Anik Islam Abhi

Anik Islam Abhi
Kumoh National Institute of Technology · Department of IT Convergence Engineering

Ph.D.
Currently, I am working on federated AI-assisted blockchain networks for the Internet of Drone Things.

About

58
Publications
65,618
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
560
Citations
Citations since 2016
58 Research Items
560 Citations
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
Introduction
Hello! I’m Anik Islam. I received my Ph.D. degree in IT Convergence Engineering from Kumoh National Institute of Technology. I have completed my graduation in Software engineering and completed post-graduation in computer science at American International University-Bangladesh (AIUB). I have been awarded “Summa Cum Laude” for maintaining a good CGPA in my post-graduation. You can find more in https://www.anikislamabhi.com/
Additional affiliations
August 2017 - present
Wireless and Emerging Network System Laboratory (WENS Lab.)
Position
  • Research Assistant
August 2017 - August 2021
Kumoh National Institute of Technology
Position
  • PhD Student
Education
August 2017 - February 2021
Kumoh National Institute of Technology
Field of study
  • IT Convergence Engineering
January 2016 - February 2017
American International University-Bangladesh
Field of study
  • Computer Science
January 2010 - February 2014
American International University-Bangladesh
Field of study
  • Software Engineering

Publications

Publications (58)
Article
Full-text available
This paper presents a blockchain enabled secure data acquisition scheme utilizing an Unmanned Aerial Vehicle (UAV) swarm where data are collected from internet of things (IoT) devices and subsequently, forwarded to the nearest server through the UAV swarm. Before initiating data acquisition, the UAV swarm shares a shared key with IoT devices in ord...
Article
Internet of things (IoT), mobile edge computing (MEC), and unmanned aerial vehicle (UAV) have attracted significant attention in both industry and academic research. By consolidating these technologies, IoT can be facilitated with improved connectivity, better data transmission, energy saving, and other advantages. However, the communication betwee...
Article
This paper introduces a blockchain-based secure healthcare scheme in which health data (HD) are collected from users via an unmanned aerial vehicle (UAV) and stored on the nearest server. In the proposed scheme, a UAV first establishes a relation with body sensor hives (BSHs) via a token and then shares a shared key with BSHs to enable low-power se...
Article
Full-text available
Contagious disease pandemics present a significant threat worldwide in terms of both human health and economic damage. New diseases emerge annually and place enormous burdens on many countries. Additionally, using humans to handle pandemic situations increases the chances of disease spreading. Therefore, various technologies that do not directly in...
Article
This letter presents a federated learning-based data-accumulation scheme that combines drones and blockchain for remote regions where Internet of Things devices face network scarcity and potential cyber threats. The scheme contains a two-phase authentication mechanism in which requests are first validated using a cuckoo filter, followed by a timest...
Conference Paper
New diseases (e.g., monkeypox) are showing up and taking the form of a pandemic within a short time. Early detection can assist in reducing the spread. However, because of privacy-sensitive data, users do not share it continually. Thus, it becomes challenging to employ modern technologies (e.g., deep learning). Moreover, cyber threats encircle both...
Article
In this paper, an automated real-time traffic management scheme is proposed by using unmanned aerial vehicles (UAV) in an effective and secured way. However, owing to the low computational capability and limited battery capacity of a UAV, multi-access edge computing (MEC) is applied to enhance the performance of an automated UAV-based traffic manag...
Conference Paper
In the modern era, the internet of vehicles (IoV) is being utilized in commercial applications and extensively explored in research. However, internal fault in IoV can cause accidents on the road. Moreover, privacy concerns can hamper the internal data sharing to build a model to detect the anomaly. Federated learning (FL) and blockchain are emergi...
Article
This paper presents a deep learning (DL) model integrated automated and secure garbage management scheme using unmanned any vehicle (UxV) to minimize the human effort in terms of the traditional garbage management system. Different kinds of UxV (unmanned aerial vehicles, automated guided vehicles, unmanned surface vehicles, unmanned underwater vehi...
Conference Paper
The modern era is filled with smart entities (e.g., smart vehicles) that have both sense and actuate capabilities. These entities can collect lots of data during their functional period and these data can be utilized for the wellbeing of citizens. However, these data are very sensitive raising issues like privacy. Moreover, network scarcity, bandwi...
Conference Paper
Natural disasters visited countries every year more or less and left devastating situations behind, which affect both the economy and health. However, instantaneous actions can lessen casualties in the affected areas. Unmanned any vehicle (UxV) is a concept where unmanned vehicles come together and perform missions cooperatively. UxV can assist in...
Conference Paper
Pandemics are very burdensome for every country in terms of health and economy. Technology is needed to come forward to lessen the burden. As finding cure instantly is not always possible, prevention method can be adopted to reduce the damages. Among the methods, home quarantine (HQ) can be beneficial. However, maintaining HQ is very difficult, esp...
Chapter
Full-text available
With the advancement of technology (i.e., devices), which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising o...
Conference Paper
Internet of Things (IoT) established the foundation of the smart world via its diverse functionalities (e.g., remote data acquisition, automated task execution). This trend continues to military applications too by introducing internet of military things (IoMT). Due to being at infancy level, new technologies require to move forward and assist IoMT...
Conference Paper
As the unmanned aerial vehicle (UAV) can play a vital role to collect information remotely in a military battlefield, researchers have shown great interest to reveal the domain of internet of battlefield Things (IoBT). In a rescue mission on a battlefield, UAV can collect data from different regions to identify the casualty of a soldier. One of the...
Article
Full-text available
One of the biggest challenge in the world right now is to control the emission of carbon-dioxide (CO2) gas to reduce the greenhouse effect. Vehicles that are used in the transport sector are responsible to increase the level of CO2 in the atmosphere. Restriction can be applied for private vehicle users to limit the usage of CO2 gas in the society....
Conference Paper
Bicycle is very popular in all over the world. Thus, the use of a bicycle is also increasing day by day. However, while moving to different places, they have to abandon their bicycle as taking a bicycle with them is not always possible. Therefore, they abandon their bicycle. Due to not having any recycle platform, bicycle stays there and after a ce...
Conference Paper
The COVID-19 pandemic has introduced an unprecedented impact on global healthcare, economics, and general human well-being, industries, educations. Handling various tasks is become very challenging due to social distancing and limited traveling possibilities. Mixed reality (MR) technology can be helpful during this COVID-19 situations. MR can give...
Conference Paper
Unregistered vehicle identification is one challenging issue to solve in the perspective of a smart city as it is responsible for different consequences like a traffic accident, vehicle hijacking, illegal drug transfer etc. A surveillance camera can try to capture the video and transfer it to the mobile edge computing (MEC) server for identificatio...
Chapter
To stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax, etc. and sometimes they buy news from the agencies. However, the existing...
Chapter
Full-text available
Voting is a very important issue that can be beneficial in terms of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounded by ballot forgery, coercion, and multiple voting issues. Moreover, while giving votes, a pers...
Presentation
. Voting is a very important issue that can be beneficial in terms of choosing the right leader in an election. A good leader can bring prosperity to a country and al-so can lead the country in the right direction every time. However, elections are surrounded by ballot forgery, coercion, and multiple voting issues. Moreover, while giving votes, a p...
Conference Paper
Full-text available
Controlling greenhouse effect especially reducing carbon-di-oxide (CO2) gas emission rate is one of the biggest difficulties of the 21st Century. This paper comprehensively described the issues regarding the greenhouse effect and possible controlling mechanism of the Green House Effect to save the world. As excessive CO2 gas emission in the atmosph...
Conference Paper
Unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs) has recently attracted a lot of attention in the research field with its diverse functionality. UAV and UGV can enhance efficiency in search and rescue (SAR) missions by operating side by side. However, communication between UAV and UGV, UAV and ground control system (GCS), and UGV...
Conference Paper
Natural disasters are increasing day by day as the climate crisis becomes more serious. In a disastrous situation, search and rescue missions are very risky, time-consuming, and resource constraints. A hybrid drone-assisted mixed reality-based system (termed as "MR-Drone") is proposed for conducting search and rescue operations very quickly and eff...
Conference Paper
This paper proposes a firmware update system using blockchain technology and drones to solve the firmware security problem caused by the development of IoT technology. The proposed system can reduce the network load caused by the firmware update of a large number of devices by preventing the forgery of the firmware using the blockchain and updating...
Conference Paper
Trespassing in the marine area is a very critical issue. As a result, countries are losing revenue as well as it's a threat against the sovereignty of the country. As sea area is large, it's not always possible to monitor every part in real-time. Unmanned aerial vehicle (UAV) is a promising technology that can assist to alleviate this issue. Howeve...
Preprint
With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such...
Preprint
Full-text available
Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a pers...
Article
Full-text available
In this study, we present a new scheme for smart education utilizing the concept of a blockchain for question sharing. A two-phase encryption technique for encrypting question papers (QSPs) is proposed. In the first phase, QSPs are encrypted using a timestamp, and in the second phase, previously encrypted QSPs are encrypted again using a timestamp,...
Patent
The weapons and ammunition management system using the blockchain according to an embodiment of the present invention performs user authentication using the user's biometric information and grants the weapons or ammunition in connection with a blockchain server connected to the blockchain network. Register the weapons or ammunition with the identif...
Conference Paper
Mixed Reality (MR) applications are becoming very popular in different sectors such as communication, education and entertainment for its extensive application areas and also for the wide adoption of mobile and especially wearable devices. Due to weak computational efficiency and short battery life of these devices, MR applications performance can...
Conference Paper
Unmanned aerial vehicle (UAV) is an emerging technology that becomes popular not only in military operation but also in civil applications. Internet of things (IoT) is another popular technology which brings automation in our daily life. Like other areas, IoT also exposes its potential in healthcare. Using IoT sensors, it becomes easy to monitor th...
Conference Paper
For decades, farming has been connected with the production of essential food crops. However, automation in farming is very critical. Moreover, the current automation process surrounds with data integrity, reliability, availability, and cyber threats. Blockchain is a data structure in which data are shared among peers. Blockchain holds properties l...
Conference Paper
Parking is a big issue in cities. A smart parking scheme can lessen the traffic congestion and hassle for locating a free parking space. Internet of Things (IoT), unmanned aerial vehicle (UAV), and mobile edge computing (MEC) are emerging technologies that can provide great benefits in terms of managing parking space. However, communication in thes...
Conference Paper
There are many applications for outdoor navigation but still less application for indoor navigation are available. In complex unknown indoor environments such as public buildings, railway stations, airports, hospitals, is difficult and time consuming to find the destination. In this paper, we design a mixed reality based indoor navigation system to...
Conference Paper
Deep Learning algorithms are often used as black box type learning and they are too complex to understand. The widespread usability of Deep Learning algorithms to solve various machine learning problems demands deep and transparent understanding of the internal representation as well as decision making. Moreover, the learning models, trained on seq...
Article
Full-text available
To meet with both the energy and spectral efficiency, cooperative non-orthogonal multiple access (NOMA) (termed as CNOMA) and simultaneous wireless information and power transfer (SWIPT) are integrated in this paper. Two different protocols such as CNOMA-SWIPT-PS and CNOMA-SWIPT-TS are proposed, by employing power-splitting (PS) and time-switching...
Preprint
In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax etc. and sometimes they buy news from the agencies. However, the e...
Conference Paper
In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax etc. and sometimes they buy news from the agencies. However, the e...
Conference Paper
Full-text available
Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a pers...
Conference Paper
With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such...
Conference Paper
Unmanned aerial vehicle (UAV) has been regarded as one of promising research field because of its capability of performing critical operations. Mobile Edge Computing (MEC) is an emerging technology where the cloud has brought to the base station and utilizes radio access network in order to meetup network challenges. UAV combined MEC can perform re...
Conference Paper
It is a big challenge for blind people to explore daily essential things. This paper comprehensively illustrates the implementation and design of a wearable, deep learning based object detection approach for helping visual impair and blind people. The aim of this paper is to assist people who face challenges to see the world using technical sensors...
Preprint
Full-text available
Existing education systems are facing a threat of question paper leaking (QPL) in the exam which jeopardizes the quality of education. Therefore, it is high time to think about a more secure and flexible question sharing system which can prevent QPL issue in the future education system. Blockchain enables a way of creating and storing transactions,...
Patent
The present invention relates to a method of transmitting data in a wireless communication system using blockchain, the method comprising the steps of: registering each user terminal in a base station; and, when data transmission is requested from a first user terminal and a second user terminal, 1) encrypting data to be transmitted in an asymmetri...
Conference Paper
According to the International Association of Public Transport (UITP), the current high speed of urbanization will equally bring rise in the challenges related to urban mobility in future. Thus, updating real-time traffic and road information is quite essential for limiting road accidents, enhance public and traffic safety. Most of the past researc...
Conference Paper
Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is considered as one of the most potent multiple access techniques to be adopted in future wireless communication networks. Data security in the NOMA transmission scheme is on much attention drawing issue. Blockchain is a distributed peer-to-peer network enable...
Article
Non-orthogonal multiple access (NOMA) is thought of as a challenging technique for providing the data rate and spectral efficiency requirement in the era of future wireless communication. This article studies the performance of a NOMA adopted two-cell downlink communication scenario where adjacent cells interfere into each other' s data transmissio...
Conference Paper
Blockchain is a decentralized digital ledger of transactions which is managed by a network of untrusted nodes. Different properties of blockchain have drawn researchers’ attention in order to think about the solution in a different way. However, like other areas, researchers from networking areas have also adopted blockchain as a new promise for so...
Conference Paper
본 논문은 저해상도 입력을 사용하는 모바일용 한글 필기인식 시스템을 소개한다. 사용된 입력의 해상도는 가로, 세로 각 10 pixel의 크기를 가지며, 각 pixel은 1bit의 정보를 가진다. 사용자가 입력 기기에 한글 문자를 그리면, Mobile processor가 Convolutional Neural Nets를 사용한 알고리즘을 이용하여 문자를 인식하여 QWERTY키보드와 동일한 알고리즘을 사용하는 출력을 내게 된다.
Patent
The present invention relates to a method of preventing leakage of a test strip based on blockchain, and more particularly, to a test strip leakage preventing method based on a blockchain for generating and decoding an encrypted test strip.
Conference Paper
Internet of Things (IoT) recently has the rising of both enormous numbers and types of connected devices in a better connectivity towards the next wireless communication network (5G) that is bringing advantages to producing data efficiently, business and living standard. In this paper, we illustrate the integration of IoT devices and Social Network...
Conference Paper
Internet of Things (IoT) imparts not only comfort to our life but also exposes new research areas like Social Internet of Things which can assist to manage things more efficiently. Another concept, Blockchain, is imparting in every research area because of its technology. In this context, the contribution of this paper follows: 1) we depict popular...
Article
Full-text available
Caching is a very important issue in distributed web system in order to reduce access latency and server load. A request is a hit if it is available in the cache and if not then it will fetch from the server in order to cache and serve the request. Researches have shown that generic algorithms of caching can increase hit rate up to 40−50%, but addi...
Article
Full-text available
Domestic violence is a silent crisis in the developing and underdeveloped countries, though developed countries also remain drowned in the curse of it. In developed countries, victims can easily report and ask help on the contrary in developing and underdeveloped countries victims hardly report the crimes and when it's noticed by the authority it's...

Questions

Questions (21)
Question
Monkeypox Virus is recently spreading very fast, which is very alarming. Awareness can assist people in reducing the panic that is caused all over the world.
To do that, Is there any image dataset for monkeypox?
Question
I was trying to get an insight into quantum computing (QC) for a research purpose. However, every source was filled with lots of technical terms with less explanation. It becomes very difficult for us those who want to learn QC with no knowledge before.
Is there any source where beginners can learn QC with zero background knowledge?
Thanks in advance.
Question
I was exploring differential privacy (DP) which is an excellent technique to preserve the privacy of the data. However, I am wondering what will be the performance metrics to prove this between schemes with DP and schemes without DP.
Are there any performance metrics in which a comparison can be made between scheme with DP and scheme without DP?
Thanks in advance.

Network

Cited By

Projects

Projects (4)
Project
The goal of this project is to provide solutions for the autonomous movement of Unmanned Ariel Vehicles (UAVs) to search for targets.