broadband ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,Spectral efficiency ,Scheduling (computing) ,Computer Science - Networking and Internet Architecture ,User equipment ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical Engineering and Systems Science - Signal Processing ,Electrical and Electronic Engineering ,5G - Abstract
uRLLC and eMBB are two influential services of the emerging 5G cellular network. Latency and reliability are major concerns for uRLLC applications, whereas eMBB services claim for the maximum data rates. Owing to the trade-off among latency, reliability and spectral efficiency, sharing of radio resources between eMBB and uRLLC services, heads to a challenging scheduling dilemma. In this paper, we study the co-scheduling problem of eMBB and uRLLC traffic based upon the puncturing technique. Precisely, we formulate an optimization problem aiming to maximize the MEAR of eMBB UEs while fulfilling the provisions of the uRLLC traffic. We decompose the original problem into two sub-problems, namely scheduling problem of eMBB UEs and uRLLC UEs while prevailing objective unchanged. Radio resources are scheduled among the eMBB UEs on a time slot basis, whereas it is handled for uRLLC UEs on a mini-slot basis. Moreover, for resolving the scheduling issue of eMBB UEs, we use PSUM based algorithm, whereas the optimal TM is adopted for solving the same problem of uRLLC UEs. Furthermore, a heuristic algorithm is also provided to solve the first sub-problem with lower complexity. Finally, the significance of the proposed approach over other baseline approaches is established through numerical analysis in terms of the MEAR and fairness scores of the eMBB UEs., Comment: 30 pages, 11 figures, IEEE Transactions on Communications
- Published
- 2020
- Full Text
- View/download PDF
83. Simpler Design for Liquid Supply Line Leakage Monitoring
- Author
-
Abdullah-Al Nahid, Anupam Kumar Bairagi, and Md. Tajbiul Hasan
- Subjects
Microcontroller ,Data collection ,Flow monitoring ,Data storing ,Computer science ,Real-time computing ,Flow measurement ,Leakage (electronics) - Abstract
This paper introduces a method for flow monitoring through various supply lines by implementing a mathematical function, majority of which is dependent on standard deviation. Instead of including various sensors and numerous complex electrical connections which is still the common way to measure and monitor leakage or flow, this project just uses flow measuring sensor to collect data and process the data in such a way that actually focuses on user conditions and takes regular variation of flow into account and modifies its monitoring protocols regularly. The other systems in this sector implies various sensors to accurately detect leakage which is good but those systems lack the ability to collect, process and store regular data related to the supply line. For this reason, users often have to handle two different systems simultaneously, one to monitor leakage and the another for regular data collection regarding supply. To reduce that effort and cost, this system includes both flow measurement, data storing and monitoring as well as keeps an eye whether the flow is regular or there is any leakage or illegal line taken out. In the field of commercial distribution of oil and water, leakage and unauthorized or illegal supply is one of the main issues to be considered. Yet now, not many systems has been developed to prevent or monitor such losses. We have developed a system to monitor and locate line leakage, illegal supply lines and faulty supply lines in a much swift and simpler way which is cost effective too.
- Published
- 2019
84. A matching based coexistence mechanism between eMBB and uRLLC in 5G wireless networks
- Author
-
Madyan Alsenwi, Choong Seon Hong, Anupam Kumar Bairagi, Nguyen H. Tran, and Md. Shirajum Munir
- Subjects
Mathematical optimization ,Job shop scheduling ,Wireless network ,Computer science ,020204 information systems ,Mobile broadband ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Resource allocation ,020207 software engineering ,02 engineering and technology ,Spectral efficiency ,5G - Abstract
Ultra-reliable low-latency communication (uRLLC) and enhanced mobile broadband (eMBB) are two major service classes in the emerging 5G mobile network. uRLLC applications demand a stringent latency and reliability whereas eMBB services necessitate utmost data rates. The coexistence of uRLLC and eMBB services on the same radio resource leads to a challenging scheduling problem because of the trade-off among latency, reliability and spectral efficiency. In this paper, a puncturing scheme based coexistence approach between uRLLC and eMBB traffic is proposed for the upcoming 5G mobile networks. Specifically, an optimization problem is formulated with the objective of maximizing the minimum expected achieved rate of eMBB users in the long run basis while meeting the uRLLC requirements. To solve this co-scheduling optimization problem, we decomposed it into two sub-problems with the same objective of the original problem: 1) resource allocation problem for eMBB users, and 2) resource allocation problem for uRLLC users. A heuristic algorithm is used for solving the first sub-problem, whereas the one-sided matching game is used for solving the second. Simulation results show the advantages of the proposed approach over other baseline methods in terms of the minimum achieved rate and fairness among the eMBB users.
- Published
- 2019
85. Towards coexistence of cellular and WiFi networks in unlicensed spectrum:A neural networks based approach
- Author
-
Shashi Raj Pandey, Ibrar Yaqoob, Lok-Won Kim, Madyan Alsenwi, Yan Kyaw Tun, Choong Seon Hong, and Anupam Kumar Bairagi
- Subjects
Optimization problem ,proportional fair ,General Computer Science ,Computer science ,Hopfield neural networks ,resource allocation ,Spectrum management ,Base station ,hopfield neural networks ,LTE-U ,General Materials Science ,Resource allocation ,Artificial neural network ,Wireless network ,business.industry ,Quality of service ,WiFi ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,5G wireless networks ,Proportional fair ,Minification ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Communication channel ,Computer network - Abstract
Long-Term Evolution in the Unlicensed Spectrum (LTE-U) is considered as an indispensable technology to mitigate the spectrum scarcity in wireless networks. Typical LTE transmissions are contention-free and centrally controlled by the Base Station (BS). However, the wireless networks that work in unlicensed bands use contention-based protocols for channel access, which raise the need to derive an efficient and fair coexistence mechanism among different radio access networks. In this paper, we propose a novel mechanism based on neural networks for the coexistence of an LTE-U BS in the unlicensed spectrum alongside with WiFi access points. Specifically, we model the problem in coexistence as a 2-Dimensions Hopfield Neural Network (2D-HNN) based optimization problem that aims to achieve fairness considering both the LTE-U data rate and the QoS requirements of WiFi networks. Using the energy function of 2D-HNNs, precise investigation of its minimization property can directly provide the solution of the optimization problem. Furthermore, the problem of allocating the unlicensed resources to LTE-U users is modeled as a 2D-HNN and its energy function is leveraged to allocate resources to LTE-U users based on their channel states. Numerical results show that the proposed algorithm allows the LTE-U BS to work efficiently in the unlicensed spectrum while protecting the WiFi networks. Moreover, more than 90% fairness among the LTE-U users is achieved when allocating the unlicensed resources to LTE-U users based on the proposed algorithm.
- Published
- 2019
86. Severity Classification of Diabetic Retinopathy Using an Ensemble Learning Algorithm through Analyzing Retinal Images
- Author
-
Abdullah-Al Nahid, Mehedi Masud, Niloy Sikder, Anupam Kumar Bairagi, Hesham Alhumyani, and Abu Shamim Mohammad Arif
- Subjects
Physics and Astronomy (miscellaneous) ,Computer science ,General Mathematics ,Feature extraction ,Margin of error ,Decision tree ,Feature selection ,Image processing ,02 engineering and technology ,diabetic retinopathy detection ,medical image analysis ,image histogram ,gray-level co-occurrence matrix ,genetic algorithm ,ensemble learning ,01 natural sciences ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,business.industry ,lcsh:Mathematics ,010401 analytical chemistry ,Pattern recognition ,lcsh:QA1-939 ,Ensemble learning ,0104 chemical sciences ,Chemistry (miscellaneous) ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Image histogram - Abstract
Diabetic Retinopathy (DR) refers to the damages endured by the retina as an effect of diabetes. DR has become a severe health concern worldwide, as the number of diabetes patients is soaring uncountably. Periodic eye examination allows doctors to detect DR in patients at an early stage to initiate proper treatments. Advancements in artificial intelligence and camera technology have allowed us to automate the diagnosis of DR, which can benefit millions of patients indeed. This paper inscribes a novel method for DR diagnosis based on the gray-level intensity and texture features extracted from fundus images using a decision tree-based ensemble learning technique. This study primarily works with the Asia Pacific Tele-Ophthalmology Society 2019 Blindness Detection (APTOS 2019 BD) dataset. We undertook several steps to curate its contents to make them more suitable for machine learning applications. Our approach incorporates several image processing techniques, two feature extraction techniques, and one feature selection technique, which results in a classification accuracy of 94.20% (margin of error: ±0.32%) and an F-measure of 93.51% (margin of error: ±0.5%). Several other parameters regarding the proposed method’s performance have been presented to manifest its robustness and reliability. Details on each employed technique have been included to make the provided results reproducible. This method can be a valuable tool for mass retinal screening to detect DR, thus drastically reducing the rate of vision loss attributed to it.
