-
A Systematic Literature Review of Blockchain Technology Adoption in Bangladesh
Authors:
Abdullah Al Hussain,
Md. Akhtaruzzaman Emon,
Toufiq Ahmed Tanna,
Rasel Iqbal Emon,
Md. Mehedi Hassan Onik
Abstract:
The spirit of "blockchain technology" is a distributed database in which saved data is transparent, accountable, public, immutable, and traceable. This base-level disruptive technology can boost the security and privacy-related efficiency of various domains. As Bangladesh is currently aiming for sustainable development, blockchain technology adoption by local researchers is growing robustly. Howev…
▽ More
The spirit of "blockchain technology" is a distributed database in which saved data is transparent, accountable, public, immutable, and traceable. This base-level disruptive technology can boost the security and privacy-related efficiency of various domains. As Bangladesh is currently aiming for sustainable development, blockchain technology adoption by local researchers is growing robustly. However, in Bangladesh, the blockchain Technology Acceptance Model (TAM) is not yet well structured which is also limiting the perspective of local developers and researchers. Therefore, sectors like governance, healthcare, security, privacy, farming, information authentication, cryptocurrencies, internet architecture, data, and so on are unable to utilize the full potential of this technology. In this research, the authors conduct an in-depth review of such types of blockchain technology-related research articles that have been published recently and are also solely focused on Bangladesh. From 5 publishers (IEEE Xplore, ACM, ScienceDirect, Taylor & Francis, and SpringerLink) this study analyses 70 articles published during the year 2016-2020. The study results find the top 13 sectors where Bangladeshi researchers are currently focusing on. Those studies identify that the rigid policy by the government, scarcity of expert researchers, and lack of resources are the main reasons why Bangladesh is still struggling to accommodate blockchain extensively. In addition, published papers are mostly based on theoretical concepts without an appropriate implementation. Finally, this study will be a great resource to the developers, entrepreneurs, and technology enthusiasts to determine the strategic plan for adopting blockchain technology in Bangladesh or even in any other develo** country.
△ Less
Submitted 15 January, 2022;
originally announced January 2022.
-
Performance Analytical Comparison of Blockchain-as-a-Service (BaaS) Platforms
Authors:
Md Mehedi Hassan Onik,
Mahdi H. Miraz
Abstract:
Both blockchain technologies and cloud computing are contemporary emerging technologies. While the application of Blockchain technologies is being spread beyond cryptocurrency, cloud computing is also seeing a paradigm shift to meet the needs of the 4th industrial revolution (Industry 4.0). New technological ad-vancement, especially by the fusion of these two, such as Blockchain-as-a-Service (BaaS…
▽ More
Both blockchain technologies and cloud computing are contemporary emerging technologies. While the application of Blockchain technologies is being spread beyond cryptocurrency, cloud computing is also seeing a paradigm shift to meet the needs of the 4th industrial revolution (Industry 4.0). New technological ad-vancement, especially by the fusion of these two, such as Blockchain-as-a-Service (BaaS), is considered to be able to significantly generate values to the en-terprises. This article surveys the current status of BaaS in terms of technological development, applications, market potentials and so forth. An evaluative judge-ment, comparing amongst various BaaS platforms, has been presented, along with the trajectory of adoption, challenges and risk factors. Finally, the study suggests standardisation of available BaaS platforms.
△ Less
Submitted 1 September, 2019;
originally announced September 2019.
-
Communication Interface Identifier Protocol (CIIP): An Energy Efficient Protocol for smaller IoT Sensor
Authors:
Nasr Al-Zaben,
Md Mehedi Hassan Onik,
Chul-Soo Kim,
**hong Yang
Abstract:
Today we can use technologies like switched Ethernet, TCP/IP, high-speed wide area networks, and high-performance low-cost computers very easily. However, protocols designed for those communication are inefficient or not energy efficient. Smart home, smart grid, blockchain, Internet of Things (IoT) all these technologies are coming very rapidly with higher communication facilities demands an energ…
▽ More
Today we can use technologies like switched Ethernet, TCP/IP, high-speed wide area networks, and high-performance low-cost computers very easily. However, protocols designed for those communication are inefficient or not energy efficient. Smart home, smart grid, blockchain, Internet of Things (IoT) all these technologies are coming very rapidly with higher communication facilities demands an energy efficient Ethernet. Due to controller and network equipment use a huge quantity of energy. Layer to layer communication making our communication method more complex and costly. In this work, we propose an architecture, which will make the communication of sensor devices to outside world easier. Our proposed system removes certain layer from TCP-IP communication. We used a communication interface identifier protocol (CIIP) which can be used for smaller IoT sensors.
