Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hussain Mohammed Dipu Kabir is active.

Publication


Featured researches published by Hussain Mohammed Dipu Kabir.


ieee international conference on information theory and information security | 2010

Hardware based realtime, fast and highly secured speech communication using FPGA

Hussain Mohammed Dipu Kabir; Syed Bahauddin Alam

This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water- marking. Watermark provides authentication and ownership verification. Encryption is used for security of watermark and voice signal. As random numbers are used as a key for the encryption process, the signal is secured for both wired and wireless media. FPGA is an efficient device for encryption. Conventional processors contain small number of registers and perform large operations in multiple cycles. FPGA can perform a large number of operations at a time. All the steps described in the algorithm is verified in Matlab and implemented in FPGA. Security level is also analyzed in this paper.


ieee international conference on information theory and information security | 2010

A secured electronic transaction scheme for mobile banking in Bangladesh incorporating digital watermarking

Syed Bahauddin Alam; Hussain Mohammed Dipu Kabir; Md. Nazmus Sakib; A B M Rafi Sazzad; Celia Shahnaz; Shaikh Anowarul Fattah

Nowadays internet-based banking is getting popularity because of its several advantages, such as ease of operation and virtual monetary activities, i.e., clients physical presence at different bank locations is no more required. However, because of scarcity of accessibility at different locations, cost, and slow speed, number of people using internet communication is a small percentage of the mobile phone users, especially in the developing countries. Moreover, security in internet-based banking is still a major concern. Most of the financial institutions have their own domain and offer web-based transaction facilities. In this paper, we propose a scheme to utilize the internet based existing banking facility via short message service (SMS) available in mobile phone technology without having the internet connection. In view of ensuring a high level of security, we introduce two-level security scheme: voice verification and digital watermarking.


ieee international conference on power and energy | 2010

Nuclear waste transmutation by decay energetics, compton imaging, Bremsstrahlung and nuclei dynamics

Syed Bahauddin Alam; Hussain Mohammed Dipu Kabir; Md. Rishad Ahmed; A B M Rafi Sazzad; Celia Shahnaz; Shaikh Anowarul Fattah

Of all the panoramas of nuclear power in the world, none is so disputatious or as pivotal as the issue of nuclear waste and its management. While there is no contiguous reason for alarm, an immense amount of amelioration is needed if the worlds custody of its radioactive waste is to become a programmed and prosecuted success. Disposal of waste can highly jeopardize the atmosphere and environment. Already waste disposal in ocean is proscribed by the governments of developed countries. As energy sources are going to be diminished, our future prognoses certainly run towards nuclear power as it is already weighed as a safe and clean alternative energy. As, tralatitious waste disposal system is hazardous, rumination about nuclear waste management, treatment and processing via adopting different physical and chemical technologies is of grave importance. Virility of nuclear waste needs to be controlled and mitigated for safe industrial purposes and fuel consumptions. In this paper, overhauled radioactive waste treatment processes as well as assured data transmission from nuclear power plant to National Load Dispatch Center (NLDC) using digital watermarking is proposed as this type of penetrable data transmission is an affair of cracking concern.


ieee international conference on power and energy | 2010

Can gen-4 nuclear power and reactor technology be safe and reliable future energy for developing countries?

Syed Bahauddin Alam; Hussain Mohammed Dipu Kabir; A B M Rafi Sazzad; Khaled Redwan; Ishtiaque Aziz; Imranul Kabir Chowdhury; Md. Abdul Matin

For the promising population, the growing demand of energy has delicate the requirement of alternative sources of energies other than fossil fuels. Though renewable energy resources like solar, biomass, hydro and geothermal energy appear as environment friendly, replenishing sources of energy, a comprehensive solution appears far-fetched as far as large scale production and wide-spread dissemination is concerned when long term cost factors are taken into consideration. The unwavering boost of population and ongoing depletion of fossil fuels and have further exacerbated the energy crisis. In this paper, discussions on the limitations of conventional and renewable sources of energy compared to advanced fourth generation nuclear power on the basis of environmental contamination, energy security, cost of fossil fuels and electricity generation and have philosophy to the prospects of nuclear power as the ultimate future energy option for the developing countries are done. Environmental issues, long term cost factors, radiation hazard and safety concerns have been considered with respect to the generation of electricity using advanced third Generation nuclear power. This study proposes that gen-4 nuclear appears to be a long term environment favorable panacea to the much discoursed problem of energy crisis by maintaining energy security and long term cost concern in developing countries as well as in the whole world.


ieee international conference on power and energy | 2010

EM shielding, dosimetry control and Xe(135)-Sm(149) Poisoning effect for nuclear waste treatment

Syed Bahauddin Alam; Hussain Mohammed Dipu Kabir; Md. Nazmus Sakib; Celia Shahnaz; Shaikh Anowarul Fattah

A crucial yard mensuration of the shape up of a state is the level to which clean, low-priced and sustainable energy resources are made available for the bulk assemblage. At present eons, equating cost factors, environmental issues, power generation with other substitute energy informants, atomic or nuclear power is turning into a popular alternative as an energy option. Though it is clean and safe alternative, nuclear waste is still a matter of great concern. In this paper, nuclear waste treatment for nuclear plant by radioactive and electromagnetic shielding via dose conversion factors, photons and neutrons response functions has been explained. Moreover, analyzing of Quality-Factor and Poisoning decay of Xenon and Samarium has been discussed. In this paper modernized radioactive waste treatment processes as well as secured data transmission from nuclear power plant to National Load Dispatch Center (NLDC) using digital watermarking is proposed as this type of vulnerable data transmission is a matter of great concern.


ieee international conference on information theory and information security | 2010

Manipulation and transparency control of ICT constituted e-administrative protocol via digital watermarking for LDC's

Syed Bahauddin Alam; A B M Rafi Sazzad; Md. Nazmus Sakib; Hussain Mohammed Dipu Kabir; Celia Shahnaz; Shaikh Anowarul Fattah

Theme of E-Governance admits agile and ameliorated citizen service from a quantitative and qualitative point of view. An efficacious e-Governance system ascertains completion of administrative tasks in a nimble way reducing bureaucracy through a transparent protocol being robust against corruption. With the increased utilization and adaptation of the information and communication technologies (ICT), especially through the overhauls of the Internet, the idea of e-governance becomes easy to implement and lucrative for both the administrators and mass population. In this paper, a four dimensional e-governance approach for any administrative entity is proposed. This protocol provides a better control for decision makers over their employees as well as defends employees against over dominance and victimization from high officials. Proper sharing of work and organizational hierarchy is also ensured for the Least Developed Countries (LDCs) using their existing infrastructure in the proposed scheme. Most importantly security and integrity of emergency data are enhanced using digital watermarking based on DCT coefficients replacement method.


european symposium on computer modeling and simulation | 2010

A Theory of Loss-less Compression of High Quality Speech Signals with Comparison

Hussain Mohammed Dipu Kabir; Syed Bahauddin Alam; Md. Isme Azam; Rishad Ahmed; Md. Riazul Islam; M. Asif Ul Hoque; Md. Abdul Matin

The field of speech compression has advanced rapidly due to cost-effective digital technology and diverse commercial applications. In voice communication a real-time system should be considered. It is not still possible to compress signals without facing any loss in real-time system. This paper presents a theory of loss-less digital compression for saving high quality speech signals. Emphasis is given on the quality of speech signal. In hearing music high quality music is always needed, consuming smaller memory space. In this compression 8-bit PCM/PCM speech signal is compressed. When values of samples are varying they are kept same. When they are not varying the number of samples containing same value is saved. After compression the signal is also an 8-bit PCM/PCM but expansion is needed before hearing it. This technique may also be used in real-time systems.


european symposium on computer modeling and simulation | 2010

Non-linear Down-sampling and Signal Reconstruction, without Folding

Hussain Mohammed Dipu Kabir; Syed Bahauddin Alam; Md. Isme Azam; Mohammad Arafat Hussain; A B M Rafi Sazzad; Md. Nazmus Sakib; Md. Abdul Matin

This paper presents a theory of 1.5 factor nonlinear down-sampling, reconstruction and noise elimination. For linear down sampling of two or three factor, one sample is taken and next one or two samples are not taken/discarded. Here in non-linear down sampling two or three samples are taken and the next one is not taken. The purpose of this nonlinear down sampling is to send less data samples in voice communication. Though one sample is discarded after taking two samples value of this sample can be reconstructed from values of other samples. Here, two samples are at original sampling period, Ts interval and next two samples are at 2Ts interval. High-frequency sharp changes were extracted when sampled at Ts interval. From received signal, discarded sample can be reconstructed from nearby four samples (Previous two and next two). When original signal contains higher frequency some error signal is introduced, after reconstruction. This error signal depends on original signal. Error signal is eliminated using original signal. Down-sampling is performed after sampling and signal reconstruction is performed just before hearing the sound.


ieee international conference on information theory and information security | 2010

Watermarking with fast and highly secured encryption for real-time speech signals

Hussain Mohammed Dipu Kabir; Saeed Anwar; Syed Bahauddin Alam; K. M. Sabidur Rahman; Md. Abdul Matin; Imranul Kabir Chowdhury

This paper presents a watermarking technique with fast encryption and compression. Recently a number of algorithms exist for watermarking and encryption. Their drawbacks are size, security and time for execution. Compression is necessary to maintain size small where bandwidth and storage capacity is limited. A loss-less compression technique is used to compress speech signal. Due to compression, vacant places are created. These vacant places are used for watermark. In the proposed encryption technique size of encrypted data is increased by only 12.5%. Execution of encryption is faster than present unbreakable algorithms. The proposed encryption is also highly secured and can be used for real-time application and saving signal. Watermark will exist even after signal cropping.


ieee international conference on information theory and information security | 2010

A loss-less compression technique for high quality speech signals and its implementation with MPEG-4 ALS for better compression

Hussain Mohammed Dipu Kabir; Syed Bahauddin Alam; Md. Abdul Matin; Imranul Kabir Chowdhury

This paper presents a theory of loss-less digital compression. Quality of voice signal is not important for voice communication. In hearing music high quality music is always recommended. For this emphasis is given on the quality of speech signal. To save more music it is needed to save them consuming smaller memory space. In proposed compression 8-bit PCM/PCM speech signal is compressed. When values of samples are varying they are kept same. When they are not varying the number of samples containing same value is saved. After compression the signal is also an 8-bit PCM/PCM. MPEG-4 ALS is applied in this compressed PCM signal for better compression.

Collaboration


Dive into the Hussain Mohammed Dipu Kabir's collaboration.

Top Co-Authors

Avatar

Syed Bahauddin Alam

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Md. Abdul Matin

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

A B M Rafi Sazzad

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Md. Nazmus Sakib

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Celia Shahnaz

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Shaikh Anowarul Fattah

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Imranul Kabir Chowdhury

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Khaled Redwan

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Md. Isme Azam

Bangladesh University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Md. Rishad Ahmed

Bangladesh University of Engineering and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge