-
Smart Sampling: Self-Attention and Bootstrapping for Improved Ensembled Q-Learning
Authors:
Muhammad Junaid Khan,
Syed Hammad Ahmed,
Gita Sukthankar
Abstract:
We present a novel method aimed at enhancing the sample efficiency of ensemble Q learning. Our proposed approach integrates multi-head self-attention into the ensembled Q networks while bootstrapping the state-action pairs ingested by the ensemble. This not only results in performance improvements over the original REDQ (Chen et al. 2021) and its variant DroQ (Hi-raoka et al. 2022), thereby enhanc…
▽ More
We present a novel method aimed at enhancing the sample efficiency of ensemble Q learning. Our proposed approach integrates multi-head self-attention into the ensembled Q networks while bootstrapping the state-action pairs ingested by the ensemble. This not only results in performance improvements over the original REDQ (Chen et al. 2021) and its variant DroQ (Hi-raoka et al. 2022), thereby enhancing Q predictions, but also effectively reduces both the average normalized bias and standard deviation of normalized bias within Q-function ensembles. Importantly, our method also performs well even in scenarios with a low update-to-data (UTD) ratio. Notably, the implementation of our proposed method is straightforward, requiring minimal modifications to the base model.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Enhanced Multimodal Content Moderation of Children's Videos using Audiovisual Fusion
Authors:
Syed Hammad Ahmed,
Muhammad Junaid Khan,
Gita Sukthankar
Abstract:
Due to the rise in video content creation targeted towards children, there is a need for robust content moderation schemes for video hosting platforms. A video that is visually benign may include audio content that is inappropriate for young children while being impossible to detect with a unimodal content moderation system. Popular video hosting platforms for children such as YouTube Kids still p…
▽ More
Due to the rise in video content creation targeted towards children, there is a need for robust content moderation schemes for video hosting platforms. A video that is visually benign may include audio content that is inappropriate for young children while being impossible to detect with a unimodal content moderation system. Popular video hosting platforms for children such as YouTube Kids still publish videos which contain audio content that is not conducive to a child's healthy behavioral and physical development. A robust classification of malicious videos requires audio representations in addition to video features. However, recent content moderation approaches rarely employ multimodal architectures that explicitly consider non-speech audio cues. To address this, we present an efficient adaptation of CLIP (Contrastive Language-Image Pre-training) that can leverage contextual audio cues for enhanced content moderation. We incorporate 1) the audio modality and 2) prompt learning, while keeping the backbone modules of each modality frozen. We conduct our experiments on a multimodal version of the MOB (Malicious or Benign) dataset in supervised and few-shot settings.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
A Hybrid SNN-ANN Network for Event-based Object Detection with Spatial and Temporal Attention
Authors:
Soikat Hasan Ahmed,
Jan Finkbeiner,
Emre Neftci
Abstract:
Event cameras offer high temporal resolution and dynamic range with minimal motion blur, making them promising for object detection tasks. While Spiking Neural Networks (SNNs) are a natural match for event-based sensory data and enable ultra-energy efficient and low latency inference on neuromorphic hardware, Artificial Neural Networks (ANNs) tend to display more stable training dynamics and faste…
▽ More
Event cameras offer high temporal resolution and dynamic range with minimal motion blur, making them promising for object detection tasks. While Spiking Neural Networks (SNNs) are a natural match for event-based sensory data and enable ultra-energy efficient and low latency inference on neuromorphic hardware, Artificial Neural Networks (ANNs) tend to display more stable training dynamics and faster convergence resulting in greater task performance. Hybrid SNN-ANN approaches are a promising alternative, enabling to leverage the strengths of both SNN and ANN architectures. In this work, we introduce the first Hybrid Attention-based SNN-ANN backbone for object detection using event cameras. We propose a novel Attention-based SNN-ANN bridge module to capture sparse spatial and temporal relations from the SNN layer and convert them into dense feature maps for the ANN part of the backbone. Experimental results demonstrate that our proposed method surpasses baseline hybrid and SNN-based approaches by significant margins, with results comparable to existing ANN-based methods. Extensive ablation studies confirm the effectiveness of our proposed modules and architectural choices. These results pave the way toward a hybrid SNN-ANN architecture that achieves ANN like performance at a drastically reduced parameter budget. We implemented the SNN blocks on digital neuromorphic hardware to investigate latency and power consumption and demonstrate the feasibility of our approach.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
The Potential of Vision-Language Models for Content Moderation of Children's Videos
Authors:
Syed Hammad Ahmed,
Shengnan Hu,
Gita Sukthankar
Abstract:
Natural language supervision has been shown to be effective for zero-shot learning in many computer vision tasks, such as object detection and activity recognition. However, generating informative prompts can be challenging for more subtle tasks, such as video content moderation. This can be difficult, as there are many reasons why a video might be inappropriate, beyond violence and obscenity. For…
▽ More
Natural language supervision has been shown to be effective for zero-shot learning in many computer vision tasks, such as object detection and activity recognition. However, generating informative prompts can be challenging for more subtle tasks, such as video content moderation. This can be difficult, as there are many reasons why a video might be inappropriate, beyond violence and obscenity. For example, scammers may attempt to create junk content that is similar to popular educational videos but with no meaningful information. This paper evaluates the performance of several CLIP variations for content moderation of children's cartoons in both the supervised and zero-shot setting. We show that our proposed model (Vanilla CLIP with Projection Layer) outperforms previous work conducted on the Malicious or Benign (MOB) benchmark for video content moderation. This paper presents an in depth analysis of how context-specific language prompts affect content moderation performance. Our results indicate that it is important to include more context in content moderation prompts, particularly for cartoon videos as they are not well represented in the CLIP training data.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
Malicious or Benign? Towards Effective Content Moderation for Children's Videos
Authors:
Syed Hammad Ahmed,
Muhammad Junaid Khan,
H. M. Umer Qaisar,
Gita Sukthankar
Abstract:
Online video platforms receive hundreds of hours of uploads every minute, making manual content moderation impossible. Unfortunately, the most vulnerable consumers of malicious video content are children from ages 1-5 whose attention is easily captured by bursts of color and sound. Scammers attempting to monetize their content may craft malicious children's videos that are superficially similar to…
▽ More
Online video platforms receive hundreds of hours of uploads every minute, making manual content moderation impossible. Unfortunately, the most vulnerable consumers of malicious video content are children from ages 1-5 whose attention is easily captured by bursts of color and sound. Scammers attempting to monetize their content may craft malicious children's videos that are superficially similar to educational videos, but include scary and disgusting characters, violent motions, loud music, and disturbing noises. Prominent video hosting platforms like YouTube have taken measures to mitigate malicious content on their platform, but these videos often go undetected by current content moderation tools that are focused on removing pornographic or copyrighted content. This paper introduces our toolkit Malicious or Benign for promoting research on automated content moderation of children's videos. We present 1) a customizable annotation tool for videos, 2) a new dataset with difficult to detect test cases of malicious content and 3) a benchmark suite of state-of-the-art video classification models.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
NeuroBench: A Framework for Benchmarking Neuromorphic Computing Algorithms and Systems
Authors:
Jason Yik,
Korneel Van den Berghe,
Douwe den Blanken,
Younes Bouhadjar,
Maxime Fabre,
Paul Hueber,
Denis Kleyko,
Noah Pacik-Nelson,
Pao-Sheng Vincent Sun,
Guangzhi Tang,
Shenqi Wang,
Biyan Zhou,
Soikat Hasan Ahmed,
George Vathakkattil Joseph,
Benedetto Leto,
Aurora Micheli,
Anurag Kumar Mishra,
Gregor Lenz,
Tao Sun,
Zergham Ahmed,
Mahmoud Akl,
Brian Anderson,
Andreas G. Andreou,
Chiara Bartolozzi,
Arindam Basu
, et al. (73 additional authors not shown)
Abstract:
Neuromorphic computing shows promise for advancing computing efficiency and capabilities of AI applications using brain-inspired principles. However, the neuromorphic research field currently lacks standardized benchmarks, making it difficult to accurately measure technological advancements, compare performance with conventional methods, and identify promising future research directions. Prior neu…
▽ More
Neuromorphic computing shows promise for advancing computing efficiency and capabilities of AI applications using brain-inspired principles. However, the neuromorphic research field currently lacks standardized benchmarks, making it difficult to accurately measure technological advancements, compare performance with conventional methods, and identify promising future research directions. Prior neuromorphic computing benchmark efforts have not seen widespread adoption due to a lack of inclusive, actionable, and iterative benchmark design and guidelines. To address these shortcomings, we present NeuroBench: a benchmark framework for neuromorphic computing algorithms and systems. NeuroBench is a collaboratively-designed effort from an open community of nearly 100 co-authors across over 50 institutions in industry and academia, aiming to provide a representative structure for standardizing the evaluation of neuromorphic approaches. The NeuroBench framework introduces a common set of tools and systematic methodology for inclusive benchmark measurement, delivering an objective reference framework for quantifying neuromorphic approaches in both hardware-independent (algorithm track) and hardware-dependent (system track) settings. In this article, we present initial performance baselines across various model architectures on the algorithm track and outline the system track benchmark tasks and guidelines. NeuroBench is intended to continually expand its benchmarks and features to foster and track the progress made by the research community.
△ Less
Submitted 17 January, 2024; v1 submitted 10 April, 2023;
originally announced April 2023.
-
Transformer-based Value Function Decomposition for Cooperative Multi-agent Reinforcement Learning in StarCraft
Authors:
Muhammad Junaid Khan,
Syed Hammad Ahmed,
Gita Sukthankar
Abstract:
The StarCraft II Multi-Agent Challenge (SMAC) was created to be a challenging benchmark problem for cooperative multi-agent reinforcement learning (MARL). SMAC focuses exclusively on the problem of StarCraft micromanagement and assumes that each unit is controlled individually by a learning agent that acts independently and only possesses local information; centralized training is assumed to occur…
▽ More
The StarCraft II Multi-Agent Challenge (SMAC) was created to be a challenging benchmark problem for cooperative multi-agent reinforcement learning (MARL). SMAC focuses exclusively on the problem of StarCraft micromanagement and assumes that each unit is controlled individually by a learning agent that acts independently and only possesses local information; centralized training is assumed to occur with decentralized execution (CTDE). To perform well in SMAC, MARL algorithms must handle the dual problems of multi-agent credit assignment and joint action evaluation.
This paper introduces a new architecture TransMix, a transformer-based joint action-value mixing network which we show to be efficient and scalable as compared to the other state-of-the-art cooperative MARL solutions. TransMix leverages the ability of transformers to learn a richer mixing function for combining the agents' individual value functions. It achieves comparable performance to previous work on easy SMAC scenarios and outperforms other techniques on hard scenarios, as well as scenarios that are corrupted with Gaussian noise to simulate fog of war.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Federated Learning in the Sky: Aerial-Ground Air Quality Sensing Framework with UAV Swarms
Authors:
Yi Liu,
Jiangtian Nie,
Xuandi Li,
Syed Hassan Ahmed,
Wei Yang Bryan Lim,
Chunyan Miao
Abstract:
Due to air quality significantly affects human health, it is becoming increasingly important to accurately and timely predict the Air Quality Index (AQI). To this end, this paper proposes a new federated learning-based aerial-ground air quality sensing framework for fine-grained 3D air quality monitoring and forecasting. Specifically, in the air, this framework leverages a light-weight Dense-Mobil…
▽ More
Due to air quality significantly affects human health, it is becoming increasingly important to accurately and timely predict the Air Quality Index (AQI). To this end, this paper proposes a new federated learning-based aerial-ground air quality sensing framework for fine-grained 3D air quality monitoring and forecasting. Specifically, in the air, this framework leverages a light-weight Dense-MobileNet model to achieve energy-efficient end-to-end learning from haze features of haze images taken by Unmanned Aerial Vehicles (UAVs) for predicting AQI scale distribution. Furthermore, the Federated Learning Framework not only allows various organizations or institutions to collaboratively learn a well-trained global model to monitor AQI without compromising privacy, but also expands the scope of UAV swarms monitoring. For ground sensing systems, we propose a Graph Convolutional neural network-based Long Short-Term Memory (GC-LSTM) model to achieve accurate, real-time and future AQI inference. The GC-LSTM model utilizes the topological structure of the ground monitoring station to capture the spatio-temporal correlation of historical observation data, which helps the aerial-ground sensing system to achieve accurate AQI inference. Through extensive case studies on a real-world dataset, numerical results show that the proposed framework can achieve accurate and energy-efficient AQI sensing without compromising the privacy of raw data.
△ Less
Submitted 23 July, 2020;
originally announced July 2020.