△ Less
Submitted 18 January, 2019;
originally announced February 2019.
-
A Recruitment and Human Resource Management Technique Using Blockchain Technology for Industry 4.0
Authors:
Md Mehedi Hassan Onik,
Mahdi H. Miraz,
Chul-Soo Kim
Abstract:
Application of Information Technology (IT) in the domain of Human Resource Management (HRM) systems is a sine qua non for any organization for successfully adopting and implementing Fourth Industrial Revolution (Industry 4.0). However, these systems are required to ensure non-biased, efficient, transparent and secure environment. Blockchain, a technology based on distributed digital ledgers, can h…
▽ More
Application of Information Technology (IT) in the domain of Human Resource Management (HRM) systems is a sine qua non for any organization for successfully adopting and implementing Fourth Industrial Revolution (Industry 4.0). However, these systems are required to ensure non-biased, efficient, transparent and secure environment. Blockchain, a technology based on distributed digital ledgers, can help facilitate the process of successfully effectuating these specifications. A detailed literature review has been conducted to identify the current status of usage of Information Technology in the domain of Human Resource Management and how Blockchain can help achieve a smart, cost-effective, efficient, transparent and secure factory management system. A Blockchain based Recruitment Management System (BcRMS) as well as Blockchain based Human Resource Management System (BcHRMS) algorithm have been proposed. From the analysis of the results obtained through the case study, it is evident that the proposed system holds definite advantages compared to the existing recruitment systems. Future research directions have also been identified and advocated.
△ Less
Submitted 7 December, 2018;
originally announced December 2018.
-
Prediction of a Gene Regulatory Network from Gene Expression Profiles With Linear Regression and Pearson Correlation Coefficient
Authors:
Md Mehedi Hassan Onik,
Shakhawat Ahmmed Nobin,
Adnan Ferdous Ashrafi,
Tareque Mohmud Chowdhury
Abstract:
Reconstruction of gene regulatory networks is the process of identifying gene dependency from gene expression profile through some computation techniques. In our human body, though all cells pose similar genetic material but the activation state may vary. This variation in the activation of genes helps researchers to understand more about the function of the cells. Researchers get insight about di…
▽ More
Reconstruction of gene regulatory networks is the process of identifying gene dependency from gene expression profile through some computation techniques. In our human body, though all cells pose similar genetic material but the activation state may vary. This variation in the activation of genes helps researchers to understand more about the function of the cells. Researchers get insight about diseases like mental illness, infectious disease, cancer disease and heart disease from microarray technology, etc. In this study, a cancer-specific gene regulatory network has been constructed using a simple and novel machine learning approach. In First Step, linear regression algorithm provided us the significant genes those expressed themselves differently. Next, regulatory relationships between the identified genes has been computed using Pearson correlation coefficient. Finally, the obtained results have been validated with the available databases and literatures. We can identify the hub genes and can be targeted for the cancer diagnosis.
△ Less
Submitted 1 May, 2018;
originally announced May 2018.
-
A Novel Approach for Network Attack Classification Based on Sequential Questions
Authors:
Md Mehedi Hassan Onik,
Nasr Al-Zaben,
Hung Phan Hoo,
Chul-Soo Kim
Abstract:
With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards distributed hardware and software. Lack of standard network attack taxonomy has become an indispensable dispute on develo** a clear understanding about the attacks in order to h…
▽ More
With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards distributed hardware and software. Lack of standard network attack taxonomy has become an indispensable dispute on develo** a clear understanding about the attacks in order to have an operative protection mechanism. Present attack categorization techniques protect a specific group of threat which has either messed the entire taxonomy structure or ambiguous when one network attacks get blended with few others attacks. Hence, this raises concerns about develo** a common and general purpose taxonomy. In this study, a sequential question-answer based model of categorization is proposed. In this article, an intrusion detection framework and threat grou** schema are proposed on the basis of four sequential questions (Who, Where, How and What). We have used our method for classifying traditional network attacks in order to identify initiator, source, attack style and seriousness of an attack. Another focus of the paper is to provide a preventive list of actions for network administrator as a guideline to reduce overall attack consequence. Recommended taxonomy is designed to detect common attacks rather than any particular type of attack which can have a practical effect in real life attack classification. From the analysis of the classifications obtained from few infamous attacks, it is obvious that the proposed system holds certain benefits related to the prevailing taxonomies. Future research directions have also been well acknowledged.
△ Less
Submitted 1 April, 2018;
originally announced April 2018.