35 results on '"Shahid Al Noor"'
Search Results
2. IoTaaS: Drone-Based Internet of Things as a Service Framework for Smart Cities.
- Author
-
Mohammad Aminul Hoque, Md. Mahmud Hossain, Shahid Al Noor, S. M. Riazul Islam, and Ragib Hasan
- Published
- 2022
- Full Text
- View/download PDF
3. CrowdPick: A Generic Framework for Delivering Service Specific Crowd Infrastructure.
- Author
-
Shahid Al Noor, Yasser Karim, Md. Mahmud Hossain, and Ragib Hasan
- Published
- 2020
- Full Text
- View/download PDF
4. ParkBid: An Incentive Based Crowdsourced Bidding Service for Parking Reservation.
- Author
-
Shahid Al Noor, Ragib Hasan, and Arsh Arora
- Published
- 2017
- Full Text
- View/download PDF
5. IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-Based Systems.
- Author
-
Md. Mahmud Hossain, Shahid Al Noor, Yasser Karim, and Ragib Hasan
- Published
- 2017
- Full Text
- View/download PDF
6. HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things.
- Author
-
Md. Mahmud Hossain, Shahid Al Noor, and Ragib Hasan
- Published
- 2017
- Full Text
- View/download PDF
7. ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Clouds Based on Task Asymptotic Complexity.
- Author
-
Shahid Al Noor and Ragib Hasan
- Published
- 2017
- Full Text
- View/download PDF
8. SASCloud: Ad Hoc Cloud as Secure Storage.
- Author
-
Shahid Al Noor, Md. Mahmud Hossain, and Ragib Hasan
- Published
- 2016
- Full Text
- View/download PDF
9. How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
- Author
-
Ragib Hasan, Shams Zawoad, Shahid Al Noor, Md Munirul Haque, and Darrell Burke
- Published
- 2016
- Full Text
- View/download PDF
10. Jugo: A Generic Architecture for Composite Cloud as a Service.
- Author
-
Md. Mahmud Hossain, Rasib Khan, Shahid Al Noor, and Ragib Hasan
- Published
- 2016
- Full Text
- View/download PDF
11. Litigo: A Cost-Driven Model for Opaque Cloud Services.
- Author
-
Shahid Al Noor, Rasib Khan, Md. Mahmud Hossain, and Ragib Hasan
- Published
- 2016
- Full Text
- View/download PDF
12. CACROS: A Context-Aware Cloud Content Roaming Service.
- Author
-
Md. Mahmud Hossain, Shahid Al Noor, Dibya Mukhopadhyay, Ragib Hasan, and Lei Li 0021
- Published
- 2016
- Full Text
- View/download PDF
13. D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing.
- Author
-
Shahid Al Noor and Ragib Hasan
- Published
- 2015
- Full Text
- View/download PDF
14. CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives.
- Author
-
Shahid Al Noor, Ragib Hasan, and Md Munirul Haque
- Published
- 2014
- Full Text
- View/download PDF
15. Development of Analysis Rules for Bangla Root and Primary Suffix for Universal Networking Language.
- Author
-
Md. Nawab Yousuf Ali, Shahid Al Noor, Md. Zakir Hossain, and Jugal Krishna Das
- Published
- 2010
- Full Text
- View/download PDF
16. Bepari: A Cost-aware Comprehensive Agent Architecture for Opaque Cloud Services
- Author
-
Rasib Khan, Ragib Hasan, S. M. Riazul Islam, Shahid Al Noor, and Mahmud Hossain
- Subjects
Service (business) ,020203 distributed computing ,Computer science ,business.industry ,Software as a service ,Cloud computing ,02 engineering and technology ,Service provider ,Computer security ,computer.software_genre ,Cost reduction ,Pricing strategies ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,020201 artificial intelligence & image processing ,Profit model ,business ,computer - Abstract
Cloud computing has become popular in various application domains based on infrastructure, platform, and software as a service model. Rapid deployment, high scalability, on-demand, and (theoretically) infinite resources have driven the industry towards the wide adoption of cloud computing services. However, the difficulty of cross-provider resource allocation and seamless resource transition is a major concern for such services. Therefore, the segregated cloud market forces its clients to use provider-specific and pre-configured options for their required resources and services. Thus, the overall market, even with the presence of multiple cloud service providers, operates as a direct service from the providers to the clients, and with non-negotiable pricing strategies for the cloud services. In this article, we propose Bepari, a cost-driven model for opaque service platforms for cloud computing. Bepari acts as a negotiation-based approach to deliver composite cross-provider cloud-based services to the end-users. Bepari provides a detailed service-oriented architecture for multiple cloud service providers to provide cross-platform and composite services. Furthermore, Bepari delivers a detailed cost model and comparison between establishing a cloud service vs. an opaque cloud service. Our empirical framework allows a Bepari service provider to analyze the profit model and create a market niche accordingly. Simulation results are provided, which validate the efficiency of a negotiated pricing strategy in terms of maximized resource utilization and profits for cloud service providers and cost reduction for the cloud users.
- Published
- 2020
- Full Text
- View/download PDF
17. CrowdPick: A Generic Framework for Delivering Service Specific Crowd Infrastructure
- Author
-
Ragib Hasan, Shahid Al Noor, Yasser Karim, and Mahmud Hossain
- Subjects
Service (business) ,Computer science ,business.industry ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Service provider ,Computer security ,computer.software_genre ,Crowdsourcing ,Task (project management) ,Service-level agreement ,Software deployment ,Middleware ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Task analysis ,business ,computer - Abstract
Crowdsourcing is an efficient and scalable way for the service providers (SP) to provide a broad range of services with a low initial service setup cost. With its growing popularity, people are continuously introducing new crowdsourcing-based applications and searching for suitable crowd platforms for the deployment of those applications as a service. Consequently, a contributor participates in multiple platforms from different SPs and concurrently executes various tasks in a time interval. As the number of SP increases, managing and monitoring each contributor separately becomes a primary challenge for each SP. Moreover, upgrading a service, ensuring service scalability, and migration is tough for any crowd-based service provider. Frequently, a service provider has difficulty finding the appropriate contributors that will satisfy their service specifications. Besides, as a contributor, it is also hard to decide whether or not they should participate in a task offered by an SP. Therefore, in this paper, we introduced CrowdPick, a middleware that provides a crowdsourced platform for the people who want to provide a crowdsourcing-based service. Each SP contacts CrowdPick for initiating any service chooses an appropriate application package from its repository and specifies its service requirements. Instead of joining individually to each SP, the contributor needs to register into CrowdPick. All the tasks associated with services are scheduled and monitored by CrowdPick, and the CrowdPick decides the corresponding monetary incentives. Along with providing a detailed cost-benefit analysis of an SP and a contributor, we describe the service level agreement (SLA) policies. We simulate our model to show that implementing CrowdPick in real life is viable, and beneficial for both an SP and a contributor.
- Published
- 2020
- Full Text
- View/download PDF
18. IoTDoc: A Docker-Container Based Architecture of IoT-Enabled Cloud System
- Author
-
Jesus Caballero, Bridget Koehler, Lucas Heilman, Abby Steenson, Shahid Al Noor, and David Ellenberger
- Subjects
Computer science ,business.industry ,Distributed computing ,Cloud computing ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,010201 computation theory & mathematics ,Virtual machine ,Container (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Virtual learning environment ,Resource allocation ,Resource allocation (computer) ,020201 artificial intelligence & image processing ,Architecture ,business ,computer - Abstract
In recent years, cloud computing has gained considerable notoriety because it provides access to shared system resources, allowing for high computing power at low management effort. With the widespread availability of mobile and Internet-of-Things (IoT) devices, we can now form cloud instantly without considering a dedicated infrastructure. However, the resource-constrained IoT devices are quite infeasible for installing virtual machines. Therefore, the mobile cloud can be used only for the tasks that require distributed sensing or computation. In order to solve this problem, we introduce IoTDoc, an architecture of mobile cloud composed of lightweight containers running on distributed IoT devices. To explore the benefits of running containers on low-cost IoT-based cloud system, we use Docker to create and orchestrate containers and run on a cloud formed by cluster of IoT devices. We provide a detail operational model of IoTDoc that illustrates cloud formation, resource allocation, container distribution, and migration. We test our model using the benchmark program Sysbench and compare the performance of IoTDoc with Amazon EC2. Our experimental result shows that IoTDoc is a viable option for cloud computing and is a more affordable, cost-effective alternative to large platform cloud computing services, specifically as a learning platform than Amazon EC2.
- Published
- 2019
- Full Text
- View/download PDF
19. CELLCLOUD: TOWARDS A COST EFFECTIVE FORMATION OF MOBILE CLOUD BASED ON BIDDING INCENTIVE
- Author
-
Shahid Al Noor, Ragib Hasan, and Haque
- Subjects
Incentive ,Computer science ,Mobile cloud ,Bidding ,Environmental economics - Published
- 2015
- Full Text
- View/download PDF
20. IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-Based Systems
- Author
-
Shahid Al Noor, Ragib Hasan, Yasser Karim, and Mahmud Hossain
- Subjects
Service (systems architecture) ,Computer science ,business.industry ,Interoperability ,Big data ,Testbed ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Service provider ,Computer security ,computer.software_genre ,Purchasing ,Smart city ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Internet of Things ,computer ,Computer network - Abstract
In recent years, the concept of the Internet of Things (IoT) has already been implemented in numerous application domains, such as smart city, intelligent healthcare assistant, and smart transportation management. Researchers or developers associated with these domains frequently require diverse types of IoT devices to implement or test their IoT related innovations. However, building an IoT-testbed by purchasing these IoT devices in every few months is infeasible considering that most of them will be used only for a small amount of time and will become obsolete with the arrival of an upgraded version of those devices. Instead, a better approach would be rented out the IoT devices in on-demand, just-in-time, and pay for only the time the devices are used basis. Therefore, in this paper, we propose IoTbed – an architecture to deliver a large scale Testbed as a service using the IoT devices located in the users' proximal networks. IoTbed enables testbed providers to build their testbeds in the edge of the network and allows easy and secure access for IoT service providers to run experiments on those testbeds. IoTbed presents an economic model that offers monetary incentives to the device owners for using their devices in the testbed experiments. We posit that such an incentive model will encourage more testbed providers to rent out their smart devices through IoTbed. To demonstrate the feasibility of IoTbed, we implemented a prototype of IoTbed to run on Contiki powered IoT devices and evaluated the performance.
- Published
- 2017
- Full Text
- View/download PDF
21. ParkBid: An Incentive Based Crowdsourced Bidding Service for Parking Reservation
- Author
-
Arsh Arora, Ragib Hasan, and Shahid Al Noor
- Subjects
Service (systems architecture) ,Parking guidance and information ,Computer science ,business.industry ,media_common.quotation_subject ,Reservation ,020206 networking & telecommunications ,02 engineering and technology ,Bidding ,Computer security ,computer.software_genre ,Crowdsourcing ,Maintenance engineering ,Incentive ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer ,Reputation ,media_common - Abstract
Finding parking at a desired spot and time is tough, especially in an urban area. Users may also want to pay more to get a parking spot during urgent need. Although the existing infrastructure-based approaches can solve this problem partially, they require a high initial investment and maintenance cost. As a consequence, deploying such approaches on a large scale in the real world is infeasible. A more economically feasible solution is using crowdsourcing-based approaches where a user near a free parking spot informs the interested users about the available parking spot in exchange for some forms of incentives. However, most of the crowdsourced approaches suffer due to the lack of proper models for price negotiation, information verification, and assurance. In this paper, we propose ParkBid, a crowdsourcing-based parking service for automobiles where the information of free parking is circulated among the interested users following a bidding process. ParkBid determines the incentives for providing any parking information based on several primitives, such as time, location, reputation, urgency, etc. Along with a detailed discussion about the challenges in ParkBid for both the users and information providers, we provide a set of policies as countermeasures. Also, we present an extensive simulation to evaluate the impact of ParkBid for users under different circumstances. Our experimental results show that users can save a significant amount of time and can have more success rate during searching for a free parking spot using ParkBid.
