-
Identifying Human Indoor Daily Life Behavior employing Thermal Sensor Arrays (TSAs)
Authors:
Dina E. Abdelaleem,
Hassan M. Ahmed,
M. Sami Soliman,
Tarek M. Said
Abstract:
Daily activity monitoring systems used in households provide vital information for health status, particularly with aging residents. Multiple approaches have been introduced to achieve such goals, typically obtrusive and non-obtrusive. Amongst the obtrusive approaches are the wearable devices, and among the non-obtrusive approaches are the movement detection systems, including motion sensors and t…
▽ More
Daily activity monitoring systems used in households provide vital information for health status, particularly with aging residents. Multiple approaches have been introduced to achieve such goals, typically obtrusive and non-obtrusive. Amongst the obtrusive approaches are the wearable devices, and among the non-obtrusive approaches are the movement detection systems, including motion sensors and thermal sensor arrays (TSAs). TSA systems are advantageous when preserving a person's privacy and picking his precise spatial location. In this study, human daily living activities were monitored day and night, constructing the corresponding activity time series and spatial probability distribution and employing a TSA system. The monitored activities are classified into two categories: sleeping and daily activity. Results showed the possibility of distinguishing between classes regardless of day and night. The obtained sleep activity duration was compared with previous research using the same raw data. Results showed that the duration of sleep activity, on average, was 9 hours/day, and daily life activity was 7 hours/day. The person's spatial probability distribution was determined using the bivariate distribution for the monitored location. In conclusion, the results showed that sleeping activity was dominant. Our study showed that TSAs were the optimum choice when monitoring human activity. Our proposed approach tackled limitations encountered by previous human activity monitoring systems, such as preserving human privacy while knowing his precise spatial location.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
EUIS-Net: A Convolutional Neural Network for Efficient Ultrasound Image Segmentation
Authors:
Shahzaib Iqbal,
Hasnat Ahmed,
Muhammad Sharif,
Madiha Hena,
Tariq M. Khan,
Imran Razzak
Abstract:
Segmenting ultrasound images is critical for various medical applications, but it offers significant challenges due to ultrasound images' inherent noise and unpredictability. To address these challenges, we proposed EUIS-Net, a CNN network designed to segment ultrasound images efficiently and precisely. The proposed EUIS-Net utilises four encoder-decoder blocks, resulting in a notable decrease in…
▽ More
Segmenting ultrasound images is critical for various medical applications, but it offers significant challenges due to ultrasound images' inherent noise and unpredictability. To address these challenges, we proposed EUIS-Net, a CNN network designed to segment ultrasound images efficiently and precisely. The proposed EUIS-Net utilises four encoder-decoder blocks, resulting in a notable decrease in computational complexity while achieving excellent performance. The proposed EUIS-Net integrates both channel and spatial attention mechanisms into the bottleneck to improve feature representation and collect significant contextual information. In addition, EUIS-Net incorporates a region-aware attention module in skip connections, which enhances the ability to concentrate on the region of the injury. To enable thorough information exchange across various network blocks, skip connection aggregation is employed from the network's lowermost to the uppermost block. Comprehensive evaluations are conducted on two publicly available ultrasound image segmentation datasets. The proposed EUIS-Net achieved mean IoU and dice scores of 78. 12\%, 85. 42\% and 84. 73\%, 89. 01\% in the BUSI and DDTI datasets, respectively. The findings of our study showcase the substantial capabilities of EUIS-Net for immediate use in clinical settings and its versatility in various ultrasound imaging tasks.
△ Less
Submitted 22 August, 2024;
originally announced August 2024.
