shameemul haque - Academia.edu (original) (raw)
Uploads
Papers by shameemul haque
Iraqi journal of science, Sep 29, 2023
The Internet of Things (IoT) has great importance in the medical industry. The creation of intell... more The Internet of Things (IoT) has great importance in the medical industry. The creation of intelligent sensors, intelligent machines, and superior algorithms for lightweight communication made it feasible to connect medical equipment in order to monitor biomedical signals and also to detect illnesses in patients without human intervention. This new IoT and medical equipment connection is called IoMT. This IoMT model is most adapted to this pandemic since every human being has to be interconnected and monitored via a larger communication network. Hence, this article provides an overview of remote healthcare systems, monitoring ingestible sensors, mobile health, smart hospitals, and improved chronic disease management focused on the Internet of Medical Things. Finally, this paper proposes an IoMT architecture and platform to assist with persistent healthcare.
Abstract-The paper presents a genetic algorithm with fuzzy logic controller for determining oppor... more Abstract-The paper presents a genetic algorithm with fuzzy logic controller for determining opportunistic replacement policy for deteriorating components of an equipment or system. An Opportunistic replacement model has been formulated by considering the dynamics of the decision ...
2023 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
BENTHAM SCIENCE PUBLISHERS eBooks, Nov 9, 2022
RECENT TRENDS IN SCIENCE AND ENGINEERING
E-learning and Digital Media, Feb 10, 2023
E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinen... more E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinence in the distance education system. Due to COVID-19, the online learning education system has become very popular. Most probably, all education systems have been using the IoT-based E-Learning system to continue the students’ education without hindrance during the COVID lockdown. Several E-Learning IoT schemes are explored that reflect privacy and security, but still, there is no detailed scheme; hence, it needs a sustainable, secure E-Learning IoT system. The characteristics and prospects of the Internet of Things are discussed in this article. By analyzing the various functions and capabilities of the Internet of Things, this article aims to provide an overview of the various advantages and challenges of using the platform for e-learning. This paper proposed the E-Learning IoT architecture with Blockchain technology, with layers of different IoT and Blockchain concepts to secure the online education system. Also, the block diagram of the proposed architecture demonstrates how students can securely access or interact with the online learning system through Blockchain technology. By implementing the proposed e-learning IoT architecture, universities and colleges can improve their distance learning programs and increase efficiency without affecting their academic activities. Finally, the study found that e-learning positively impacts students' learning experience and overall quality of education. It also exhibited a significant positive impact on their flexibility and academic productivity.
International Journal of Computer Applications, 2014
Extracting previously unknown patterns from massive volume of data is the main objective of any d... more Extracting previously unknown patterns from massive volume of data is the main objective of any data mining algorithm. In current days there is a tremendous expansion in data collection due to the development in the field of information technology. The patterns revealed by data mining algorithm can be used in various domains like Image Analysis, Marketing and weather forecasting. As a side effect of the mining algorithm some sensitive information is also revealed. There is a need to preserve the privacy of individuals which can be achieved by using privacy preserving data mining. In this paper we use min-max normalization approach for preserving privacy during the mining process. We clean the original data using min-max normalization approach before publishing. For experimental purpose we have used k-means algorithm and from our results it is obvious that our approach preserves both privacy and accuracy.
Advances in Intelligent Systems and Computing
International Journal of Cloud Applications and Computing, 2022
Internet of Things is a promising technology but it also increases numerous security threats in d... more Internet of Things is a promising technology but it also increases numerous security threats in data transmission. To secure neighboring sensing devices' communication in an IoT environment, a key agreement protocol is primordial. Various IoT data transmission mechanisms have been proposed in the literature to attain security. However, these propositions are not completely secure against all types of attacks. In this paper, a new certificate-based was proposed lightweight authentication and key agreement protocol for the IoT environment. The proposed protocol uses Elliptic Curves Cryptography and minimizes the number of operations needed to generate secret keys. Moreover, performed a detailed informal security analysis, and formal security verification using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, through which demonstrated that the proposed protocol is resilient against numerous known attacks. The implementation of the proposed protoc...
Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence
Iraqi journal of science, Sep 29, 2023
The Internet of Things (IoT) has great importance in the medical industry. The creation of intell... more The Internet of Things (IoT) has great importance in the medical industry. The creation of intelligent sensors, intelligent machines, and superior algorithms for lightweight communication made it feasible to connect medical equipment in order to monitor biomedical signals and also to detect illnesses in patients without human intervention. This new IoT and medical equipment connection is called IoMT. This IoMT model is most adapted to this pandemic since every human being has to be interconnected and monitored via a larger communication network. Hence, this article provides an overview of remote healthcare systems, monitoring ingestible sensors, mobile health, smart hospitals, and improved chronic disease management focused on the Internet of Medical Things. Finally, this paper proposes an IoMT architecture and platform to assist with persistent healthcare.
Abstract-The paper presents a genetic algorithm with fuzzy logic controller for determining oppor... more Abstract-The paper presents a genetic algorithm with fuzzy logic controller for determining opportunistic replacement policy for deteriorating components of an equipment or system. An Opportunistic replacement model has been formulated by considering the dynamics of the decision ...
2023 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
BENTHAM SCIENCE PUBLISHERS eBooks, Nov 9, 2022
RECENT TRENDS IN SCIENCE AND ENGINEERING
E-learning and Digital Media, Feb 10, 2023
E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinen... more E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinence in the distance education system. Due to COVID-19, the online learning education system has become very popular. Most probably, all education systems have been using the IoT-based E-Learning system to continue the students’ education without hindrance during the COVID lockdown. Several E-Learning IoT schemes are explored that reflect privacy and security, but still, there is no detailed scheme; hence, it needs a sustainable, secure E-Learning IoT system. The characteristics and prospects of the Internet of Things are discussed in this article. By analyzing the various functions and capabilities of the Internet of Things, this article aims to provide an overview of the various advantages and challenges of using the platform for e-learning. This paper proposed the E-Learning IoT architecture with Blockchain technology, with layers of different IoT and Blockchain concepts to secure the online education system. Also, the block diagram of the proposed architecture demonstrates how students can securely access or interact with the online learning system through Blockchain technology. By implementing the proposed e-learning IoT architecture, universities and colleges can improve their distance learning programs and increase efficiency without affecting their academic activities. Finally, the study found that e-learning positively impacts students' learning experience and overall quality of education. It also exhibited a significant positive impact on their flexibility and academic productivity.
International Journal of Computer Applications, 2014
Extracting previously unknown patterns from massive volume of data is the main objective of any d... more Extracting previously unknown patterns from massive volume of data is the main objective of any data mining algorithm. In current days there is a tremendous expansion in data collection due to the development in the field of information technology. The patterns revealed by data mining algorithm can be used in various domains like Image Analysis, Marketing and weather forecasting. As a side effect of the mining algorithm some sensitive information is also revealed. There is a need to preserve the privacy of individuals which can be achieved by using privacy preserving data mining. In this paper we use min-max normalization approach for preserving privacy during the mining process. We clean the original data using min-max normalization approach before publishing. For experimental purpose we have used k-means algorithm and from our results it is obvious that our approach preserves both privacy and accuracy.
Advances in Intelligent Systems and Computing
International Journal of Cloud Applications and Computing, 2022
Internet of Things is a promising technology but it also increases numerous security threats in d... more Internet of Things is a promising technology but it also increases numerous security threats in data transmission. To secure neighboring sensing devices' communication in an IoT environment, a key agreement protocol is primordial. Various IoT data transmission mechanisms have been proposed in the literature to attain security. However, these propositions are not completely secure against all types of attacks. In this paper, a new certificate-based was proposed lightweight authentication and key agreement protocol for the IoT environment. The proposed protocol uses Elliptic Curves Cryptography and minimizes the number of operations needed to generate secret keys. Moreover, performed a detailed informal security analysis, and formal security verification using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, through which demonstrated that the proposed protocol is resilient against numerous known attacks. The implementation of the proposed protoc...
Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence