Skip to main content

Showing 1–8 of 8 results for author: Khan, S R

.
  1. arXiv:2206.06925  [pdf

    cs.CR

    Towards a secured smart IoT using light weight blockchain: An aim to secure Pharmacy Products

    Authors: Md. Faruk Abdullah Al Sohan, Samiur Rahman Khan, Nusrat Jahan Anannya, Md Taimur Ahad

    Abstract: Blockchain has proven a very developed and secured technology. It ensures data integrity with authentic connected nodes. Now-a-days, blockchain with IoT is a great combination for secured and smart end to end product delivery. This observation has motivated the research to develop a conceptual model to provide a secure pharmaceutical product delivery by develo** a IoT integrated with lightweight… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: 9 pages 3 figures

  2. Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support

    Authors: Asad Ali, Samin Rahman Khan, Sadman Sakib, Md. Shohrab Hossain, Ying-Dar Lin

    Abstract: Multi-Access or Mobile Edge Computing (MEC) is being deployed by 4G/5G operators to provide computational services at lower latencies. Federating MECs across operators expands capability, capacity, and coverage but gives rise to two issues - third-party authentication and application mobility - for continuous service during roaming without re-authentication. In this work, we propose a Federated St… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 14 pages. 8 figures. Submitted to IEEE Access

  3. arXiv:1612.08359  [pdf, other

    cs.CV

    Extracting Sub-Exposure Images from a Single Capture Through Fourier-based Optical Modulation

    Authors: Shah Rez Khan, Martin Feldman, Bahadir K. Gunturk

    Abstract: Through pixel-wise optical coding of images during exposure time, it is possible to extract sub-exposure images from a single capture. Such a capability can be used for different purposes, including high-speed imaging, high-dynamic-range imaging and compressed sensing. In this paper, we demonstrate a sub-exposure image extraction method, where the exposure coding pattern is inspired from frequency… ▽ More

    Submitted 13 February, 2018; v1 submitted 26 December, 2016; originally announced December 2016.

  4. Android based security and home automation system

    Authors: Sadeque Reza Khan, Farzana Sultana Dristy

    Abstract: The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also… ▽ More

    Submitted 28 March, 2015; originally announced April 2015.

    Comments: 10 pages,17 figures, Journal, International Journal of Ambient Systems and Applications, Volume 3, 2015

  5. The performance evaluation of IEEE 802.16 physical layer in the basis of bit error rate considering reference channel models

    Authors: Arifa Ferdousi, Farhana Enam, Sadeque Reza Khan

    Abstract: Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its ro… ▽ More

    Submitted 25 December, 2013; originally announced December 2013.

    Comments: International Journal on Cybernetics & Informatics (IJCI) Vol.2, No.4, August 2013

  6. Hardware and logic implementation of multiple alarm system for GSM BTS rooms

    Authors: Arifa Ferdousi, Sadeque Reza Khan

    Abstract: Cellular communication becomes the major mode of communication in present century. With the development of this phase of communication the globalization process is also in its peak of speed. The development of cellular communication is largely depending on the improvement and stability of Base Transceiver Station (BTS) room. So for the purpose of the development of cellular communication a large n… ▽ More

    Submitted 25 December, 2013; originally announced December 2013.

    Journal ref: International Journal of Information Technology, Modeling and Computing(ijitmc) vol.1(4) (2013) 51-58

  7. Development of Low Cost Private Office Access Control System (OACS)

    Authors: Sadeque Reza Khan

    Abstract: Over the years, access control systems have become more and more sophisticated and several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints, t… ▽ More

    Submitted 20 December, 2012; originally announced December 2012.

    Comments: ISSN: 1839-5171

    Journal ref: IJESA, Volume 02, Number 02, page 01-07, 2012

  8. arXiv:1212.4913  [pdf

    cs.OH

    Voltage Temperature Monitoring System (VTMS) for a BTS Room

    Authors: Sadeque Reza Khan, Siddique Reza Khan, Arifa Ferdousi

    Abstract: Although Cellular communication is getting more and more popular in our country present days, but its network improvement is hampered by the crysis of electricity. The recent decision of present Government is that they will not provide any electricity from the grid to any new BTS rooms of any Celluler operator companies like Grammen Phone, Robi, Airtel etc. These companies have to develop their ow… ▽ More

    Submitted 19 December, 2012; originally announced December 2012.

    Journal ref: International Journal of Instrumentation and Control Systems (IJICS), Volume: 02, Number:04, page: 01-10, ISSN: 2249 - 1147, year:2012