-
Towards an Integrated Performance Framework for Fire Science and Management Workflows
Authors:
H. Ahmed,
R. Shende,
I. Perez,
D. Crawl,
S. Purawat,
I. Altintas
Abstract:
Reliable performance metrics are necessary prerequisites to building large-scale end-to-end integrated workflows for collaborative scientific research, particularly within context of use-inspired decision making platforms with many concurrent users and when computing real-time and urgent results using large data. This work is a building block for the National Data Platform, which leverages multipl…
▽ More
Reliable performance metrics are necessary prerequisites to building large-scale end-to-end integrated workflows for collaborative scientific research, particularly within context of use-inspired decision making platforms with many concurrent users and when computing real-time and urgent results using large data. This work is a building block for the National Data Platform, which leverages multiple use-cases including the WIFIRE Data and Model Commons for wildfire behavior modeling and the EarthScope Consortium for collaborative geophysical research. This paper presents an artificial intelligence and machine learning (AI/ML) approach to performance assessment and optimization of scientific workflows. An associated early AI/ML framework spanning performance data collection, prediction and optimization is applied to wildfire science applications within the WIFIRE BurnPro3D (BP3D) platform for proactive fire management and mitigation.
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
Smart Sampling: Self-Attention and Bootstrapping for Improved Ensembled Q-Learning
Authors:
Muhammad Junaid Khan,
Syed Hammad Ahmed,
Gita Sukthankar
Abstract:
We present a novel method aimed at enhancing the sample efficiency of ensemble Q learning. Our proposed approach integrates multi-head self-attention into the ensembled Q networks while bootstrapping the state-action pairs ingested by the ensemble. This not only results in performance improvements over the original REDQ (Chen et al. 2021) and its variant DroQ (Hi-raoka et al. 2022), thereby enhanc…
▽ More
We present a novel method aimed at enhancing the sample efficiency of ensemble Q learning. Our proposed approach integrates multi-head self-attention into the ensembled Q networks while bootstrapping the state-action pairs ingested by the ensemble. This not only results in performance improvements over the original REDQ (Chen et al. 2021) and its variant DroQ (Hi-raoka et al. 2022), thereby enhancing Q predictions, but also effectively reduces both the average normalized bias and standard deviation of normalized bias within Q-function ensembles. Importantly, our method also performs well even in scenarios with a low update-to-data (UTD) ratio. Notably, the implementation of our proposed method is straightforward, requiring minimal modifications to the base model.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Enhanced Multimodal Content Moderation of Children's Videos using Audiovisual Fusion
Authors:
Syed Hammad Ahmed,
Muhammad Junaid Khan,
Gita Sukthankar
Abstract:
Due to the rise in video content creation targeted towards children, there is a need for robust content moderation schemes for video hosting platforms. A video that is visually benign may include audio content that is inappropriate for young children while being impossible to detect with a unimodal content moderation system. Popular video hosting platforms for children such as YouTube Kids still p…
▽ More
Due to the rise in video content creation targeted towards children, there is a need for robust content moderation schemes for video hosting platforms. A video that is visually benign may include audio content that is inappropriate for young children while being impossible to detect with a unimodal content moderation system. Popular video hosting platforms for children such as YouTube Kids still publish videos which contain audio content that is not conducive to a child's healthy behavioral and physical development. A robust classification of malicious videos requires audio representations in addition to video features. However, recent content moderation approaches rarely employ multimodal architectures that explicitly consider non-speech audio cues. To address this, we present an efficient adaptation of CLIP (Contrastive Language-Image Pre-training) that can leverage contextual audio cues for enhanced content moderation. We incorporate 1) the audio modality and 2) prompt learning, while keeping the backbone modules of each modality frozen. We conduct our experiments on a multimodal version of the MOB (Malicious or Benign) dataset in supervised and few-shot settings.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey
Authors:
Majid H. Khoshafa,
Omar Maraqa,
Jules M. Moualeu,
Sylvester Aboagye,
Telex M. N. Ngatched,
Mohamed H. Ahmed,
Yasser Gadallah,
Marco Di Renzo
Abstract:
Physical layer security (PLS) has received a growing interest from the research community for its ability to safeguard data confidentiality without relying on key distribution or encryption/decryption. However, the evolution towards the 5G technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless net…
▽ More
Physical layer security (PLS) has received a growing interest from the research community for its ability to safeguard data confidentiality without relying on key distribution or encryption/decryption. However, the evolution towards the 5G technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless networks. Among the potential enabling technologies, RIS has attracted extensive attention due to its ability to proactively and intelligently reconfigure the wireless propagation environment to combat dynamic wireless channel impairments. Consequently, the RIS technology can be adopted to improve the information-theoretic security of both RF and OWC systems. This survey paper provides a comprehensive overview of the information-theoretic security of RIS-based RF and optical systems. The article first discusses the fundamental concepts of PLS and RIS technologies, followed by their combination in both RF and OWC systems. Subsequently, some optimization techniques are presented in the context of the underlying system model, followed by an assessment of the impact of RIS-assisted PLS through a comprehensive performance analysis. Given that the computational complexity of future communication systems that adopt RIS-assisted PLS is likely to increase rapidly as the number of interactions between the users and infrastructure grows, ML is seen as a promising approach to address this complexity issue while sustaining or improving the network performance. A discussion of recent research studies on RIS-assisted PLS-based systems embedded with ML is presented. Furthermore, some important open research challenges are proposed and discussed to provide insightful future research directions, with the aim of moving a step closer towards the development and implementation of the forthcoming 6G wireless technology.
△ Less
Submitted 26 July, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
A Hybrid SNN-ANN Network for Event-based Object Detection with Spatial and Temporal Attention
Authors:
Soikat Hasan Ahmed,
Jan Finkbeiner,
Emre Neftci
Abstract:
Event cameras offer high temporal resolution and dynamic range with minimal motion blur, making them promising for object detection tasks. While Spiking Neural Networks (SNNs) are a natural match for event-based sensory data and enable ultra-energy efficient and low latency inference on neuromorphic hardware, Artificial Neural Networks (ANNs) tend to display more stable training dynamics and faste…
▽ More
Event cameras offer high temporal resolution and dynamic range with minimal motion blur, making them promising for object detection tasks. While Spiking Neural Networks (SNNs) are a natural match for event-based sensory data and enable ultra-energy efficient and low latency inference on neuromorphic hardware, Artificial Neural Networks (ANNs) tend to display more stable training dynamics and faster convergence resulting in greater task performance. Hybrid SNN-ANN approaches are a promising alternative, enabling to leverage the strengths of both SNN and ANN architectures. In this work, we introduce the first Hybrid Attention-based SNN-ANN backbone for object detection using event cameras. We propose a novel Attention-based SNN-ANN bridge module to capture sparse spatial and temporal relations from the SNN layer and convert them into dense feature maps for the ANN part of the backbone. Experimental results demonstrate that our proposed method surpasses baseline hybrid and SNN-based approaches by significant margins, with results comparable to existing ANN-based methods. Extensive ablation studies confirm the effectiveness of our proposed modules and architectural choices. These results pave the way toward a hybrid SNN-ANN architecture that achieves ANN like performance at a drastically reduced parameter budget. We implemented the SNN blocks on digital neuromorphic hardware to investigate latency and power consumption and demonstrate the feasibility of our approach.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Adaptive Prognostic Malfunction Based Processor for Autonomous Landing Guidance Assistance System Using FPGA
Authors:
Hossam O. Ahmed,
David Wyatt
Abstract:
The demand for more developed and agile urban taxi drones is increasing rapidly nowadays to sustain crowded cities and their traffic issues. The critical factor for spreading such technology could be related to the safety criteria that must be considered. One of the most critical safety aspects for such vertical and/or Short Take-Off and Landing (V/STOL) drones is related to safety during the land…
▽ More
The demand for more developed and agile urban taxi drones is increasing rapidly nowadays to sustain crowded cities and their traffic issues. The critical factor for spreading such technology could be related to the safety criteria that must be considered. One of the most critical safety aspects for such vertical and/or Short Take-Off and Landing (V/STOL) drones is related to safety during the landing stage, in which most of the recent flight accidents have occurred. This paper focused on solving this issue by proposing decentralized processing cores that could improve the landing failure rate by depending on a Fuzzy Logic System (FLS) and additional Digital Signal Processing (DSP) elements. Also, the proposed system will enhance the safety factor during the landing stages by adding a self-awareness feature in case a certain sensor malfunction occurs using the proposed Adaptive Prognostic Malfunction Unit (APMU). This proposed coarse-grained Autonomous Landing Guidance Assistance System (ALGAS4) processing architecture has been optimized using different optimization techniques. The ALGAS4 architecture has been designed completely using VHDL, and the targeted FPGA was the INTEL Cyclone V 5CGXFC9D6F27C7 chip. According to the synthesis findings of the INTEL Quartus Prime software, the maximum working frequency of the ALGAS4 system is 278.24 MHz. In addition, the proposed ALGAS4 system could maintain a maximum computing performance of approximately 74.85 GOPS while using just 166.56 mW for dynamic and I/O power dissipation.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
IdentiFace : A VGG Based Multimodal Facial Biometric System
Authors:
Mahmoud Rabea,
Hanya Ahmed,
Sohaila Mahmoud,
Nourhan Sayed
Abstract:
The development of facial biometric systems has contributed greatly to the development of the computer vision field. Nowadays, there's always a need to develop a multimodal system that combines multiple biometric traits in an efficient, meaningful way. In this paper, we introduce "IdentiFace" which is a multimodal facial biometric system that combines the core of facial recognition with some of th…
▽ More
The development of facial biometric systems has contributed greatly to the development of the computer vision field. Nowadays, there's always a need to develop a multimodal system that combines multiple biometric traits in an efficient, meaningful way. In this paper, we introduce "IdentiFace" which is a multimodal facial biometric system that combines the core of facial recognition with some of the most important soft biometric traits such as gender, face shape, and emotion. We also focused on developing the system using only VGG-16 inspired architecture with minor changes across different subsystems. This unification allows for simpler integration across modalities. It makes it easier to interpret the learned features between the tasks which gives a good indication about the decision-making process across the facial modalities and potential connection. For the recognition problem, we acquired a 99.2% test accuracy for five classes with high intra-class variations using data collected from the FERET database[1]. We achieved 99.4% on our dataset and 95.15% on the public dataset[2] in the gender recognition problem. We were also able to achieve a testing accuracy of 88.03% in the face-shape problem using the celebrity face-shape dataset[3]. Finally, we achieved a decent testing accuracy of 66.13% in the emotion task which is considered a very acceptable accuracy compared to related work on the FER2013 dataset[4].
△ Less
Submitted 10 January, 2024; v1 submitted 2 January, 2024;
originally announced January 2024.
-
The Potential of Vision-Language Models for Content Moderation of Children's Videos
Authors:
Syed Hammad Ahmed,
Shengnan Hu,
Gita Sukthankar
Abstract:
Natural language supervision has been shown to be effective for zero-shot learning in many computer vision tasks, such as object detection and activity recognition. However, generating informative prompts can be challenging for more subtle tasks, such as video content moderation. This can be difficult, as there are many reasons why a video might be inappropriate, beyond violence and obscenity. For…
▽ More
Natural language supervision has been shown to be effective for zero-shot learning in many computer vision tasks, such as object detection and activity recognition. However, generating informative prompts can be challenging for more subtle tasks, such as video content moderation. This can be difficult, as there are many reasons why a video might be inappropriate, beyond violence and obscenity. For example, scammers may attempt to create junk content that is similar to popular educational videos but with no meaningful information. This paper evaluates the performance of several CLIP variations for content moderation of children's cartoons in both the supervised and zero-shot setting. We show that our proposed model (Vanilla CLIP with Projection Layer) outperforms previous work conducted on the Malicious or Benign (MOB) benchmark for video content moderation. This paper presents an in depth analysis of how context-specific language prompts affect content moderation performance. Our results indicate that it is important to include more context in content moderation prompts, particularly for cartoon videos as they are not well represented in the CLIP training data.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
Boosting Stock Price Prediction with Anticipated Macro Policy Changes
Authors:
Md Sabbirul Haque,
Md Shahedul Amin,
Jonayet Miah,
Duc Minh Cao,
Ashiqul Haque Ahmed
Abstract:
Prediction of stock prices plays a significant role in aiding the decision-making of investors. Considering its importance, a growing literature has emerged trying to forecast stock prices with improved accuracy. In this study, we introduce an innovative approach for forecasting stock prices with greater accuracy. We incorporate external economic environment-related information along with stock pr…
▽ More
Prediction of stock prices plays a significant role in aiding the decision-making of investors. Considering its importance, a growing literature has emerged trying to forecast stock prices with improved accuracy. In this study, we introduce an innovative approach for forecasting stock prices with greater accuracy. We incorporate external economic environment-related information along with stock prices. In our novel approach, we improve the performance of stock price prediction by taking into account variations due to future expected macroeconomic policy changes as investors adjust their current behavior ahead of time based on expected future macroeconomic policy changes. Furthermore, we incorporate macroeconomic variables along with historical stock prices to make predictions. Results from this strongly support the inclusion of future economic policy changes along with current macroeconomic information. We confirm the supremacy of our method over the conventional approach using several tree-based machine-learning algorithms. Results are strongly conclusive across various machine learning models. Our preferred model outperforms the conventional approach with an RMSE value of 1.61 compared to an RMSE value of 1.75 from the conventional approach.
