Papers by Mohammad Kamrul Hasan

IEEE Access, 2021
Steganography algorithms hide the secret message in the cover image and provide imperceptibility ... more Steganography algorithms hide the secret message in the cover image and provide imperceptibility to the attacker. The Least Significant Bit (LSB) algorithm is the preferred data hiding method. In this method, the least significant bit of the cover image pixel is substituted with the secret data bit. However, this method provides high variability if k-LSB bits of the cover image is replaced with secret data bit. To reduce the variability, various optimization algorithms are deployed in image steganography. These algorithms search the optimal pixels in the cover image, and data hiding is performed using the k-bits LSB method. Several iterations of optimization algorithms have increased the time complexity upon achieving this goal. Therefore, in this paper, a data hiding approach is designed based on the flipping approach that reduces variability and provides lesser time complexity. In the proposed method, initially, data hiding is performed using the k-bit LSB method in the cover image, and stego image is obtained. After that, the absolute difference between the cover and stego image is determined and compared with the threshold value. If the absolute difference is higher than the threshold value, then the adjacent bit of the k-bit LSB method is flipped. This process reduces the variability because flipping the adjacent bit will make the pixel value of the stego image closer to the cover image. The simulation evaluates using various performance metrics upon testing on standard dataset images. The simulation results show that the proposed method provides lesser variability, good visual quality, lesser time complexity than Genetic and Bayesian Optimization algorithms and the existing flip method. INDEX TERMS Flipping method, data hiding, least significant bit, variability.

IEEE Access, 2020
In the criminology area, to detain the serial criminal, the forthcoming serial crime time, distan... more In the criminology area, to detain the serial criminal, the forthcoming serial crime time, distance, and criminal's biography are essential keys. The main concern of this study is on the upcoming serial crime distance, time, and suspect biographies such as age and nationality. In conjunction with having time delays, the dynamic classifier, like Time Delay Neural Network (TDNN) utilized to perform nonlinear techniques-based predictions. The TDNN classifier system, like Back Propagation Through Time (BPTT) and Nonlinear Autoregressive with Exogenous Input (NARX) are two prominent examples. However, BPTT and NARX techniques are unable to identify the dynamic system by using single-activation functions due to producing lower accuracy. Hence, during the training phase, the direct minimization of the TDNN error can further enhance the single activation function. Thus, this work introduces an enhanced NARX (eNARX) model based on the proposed activation functions of SiRBF via fusion of two functions of the hyperbolic tangent (Tansig) and Radial Basis Function (RBF), in the same hidden layer. If a fusion of activation functions can affect the TDNN error minimization, then fusing of the Tansig and RBF functions can produce a precise prediction for crime spatiotemporal. To evaluate the proposed technique and compared it with existing NARX and BPTT, we utilized five time-series datasets, namely, Dow Jones Index, Monthly River flow in cubic meters per second, Daily temperature, and UKM-PDRM datasets namely, ''Suspect & Capture'' and ''Crime Plotting.'' The analysis of the results demonstrated that the proposed eNARX produce higher accuracy in comparison to other techniques of NARX and BPTT. Consequently, the proposed technique provides more effective results for the prediction of commercial serial crime. INDEX TERMS Back propagation algorithm, enhanced NARX, NARX, neural network, temporal pattern recognition, quantum geographic information systems.

Energies
Modern communication networks and digital control techniques are used in a smart grid. The first ... more Modern communication networks and digital control techniques are used in a smart grid. The first step is to classify the features of several communication networks and conduct a comparative investigation of the communication networks applicable to the smart grid. The integration of distributed generation has significantly increased as the global energy demand rises, and sustainable energy for electric vehicles and renewable energies worldwide are being pursued. Additional explanations for this surge include environmental concerns, the reforming of the power sector, and the advancing of small-scale electricity generation technologies. Smart monitoring and control of interconnected systems are required to successfully integrate distributed generation into an existing conventional power system. Electric-vehicles-based smart grid technologies are capable of playing this part. Smart grids are crucial to avoid becoming locked in an obsolete energy infrastructure and to draw in new investm...

