Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where S. M. Kamruzzaman is active.

Publication


Featured researches published by S. M. Kamruzzaman.


international conference on communications | 2011

Spectrum and Energy Aware Routing Protocol for Cognitive Radio Ad Hoc Networks

S. M. Kamruzzaman; Eunhee Kim; Dong Geun Jeong

Throughput maximization is one of the core challenges in cognitive radio ad hoc networks (CRANs), where local spectrum resources are changing over time and locations. This paper proposes a spectrum and energy aware routing (SER) protocol for CRANs, which involves spectrum aware, and energy-efficient route selection, and channel-timeslot assignment. A good routing protocol should be aware of the interference as well as the end-to-end delay. The proposed joint spectrum and energy aware routing with channel-timeslot assignment can balance the energy consumption, eliminates contention between users, and decompose contending traffics over different channels and timeslots. As a result, the proposed scheme leads to significant increases in network throughput and decreases the end-to-end delay. The simulation results show the effectiveness of our proposed approach with good generalization ability.


Iet Communications | 2012

Energy-aware routing protocol for cognitive radio ad hoc networks

S. M. Kamruzzaman; Eunhee Kim; Dong Geun Jeong; Wha Sook Jeon

Routing is one of the most important issues in multihop ad hoc networks. In the routing for mobile cognitive radio (CR) networks, the constraints on residual energy of each user and the requirements for primary user protection should be additionally taken into account. This study proposes a spectrum and energy-aware routing (SER) protocol for CR ad hoc networks, which is based on the dynamic source routing. To establish routes on-demand with reserved bandwidth, the protocol involves route selection and channel-timeslot allocation jointly. The proposed SER protocol can balance energy consumption, reduce routing overhead, eliminate contention between nodes and decompose traffics over different channels/timeslots. Extensive simulation shows that the proposed protocol achieves good performance in system throughput, network lifetime and mean message delay.


Sensors | 2011

A New Data Mining Scheme Using Artificial Neural Networks

S. M. Kamruzzaman; A. M. Jehad Sarkar

Classification is one of the data mining problems receiving enormous attention in the database community. Although artificial neural networks (ANNs) have been successfully applied in a wide range of machine learning applications, they are however often regarded as black boxes, i.e., their predictions cannot be explained. To enhance the explanation of ANNs, a novel algorithm to extract symbolic rules from ANNs has been proposed in this paper. ANN methods have not been effectively utilized for data mining tasks because how the classifications were made is not explicitly stated as symbolic rules that are suitable for verification or interpretation by human experts. With the proposed approach, concise symbolic rules with high accuracy, that are easily explainable, can be extracted from the trained ANNs. Extracted rules are comparable with other methods in terms of number of rules, average number of conditions for a rule, and the accuracy. The effectiveness of the proposed approach is clearly demonstrated by the experimental results on a set of benchmark data mining classification problems.


International Journal of Computer Networks & Communications | 2010

CR-MAC: A MULTICHANNEL MAC PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS

S. M. Kamruzzaman

This paper proposes a cross-layer based cognitive radio multichannel medium access control (MAC) protocol with TDMA, which integrate the spectrum sensing at physical (PHY) layer and the packet scheduling at MAC layer, for the ad hoc wireless networks. The IEEE 802.11 standard allows for the use of multiple channels available at the PHY layer, but its MAC protocol is designed only for a single channel. A single channel MAC protocol does not work well in a multichannel environment, because of the multichannel hidden terminal problem. Our proposed protocol enables secondary users (SUs) to utilize multiple channels by switching channels dynamically, thus increasing network throughput. In our proposed protocol, each SU is equipped with only one spectrum agile transceiver, but solves the multichannel hidden terminal problem using temporal synchronization. The proposed cognitive radio MAC (CR-MAC) protocol allows SUs to identify and use the unused frequency spectrum in a way that constrains the level of interference to the primary users (PUs). Our scheme improves network throughput significantly, especially when the network is highly congested. The simulation results show that our proposed CR-MAC protocol successfully exploits multiple channels and significantly improves network performance by using the licensed spectrum band opportunistically and protects PUs from interference, even in hidden terminal situations.