△ Less
Submitted 27 October, 2023;
originally announced November 2023.
-
Segregated FLS Processing Cores for V/STOL Autonomous Landing Guidance Assistant System using FPGA
Authors:
Hossam O. Ahmed
Abstract:
It is highly predicted that the roads and parking areas will be extremely congested with vehicles to the point that searching for a novel solution will not be an optional choice for conserving the sustainability rate of the overall humanity's development growth. Such issue could be overcome by developing modified generations of the Urban Air Mobility (UAM) vehicles that essentially depend on the V…
▽ More
It is highly predicted that the roads and parking areas will be extremely congested with vehicles to the point that searching for a novel solution will not be an optional choice for conserving the sustainability rate of the overall humanity's development growth. Such issue could be overcome by developing modified generations of the Urban Air Mobility (UAM) vehicles that essentially depend on the Vertical and/or Short Take-Off and Landing (V/STOL) feature to increase the efficiency of landing capabilities on limited-space parking areas. The complexity of integrating an efficient and safe V/STOL feature in such UAM vehicles is notably difficult comparing with the conventional and normal techniques for landing and take-off. The efficient V/STOL feature should be carried out by a complete and collaborative Cyber-Physical System (CPS) processing architecture, such as the CPS-5C architecture. In this paper, we only proposed two CPS-5C physical layers of a V/STOL Autonomous Landing Guidance Assistant System (ALGAS2) processing unit to increase the reliability of the vertical landing mechanism. The proposed V/STOL-ALGAS2 system depends on Fuzzy Logic System (FLS) as the advanced control unit. Furthermore, the proposed ALGAS2 system depends on four symmetric and segregated processing ALGAS2 cores that processing the data in a fully parallel and independent manner to enhance many essential security and safety factors for the futuristic UAM vehicles. The proposed ALGAS2 digital circuits architecture has been designed using MATLAB and VHDL. Also, it has been further analyzed for the implementation and validation tests using the Intel Altera OpenVINO FPGA board. The proposed ALGAS processing unit attained a maximum computational processing performance of about 21.22 Giga Operations per Seconds (GOPS).
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
Learning by Aligning 2D Skeleton Sequences and Multi-Modality Fusion
Authors:
Quoc-Huy Tran,
Muhammad Ahmed,
Murad Popattia,
M. Hassan Ahmed,
Andrey Konin,
M. Zeeshan Zia
Abstract:
This paper presents a self-supervised temporal video alignment framework which is useful for several fine-grained human activity understanding applications. In contrast with the state-of-the-art method of CASA, where sequences of 3D skeleton coordinates are taken directly as input, our key idea is to use sequences of 2D skeleton heatmaps as input. Unlike CASA which performs self-attention in the t…
▽ More
This paper presents a self-supervised temporal video alignment framework which is useful for several fine-grained human activity understanding applications. In contrast with the state-of-the-art method of CASA, where sequences of 3D skeleton coordinates are taken directly as input, our key idea is to use sequences of 2D skeleton heatmaps as input. Unlike CASA which performs self-attention in the temporal domain only, we feed 2D skeleton heatmaps to a video transformer which performs self-attention both in the spatial and temporal domains for extracting effective spatiotemporal and contextual features. In addition, we introduce simple heatmap augmentation techniques based on 2D skeletons for self-supervised learning. Despite the lack of 3D information, our approach achieves not only higher accuracy but also better robustness against missing and noisy keypoints than CASA. Furthermore, extensive evaluations on three public datasets, i.e., Penn Action, IKEA ASM, and H2O, demonstrate that our approach outperforms previous methods in different fine-grained human activity understanding tasks. Finally, fusing 2D skeleton heatmaps with RGB videos yields the state-of-the-art on all metrics and datasets. To our best knowledge, our work is the first to utilize 2D skeleton heatmap inputs and the first to explore multi-modality fusion for temporal video alignment.
△ Less
Submitted 9 July, 2024; v1 submitted 30 May, 2023;
originally announced May 2023.
-
Malicious or Benign? Towards Effective Content Moderation for Children's Videos
Authors:
Syed Hammad Ahmed,
Muhammad Junaid Khan,
H. M. Umer Qaisar,
Gita Sukthankar
Abstract:
Online video platforms receive hundreds of hours of uploads every minute, making manual content moderation impossible. Unfortunately, the most vulnerable consumers of malicious video content are children from ages 1-5 whose attention is easily captured by bursts of color and sound. Scammers attempting to monetize their content may craft malicious children's videos that are superficially similar to…
▽ More
Online video platforms receive hundreds of hours of uploads every minute, making manual content moderation impossible. Unfortunately, the most vulnerable consumers of malicious video content are children from ages 1-5 whose attention is easily captured by bursts of color and sound. Scammers attempting to monetize their content may craft malicious children's videos that are superficially similar to educational videos, but include scary and disgusting characters, violent motions, loud music, and disturbing noises. Prominent video hosting platforms like YouTube have taken measures to mitigate malicious content on their platform, but these videos often go undetected by current content moderation tools that are focused on removing pornographic or copyrighted content. This paper introduces our toolkit Malicious or Benign for promoting research on automated content moderation of children's videos. We present 1) a customizable annotation tool for videos, 2) a new dataset with difficult to detect test cases of malicious content and 3) a benchmark suite of state-of-the-art video classification models.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Fault Tolerant Processing Unit Using Gamma Distribution Sliding Window For Autonomous Landing Guidance System
Authors:
Hossam O. Ahmed
Abstract:
To keep up with today's dense metropolitan areas and their accompanying traffic problems, a growing number of towns are looking for more advanced and swift urban taxi drones. The safety parameters that must be taken into consideration may be the most important element in the widespread use of such technology. Most recent aviation mishaps have happened during the landing phase, making this a partic…
▽ More
To keep up with today's dense metropolitan areas and their accompanying traffic problems, a growing number of towns are looking for more advanced and swift urban taxi drones. The safety parameters that must be taken into consideration may be the most important element in the widespread use of such technology. Most recent aviation mishaps have happened during the landing phase, making this a particularly important safety consideration for Vertical and/or Short Take-Off and Landing (V/STOL) drones. In this study, we focused on improving the fault tolerance of the processor architectures used by the predecessors of Autonomous Landing Guidance Assistance Systems (ALGAS), which in turn improves their decision-making capabilities. Furthermore, this is achieved by proposing a fault-tolerant processing architecture that depends on the Gamma Distribution Sliding Window Unit (GDSWU). This proposed GDSWU has been designed completely using VHDL, and the targeted FPFA was the Intel Cyclone V 5CGXFC9D6F27C7 chip. The GDSWU could operate at a maximum frequency of 369.96 MHz, as calculated by the synthesis results of the INTEL Quartus Prime program. The suggested GDSWU core only requires 20.36 mW for dynamic core and I/O power consumption.
△ Less
Submitted 3 June, 2023; v1 submitted 2 May, 2023;
originally announced May 2023.
-
NeuroBench: A Framework for Benchmarking Neuromorphic Computing Algorithms and Systems
Authors:
Jason Yik,
Korneel Van den Berghe,
Douwe den Blanken,
Younes Bouhadjar,
Maxime Fabre,
Paul Hueber,
Denis Kleyko,
Noah Pacik-Nelson,
Pao-Sheng Vincent Sun,
Guangzhi Tang,
Shenqi Wang,
Biyan Zhou,
Soikat Hasan Ahmed,
George Vathakkattil Joseph,
Benedetto Leto,
Aurora Micheli,
Anurag Kumar Mishra,
Gregor Lenz,
Tao Sun,
Zergham Ahmed,
Mahmoud Akl,
Brian Anderson,
Andreas G. Andreou,
Chiara Bartolozzi,
Arindam Basu
, et al. (73 additional authors not shown)
Abstract:
Neuromorphic computing shows promise for advancing computing efficiency and capabilities of AI applications using brain-inspired principles. However, the neuromorphic research field currently lacks standardized benchmarks, making it difficult to accurately measure technological advancements, compare performance with conventional methods, and identify promising future research directions. Prior neu…
▽ More
Neuromorphic computing shows promise for advancing computing efficiency and capabilities of AI applications using brain-inspired principles. However, the neuromorphic research field currently lacks standardized benchmarks, making it difficult to accurately measure technological advancements, compare performance with conventional methods, and identify promising future research directions. Prior neuromorphic computing benchmark efforts have not seen widespread adoption due to a lack of inclusive, actionable, and iterative benchmark design and guidelines. To address these shortcomings, we present NeuroBench: a benchmark framework for neuromorphic computing algorithms and systems. NeuroBench is a collaboratively-designed effort from an open community of nearly 100 co-authors across over 50 institutions in industry and academia, aiming to provide a representative structure for standardizing the evaluation of neuromorphic approaches. The NeuroBench framework introduces a common set of tools and systematic methodology for inclusive benchmark measurement, delivering an objective reference framework for quantifying neuromorphic approaches in both hardware-independent (algorithm track) and hardware-dependent (system track) settings. In this article, we present initial performance baselines across various model architectures on the algorithm track and outline the system track benchmark tasks and guidelines. NeuroBench is intended to continually expand its benchmarks and features to foster and track the progress made by the research community.
△ Less
Submitted 17 January, 2024; v1 submitted 10 April, 2023;
originally announced April 2023.
-
Coarse Grained FLS-based Processor with Prognostic Malfunction Feature for UAM Drones using FPGA
Authors:
Hossam O. Ahmed
Abstract:
Many overall safety factors need to be considered in the next generation of Urban Air Mobility (UAM) systems and addressing these can become the anchor point for such technology to reach consent for worldwide application. On the other hand, fulfilling the safety requirements from an exponential increase of prolific UAM systems, is extremely complicated, and requires careful consideration of a vari…
▽ More
Many overall safety factors need to be considered in the next generation of Urban Air Mobility (UAM) systems and addressing these can become the anchor point for such technology to reach consent for worldwide application. On the other hand, fulfilling the safety requirements from an exponential increase of prolific UAM systems, is extremely complicated, and requires careful consideration of a variety of issues. One of the key goals of these Unmanned Air Systems (UAS) is the requirement to support the launch and control of hundreds of thousands of these advanced drones in the air simultaneously. Given the impracticalities of training the corresponding number of expert pilots, achieving this goal can only be realized through safe operation in either fullautonomous or semi-autonomous modes. According to many recent studies, the majority of flight accidents are concentrated on the last three stages of a flight trip, which include the Initial Approach, Final Approach, and Landing Phases of an airplane trip. Therefore, this paper proposes a novel decentralized processing system for enhancing the safety factors during the critical phases of Vertical and/or Short Take-Off and Landing (V/STOL) drones. This has been achieved by adopting several processing and control algorithms such as an Open Fuzzy Logic System (FLS) integrated with a Flight Rules Unit (FRU), FIR filters, and a novel Prognostic Malfunction processing unit. After applying several optimization techniques, this novel coarse-grained Autonomous Landing Guidance Assistance System (ALGAS3) processing architecture has been optimized to achieve a maximum computational processing performance of 70.82 Giga Operations per Second (GOPS). Also, the proposed ALGAS3 system shows an ultra-low dynamic thermal power dissipation (I/O and core) of 145.4 mW which is ideal for mobile avionic systems using INTEL 5CGXFC9D6F27C7 FPGA chip.