- Published
- 2021
87. Bargaining game for effective coexistence between LTE-U and Wi-Fi systems
- Author
-
Choong Seon Hong, Nguyen H. Tran, Anupam Kumar Bairagi, and Walid Saad
- Subjects
Computer science ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Maximization ,Spectrum management ,Radio spectrum ,Base station ,Resource (project management) ,0203 mechanical engineering ,Hardware_GENERAL ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Resource management ,business ,Computer network - Abstract
LTE over unlicensed band (LTE-U) has emerged as an effective technique to overcome the challenge of spectrum scarcity. Using LTE-U along with advanced techniques such as carrier aggregation (CA), one can boost the performance of existing cellular networks. However, if not properly managed, the use of LTE-U can potentially degrade the performance of coexisting Wi-Fi access points which operate over the unlicensed frequency bands. Moreover, most of the existing works consider a macro base station (MBS) or a small cell base station (SBS) for their proposals. In this paper, an effective coexistence mechanism between LTE-U and Wi-Fi systems is studied. The goal is to enable the cellular network to use LTE-U with CA to meet the quality-of-service (QoS) of the users while protecting Wi-Fi access points (WAPs), considering multiple SBSs from different operators in a dense deployment scenario. Specifically, an LTE-U sum-rate maximization problem is formulated under a user QoS and WAP-LTE-U co-existence constraints. To solve this problem, a cooperative Nash bargaining game is proposed. This game allows LTE-U and WAPs to share time resource while protecting Wi-Fi system. For allocating unlicensed resource among LTE-U users, a heuristic algorithm is proposed. Simulation results show that the proposed method is better than the comparing methods regarding per user achieved rate, percentage of unsatisfied users and fairness. The result also shows that the proposed method protects Wi-Fi user far better way than basic listen-before-talk (LBT) does.
- Published
- 2018
88. D2D communications under LTE-U system: QoS and co-existence issues are incorporated
- Author
-
Choong Seon Hong and Anupam Kumar Bairagi
- Subjects
Nash bargaining game ,business.industry ,Computer science ,Quality of service ,media_common.quotation_subject ,05 social sciences ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Spectral efficiency ,Spectrum management ,Scarcity ,Base station ,0508 media and communications ,User experience design ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Telecommunications ,business ,Computer network ,media_common - Abstract
Daily-life oriented applications and multimedia entertainments through smart devices are creating immense stress to the current cellular foundation. To overwhelm from this loopholes, both academia and industry are trying their best by incorporating different technologies with existing ones using licensed spectrum. On the other side, Device-to-Device (D2D) communications are also being used to improve the spectrum efficiency and user experience by reutilizing licensed cellular spectrum. But with insufficient licensed spectrum, it is impossible to meet the demand of users in the current scenario. So, peoples are thinking to utilize unlicensed spectrum with licensed one to alleviate this scarcity issue and provide guaranteed Quality of Service (QoS) to the users. In this paper, we want to extend D2D communication and LTE-A network into the unlicensed spectrum. But this initiative will harm the performance of other technologies which are already working in the same unlicensed band. Moreover, if multiple mobile network operators (MNOs) use the same unlicensed band then they will diminish the benefits of each other. So this paper wants to maximize the sum-rate of LTE users and D2D pairs by allocating licensed and unlicensed subchannels considering their QoS requirements while protecting minimum requirements of WiFi Access Points (WAPs). Then we solve this problem with the help of Nash bargaining game (NBG) between Small Cell Base Stations (SBSs) and WAPs by the cooperative approach. Simulation results show the effectiveness and efficiency of the proposed approach.
- Published
- 2017
89. An approach of cost optimized influence maximization in social networks
- Author
-
Sarder Fakhrul Abedin, Abu Layek, Choong Seon Hong, Hoang T. Nguyen, Ashis Talukder, Md. Golam Rabiul Alam, and Anupam Kumar Bairagi
- Subjects
Mathematical optimization ,Opportunity cost ,Social network ,Computer science ,business.industry ,02 engineering and technology ,Maximization ,Boom ,Field (computer science) ,Set (abstract data type) ,Viral marketing ,Margin (machine learning) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Simulation - Abstract
Social networks have gained huge research interest, especially in viral marketing due to their rapid boom in the past years. It is very crucial to identify the influential users in the social networks for viral and target marketing. Influence maximization (IM) problem estimates such influential users in the social networks. With an initial seed set, the IM finds a maximum number of nodes that can be activated in the network under some diffusion models e.g. Linear Threshold model or Independent Cascade model. But previous works in this field have not studied about the minimum cost, termed as opportunity cost (OC), to motivate those seed nodes. In this work, we define a novel Reverse Influence Maximization (RIM) problem to determine the opportunity cost of influence maximization. Employing the influence propagation in opposite order, the RIM determines the minimum number of nodes that must be activated in order to motivate a set of target nodes. We propose Random RIM (R-RIM) and Randomized Linear Threshold RIM (RLT-RIM) models to tackle the RIM problem. We also perform a simulation to evaluate the performance of the algorithms using two real world datasets. The result shows that the proposed models determine the optimized opportunity cost with faster running time margin.
- Published
- 2017
90. An overlapping coalition formation approach to maximize payoffs in cloud computing environment
- Author
-
Ashis Talukder, Choong Seon Hong, Md. Golam Rabiul Alam, Anupam Kumar Bairagi, Da Eun Lee, and Tran Hoang Nguyen
- Subjects
Price elasticity of demand ,020203 distributed computing ,Computer science ,business.industry ,TheoryofComputation_GENERAL ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Core (game theory) ,Elasticity (cloud computing) ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,business ,computer - Abstract
Data-intensive applications are anticipated to increase day by day. The amount of computing and storage resources required by these are also increasing simultaneously, creating high demands for cloud resources. Cloud provider's limited resources are not adequate to meet the elastic demand of consumers. Cloud coalition is the key approach to deal with such elastic demand of resources in the environment. But traditional coalition formation mechanism allows a cloud provider to participate into a single coalition which leads to under-utilize of coalition resources with increasing security risk like botnet attacks. In this paper, a mathematical framework from cooperative game namely overlapping coalition formation (OCF) game to overcome the under-utilization problem and to reduce security risk for cloud providers (CPs) is introduced by permitting a CP to participate into multiple small coalitions. First, the concepts of OCF game in cloud is presented and then, an algorithm for the stability in OCF game is introduced. We analyze the performance of the proposed approach with traditional coalition formation and no-coalition scenarios in perspective of payoffs, yielding higher payoffs for the participating CPs.
- Published
- 2016
91. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
- Author
-
Rahamatullah Khondoker, Anupam Kumar Bairagi, Rafiqul Islam, and Publica
- Subjects
Steganalysis ,Information Systems and Management ,Edge device ,Steganography ,Computer science ,End user ,business.industry ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Critical infrastructure ,Computer Science Applications ,Home automation ,Smart city ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Software - Abstract
With the manifestation of the Internet of Things IoT and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control information around this open IoT environment. A large amount of this information contains personal and important information for the user as well as for the organization. The number of attack vectors for malicious users is high due to the openness, distributed nature, and lack of control over the whole IoT environment. For building the IoT as an effective service platform, end users need to trust the system. For this reason, security and privacy of information in the IoT is a great concern in critical infrastructures such as the smart home, smart city, smart healthcare, smart industry, etc. In this article, we propose three information hiding techniques for protecting communication in critical IoT infrastructure with the help of steganography, where RGB images are used as carriers for the information. We hide the information in the deeper layer of the image channels with minimum distortion in the least significant bit lsb to be used as indication of data. We analyze our technique both mathematically and experimentally. Mathematically, we show that the adversary cannot predict the actual information by analysis. The proposed approach achieved better imperceptibility and capacity than the various existing techniques along with better resistance to steganalysis attacks such as histogram analysis and RS analysis, as proven experimentally.
- Published
- 2016
92. Trust based D2D communications for accessing services in Internet of Things
- Author
-
Debasish Chakroborti and Anupam Kumar Bairagi
- Subjects
Computer science ,business.industry ,Wireless ad hoc network ,Reliability (computer networking) ,Service management ,Access control ,Symmetric multiprocessor system ,Computer security ,computer.software_genre ,Grid ,Trust management (information system) ,business ,Internet of Things ,computer ,Computer network - Abstract
Internet of Things (IoT) is a vision of connecting everything for providing better services efficiently. IoT consists of enormous number of heterogeneous computing devices with different capabilities to provide a diverse range of services situated around the globe. Increasing number of IoT devices and availability of different services in the edge of the networks makes it inevitable to interact among devices. As a result, this open, non-homogeneous and distributed environment also breaches the integrity of secure and reliable device to device (D2D) communication. Traditional access control mechanisms are not prolific to the itinerant, decentralized and dynamic scenarios in the IoT. Trust management is a proven technology for applications like P2P, Grid, and ad hoc network. Hence, this technology can also be used to increase the user reliability in IoT. In this paper, we propose a trust based D2D communication mechanism for accessing different services to meet the growing transactions and successful operations of IoT. We also analyze the effect of adaptive trust parameters for IoT device to device communication in order to access the services.
- Published
- 2015
93. ICT based market information system: An effective approach for market price monitoring and supervision in developing countries
- Author
-
Md. Mahbubur Rahman, S. A. Ahsan Rajon, and Anupam Kumar Bairagi
- Subjects
Factor market ,Reservation price ,Market depth ,Order (exchange) ,Law of one price ,Price mechanism ,Market price ,Business ,Price discrimination ,Computer security ,computer.software_genre ,computer ,Industrial organization - Abstract
This paper presents an effective framework for market monitoring, supervision and price management in developing countries using Information and Communication Technology (ICT). This research also illustrates the possible ways to handle the price hike and also derives solutions to resist unethical and ill-motivated hoarding by integrating ICT. In this paper, we have presented an overview on the application of ICT in disseminating market price information to the consumers and also existent mechanisms in adopting ICT as a tool to stabilize the market price from the point of view of consumers' right. Rather than paying the price of any commodity in cash to the seller, the consumer is charged through the identification of his mobile phone within particular fair price margin by sending SMS. The seller also demands the price using SMS and confirmation is also made by the buyer through the same. This fair price margin should be market specific and be defined by the government or some legitimate agencies appointed to monitor the market as currently done to some extent for displaying the market price on the entrance of the markets in large cities. Since, the price margin is supposed to be defined balancing mutual interests of the producer, seller and buyer along with considerations of all other related phenomena like transport costs to the market, labor costs in that area etc, there may be legal bindings to come to an agreement. Illustrating ICT based promising and easiest framework of making the people aware of price of any product and thus maintaining a reasonable price for markets in developing country like Bangladesh is the main contribution of the paper.
- Published
- 2014
94. A robust RGB channel based image steganography technique using a secret key
- Author
-
Rameswar Debnath, Anupam Kumar Bairagi, and Saikat Mondal
- Subjects
Cover (telecommunications) ,Pixel ,Steganography ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,Public-key cryptography ,Robustness (computer science) ,Key (cryptography) ,RGB color model ,Computer vision ,Artificial intelligence ,business ,Communication channel - Abstract
The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into deeper layers of the selected RGB channel and the position is determined depending on the status of channel and value of the secret key. Pixels of the cover image are selected depending on the environment of the channels and hidden information. The ambiguity of pixel, channel and position selection process increases robustness of the steganographic system. The technique is also less vulnerable to unintentional attacks like image manipulation as data hides in the deeper layer of the pixels. The system uses the RGB channels of the stego-image and the secret key to extract the hidden information. The use of secret key gives another way to secure the information from malicious user. The experiment shows that on average 77.00% pixels of the cover image are used for hiding secret information and produces high PSNR value which indicates the capacity and imperceptibility of the technique respectively.
- Published
- 2014
95. A dynamic approach in substitution based audio steganography
- Author
-
Amit Mondal, Anupam Kumar Bairagi, and Saikat Mondal
- Subjects
Steganography tools ,Steganography ,Computer science ,Robustness (computer science) ,Speech recognition ,Message authentication code ,Computer security ,computer.software_genre ,computer - Abstract
In this paper, we present a novel, principled approach to resolve the remained problem of substitution technique of audio steganography. Using the proposed method, the message bits are embedded into deeper layer depending on the environment of the host audio resulting increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden messages.