- Published
- 2017
- Full Text
- View/download PDF
22. ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Clouds Based on Task Asymptotic Complexity
- Author
-
Ragib Hasan and Shahid Al Noor
- Subjects
020203 distributed computing ,Computer science ,business.industry ,Distributed computing ,Mobile computing ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Fair-share scheduling ,Scheduling (computing) ,Mobile cloud computing ,Cloud testing ,0202 electrical engineering, electronic engineering, information engineering ,Mobile telephony ,Time point ,business - Abstract
Mobile cloud computing has become popular because of its flexible infrastructure and easily accessible storage, sensing, and computing services. However, scheduling and allocating resources for the tasks provided by the cloud user are major challenges in the mobile cloud. The existing scheduling algorithms in the mobile cloud primarily focus on dividing and distributing a single task among multiple devices participating in the mobile cloud. However, when the load on the mobile cloud increases, multiple requests from different users can come at a single time point. The existing scheduling algorithms for distributed systems cannot be implemented in the mobile cloud, because the available resources differ extensively in the mobile cloud depending upon the time, geographic location, incentive policy, etc. While some cloud users' tasks are computed by their specified deadlines, the others suffer heavily. Therefore, we propose ROSAC, a fair scheduling approach based on the complexity of the cloud users' assigned task that minimizes the average delay between the task computation time and users' specified deadline. ROSAC works by round wise task division and distribution where the estimated time of all the subtasks in each round are the same. We design a simulated platform for a mobile cloud and compare the performance of ROSAC with some of the widely used scheduling approaches for distributed systems.
- Published
- 2017
- Full Text
- View/download PDF
23. HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things
- Author
-
Ragib Hasan, Mahmud Hossain, and Shahid Al Noor
- Subjects
Authentication ,business.industry ,Computer science ,Physical unclonable function ,020206 networking & telecommunications ,02 engineering and technology ,Mutual authentication ,Cryptographic protocol ,Computer security ,computer.software_genre ,Information sensitivity ,Embedded software ,Software deployment ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Elliptic curve cryptography ,business ,computer ,Computer hardware ,Computer network - Abstract
The Internet of Things (IoT) have become popular in diverse domains because of their accessibility and mobility as well as cost-efficient manufacturing, deployment, and maintenance process. The widespread deployment of IoT devices makes them an attractive target for an attacker trying to gain unauthorized access to an IoT-based system. An adversary clones a real hardware device or compromises embedded software to impersonate a legitimate device, and thus gains unauthorized access to sensitive information and performs security-critical operations. The existing security schemes for the mobile systems cannot be applied directly to an IoT-enabled infrastructure since devices are resource constrained regarding storage, processing power, and communication bandwidth. Additionally, the current security approaches for the IoT systems are unable to identify physically compromised IoT devices. In this paper, we propose HSC-IoT, a resource-efficient Physical Unclonable Function (PUF)-based security protocol that ensures both software and hardware integrity of IoT devices. HSC-IoT also provides a lightweight mutual authentication scheme for the resource-limited devices based on Elliptic Curve Cryptography. We present a detailed analysis of the security strength of HSC-IoT. We implemented a prototype of HSC-IoT on IoT devices powered by Contiki OS and provided an extensive comparative analysis of HSC-IoT with contemporary IoT security protocols.
- Published
- 2017
- Full Text
- View/download PDF
24. CACROS: A Context-Aware Cloud Content Roaming Service
- Author
-
Lei Li, Mahmud Hossain, Dibya Mukhapadhay, Ragib Hasan, and Shahid Al Noor
- Subjects
Service (business) ,Computer science ,business.industry ,Service delivery framework ,Quality of service ,Service level requirement ,Cloud computing ,Differentiated service ,Computer security ,computer.software_genre ,Cloud testing ,Data as a service ,business ,computer ,Computer network - Abstract
Cloud computing has emerged as the primary and popular computing paradigm recently. Since cloud users move continuously, sustaining the required quality of service (QoS) in a cost effective manner is very challenging. For maintaining the required QoS for a moving user, the current cloud systems use some of the existing service replication or/and migration strategies. However, those policies become inefficient when a user frequently moves among multiple places. The primary reason for the failure of the existing migration strategies is they overlook several critical parameters associated with users' context during the service migration or replication. In this paper, we analyze the users' context thoroughly to determine their mobility and content usage patterns. We identify the key factors that affect the time and cost associated with the content storage and migration and design a model considering those factors. Based on our model CACROS (Context-Aware Cloud content Roaming Service), a cloud provider can perform the cost-benefit analysis between service migration and replication, and determine an efficient point for service hosting. We test our model with different potential scenarios using a real and simulated testbed and show that the model can provide a cost efficient solution for mobile cloud users while maintaining the desired level of quality of service.
- Published
- 2016
- Full Text
- View/download PDF
25. SASCloud: Ad Hoc Cloud as Secure Storage
- Author
-
Md. Mahmud Hossain, Ragib Hasan, and Shahid Al Noor
- Subjects
Vehicular ad hoc network ,Adaptive quality of service multi-hop routing ,business.industry ,Computer science ,Wireless ad hoc network ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Optimized Link State Routing Protocol ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Storage as a service ,Mobile device ,Computer network - Abstract
With the emergence of high-speed 4G networks along with reachable Wi-fi systems, cloud computing frameworks can greatly leverage mobile domains. However, obtaining a temporary storage service in a communication-challenged area is difficult due to the unavailability of any secure third-party cloud systems. Although the existing ad hoc cloud architectures facilitate distributed computation and sensing operations, such systems fail to deliver secure ad hoc storage as a service when a client requests for secure storage. The absence of a proper centralized monitoring system in the existing ad hoc clouds is a major obstacle for convincing a client to trust the neighboring mobile nodes for content offloading. In case a client and an outsourced node get disconnected, retrieving the offloaded contents along with ensuring their confidentiality and integrity becomes non-trivial. Additionally, providing a feasible and justified monetary incentive is a complex process for such ad hoc mobile frameworks. In this paper, we propose SASCloud, a centrally controlled ad hoc cloud system that provides a secure and reliable storage service for mobile clients. Our proposed system uses the contextual information of mobile users along with partial environmental knowledge and forms a temporal cloud using the resources of neighboring mobile devices. Along with the detailed reasoning of possible threats in our model, we provide a secure framework for content distribution and retrieval. We provide extensive analysis of our model using simulated experimental modules and demonstrate the feasibility of providing a secure storage service in a network-disconnected area using SASCloud.
- Published
- 2016
- Full Text
- View/download PDF
26. Litigo: A Cost-Driven Model for Opaque Cloud Services
- Author
-
Mahmud Hossain, Shahid Al Noor, Ragib Hasan, and Rasib Khan
- Subjects
Service (business) ,Cloud computing security ,business.industry ,Service delivery framework ,Computer science ,Cloud computing ,02 engineering and technology ,Service provider ,Computer security ,computer.software_genre ,Utility computing ,020204 information systems ,Service catalog ,Cloud testing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Resource management ,Data as a service ,business ,computer ,Simulation - Abstract
Cloud computing provides software, platform, and infrastructure as a service that helps organizations to perform several resource intensive tasks. The services offered by a cloud service provider are limited by provider-specific options in terms of the pre-specified configurations. Moreover, it is sometimes expensive to pay a fixed amount of money without any format of negotiation or price-matching deals for the cloud-based services and resources. Conversely, the negotiator-based model for opaque services has gained popularity in various markets, such as, for flights, hotels, and rentals. We posit that a similar opaque inventory for cloud-based services and resources is the next generation niche for consumer acquisition and service delivery in the cloud computing market. Such a model will facilitate the clients with flexible resource and service provisioning at reasonable prices, and will also allow a higher revenue and increase resource utilization for cloud service providers. In this paper, we propose Litigo, a cost-driven model for opaque service platforms for cloud computing. The Litigo component acts as a middle-man to deliver cloud-based services from a set of cloud service providers to the end users. We present a detailed cost model and comparison between establishing a cloud service vs. an opaque cloud service. Our empirical framework allows a Litigo service provider to analyze the profit model and creates the market niche accordingly. We performed extensive analysis using simulated model verification for Litigo. The proposed model delivers an opaque cloud as a service to clients at a reasonable price by maximizing the resource utilization and revenue of cloud service providers.
- Published
- 2016
- Full Text
- View/download PDF
27. Jugo: A Generic Architecture for Composite Cloud as a Service
- Author
-
Shahid Al Noor, Mahmud Hossain, Ragib Hasan, and Rasib Khan
- Subjects
Cloud computing security ,Computer science ,business.industry ,Service delivery framework ,Quality of service ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Service provider ,Computer security ,computer.software_genre ,Panorama9 ,Pricing strategies ,Software deployment ,020204 information systems ,Cloud testing ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,business ,computer - Abstract
Cloud computing has become the industry standard for rapid application deployment, scalable server support, mobile and distributed services, and it provides access to (theoretically) infinite resources. Unfortunately, researchers are still trying to converge towards cross-provider cloud computing frameworks to enable compatibility and seamless resource transition between cloud providers. Moreover, users are restricted to using the provider-specific pre-configured options of resources and services, irrespective of their current needs. At the same time, cloud services are provided as a direct service from the providers to the clients. This creates a segregated cloud market clientele, and non-negotiable pricing strategies for the cloud services. In this paper, we propose Jugo, a generic architecture for cloud composition and negotiated service delivery for cloud users. Jugo acts as a match-maker for service specifications from the users with the currently available assets from the cloud providers. The engagement of a middle-man as an opaque cloud service provider will create a better opportunity for cloud users to find cheaper deals, price-matching, and flexible resource specifications, with increased revenue and higher resource utilization for the cloud service providers.
- Published
- 2016
- Full Text
- View/download PDF
28. How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis
- Author
-
Shahid Al Noor, Md. Munirul Haque, Darrell Burke, Shams Zawoad, and Ragib Hasan
- Subjects
Engineering ,business.industry ,Internet privacy ,020206 networking & telecommunications ,030209 endocrinology & metabolism ,02 engineering and technology ,Audit ,computer.software_genre ,Computer security ,law.invention ,Bluetooth ,03 medical and health sciences ,0302 clinical medicine ,Vulnerability assessment ,law ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,Wireless ,Confidentiality ,business ,Mobile device ,computer ,Block (data storage) - Abstract
The availability of wireless interfaces with the new generation medical devices has spawned numerous opportunities in providing better healthcare support to patients. However, the weaknesses of available wireless communication channels introduce various novel attacks on the medical devices. Since the smart mobile devices, such as smartphones, tablets, laptops are also equipped with the same communication channels (WiFi/Bluetooth), attacks on medical devices can be initiated from a compromised or malware infected mobile device. Attackers can steal confidential medical records from a wireless-enabled medical device. Medical devices or communication channels can also be compromised to feed incorrect medical records to doctors or send life threatening commands to the devices. Moreover, since the compromised mobile devices are already inside the security perimeter of a healthcare network, it is very challenging to block attacks from such compromised mobile devices. In this paper, we systematically analyze the novel threats on healthcare devices and networks, which can be initiated from compromised mobile devices. We provide a detail audit guideline to evaluate the security strength of a healthcare network. Based on our proposed guideline, we evaluate the current security state of a large university healthcare facility. We also propose several mitigation strategies to mitigate some of the possible attacks.
- Published
- 2016
- Full Text
- View/download PDF
29. A Survey on Routing Protocols and Simulation Analysis of WRP, DSR and AODV in Wireless Sensor Networks
- Author
-
Shaiful Alam Chowdhury, Shahid Al Noor, and Md. Ashraf Uddin
- Subjects
Dynamic Source Routing ,Information Systems and Management ,business.industry ,Computer science ,Wireless ad hoc network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Ad hoc wireless distribution service ,Computer Science Applications ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Artificial Intelligence ,Ad hoc On-Demand Distance Vector Routing ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Destination-Sequenced Distance Vector routing ,business ,Computer network - Abstract
The field of communications networks continues to emerge, thus leading to the rapid growth in the field of wireless sensor networks (WSNs). WSNs are noticeably different from traditional Ad hoc networks. The conspicuous difference between WSNs and traditional Ad hoc networks is that they (WSNs) are strictly constrained by limited supply of energy, capacity of storage, power of computation, and bandwidth. Because of these constraints and random deployment in some cases, it has become a challenge for the researchers to design an unblemished routing layer protocol for wireless sensor networks. In this paper we studied the motivation and design issues for routing protocols in WSNs with the limitations of existing routing protocols for WSNs. We also used GloMoSim-2.03 to find the shortcomings of traditional ad hoc routing protocols (DSR, WRF, AODV) when those are applied to WSN and to find out certain specific scenarios (considering low traffic networks and high traffic networks) of WSN where it is better to employ an existing Ad hoc routing protocol rather than developing a new one.
- Published
- 2012
- Full Text
- View/download PDF
30. Some Proposed Standard Models for Bangla Dictionary Entries of Bangla Morphemes for Universal Networking Language
- Author
-
Muhammad F. Mridha, Zakir Hossain, and Shahid Al Noor
- Subjects
business.industry ,Computer science ,computer.software_genre ,World wide ,language.human_language ,Bengali ,Universal Networking Language ,Morpheme ,language ,Artificial intelligence ,business ,computer ,Natural language processing ,Sentence - Abstract
The Universal Networking Language (UNL) is a world wide generalizes form of human interactive language in a machine independent digital platform for defining, recapitulating, amending, storing and dissipating knowledge or information among people of different affiliations. The theoretical and applied research associated with this interdisciplinary endeavor facilitates in a number of practical applications in most domains of human activities such as creating globalization trends of markets or geopolitical interdependence among nations. In our research work we are presenting a pioneer work that aims to contribute with Development of Models for Bangla Dictionary Entries and Analysis of Grammatical Attributes of Bangla words such as Bangla Roots, Krit Prottoy and Kria Bivokti which will help to create a doorway for converting the Bangla Sentence to UNL and vice versa and subside the barrier between Bangla to other
- Published
- 2010
- Full Text
- View/download PDF
31. D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing
- Author
-
Ragib Hasan and Shahid Al Noor
- Subjects
Delay-tolerant networking ,business.industry ,Computer science ,Cloud testing ,Distributed computing ,Cellular network ,Context (language use) ,Cloud computing ,Mobile telephony ,Unavailability ,business ,Crowdsourcing - Abstract
Gathering information and providing remote assistant is a common trend as it saves time and cost associated with visiting the actual location in person. The widely available mobile sensors are used in collecting information during a task processing. However, gathering information from a remote place, or an area of disaster, is not trivial, given the unavailability of appropriate infrastructure. Existing delay tolerant networking approaches address this issue but suffer from unsatisfactory performance due to the lack of sufficient user participation. We propose the Delay-tolerant Cloud Computing framework (D-CLOC), a cloud framework utilizing the contextual information of a mobile client. Our proposed architecture combines crowdsourcing and the cellular network and forms a temporal delay tolerant cloud. D-CLOC uses a bidding incentive model to ensure and promote user participation in the cloud. We provide a detailed reasoning of the security and feasibility of our model, and delineate probable approaches for solving the various security related aspects. The paper includes the design and implementation of a realistic-simulation model for D-CLOC. The simulation scenario incorporates an example face recognition task for evaluating the performance of our proposed model. Our experimental results show that D-CLOC performs quite well compared to some of the existing DTN approaches and can be deployed for solving any real life problems using crowdsourcing within a delay tolerant cloud infrastructure.
- Published
- 2015
- Full Text
- View/download PDF
32. CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives
- Author
-
Ragib Hasan, Shahid Al Noor, and Munirul Haque
- Subjects
Cloud computing security ,business.industry ,Computer science ,media_common.quotation_subject ,Mobile computing ,Cloud computing ,Provisioning ,Computer security ,computer.software_genre ,Cloud testing ,Mobile payment ,Mobile search ,business ,computer ,Mobile device ,Reputation ,media_common - Abstract
Cloud computing has become the dominant computing paradigm in recent years. As clouds evolved, researchers have explored the possibility of building clouds out of loosely associated mobile computing devices. However, most such efforts failed due to the lack of a proper incentive model for the mobile device owners. In this paper, we propose CellCloud - a practical mobile cloud architecture which can be easily deployed on existing cellular phone network infrastructure. It is based on a novel reputation-based economic incentive model in order to compensate the phone owners for the use of their phones as cloud computing nodes. CellCloud offers a practical model for performing cloud operations, with lower costs compared to a traditional cloud. We provide an elaborate analysis of the model with security and economic incentives as major focus. Along with a cost equation model, we discuss detailed results to prove the feasibility of our proposed model. Our simulation results show that CellCloud creates a win-win scenario for all three stakeholders (client, cloud provider, and mobile device owners) to ensure the formation of a successful mobile cloud architecture.
- Published
- 2014
- Full Text
- View/download PDF
33. Sustainable approach to segmented digital display: Complete, precise and economic
- Author
-
Shahid Al Noor, Fariha Tasmin Jaigirdar, and Mohammad Abdul Hadi Bhuiyan
- Subjects
Scheme (programming language) ,Computer science ,business.industry ,Character (computing) ,Speech recognition ,computer.software_genre ,Arabic numerals ,language.human_language ,Display device ,Numeral system ,Bengali ,language ,Binary code ,Artificial intelligence ,business ,computer ,Natural language processing ,computer.programming_language - Abstract
Different approaches have been proposed for digital display of bangla numerals and also characters. But a complete and accurate scheme not has been done yet. We approach a complete low cost and fair design to display bangla numerals, bangla characters (vowel, consonant and shortened form of these characters), also English and Arabic numerals and all English character's represented as 120 character displayed by only 34 segments with tiny bits of binary code and differently usable architecture made this approach favorable. This scheme can be effectively used instead of other alternatives as less complex, economic and complete. With this framework, other characters also can be displayed as manufacturer specification.
- Published
- 2010
- Full Text
- View/download PDF
34. Development of Analysis Rules for Bangla Root and Primary Suffix for Universal Networking Language
- Author
-
Shahid Al Noor, Jugal Krishna Das, Md. Zakir Hossain, and Md. Nawab Yousuf Ali
- Subjects
Root (linguistics) ,Computer science ,business.industry ,Word processing ,computer.software_genre ,Semantics ,Expression (mathematics) ,language.human_language ,Universal Networking Language ,Bengali ,language ,Artificial intelligence ,Computational linguistics ,Suffix ,business ,computer ,Natural language processing - Abstract
This paper describes a method for the development of Bangla Enconversion within the framework of the Universal Networking Language (UNL). We also discuss some issues and problems related to the UNL representation that affect the quality of generation. Additionally, the ling ware engineering is introduced as a technique to enhance the quality and increase the development efficiency. In this paper a pioneer work is proposes that analyzes the Bangla words morphologically from which we obtain Roots and Primary suffixes (Krit Prottoy) and develops some rules for Bangla Root, and Primary Suffix for the UNL. This paper also describes grammatical attributes for Bangla root and Primary suffixes and use of morphological analysis. UNL Expression of the Bangla attributes is also thoroughly discussed in this paper.
- Published
- 2010
- Full Text
- View/download PDF
35. Performance study and simulation analysis of CSMA and IEEE 802.11 in wireless sensor networks and limitations of IEEE 802.11
- Author
-
Mohammad Tauhidul Islam, Fariha Tasmin Jaigirdar, Shaiful Alam Chowdhury, Shahid Al Noor, and Md. Rokan Uddin Faruqui
- Subjects
Hidden node problem ,business.industry ,Network packet ,Computer science ,Inter-Access Point Protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Energy consumption ,Network allocation vector ,Distributed coordination function ,IEEE 802.11 ,IEEE 802.11b-1999 ,Multiple Access with Collision Avoidance for Wireless ,Wireless ,Channel access method ,IEEE 802.11e-2005 ,business ,Wireless sensor network ,Carrier sense multiple access with collision avoidance ,Random access ,Computer network - Abstract
Since its birth wireless communication became an indispensible part of the modern society. One major area that has a gigantic impact on the performance of wireless sensor networks (WSNs) is the Medium Access Control (MAC) layer. Many random access protocols exist in wireless sensor networks. Some of these protocols include Carrier Sense Multiple Access (CSMA), Multiple Access with Collision Avoidance (MACA), Multiple Access with Collision Avoidance for wireless (MACAW) and IEEE 802.11. All the protocols mentioned above except CSMA use Request To Send/Clear To Send (RTS/CTS) packets to avoid collisions (hidden terminal problem) which was a great problem for CSMA and that is the reason CSMA is almost obsolete for wireless communications. But after using RTS/CTS packets the protocols have to encounter some extra problems such as, energy consumption and end-to-end delay. The objective of this paper is to show the pros and cons of using RTS/CTS packets by comparing CSMA (does not use RTS/CTS) and IEEE 802.11 (uses RTS/CTS packets). We also portray that under some specific scenario the IEEE 802.11 is outperformed by CSMA which is also the novelty and contribution of this research work. This observation suggests that a lot of works have to be done to consider IEEE 802.11 an approximate perfect MAC layer protocol for WSNs.
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.