Skip to main content
Handover is crucial for data portability, real-time data generation, and data processing in mobile technology. Up to 4G, handover efficiency reached optimal stability. However, with the entrance of 5G, the cellular network has turned into... more
Handover is crucial for data portability, real-time data generation, and data processing in mobile technology. Up to 4G, handover efficiency reached optimal stability. However, with the entrance of 5G, the cellular network has turned into a complete heterogeneous network (HetNet) with enormous diversity due to the integration of Internet of Things (IoT) devices with mobile networks. Resource-constrained IoT devices differ notably in operational features from traditional mobile devices. Those devices usually need a smaller geographical cell with better connectivity coverage than conventional large cells of the same size. Hence, to support IoT, 5G splits large geographical cell areas into small cells and allows bandwidth sharing during Device-to-Device (D2D) communication. In a nutshell, 5G infrastructures and architectures have been changed a lot from the previous generations, and handover needs to be re-thought for efficient mobility management. This paper has incorporated the conce...
Wireless Body Area Network (WBAN) ensures highquality healthcare services by endowing distant and continual monitoring of patients’ health conditions. The security and privacy of the sensitive health-related data transmitted through the... more
Wireless Body Area Network (WBAN) ensures highquality healthcare services by endowing distant and continual monitoring of patients’ health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the identities of entities involved in the communication process. Since WBAN carries crucial health data, every entity engaged in the data transfer process must be authenticated. In literature, an end-to-end user authentication mechanism covering each communicating party is absent. Besides, most of the existing user authentication mechanisms are designed assuming that the patient’s mobile phone is trusted. In reality, a patient’s mobile phone can be stolen or comprised by malware and thus behaves maliciously. Our work addresses these drawbacks and proposes an end-to-end user authentication and se...
This dataset was curated in collaboration between the Computer Science and Engineering Department, University of Dhaka and the National Institute of Neuroscience, Bangladesh. It comprise 5,285 T1-weighted contrast- enhanced brain MRI... more
This dataset was curated in collaboration between the Computer Science and Engineering Department, University of Dhaka and the National Institute of Neuroscience, Bangladesh. It comprise 5,285 T1-weighted contrast- enhanced brain MRI images belonging to 38 categories. This work is accompanied by a paper found here http://arxiv.org/abs/2106.07333<br>
— Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, personal digital assistants (PDAs), cameras, and... more
— Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, personal digital assistants (PDAs), cameras, and printers etc. This thesis paper provides an overview of Bluetooth technology, protocol stack, some of the Vulnerabilities, risks and also protection technique of bluetooth enables mobile phones. Bluetooth enable mobile phone exchanges important data or files, image, sms, personal videos etc. When bluetooth is turn on, it is time to attack from attacker. Some brilliant attacker wants to take scope to harm bluetooth enable mobile phones by using proper steps. BlueBug is the name of a bluetooth security loophole on some bluetooth enabled cell phones. By bluebug attack, a mobile phone can be damaged or lost important information.Not only they can make calls, they can send messages, read phone books, examine calendars, etc. When a user put balance in mobile , i...
— JXTA is a P2P (Peer-to-Peer) Semantic Web application, which is aimed to accommodate heterogeneous resource metadata repositories in a P2P manner.,the main focus of research in cellular domain has shifted to “Web Service Security ” The... more
— JXTA is a P2P (Peer-to-Peer) Semantic Web application, which is aimed to accommodate heterogeneous resource metadata repositories in a P2P manner.,the main focus of research in cellular domain has shifted to “Web Service Security ” The aim of this thesis will be to develop a distributed service discovery mechanism. JXTA's P2P provides perfect solution for service (Web Service) discovery and Algorithm for Web Service Security. Here I have implemented an algorithm for web service security by using RSA Cryptographic Library and AES Encryption technology. Because most of the attackers may have easy access to Web Services that do not have adequate protection against unauthorized access. So, as the business needs to be protected against unauthorized infiltration, we need to implement some security measures in the Web Services. RSA Laboratories implemented a 330 bit security algorithm on March 18, 1991 named RSA-100. But that was factored within two weeks. Since then RSA has been im...
JXTA is a P2P (Peer-to-Peer) Semantic Web application, which is aimed to accommodate heterogeneous resource metadata repositories in a P2P manner.,the main focus of research in cellular domain has shifted to "Web Service... more
JXTA is a P2P (Peer-to-Peer) Semantic Web application, which is aimed to accommodate heterogeneous resource metadata repositories in a P2P manner.,the main focus of research in cellular domain has shifted to "Web Service Security" The aim of this thesis will be to develop a distributed service discovery mechanism. JXTA's P2P provides perfect solution for service (Web Service) discovery and Algorithm for Web Service Security. Here I have implemented an algorithm for web service security by using RSA Cryptographic Library and AES Encryption technology. Because most of the attackers may have easy access to Web Services that do not have adequate protection against unauthorized access. So, as the business needs to be protected against unauthorized infiltration, we need to implement some security measures in the Web Services. RSA Laboratories implemented a 330 bit security algorithm on March 18, 1991 named RSA-100. But that was factored within two weeks. Since then RSA has b...
Magnetic Resonance Imaging (MRI) is a principal diagnostic approach used in the field of radiology to create images of the anatomical and physiological structure of patients. MRI is the prevalent medical imaging practice to find... more
Magnetic Resonance Imaging (MRI) is a principal diagnostic approach used in the field of radiology to create images of the anatomical and physiological structure of patients. MRI is the prevalent medical imaging practice to find abnormalities in soft tissues. Traditionally they are analyzed by a radiologist to detect abnormalities in soft tissues, especially the brain. The process of interpreting a massive volume of patient’s MRI is laborious. Hence, the use of Machine Learning methodologies can aid in detecting abnormalities in soft tissues with considerable accuracy. In this research, we have curated a novel dataset and developed a framework that uses Deep Transfer Learning to perform a multi-classification of tumors in the brain MRI images. In this paper, we adopted the Deep Residual Convolutional Neural Network (ResNet50) architecture for the experiments along with discriminative learning techniques to train the model. Using the novel dataset and two publicly available MRI brain...
A Bayesian Attack Graph (BAG) is an essential model for red teams in cyber security to detect the most vulnerable components of a system. It is a probabilistic graphical model in which each node is initially assigned a probability value... more
A Bayesian Attack Graph (BAG) is an essential model for red teams in cyber security to detect the most vulnerable components of a system. It is a probabilistic graphical model in which each node is initially assigned a probability value called local probability. For realistic and better analysis of BAGs, it is essential to evaluate local probabilities precisely. For that purpose, in this paper, we use the Common Vulnerability Scoring System (CVSS) to estimate temporal and environmental scores. We further consider various factors reflecting attackers' characteristics in BAG analysis. In this respect, we inaugurated a new environmental variable named “host type” that influences an attacker's motivation and abolishes the need for earlier network architecture knowledge to determine the factor values.
In this research work, a network protocol is proposed for all-optical network, using a combination of wavelength routing and packet routing schemes. The technique uses wavelength division multiplexing (WDM). A set of wavelengths is... more
In this research work, a network protocol is proposed for all-optical network, using a combination of wavelength routing and packet routing schemes. The technique uses wavelength division multiplexing (WDM). A set of wavelengths is reserved to transfer control information, which is defined as control wavelengths. Control wavelengths are routed with packet routing scheme and the others are routed with wavelength routing scheme. In connection oriented network only the control packets are sent with the control wavelengths, data or messages are sent with other wavelengths. On the other hand, in datagram network, all the packets are sent with the control wavelengths. The allocation of wavelengths may be fully dynamic.
Checkpoint and recovery cost imposed by checkpoint/restart (CP/R) is a crucial performance issue for high-performance computing (HPC) applications. In comparison, Algorithm-Based Fault Tolerance (ABFT) is a promising fault tolerance... more
Checkpoint and recovery cost imposed by checkpoint/restart (CP/R) is a crucial performance issue for high-performance computing (HPC) applications. In comparison, Algorithm-Based Fault Tolerance (ABFT) is a promising fault tolerance method with low recovery overhead, but it suffers from the inadequacy of universal applicability, i.e., tied to a specific application or algorithm. Till date, providing fault tolerance for matrix-based algorithms for linear systems has been the research focus of ABFT schemes. As a consequence, it necessitates a comprehensive exploration of ABFT research to widen its scope to other types of parallel algorithms and applications. In this thesis, we go beyond traditional ABFT and focus on other types of parallel applications not covered by traditional ABFT. In that regard, rather than an emphasis on a single application at a time, we consider the algorithmic and communication characteristics of a class of parallel applications to design efficient fault tole...
In this research paper, an efficient routing protocol for all optical network (AOL) is proposed. The technique uses wavelength division multiplexing (WDM). The proposed one is different from the conventional AOL protocol in transmission... more
In this research paper, an efficient routing protocol for all optical network (AOL) is proposed. The technique uses wavelength division multiplexing (WDM). The proposed one is different from the conventional AOL protocol in transmission of data and control over optical fiber. A set of wavelengths is reserved to transfer control information, which is defined as control wavelengths. Control wavelengths are routed with packet routing scheme and the others are routed with wavelength routing scheme. In connection oriented network only the control packets are sent with the control wavelengths, data or messages are sent with other wavelengths. On the other hand, in datagram network, all the packets are sent with the control wavelengths. The allocation of wavelengths may be fully dynamic.
Abstract This paper presents a method of enhancing the execution time of a processor in implementing signal processing and control algorithms, through a process of minimisation of memory access time of the processor. The method is based... more
Abstract This paper presents a method of enhancing the execution time of a processor in implementing signal processing and control algorithms, through a process of minimisation of memory access time of the processor. The method is based on the design and corresponding software coding of an algorithm, and thus can be adopted for a variety of real-timesignal processing and control applications. The finite difference simulation algorithm ofa flexible beam is considered to demonstrate the effectiveness of the proposed method. The algorithm is implemented on a general-purpose computing platform, and a comparative performance evaluation of the processor with the proposed method is presented and discussed.
Log data is crucial to detect mischievous activities conducted in a computing environment. Traditional log management systems that depend on cloud and centralized storage servers are vulnerable to a single point of failure and lack... more
Log data is crucial to detect mischievous activities conducted in a computing environment. Traditional log management systems that depend on cloud and centralized storage servers are vulnerable to a single point of failure and lack transparency and trust since the adversaries tamper log records. In literature, blockchain is used to design log storage to resolve these issues. Although some solutions have been introduced, the existing works still cannot guarantee log data confidentiality, lack of efficient query mechanism, real-time implementation, and performance analysis. In this paper, we propose a blockchain-based network log data storage, query, and audit system. We have implemented and deployed the scheme in physical networking environment to collect log records. Our system ensures transparency, data accountability, and data confidentiality and incurs low overhead for performance analysis. Our work demonstrates the feasibility of blockchain to build a time-efficient log manageme...
In this research paper, an efficient routing protocol for all optical network (AOL) is proposed. The technique uses wavelength division multiplexing (WDM). The proposed one is different from the conventional AOL protocol in transmission... more
In this research paper, an efficient routing protocol for all optical network (AOL) is proposed. The technique uses wavelength division multiplexing (WDM). The proposed one is different from the conventional AOL protocol in transmission of data and control over optical fiber. A set of wavelengths is reserved to transfer control information, which is defined as control wavelengths. Control wavelengths are routed with packet routing scheme and the others are routed with wavelength routing scheme. In connection oriented network only the control packets are sent with the control wavelengths, data or messages are sent with other wavelengths. On the other hand, in datagram network, all the packets are sent with the control wavelengths. The allocation of wavelengths may be fully dynamic.
This paper presents an investigation into the impact of data dependencies in real-time high performance sequential and parallel processing. An adaptive active vibration control algorithm is considered to demonstrate the impact of data... more
This paper presents an investigation into the impact of data dependencies in real-time high performance sequential and parallel processing. An adaptive active vibration control algorithm is considered to demonstrate the impact of data dependencies in real-time computing. The algorithm is ...
Abstract— Load balancing is the key to the efficient operation of distributed systems. To efficiently utilize computing resources provided by distributed systems, an underlying Dynamic load balancing (DLB) scheme must address both... more
Abstract— Load balancing is the key to the efficient operation of distributed systems. To efficiently utilize computing resources provided by distributed systems, an underlying Dynamic load balancing (DLB) scheme must address both heterogeneous and dynamic features of distributed ...
This paper presents an investigation into the impact of data dependencies in real-time high performance sequential and parallel processing. An adaptive active vibration control algorithm is considered to demonstrate the impact of data... more
This paper presents an investigation into the impact of data dependencies in real-time high performance sequential and parallel processing. An adaptive active vibration control algorithm is considered to demonstrate the impact of data dependencies in real-time computing. The algorithm is ...