computer and information technology | 2010

Dynamic TDMA slot reservation protocol for cognitive radio ad hoc networks

S. M. Kamruzzaman; Mohammad Shamsul Alam

In this paper, we propose a dynamic TDMA slot reservation (DTSR) protocol for cognitive radio ad hoc networks. Quality of Service (QoS) guarantee plays a critically important role in such networks. We consider the problem of providing QoS guarantee to users as well as to maintain the most efficient use of scarce bandwidth resources. A dynamic frame length expansion and shrinking scheme that controls the excessive increase of unassigned slots has been proposed. This method efficiently utilizes the channel bandwidth by assigning unused slots to new neighboring nodes and increasing the frame length when the number of slots in the frame is insufficient to support the neighboring nodes. It also shrinks the frame length in an effective way. Our proposed scheme, which provides both QoS guarantee and efficient resource utilization, be employed to optimize the channel spatial reuse and maximize the system throughput. Extensive simulation results show that the proposed mechanism achieves significant performance improvement in multichannel cognitive radio ad hoc networks.


Concurrency and Computation: Practice and Experience | 2015

Design of an energy-efficient and reliable data delivery mechanism for mobile ad hoc networks: a cross-layer approach

Mohammad Mehedi Hassan; S. M. Kamruzzaman; Atif Alamri; Ahmad Almogren; Abdulhameed Alelaiwi; Mohammed Abdullah Alnuem; Md. Manowarul Islam; Md. Abdur Razzaque

In a mobile ad hoc network, the data packet may fail to be delivered for various reasons mostly for route failure, congestion, and battery energy drain. Hence, providing reliable and timely data delivery in this network in an energy‐efficient way is challenging. Although there exist several solutions to solve these problems, they can handle either route failure or congestion or energy‐efficient routing. Hence, to cope up with all the problems simultaneously, we propose a route failure and congestion‐aware energy‐efficient cross‐layer design that spans the transport and network layer. In the transport layer, we introduce the concept of local packet buffering during link failure and congestion. As a result, the packet dropping rate of the network and energy consumption decreases. In the network layer, a routing protocol is proposed for selecting the energy‐efficient path for data transmission. It uses the buffering mechanism in case of route maintenance. In addition, we employ a multilevel congestion detection and control mechanism at the source and intermediate nodes that can judiciously take the most appropriate decision for congestion control in the network proactively. The simulation results showed that the proposed cross‐layer design provided better performance as compared with the state‐of‐the‐art protocols. Copyright


arXiv: Learning | 2010

Speaker Identification using MFCC-Domain Support Vector Machine

S. M. Kamruzzaman; A. N. M. Rezaul Karim; Md. Saiful Islam; Md. Emdadul Haque

Speech recognition and speaker identification are important for authentication and verification in security purpose, but they are difficult to achieve. Speaker identification methods can be divided into text-independent and text-dependent. This paper presents a technique of text-dependent speaker identification using MFCC-domain support vector machine (SVM). In this work, melfrequency cepstrum coefficients (MFCCs) and their statistical distribution properties are used as features, which will be inputs to the neural network. This work firstly used sequential minimum optimization (SMO) learning technique for SVM that improve performance over traditional techniques Chunking, Osuna. The cepstrum coefficients representing the speaker characteristics of a speech segment are computed by nonlinear filter bank analysis and discrete cosine transform. The speaker identification ability and convergence speed of the SVMs are investigated for different combinations of features. Extensive experimental results on several samples show the effectiveness of the proposed approach.


international symposium on multimedia | 2014

Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks

Sk. Md. Mizanur Rahman; S. M. Kamruzzaman; Ahmad Almogren; Abdulhameed Alelaiwi; Atif Alamri; Abdullah Sharaf Alghamdi

Cognitive radio (CR) networks are becoming an increasingly important part of the wireless networking landscape due to the ever-increasing scarcity of spectrum resources throughout the world. Nowadays CR media is becoming popular wireless communication media for disaster recovery communication network. Although the operational aspects of CR are being explored vigorously, its security aspects have gained less attention to the research community. The existing research on CR network mainly focuses on the spectrum sensing and allocation, energy efficiency, high throughput, end-to-end delay and other aspect of the network technology. But, very few focuses on the security aspect and almost none focus on the secure anonymous communication in CR networks (CRNs). In this research article we would focus on secure anonymous communication in CR ad hoc networks (CRANs). We would propose a secure anonymous routing for CRANs based on pairing based cryptography which would provide source node, destination node and the location anonymity. Furthermore, the proposed research would protect different attacks those are feasible on CRANs.


International Journal of Distributed Sensor Networks | 2014

Channel-Slot Aggregation Diversity Based Slot Reservation Scheme for Cognitive Radio Ad Hoc Networks

S. M. Kamruzzaman; Abdullah Sharaf Alghamdi; Abdulhameed Alelaiwi; Mohammad Mehedi Hassan

In cognitive radio (CR) ad hoc networks, spectrum efficiency and energy efficiency are vitally important because spectrum availability is opportunistic in nature and mobile CR nodes usually have limited energy. Aiming to improve network throughput along with improving spectrum and energy efficiencies, this paper proposes a channel-slot aggregation diversity based slot reservation (CADSR) scheme by which each CR node can utilize multiple slots in different channels simultaneously and efficiently utilize the power control mechanism with only a single CR transceiver. The proposed scheme dynamically assigns channel-slots to CR nodes using the diversity technique according to the topology density of the network and the bandwidth requirement, allowing CR nodes to join and leave the network at any time in a distributed way. A dynamic frame length expansion and shrinking scheme has also been introduced that improves the slot utilization. Extensive simulation results show that the proposed mechanism achieves significant performance improvement in network throughput, energy efficiency, and end-to-end delay.


Iete Journal of Research | 2012

ERANN: An Algorithm to Extract Symbolic Rules from Trained Artificial Neural Networks

S. M. Kamruzzaman; Md. Abdul Hamid; A. M. Jehad Sarkar

AbstractThis paper presents an algorithm to extract symbolic rules from trained artificial neural networks (ANNs), called ERANN. In many applications, it is desirable to extract knowledge from ANNs for the users to gain a better understanding of how the networks solve the problems. Although ANN usually achieves high classification accuracy, the obtained results sometimes may be incomprehensible, because the knowledge embedded within them is distributed over the activation functions and the connection weights. This problem can be solved by extracting rules from trained ANNs. To do so, a rule extraction algorithm has been proposed in this paper to extract symbolic rules from trained ANNs. A standard three-layer feedforward ANN with four-phase training is the basis of the proposed algorithm. Extensive experimental studies on a set of benchmark classification problems, including breast cancer, iris, diabetes, wine, season, golfplaying, and lenses classification, demonstrates the applicability of the proposed ...Abstract Usage of Automatic Speech Recognition (ASR) systems is increasing day-by-day for voice centric applications in mobile handheld and Voice over Internet Protocol (VoIP) devices. The necessity is also increasing to find out the ASR performance under different network impediments. Among them, speech and audio coding standards is the one, which affects the ASR performance greatly, when, using them with different sampling and bit rates in the practical systems. Another common impediment which influences the ASR accuracy is the bit errors in the wireless networks and packet drop conditions in the VoIP networks. ASR performance with some of the speech coding standards under noise conditions for the wireless networks is reported in the literature. However, each study is reporting the ASR performance for few narrowband codecs with different speech databases and different ASR toolkits like RAPHEL, HTK, SPHINX, etc. In this paper, the analysis on ASR performance while using both narrowband and wideband speech and audio coding standards, which are currently accepted for GSM mobile and VoIP networks, using the common speech database-TIMIT, and using ASR toolkit-SPHINX, is presented. The Mean Opinion Score (MOS), which is the generally accepted speech quality measurement technique, is also analyzed for all the speech and audio coding standards, using the same speech database. The results of the studies carried out for the ASR word accuracies and MOS values for different narrowband and wideband speech and audio codecs under no-loss conditions are presented. Results for different rates of packet drop condition which is the common noise scenario in wired networks such as VoIP (which is also merging with wireless networks) are also presented. The observation is that though some of the codecs are showing poor MOS performance at lower bit rates, the corresponding ASR performance is comparable with other codecs at higher bit rates.

Collaboration


Dive into the S. M. Kamruzzaman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dong Geun Jeong

Hankuk University of Foreign Studies

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eunhee Kim

Hankuk University of Foreign Studies

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge