The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals becau... more The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals because of its market worth and rapid growth. These devices have limited computational capabilities, which ensure minimum power absorption. Moreover, the manufacturers use simplified architecture to offer a competitive price in the market. As a result, IoMTs cannot employ advanced security algorithms to defend against cyber-attacks. IoMT has become easy prey for cybercriminals due to its access to valuable data and the rapidly expanding market, as well as being comparatively easier to exploit.As a result, the intrusion rate in IoMT is experiencing a surge. This paper proposes a novel Intrusion Detection System (IDS), namely SafetyMed, combining Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks to defend against intrusion from sequential and grid data. SafetyMed is the first IDS that protects IoMT devices from malicious image data and sequential network traffic. Th...
Cyber-physical security is vital for protecting key computing infrastructure against cyber attack... more Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. Cyber-physical system security is more challenging than software-level cyber security because it requires physical inspection and monitoring. This paper proposes an innovative and effective algorithm to strengthen cyber-physical security (CPS) with minimal human intervention. It is an approach based on human activity recognition (HAR), where GoogleNet–BiLSTM network hybridization has been used to recognize suspicious activities in the cyber-physical infrastructure perimeter. The proposed HAR-CPS algorithm classifies suspicious activities from real-time video surveillance with...
Cyber-physical security is vital for protecting key computing infrastructure against cyber attack... more Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including Data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. Cyber-physical system security is more challenging than software-level cyber security because it requires physical inspection and monitoring. This paper proposes an innovative and effective algorithm to strengthen Cyber-Physical Security (CPS) with minimal human intervention. It is a Human Activity Recognition (HAR)-based approach where a GoogleNet-BiLSTM network hybridization has been used to recognize suspicious activities in cyber-physical infrastructure perimeter. The proposed HAR-CPS algorithm classifies suspicious activities from real-time video surveillance with an ave...
Proceedings of International Joint Conference on Computational Intelligence
Attention is the behavioral and cognitive process of selectively concentrating on a discrete aspe... more Attention is the behavioral and cognitive process of selectively concentrating on a discrete aspect of information. It is the taking possession by the mind in clear and colorful form of one out of what seem several simultaneous objects or trains of thought. The purpose of this work is to establish a human–robot interaction system to detect the visual focus of attention (VFOA) based on human attention (in case of both reading and browsing purposes). The system detects the person’s current task (attention) and estimates the level by detecting the head and estimating eye region specially detected iris center within eye area (gaze pattern calculation). The system also determines the interest or willingness of the target person to interact with it based upon a certain level of VFOA. Then, depending on the level of interest of the target person, the system/robot generates awareness and establishes a communication channel with her/him.
Data have ascended a place among capital, labor and land in production. The emerging data-driven ... more Data have ascended a place among capital, labor and land in production. The emerging data-driven economy has facilitated the scope of growth of data-entry industry – an industry equipped with modern computing and communication infrastructure enriched with specialized software interface allowing data-entry professionals to look into the source, collect and store target data. These data are used in business intelligence and analytics for value creation. By nature, data-entry is a tedious and repetitive task. It not only hampers creativity of the operators but also leave a possibility of wrong entry. In this paper, an innovative algorithm has been proposed which can automate the date entry industry with above 97% accuracy, more than 15 times faster than existing speed with no additional cost apart from the cost of existing infrastructure. The proposed algorithm has been tested and compared with several data-entry focused companies which demonstrate that it outperforms current manual data-entry approach and it has the potential to revolutionize the data-entry industry.
Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India
The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical exp... more The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical expansion. IoT networks provide end-to-end connectivity while keeping minimal latency. To reduce delays, efficient data delivery schemes are required for dispersed fog-IoT network orchestrations. We use a Spark-based big data processing scheme (BDPS) to accelerate the distributed database (RDD) delay efficient technique in the fogs for a decentralized heterogeneous network architecture to reinforce suitable data allocations via IoTs. We propose BDPS based on Spark-RDD in fog-IoT overlay architecture to address the performance issues across the network orchestration. We evaluate data processing delays from fog-IoT integrated parts using a depth-first-search-based shortest path node finding configuration, which outperforms the existing shortest path algorithms in terms of algorithmic (i.e., depth-first search) efficiency, including the Bellman–Ford (BF) algorithm, Floyd–Warshall (FW) algorith...
Proceedings of International Joint Conference on Computational Intelligence
During the festival seasons, the crowds in the shopping malls become eight to ten times more than... more During the festival seasons, the crowds in the shopping malls become eight to ten times more than regular times. To impress maximum number of customers, business owners offer discounts, arrange raffle draws, game competitions, and many other events. They decorate their showrooms with eye-catching banners and lighting effects. These excellent marketing strategies work and increase customers’ engagements. However, the curious minds of children are attracted by these events more than those of adults. As a result, missing children in the shopping malls have become a common incident during festival seasons. Whenever a child is missing, shopping mall managements announce it though central sound system and normally if the people see the missing child, they bring it back to mall management’s office and the officials hand it over to the parents. This method depends on the generosity of the people and does not guarantee the return of the child. Moreover, the children kidnappers can take advantage of the announcement of missing child. In this paper, we are proposing a method that depends on eigenfaces which is fast, efficient yet simple to implement and ensure the recovery of the missing children in shortest possible time.
2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), 2019
In most of the developing countries the seats of educational institutions are limited and barley ... more In most of the developing countries the seats of educational institutions are limited and barley 30% of the total eligible candidates get the opportunity to get admitted after facing competitive admission test. The scenario is worse in the job market. The growing graduation to unemployment ratio has become a major concern in developing and underdeveloped countries. As a result, job recruitment tests have become more competitive than ever. In order to survive in these types of competitive examinations, many candidates try to take unethical approaches. Because of large number of candidates, exam administrators cannot validate each and every candidate one by one. Moreover, modified image in registration paper makes it difficult to identify valid examinee. This is the weakest point of examinee validation system of competitive examination and significant number of candidates try to pass the examination by exploiting this weakness. The easiest way to exploit this weakness is to hire and s...
This study aims to model the prediction of two clinically relevant properties of drug delivery sy... more This study aims to model the prediction of two clinically relevant properties of drug delivery systems specifically for niosomes, i.e., particle size and drug entrapment efficiency (EE%) using a combined approach of data mining, artificial neural networks (ANN), and design of experiments (DoE). Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) system was adopted to screen published literature on niosomes that resulted in 17 articles with 114 formulations. Eleven properties (input parameters) related to drugs and niosomes affecting particle size and drug entrapment (EE%) (output variables) were precisely identified and used for the network training. The network architecture consists of 5 fully connected hidden layers with eleven hidden nodes in each layer, input layer has eleven nodes where each of these nodes maintains omnidirectional injective relation with the corresponding hidden node. The hyperbolic tangent sigmoid transfer function (HTSTF) with Levenbe...
The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals becau... more The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals because of its market worth and rapid growth. These devices have limited computational capabilities, which ensure minimum power absorption. Moreover, the manufacturers use simplified architecture to offer a competitive price in the market. As a result, IoMTs cannot employ advanced security algorithms to defend against cyber-attacks. IoMT has become easy prey for cybercriminals due to its access to valuable data and the rapidly expanding market, as well as being comparatively easier to exploit.As a result, the intrusion rate in IoMT is experiencing a surge. This paper proposes a novel Intrusion Detection System (IDS), namely SafetyMed, combining Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks to defend against intrusion from sequential and grid data. SafetyMed is the first IDS that protects IoMT devices from malicious image data and sequential network traffic. Th...
Cyber-physical security is vital for protecting key computing infrastructure against cyber attack... more Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. Cyber-physical system security is more challenging than software-level cyber security because it requires physical inspection and monitoring. This paper proposes an innovative and effective algorithm to strengthen cyber-physical security (CPS) with minimal human intervention. It is an approach based on human activity recognition (HAR), where GoogleNet–BiLSTM network hybridization has been used to recognize suspicious activities in the cyber-physical infrastructure perimeter. The proposed HAR-CPS algorithm classifies suspicious activities from real-time video surveillance with...
Cyber-physical security is vital for protecting key computing infrastructure against cyber attack... more Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including Data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. Cyber-physical system security is more challenging than software-level cyber security because it requires physical inspection and monitoring. This paper proposes an innovative and effective algorithm to strengthen Cyber-Physical Security (CPS) with minimal human intervention. It is a Human Activity Recognition (HAR)-based approach where a GoogleNet-BiLSTM network hybridization has been used to recognize suspicious activities in cyber-physical infrastructure perimeter. The proposed HAR-CPS algorithm classifies suspicious activities from real-time video surveillance with an ave...
Proceedings of International Joint Conference on Computational Intelligence
Attention is the behavioral and cognitive process of selectively concentrating on a discrete aspe... more Attention is the behavioral and cognitive process of selectively concentrating on a discrete aspect of information. It is the taking possession by the mind in clear and colorful form of one out of what seem several simultaneous objects or trains of thought. The purpose of this work is to establish a human–robot interaction system to detect the visual focus of attention (VFOA) based on human attention (in case of both reading and browsing purposes). The system detects the person’s current task (attention) and estimates the level by detecting the head and estimating eye region specially detected iris center within eye area (gaze pattern calculation). The system also determines the interest or willingness of the target person to interact with it based upon a certain level of VFOA. Then, depending on the level of interest of the target person, the system/robot generates awareness and establishes a communication channel with her/him.
Data have ascended a place among capital, labor and land in production. The emerging data-driven ... more Data have ascended a place among capital, labor and land in production. The emerging data-driven economy has facilitated the scope of growth of data-entry industry – an industry equipped with modern computing and communication infrastructure enriched with specialized software interface allowing data-entry professionals to look into the source, collect and store target data. These data are used in business intelligence and analytics for value creation. By nature, data-entry is a tedious and repetitive task. It not only hampers creativity of the operators but also leave a possibility of wrong entry. In this paper, an innovative algorithm has been proposed which can automate the date entry industry with above 97% accuracy, more than 15 times faster than existing speed with no additional cost apart from the cost of existing infrastructure. The proposed algorithm has been tested and compared with several data-entry focused companies which demonstrate that it outperforms current manual data-entry approach and it has the potential to revolutionize the data-entry industry.
Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India
The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical exp... more The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical expansion. IoT networks provide end-to-end connectivity while keeping minimal latency. To reduce delays, efficient data delivery schemes are required for dispersed fog-IoT network orchestrations. We use a Spark-based big data processing scheme (BDPS) to accelerate the distributed database (RDD) delay efficient technique in the fogs for a decentralized heterogeneous network architecture to reinforce suitable data allocations via IoTs. We propose BDPS based on Spark-RDD in fog-IoT overlay architecture to address the performance issues across the network orchestration. We evaluate data processing delays from fog-IoT integrated parts using a depth-first-search-based shortest path node finding configuration, which outperforms the existing shortest path algorithms in terms of algorithmic (i.e., depth-first search) efficiency, including the Bellman–Ford (BF) algorithm, Floyd–Warshall (FW) algorith...
Proceedings of International Joint Conference on Computational Intelligence
During the festival seasons, the crowds in the shopping malls become eight to ten times more than... more During the festival seasons, the crowds in the shopping malls become eight to ten times more than regular times. To impress maximum number of customers, business owners offer discounts, arrange raffle draws, game competitions, and many other events. They decorate their showrooms with eye-catching banners and lighting effects. These excellent marketing strategies work and increase customers’ engagements. However, the curious minds of children are attracted by these events more than those of adults. As a result, missing children in the shopping malls have become a common incident during festival seasons. Whenever a child is missing, shopping mall managements announce it though central sound system and normally if the people see the missing child, they bring it back to mall management’s office and the officials hand it over to the parents. This method depends on the generosity of the people and does not guarantee the return of the child. Moreover, the children kidnappers can take advantage of the announcement of missing child. In this paper, we are proposing a method that depends on eigenfaces which is fast, efficient yet simple to implement and ensure the recovery of the missing children in shortest possible time.
2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), 2019
In most of the developing countries the seats of educational institutions are limited and barley ... more In most of the developing countries the seats of educational institutions are limited and barley 30% of the total eligible candidates get the opportunity to get admitted after facing competitive admission test. The scenario is worse in the job market. The growing graduation to unemployment ratio has become a major concern in developing and underdeveloped countries. As a result, job recruitment tests have become more competitive than ever. In order to survive in these types of competitive examinations, many candidates try to take unethical approaches. Because of large number of candidates, exam administrators cannot validate each and every candidate one by one. Moreover, modified image in registration paper makes it difficult to identify valid examinee. This is the weakest point of examinee validation system of competitive examination and significant number of candidates try to pass the examination by exploiting this weakness. The easiest way to exploit this weakness is to hire and s...
This study aims to model the prediction of two clinically relevant properties of drug delivery sy... more This study aims to model the prediction of two clinically relevant properties of drug delivery systems specifically for niosomes, i.e., particle size and drug entrapment efficiency (EE%) using a combined approach of data mining, artificial neural networks (ANN), and design of experiments (DoE). Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) system was adopted to screen published literature on niosomes that resulted in 17 articles with 114 formulations. Eleven properties (input parameters) related to drugs and niosomes affecting particle size and drug entrapment (EE%) (output variables) were precisely identified and used for the network training. The network architecture consists of 5 fully connected hidden layers with eleven hidden nodes in each layer, input layer has eleven nodes where each of these nodes maintains omnidirectional injective relation with the corresponding hidden node. The hyperbolic tangent sigmoid transfer function (HTSTF) with Levenbe...
Uploads
Papers by Nuruzzaman Faruqui