Wireless Communications and Mobile Computing
A contactless system became necessary for smart mobility during the COVID-19 pandemic. There are ... more A contactless system became necessary for smart mobility during the COVID-19 pandemic. There are many touchpoints in private and public areas where contact is essential, such as intelligent transportation systems for vaccine carriers, patient ambulances, elevators, metros, buses, hospitals, and banks. A secured contactless device reduces the chances of COVID-19 infection spread. Several devices use smart cards, fingerprint identification, or code-based access. Most of these devices require some form of touch. The cost of such devices varies, depending on their capability and intended use. Sensors developed by using artificial intelligence (AI) to provide secured access are an emerging area. This paper presents an AI-powered contactless face recognition system. The solution has the Internet of Things (IoT) enabled access system. To identify a person, it uses AI assistance for face recognition with the help of Python Dlib’s facial recognition network. Dlib offers a wide range of funct...
Water
Fish production has become a roadblock to the development of fish farming, and one of the issues ... more Fish production has become a roadblock to the development of fish farming, and one of the issues encountered throughout the hatching process is the counting procedure. Previous research has mainly depended on the use of non-machine learning-based and machine learning-based counting methods and so was unable to provide precise results. In this work, we used a robotic eye camera to capture shrimp photos on a shrimp farm to train the model. The image data were classified into three categories based on the density of shrimps: low density, medium density, and high density. We used the parameter calibration strategy to discover the appropriate parameters and provided an improved Mask Regional Convolutional Neural Network (Mask R-CNN) model. As a result, the enhanced Mask R-CNN model can reach an accuracy rate of up to 97.48%.

ACM Transactions on Asian and Low-Resource Language Information Processing, 2022
The Internet of Medical Things (IoMT) is a definite IoT connecting atmosphere that contracts with... more The Internet of Medical Things (IoMT) is a definite IoT connecting atmosphere that contracts with communication via intelligent medical equipment. Activity detection, motion tracking, information extraction, consumer retrieval, etc., have all been solved due to advances in the autonomous study of human behavior from multimedia information processing. Though the IoT connecting atmosphere enables and provisions our daily actions, it too has certain disadvantages. IoTgrieves from numerous safety and confidentiality challenges, such as reiteration, impersonation, man-in-the-middle, remote hijacking, privileged-insider attack, denial of service (DoS) attacks, password guessing, and malware bouts. Hence, in this paper, Private Blockchain and Fuzzy Logic based Attack Detection system (PBFL-ADS) has been proposed for secure IoMT disease prediction using Multimedia Information Processing techniques. The proposed method utilizes Bayesian inference-based trust administration to perceived malev...

Wireless Communications and Mobile Computing, 2021
In everyday life, electricity is necessary, and proper use is critical. To strengthen home electr... more In everyday life, electricity is necessary, and proper use is critical. To strengthen home electricity control, the existing systems have been examined over the years. However, the existing PMAS method’s error ratio is higher and does not allow for a remote monitoring system. Therefore, this study proposes a smart monitoring and control system (SMACS) for household appliances. The application’s significance is to monitor household appliances’ electricity usage using hardware and the Internet of Things (IoT) methods. The prototype of the proposed system is designed and developed considering Arduino UNO, a liquid crystal display (LCD), an ACS712 current sensor module, relays, and AC sources. The components are selected from the software library, and the simulation results are found the same as the prototype. WiFi module ESP8266 is not included in the design because it is not provided in the system. The data is recorded in cloud storage using Thing-speak. A mobile application (Virtuino...

Computers, Materials & Continua, 2022
Many organizations apply cloud computing to store and effectively process data for various applic... more Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure. The developed model supports privacy-preserving public auditing to provide a secure cloud storage system. The data owners upload the data in the cloud and edit the data using the private key. An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches. The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user. The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2-167 ms when compared to the existing Advanced Encryption Standard and Blowfish.

Mathematical Biosciences and Engineering, 2021
The use of advanced technologies has increased drastically to maintain any sensitive records rela... more The use of advanced technologies has increased drastically to maintain any sensitive records related to education, health, or finance. It helps to protect the data from unauthorized access by attackers. However, all the existing advanced technologies face some issues because of their uncertainties. These technologies have some lapses to provide privacy, attack-free, transparency, reliability, and flexibility. These characteristics are essential while managing any sensitive data like educational certificates or medical certificates. Hence, we designed an Industry 5.0 based blockchain application to manage medical certificates using Remix Ethereum blockchain in this paper. This application also employs a distributed application (DApp) that uses a test RPC-based Ethereum blockchain and user expert system as a knowledge agent. The main strength of this work is the maintenance of existing certificates over a blockchain with the creation of new certificates that use logistic Map encryptio...

EURASIP Journal on Wireless Communications and Networking, 2021
Wireless devices’ energy efficiency and spectrum shortage problem has become a key concern worldw... more Wireless devices’ energy efficiency and spectrum shortage problem has become a key concern worldwide as the number of wireless devices increases at an unparalleled speed. Wireless energy harvesting technique from traditional radio frequency signals is suitable for extending mobile devices’ battery life. This paper investigates a cognitive radio network model where primary users have their specific licensed band, and secondary users equipped with necessary hardware required for energy harvesting can use the licensed band of the primary user by smart sensing capability. Analytical expressions for considered network metrics, namely data rate, outage probability, and energy efficiency, are derived for uplink and downlink scenarios. In addition, optimal transmission power and energy harvesting power are derived for maximum energy efficiency in downlink and uplink scenarios. Numerical results show that outage probability improves high transmission power in the downlink scenario and high h...

The energy efficiency and spectrum shortage problem of wireless devices has become a concern for ... more The energy efficiency and spectrum shortage problem of wireless devices has become a concern for researchers worldwide as the number of wireless devices increases at an unparalleled speed. Many new solutions have been proposed to extend mobile devices' battery life, such as wireless energy harvesting from traditional radio frequency signals to design new smart battery chips. This paper considers a cognitive radio network model where primary users have their specific licensed band, and secondary users equipped with necessary hardware required for energy harvesting can use the licensed band of the primary user by smart sensing capability. First, the expression of outage probability is theoretically derived for uplink and downlink scenarios. Moreover, maximum energy efficiency for both uplink and downlink in the cognitive radio network model subject to interference and noise is investigated here. The theoretical analysis is then evaluated. It has been observed that outage probabili...

PLOS ONE, 2020
Transmission opportunity (TXOP) is a key factor to enable efficient channel bandwidth utilization... more Transmission opportunity (TXOP) is a key factor to enable efficient channel bandwidth utilization over wireless campus networks (WCN) for interactive multimedia (IMM) applications. It facilitates in resource allocation for the similar categories of multiple packets transmission until the allocated time is expired. The static TXOP limits are defined for various categories of IMM traffics in the IEEE802.11e standard. Due to the variation of traffic load in WCN, the static TXOP limits are not sufficient enough to guarantee the quality of service (QoS) for IMM traffic flows. In order to address this issue, several existing works allocate the TXOP limits dynamically to ensure QoS for IMM traffics based on the current associated queue size and pre-setting threshold values. However, existing works do not take into account all the medium access control (MAC) overheads while estimating the current queue size which in turn is required for dynamic TXOP limits allocation. Hence, not considering MAC overhead appropriately results in inaccurate queue size estimation, thereby leading to inappropriate allocation of dynamic TXOP limits. In this article, an enhanced dynamic TXOP (EDTXOP) scheme is proposed that takes into account all the MAC overheads while estimating current queue size, thereby allocating appropriate dynamic TXOP limits within the pre-setting threshold values. In addition, the article presents an analytical estimation of the EDTXOP scheme to compute the dynamic TXOP limits for the current high priority traffic queues. Simulation results were carried out by varying traffic load in terms of packet size and packet arrival rate. The results show that the proposed EDTXOP scheme achieves the overall performance gains in the range of 4.41%-8.16%, 8.72%-11.15%, 14.43%-32% and 26.21%-50.85% for throughput, PDR, average ETE delay and average jitter, respectively when compared to the existing work. Hence, offering a better TXOP limit allocation solution than the rest.

Cluster Computing, 2021
The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based servic... more The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It's critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps. Keywords Transport layer security (TLS) Á Third-party auditor (TPA) Á Self-sovereign identity (SSI) Á Cloud migration Á Public key infrastructure (PKI) Á Certificate authority (CA) Á Registration authority (RA) Á Certificate management system Á Revocation services Á Digital signature Cluster Computing

Wireless Communications and Mobile Computing, 2021
We present communication frameworks, models, and protocols of smart grid Internet of Things (IoT)... more We present communication frameworks, models, and protocols of smart grid Internet of Things (IoT) networks based on the IEEE and IEC standards. The measurement, control, and monitoring of grid being achieved through phasor measurement unit (PMU) based wide area measurement (WAM) framework. The WAM framework applied the IEEE standard C37.118 phasor exchange protocol to collect grid data from various substation devices. The existing frameworks include the IEC 61850 protocol and programmable logic controllers (PLCs) based supervisory control and data acquisition (SCADA) system. These protocols have been selected as per the smart grid configuration and communication design. However, the existing frameworks have severe synchronization errors due to the communication delays of IoT networks in the smart grid. Therefore, this article designs the timing mechanism and a delay model to reduce the timing delay and boost real-time measurement, monitoring, and control performance of the smart gri...

IEEE Access, 2021
Timing synchronization has a vital role in swarm drones' network (SDN) or a swarm of unmanned aer... more Timing synchronization has a vital role in swarm drones' network (SDN) or a swarm of unmanned aerial vehicle (UAV) network. Current timing synchronization methods focus on enhancing single-hop skews which remarkably improve timing synchronization precision at this level. The improper clock of the drone system can cause interference, affect spectrum precision and interrupt the operation of the transceiver. In the drones' network, master drones' (MD) neighbor drone's timing synchronization approaches like Reference Broadcast System (RBS) realize a good performance. However, the requirement of one super drone with a large number of broadcasts for RBS makes it unrealistic to use in some situations like SDN network situation. Appropriate study and adjustments are needed to have real timing synchronization by eliminating the clocks drift and enhancing the timing synchronization precision. Therefore, a new self-timing synchronization approach is proposed in this paper where several MD drones can autonomously generate swarm clusters. The cluster head (CH) instigates a timing synchronization procedure starting with intra-Swarm cluster timing synchronization. The intermediate drones (ID) are elected between two swarm clusters to synchronize all drones in line with the inter-swarm cluster timing synchronization approach. The proposed approach is distributed and flexible to achieve high timing synchronization precision. The paper proposes a novel self-timing synchronization approach for in large scale semi-flat SND network architecture. Self-timing synchronization is swarm cluster-based and applicable for a huge number of master drones in SDN. One is the intra-Swarm cluster where the timing synchronization procedure starts with the CH to synchronize all CM. Secondly, in the inter-swarm cluster timing synchronization, two clusters are synchronized via intermediate drone (ID). However, the simulations demonstrated that in many cases all CHs are synchronized by the synchronized CHs from intra-swarm cluster timing synchronizations; this increased the system throughput and synchronization delay to about 75% compared to what we planned to achieve. Moreover, the simulation results also proved that the achieved synchronization precision can be used for position estimation and prediction with high accuracy. INDEX TERMS Drones' network, timing synchronization, unmanned aerial vehicle (UAV), cluster, swarm.

Computers, Materials & Continua, 2022
The fifth generation (5G) system is the forthcoming generation of the mobile communication system... more The fifth generation (5G) system is the forthcoming generation of the mobile communication system. It has numerous additional features and offers an extensively high data rate, more capacity, and low latency. However, these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry. This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user equipment and home network. Through this mechanism, the user identity privacy would be secured and hidden. Moreover, it improves the synchronization between mobile users and home networks. Additionally, its compliance with the Authentication and Key Agreement (AKA) structure was adopted in the previous generations. It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector's message size. Moreover, the addition of any hardware to the AKA carries minor adjustments on the network parties. In this paper, the ProVerif is used to verify the proposed scheme.

Sustainability, 2021
The Industrial Internet of things (IIoT) helps several applications that require power control an... more The Industrial Internet of things (IIoT) helps several applications that require power control and low cost to achieve long life. The progress of IIoT communications, mainly based on cognitive radio (CR), has been guided to the robust network connectivity. The low power communication is achieved for IIoT sensors applying the Low Power Wide Area Network (LPWAN) with the Sigfox, NBIoT, and LoRaWAN technologies. This paper aims to review the various technologies and protocols for industrial IoT applications. A depth of assessment has been achieved by comparing various technologies considering the key terms such as frequency, data rate, power, coverage, mobility, costing, and QoS. This paper provides an assessment of 64 articles published on electricity control problems of IIoT between 2007 and 2020. That prepares a qualitative technique of answering the research questions (RQ): RQ1: “How cognitive radio engage with the industrial IoT?”, RQ2: “What are the Proposed architectures that Su...

IEEE Access, 2021
The importance of image security in the field of medical imaging is challenging. Several research... more The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be applied directly to e-health data, especially when patient data are transferred over the open channels. Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. Researchers have identified such security threats and have proposed several image encryption techniques to mitigate the security problem. However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. The proposed lightweight encryption technique employs two permutation techniques to secure medical images. The proposed technique is analyzed, evaluated, and then compared to conventionally encrypted ones in security and execution time. Numerous test images have been used to determine the performance of the proposed algorithm. Several experiments show that the proposed algorithm for image cryptosystems provides better efficiency than conventional techniques. INDEX TERMS Internet of Medical Things, medical image encryption, lightweight encryption.

Sustainability, 2021
This paper presents a comprehensive review of machine learning (ML) based approaches, especially ... more This paper presents a comprehensive review of machine learning (ML) based approaches, especially artificial neural networks (ANNs) in time series data prediction problems. According to literature, around 80% of the world’s total energy demand is supplied either through fuel-based sources such as oil, gas, and coal or through nuclear-based sources. Literature also shows that a shortage of fossil fuels is inevitable and the world will face this problem sooner or later. Moreover, the remote and rural areas that suffer from not being able to reach traditional grid power electricity need alternative sources of energy. A “hybrid-renewable-energy system” (HRES) involving different renewable resources can be used to supply sustainable power in these areas. The uncertain nature of renewable energy resources and the intelligent ability of the neural network approach to process complex time series inputs have inspired the use of ANN methods in renewable energy forecasting. Thus, this study aim...

Journal of environmental and public health, 2018
The management and treatment of healthcare waste (HCW) are of great concern owing to its potentia... more The management and treatment of healthcare waste (HCW) are of great concern owing to its potential hazard to human health and the environment, particularly in developing countries. Nowadays, various technological alternatives are gaining momentum as efficient and favorable waste management options across the world. However, selecting a suitable technology as well as an effective waste management approach for the treatment of HCW is still a challenging task for the municipal authorities. This study renders a comprehensive analysis of healthcare waste management (HCWM) practices and the technological options for its better management through a case study in Khulna, the southwestern division of Bangladesh. A number of healthcare establishments (HCEs) in the study area were selected and a questionnaire survey, as well as field investigations, was performed to find out the present status of HCWM and its limitations. An assessment of different technological alternatives was also carried o...
Uploads
Papers by Mohammad Kamrul Hasan