- Published
- 2012
96. Energy Efficient Zone Division Multihop Hierarchical Clustering Algorithm for Load Balancing in Wireless Sensor Network
- Author
-
Anupam Kumar Bairagi, Md. Rezwan-ul-Islam, A J M Asraf Uddin, M. Abul Kashem, and Ashim Kumar Ghosh
- Subjects
Routing protocol ,Zone Routing Protocol ,Dynamic Source Routing ,General Computer Science ,business.industry ,Computer science ,Distributed computing ,Wireless Routing Protocol ,Energy consumption ,Load balancing (computing) ,Network management ,Base station ,Key distribution in wireless sensor networks ,Wireless ,Destination-Sequenced Distance Vector routing ,business ,Cluster analysis ,Algorithm ,Wireless sensor network ,Computer network ,Efficient energy use - Abstract
Wireless sensor nodes are use most embedded computing application. Multihop cluster hierarchy has been presented for large wireless sensor networks (WSNs) that can provide scalable routing, data aggregation, and querying. The energy consumption rate for sensors in a WSN varies greatly based on the protocols the sensors use for communications. In this paper we present a cluster based routing algorithm. One of our main goals is to design the energy efficient routing protocol. Here we try to solve the usual problems of WSNs. We know the efficiency of WSNs depend upon the distance between node to base station and the amount of data to be transferred and the performance of clustering is greatly influenced by the selection of cluster-heads, which are in charge of creating clusters and controlling member nodes. This algorithm makes the best use of node with low number of cluster head know as super node. Here we divided the full region in four equal zones and the centre area of the region is used to select for super node. Each zone is considered separately and the zone may be or not divided further that’s depending upon the density of nodes in that zone and capability of the super node. This algorithm forms multilayer communication. The no of layer depends on the network current load and statistics. Our algorithm is easily extended to generate a hierarchy of cluster heads to obtain better network management and energy efficiency.
- Published
- 2011
97. QoS Aware Collaborative Communications with Incentives in the Downlink of Cellular Network : A Matching Approach
- Author
-
Choong Seon Hong, Anupam Kumar Bairagi, Nguyen H. Tran, and Nam Ho Kim
- Subjects
Matching (statistics) ,Optimization problem ,business.industry ,Computer science ,Distributed computing ,Quality of service ,05 social sciences ,MIMO ,020206 networking & telecommunications ,02 engineering and technology ,Incentive ,0502 economics and business ,Telecommunications link ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,050206 economic theory ,business ,Qos aware ,Computer network - Abstract
The demand for data rate is increasing exponentially in the cellular networks due to the emergence of more and more data-driven applications and smart-devices. Currently, these demands cannot be met by cellular networks with any single technology. As a consequence, Quality-of-service (QoS) needs to be sacrificed by some users. To provide guaranteed QoS to the users, researchers are considering massive MIMO, LTE-A, cooperative communications etc as the suitable candidate for the next generation cellular network. In this paper, we propose a collaborative communication mechanism with incentive for downlink in the cellular network for providing guaranteed QoS by utilizing multiple connectivity of the user's smart equipments. We formulate the problem as an optimization problem first and afterwards, we solve this problem with the help of matching theory. Simulation results are shown to represent performance of the technique.
98. A Multi-Game Approach for Effective Co-existence in Unlicensed Spectrum between LTE-U System and Wi-Fi Access Point
- Author
-
Choong Seon Hong, Nguyen H. Tran, and Anupam Kumar Bairagi
- Subjects
Computer science ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Spectrum management ,Resource (project management) ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Wireless ,Resource management ,business ,Computer network - Abstract
Cellular networks are facing the challenge of meeting aggressive data demand with limited licensed spectrum and LTE over the unlicensed band (LTE-U) has emerged as an effective way to defeat this hurdle. Using LTE-U along with superior techniques such as carrier aggregation (CA), one can boost the performance of existing cellular networks. Nevertheless, LTE-U can potentially deteriorate the performance of co-existing Wi-Fi systems operating over the unlicensed bands if not well-managed. Furthermore, single operator scenario is considered in most of the existing co-existence works. In this paper, an effective coexistence mechanism between LTE-U and Wi-Fi systems is investigated. The object is to facilitate the cellular networks to use LTE-U with CA to reduce the gap between achieved rate and quality-of-service (QoS) of the user while protecting Wi-Fi users, considering multiple operators in a dense deployment scenario. To resolve this problem, a multi-gaming approach is used. A cooperative Nash bargaining game (NBG) is used for sharing time resource in unlicensed for LTE-U and Wi-Fi systems. Following, a bankruptcy game is used by operators to allocate unlicensed resource among LTE-U users. Simulation results show that the proposed approach is better than the comparing methods regarding per user achieved rate, and fairness. It also shows that the proposed technique defends Wi-Fi user greatly in dense deployment than basic listen-before-talk (LBT) does.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.