-
LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure
Authors:
Sahil Garg,
Kuljeet Kaur,
Georges Kaddoum,
François Gagnon,
Syed Hassan Ahmed,
Dushantha Nalin K. Jayakody
Abstract:
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks.…
▽ More
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks. Therefore, the security of SMI communications raises the need for robust authentication and key agreement primitives that can satisfy the security requirements of the SG. Thus, in order to realize the aforementioned issues, this paper introduces a lightweight and secure authentication protocol, "LiSA", primarily to secure SMIs in SG setups. The protocol employs Elliptic Curve Cryptography at its core to provide various security features such as mutual authentication, anonymity, replay protection, session key security, and resistance against various attacks. Precisely, LiSA exploits the hardness of the Elliptic Curve Qu Vanstone (EVQV) certificate mechanism along with Elliptic Curve Diffie Hellman Problem (ECDHP) and Elliptic Curve Discrete Logarithm Problem (ECDLP). Additionally, LiSA is designed to provide the highest level of security relative to the existing schemes with least computational and communicational overheads. For instance, LiSA incurred barely 11.826 ms and 0.992 ms for executing different passes across the smart meter and the service providers. Further, it required a total of 544 bits for message transmission during each session.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
Blockchain-based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure
Authors:
Kuljeet Kaur,
Sahil Garg,
Georges Kaddoum,
François Gagnon,
Syed Hassan Ahmed
Abstract:
With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud based models often fall short in applications whe…
▽ More
With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud based models often fall short in applications where latency and mobility are critical. In order to fully realize the potential of vehicular networks, the challenges of efficient communication and computation need to be addressed. In this direction, vehicular fog computing (VFC) has emerged which extends the concept of fog computing to conventional vehicular networks. It is a geographically distributed paradigm that has the potential to conduct time-critical and data-intensive tasks by pushing intelligence (i.e. computing resources, storage, and application services) in the vicinity of end vehicles. However secure and reliable transmission are of significant importance in highly-mobile vehicular networks in order to ensure the optimal Quality of Service (QoS). In this direction, several authentication mechanisms have been proposed in the literature but most of them are found unfit due to absence of decentralization, anonymity, and trust characteristics. Thus, an effective cross-datacenter authentication and key-exchange scheme based on blockchain and elliptic curve cryptography (ECC) is proposed in this paper. Here, the distributed ledger of blockchain is used for maintaining the network information while the highly secure ECC is employed for mutual authentication between vehicles and road side units (RSUs). Additionally, the proposed scheme is lightweight and scalable for the considered VFC setup. The performance evaluation results against the existing state-of-the-art reveal that the proposed scheme accomplishes enhanced security features.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks
Authors:
Kuljeet Kaur,
Sahil Garg,
Georges Kaddoum,
François Gagnon,
Neeraj Kumar,
Syed Hassan Ahmed
Abstract:
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services…
▽ More
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services can be viewed as a series of virtual network functions (VNFs) and their optimal deployment on physical/virtual nodes is considered a challenging task to perform. However, SDNs have evolved from single-domain to multi-domain setups in the recent era. Thus, the complexity of the underlying VNF deployment problem in multi-domain setups has increased manifold. Moreover, the energy utilization aspect is relatively unexplored with respect to an optimal mapping of VNFs across multiple SDN domains. Hence, in this work, the VNF deployment problem in multi-domain SDN setup has been addressed with a primary emphasis on reducing the overall energy consumption for deploying the maximum number of VNFs with guaranteed QoS. The problem in hand is initially formulated as a "Multi-objective Optimization Problem" based on Integer Linear Programming (ILP) to obtain an optimal solution. However, the formulated ILP becomes complex to solve with an increasing number of decision variables and constraints with an increase in the size of the network. Thus, we leverage the benefits of the popular evolutionary optimization algorithms to solve the problem under consideration. In order to deduce the most appropriate evolutionary optimization algorithm to solve the considered problem, it is subjected to different variants of evolutionary algorithms on the widely used MOEA framework (an open source java framework based on multi-objective evolutionary algorithms).
△ Less
Submitted 24 March, 2019;
originally announced March 2019.
-
Dominant Dataset Selection Algorithms for Electricity Consumption Time-Series Data Analysis Based on Affine Transformation
Authors:
Yi Wu,
Yi Liu,
Syed Hassan Ahmed,
Jialiang Peng,
Ahmed A. Abd El-Latif
Abstract:
The explosive growth of time-series data, the scale of time-series data (TSD) suggests that the scale and capability of many Internet of Things (IoT)-based applications has already been exceeded. Moreover, redundancy persists in TSD due to the correlation between information acquired via different sources. In this paper, we propose a cohort of dominant dataset selection algorithms for electricity…
▽ More
The explosive growth of time-series data, the scale of time-series data (TSD) suggests that the scale and capability of many Internet of Things (IoT)-based applications has already been exceeded. Moreover, redundancy persists in TSD due to the correlation between information acquired via different sources. In this paper, we propose a cohort of dominant dataset selection algorithms for electricity consumption time-series data with a focus on discriminating the dominant dataset that is small dataset but capable of representing the kernel information carried by time-series data with an arbitrarily small error rate less than ". Furthermore, we prove that the selection problem of the minimum dominant dataset is an NP-complete problem. The affine transformation model is introduced to define the linear correlation relationship between time-series data objects. Our proposed framework consists of the scanning selection algorithm with O(n3) time complexity and the greedy selection algorithm with O(n4) time complexity, which are respectively proposed to select the dominant dataset based on the linear correlation distance between time-series data objects. The proposed algorithms are evaluated on the real electricity consumption data Harbin city in China. The experimental results show that the proposed algorithms not only reduce the size of the extracted kernel dataset but also ensure the time-series data integrity in terms of accuracy and efficiency.
△ Less
Submitted 10 November, 2019; v1 submitted 1 March, 2019;
originally announced March 2019.
-
Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT):The Case of Smart Campus
Authors:
Sobia Arshad,
Muhammad Awais Azam,
Syed Hassan Ahmed,
Prof. Jonathan Loo
Abstract:
Information-Centric Networking (ICN) specifically Name Data Networking (NDN) is the name-base (content-base) networking and takes named-contents as "first class citizen", being considered as the ideal candidate to form the Future Internet basis. NDN striking features like named-data self-secured contents, name-base-forwarding, in-network caching and mobility support suits the Internet of Things (I…
▽ More
Information-Centric Networking (ICN) specifically Name Data Networking (NDN) is the name-base (content-base) networking and takes named-contents as "first class citizen", being considered as the ideal candidate to form the Future Internet basis. NDN striking features like named-data self-secured contents, name-base-forwarding, in-network caching and mobility support suits the Internet of Things (IoT) environment, which aims to enable communication among smart devices and to combine all Internet-based smart applications under the one roof. With these aims, IoT put many research challenges regarding its network architecture as it should support heterogeneous devices and offer scalability. IoT may depend on the names and addresses of billions of the devices and should smartly manage the bulk of data produced every second. IoT application smart campus has gained a lot of attention in both industry and academia due to many reasons. Therefore, to design NDN for IoT, a sophisticated naming scheme is needed to explore and it is the main motivation for this work. In this paper, we study NDN-IoT smart campus (in terms of connected devices and contents) and find that it lacks in a reasonable naming and addressing mechanism; and thus we propose NDN based Hybrid Naming Scheme (NDN-HNS) for IoT based Smart Campus (IoTSC).
△ Less
Submitted 28 November, 2017;
originally announced November 2017.
-
A Deep Learning Framework using Passive WiFi Sensing for Respiration Monitoring
Authors:
U. M. Khan,
Z. Kabir,
S. A. Hassan,
S. H. Ahmed
Abstract:
This paper presents an end-to-end deep learning framework using passive WiFi sensing to classify and estimate human respiration activity. A passive radar test-bed is used with two channels where the first channel provides the reference WiFi signal, whereas the other channel provides a surveillance signal that contains reflections from the human target. Adaptive filtering is performed to make the s…
▽ More
This paper presents an end-to-end deep learning framework using passive WiFi sensing to classify and estimate human respiration activity. A passive radar test-bed is used with two channels where the first channel provides the reference WiFi signal, whereas the other channel provides a surveillance signal that contains reflections from the human target. Adaptive filtering is performed to make the surveillance signal source-data invariant by eliminating the echoes of the direct transmitted signal. We propose a novel convolutional neural network to classify the complex time series data and determine if it corresponds to a breathing activity, followed by a random forest estimator to determine breathing rate. We collect an extensive dataset to train the learning models and develop reference benchmarks for the future studies in the field. Based on the results, we conclude that deep learning techniques coupled with passive radars offer great potential for end-to-end human activity recognition.
△ Less
Submitted 19 April, 2017;
originally announced April 2017.
-
The Role of Baryons in Creating Statistically Significant Planes of Satellites around Milky Way-Mass Galaxies
Authors:
Sheehan H. Ahmed,
Alyson M. Brooks,
Charlotte R. Christensen
Abstract:
We investigate whether the inclusion of baryonic physics influences the formation of thin, coherently rotating planes of satellites such as those seen around the Milky Way and Andromeda. For four Milky Way-mass simulations, each run both as dark matter-only and with baryons included, we are able to identify a planar configuration that significantly maximizes the number of plane satellite members.…
▽ More
We investigate whether the inclusion of baryonic physics influences the formation of thin, coherently rotating planes of satellites such as those seen around the Milky Way and Andromeda. For four Milky Way-mass simulations, each run both as dark matter-only and with baryons included, we are able to identify a planar configuration that significantly maximizes the number of plane satellite members. The maximum plane member satellites are consistently different between the dark matter-only and baryonic versions of the same run due to the fact that satellites are both more likely to be destroyed and to infall later in the baryonic runs. Hence, studying satellite planes in dark matter-only simulations is misleading, because they will be composed of different satellite members than those that would exist if baryons were included. Additionally, the destruction of satellites in the baryonic runs leads to less radially concentrated satellite distributions, a result that is critical to making planes that are statistically significant compared to a random distribution. Since all planes pass through the centre of the galaxy, it is much harder to create a plane from a random distribution if the satellites have a low radial concentration. We identify Andromeda's low radial satellite concentration as a key reason why the plane in Andromeda is highly significant. Despite this, when co-rotation is considered, none of the satellite planes identified for the simulated galaxies are as statistically significant as the observed planes around the Milky Way and Andromeda, even in the baryonic runs.
△ Less
Submitted 10 October, 2016;
originally announced October 2016.
-
Home Energy Management in Smart Grid
Authors:
A. Mahmood,
H. Fakhar,
S. H. Ahmed,
N. Javaid
Abstract:
A significant amount of research has been conducted in order to make home appliances more efficient in terms of energy usage. Various techniques have been designed and implemented in order to control the power demand and supply. This paper encompasses reviews of different research works on a wide range of energy management techniques for smart homes aimed at reducing energy consumption and minimiz…
▽ More
A significant amount of research has been conducted in order to make home appliances more efficient in terms of energy usage. Various techniques have been designed and implemented in order to control the power demand and supply. This paper encompasses reviews of different research works on a wide range of energy management techniques for smart homes aimed at reducing energy consumption and minimizing energy wastage. The idea of smart home is elaborated followed by a review of existing energy management methods.
△ Less
Submitted 21 November, 2013;
originally announced November 2013.
-
Analysis of Wireless Power Transmission
Authors:
A. Mahmood,
H. Fakhar,
S. H. Ahmed,
N. Javaid
Abstract:
The advent of various wireless technologies have revolutionized the communication infrastructure and consequently changed the entire world into a global village. Use of wireless technology has also been made for transmission of electric power wirelessly. It increases the portability of power systems and integrates the communication technologies and electric power to the same platform. This paper p…
▽ More
The advent of various wireless technologies have revolutionized the communication infrastructure and consequently changed the entire world into a global village. Use of wireless technology has also been made for transmission of electric power wirelessly. It increases the portability of power systems and integrates the communication technologies and electric power to the same platform. This paper presents a comprehensive review and detailed analysis of various techniques used for wireless power transmission. Feasibility, implementations, operations, results and comparison among different methods have also been covered in order to identify the favorable and economical method for low power and small distance applications.
△ Less
Submitted 21 November, 2013;
originally announced November 2013.
-
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Networks
Authors:
B. Manzoor,
N. Javaid,
O. Rehman,
S. H. Bouk,
S. H. Ahmed,
D. Kim
Abstract:
Due to small size of sensor nodes deployed in Wireless Sensor Networks (WSNs), energy utilization is a key issue. Poor channel conditions lead to retransmissions and hence, result in energy wastage. Error control strategies are usually utilized to accommodate channel impairments like noise and fading in order to optimize energy consumption for network lifetime enhancement. Meanwhile, cooperative c…
▽ More
Due to small size of sensor nodes deployed in Wireless Sensor Networks (WSNs), energy utilization is a key issue. Poor channel conditions lead to retransmissions and hence, result in energy wastage. Error control strategies are usually utilized to accommodate channel impairments like noise and fading in order to optimize energy consumption for network lifetime enhancement. Meanwhile, cooperative communication also emerges to be an appropriate candidate to combat the effects of channel fading. Energy efficiency of cooperative scheme when applied with Automatic Repeat Request (ARQ), Hybrid-ARQ (HARQ) and Forward Error Correction (FEC) is investigated in this work. Moreover, the expressions for energy efficiency of Direct Transmission, Single Relay Cooperation and Multi Relay Cooperation are also derived. In all, our work is focused towards energy optimal communication in WSNs. Our results show that error control strategies with cooperative schemes can significantly enhance system performance in form of energy optimization.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
RF Propagation Analysis of MICAz Motes Antenna with Ground Effect
Authors:
Syed Hassan Ahmed,
Safdar H. Bouk,
Nadeem Javaid,
Iwao Sasase
Abstract:
In this paper we analyzed the Radio Frequency (RF) propagation characteristics of monopole antenna in MICAz mote. During the experimental analysis, two scenarios are considered. In Scenario-I, a pair of MICAz nodes (one transmitting and one receiving node) are placed on the ground and the RSSI is measured in presence of the ground effect. In Scenario-II, only the transmitting node is placed above…
▽ More
In this paper we analyzed the Radio Frequency (RF) propagation characteristics of monopole antenna in MICAz mote. During the experimental analysis, two scenarios are considered. In Scenario-I, a pair of MICAz nodes (one transmitting and one receiving node) are placed on the ground and the RSSI is measured in presence of the ground effect. In Scenario-II, only the transmitting node is placed above the ground; however, the receiving node is placed on the ground. The RSSI is measured by changing the antenna orientation at different angles and distances between them. The results show that the ground effect, antenna orientation and distance between the sensor nodes drastically affect the RSSI.
△ Less
Submitted 18 December, 2012;
originally announced December 2012.
-
Combined Human, Antenna Orientation in Elevation Direction and Ground Effect on RSSI in Wireless Sensor Networks
Authors:
Syed Hassan Ahmed,
Safdar H. Bouk,
N. Javaid,
Iwao Sasase
Abstract:
In this paper, we experimentally investigate the combined effect of human, antenna orientation in elevation direction and the ground effect on the Received Signal Strength Indicator (RSSI) parameter in the Wireless Sensor Network (WSN). In experiment, we use MICAz motes and consider different scenarios where antenna of the transmitter node is tilted in elevation direction. The motes were placed on…
▽ More
In this paper, we experimentally investigate the combined effect of human, antenna orientation in elevation direction and the ground effect on the Received Signal Strength Indicator (RSSI) parameter in the Wireless Sensor Network (WSN). In experiment, we use MICAz motes and consider different scenarios where antenna of the transmitter node is tilted in elevation direction. The motes were placed on the ground to take into account the ground effect on the RSSI. The effect of one, two and four persons on the RSSI is recorded. For one and two persons, different walking paces e.g. slow, medium and fast pace, are analysed. However, in case of four persons, random movement is carried out between the pair of motes. The experimental results show that some antenna orientation angles have drastic effect on the RSSI, even without any human activity. The fluctuation count and range of RSSI in different scenarios with same walking pace are completely different. Therefore, an efficient human activity algorithm is need that effectively takes into count the antenna elevation and other parameters to accurately detect the human activity in the WSN deployment region.
△ Less
Submitted 18 December, 2012;
originally announced December 2012.
-
Effect of Fast Moving Object on RSSI in WSN: An Experimental Approach
Authors:
Syed Hassan Ahmed,
Safdar H. Bouk,
Amjad Mehmood,
Nadeem Javaid,
Sasase Iwao
Abstract:
In this paper, we experimentally investigate the effect of fast moving object on the RSSI in the wireless sensor networks in presence of the ground effect and antenna orientation in elevation direction. In experimental setup, MICAz mote pair was placed on the ground, where one mote acts as a transmitter and the other as a receiver. The trans- mitter mote's antenna was oriented in elevation directi…
▽ More
In this paper, we experimentally investigate the effect of fast moving object on the RSSI in the wireless sensor networks in presence of the ground effect and antenna orientation in elevation direction. In experimental setup, MICAz mote pair was placed on the ground, where one mote acts as a transmitter and the other as a receiver. The trans- mitter mote's antenna was oriented in elevation direction with respect to the receiver mote's antenna. The fast moving object i.e. car, was passed between the motes and the fluctuations in the RSSI are observed. The experimental results show some sequential pattern in RSSI fluctuations when car moves at some relatively slow speed. However, some irregu- larities were also observed when antenna was oriented at 45 and 90 in elevation direction.
△ Less
Submitted 19 February, 2012;
originally announced February 2012.