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Automated control and optimisation of laser driven ion acceleration
Authors:
B. Loughran,
M. J. V. Streeter,
H. Ahmed,
S. Astbury,
M. Balcazar,
M. Borghesi,
N. Bourgeois,
C. B. Curry,
S. J. D. Dann,
S. DiIorio,
N. P. Dover,
T. Dzelzanis,
O. C. Ettlinger,
M. Gauthier,
L. Giuffrida,
G. D. Glenn,
S. H. Glenzer,
J. S. Green,
R. J. Gray,
G. S. Hicks,
C. Hyland,
V. Istokskaia,
M. King,
D. Margarone,
O. McCusker
, et al. (10 additional authors not shown)
Abstract:
The interaction of relativistically intense lasers with opaque targets represents a highly non-linear, multi-dimensional parameter space. This limits the utility of sequential 1D scanning of experimental parameters for the optimisation of secondary radiation, although to-date this has been the accepted methodology due to low data acquisition rates. High repetition-rate (HRR) lasers augmented by ma…
▽ More
The interaction of relativistically intense lasers with opaque targets represents a highly non-linear, multi-dimensional parameter space. This limits the utility of sequential 1D scanning of experimental parameters for the optimisation of secondary radiation, although to-date this has been the accepted methodology due to low data acquisition rates. High repetition-rate (HRR) lasers augmented by machine learning present a valuable opportunity for efficient source optimisation. Here, an automated, HRR-compatible system produced high fidelity parameter scans, revealing the influence of laser intensity on target pre-heating and proton generation. A closed-loop Bayesian optimisation of maximum proton energy, through control of the laser wavefront and target position, produced proton beams with equivalent maximum energy to manually-optimized laser pulses but using only 60% of the laser energy. This demonstration of automated optimisation of laser-driven proton beams is a crucial step towards deeper physical insight and the construction of future radiation sources.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Meal-time Detection by Means of Long Periods Blood Glucose Level Monitoring via IoT Technology
Authors:
Hassan M. Ahmed,
Souhail Maraoui,
Muhammed Abd Elnaby Sadek,
Bessam Abdulrazak,
Camille Vandenberghe,
Stephen C. Cunnane,
F. Guillaume Blanchet
Abstract:
Blood glucose level monitoring is of great importance, especially for subjects experiencing type 1 diabetes. Accurate monitoring of their blood glucose level prevents dangerous and life-threatening situations that might be experienced by those subjects. In addition, precise monitoring of blood glucose levels over long periods of time helps establishing knowledge about the daily mealtime routine wh…
▽ More
Blood glucose level monitoring is of great importance, especially for subjects experiencing type 1 diabetes. Accurate monitoring of their blood glucose level prevents dangerous and life-threatening situations that might be experienced by those subjects. In addition, precise monitoring of blood glucose levels over long periods of time helps establishing knowledge about the daily mealtime routine which aids the medical staff to monitor subjects and properly intervene in hazardous cases such as hypo- or hyperglycemia. Establishing such knowledge will play a potential role when designing proper treatment intervention plan. In this research, we present a complete IoT framework, starting from hardware acquisition system to data analysis approaches that gives a hand for medical staff when long periods of blood glucose monitoring are essential for subjects. Also, this framework is validated with real-time data collection from 7 subjects over 10 successive days with temporal resolution of 5 minutes allowing for near real-time monitoring and analysis. Our results show the precisely estimated daily mealtime routines for 4 subjects out of the 7 with discard of 3 subjects due to huge data loss mainly. The daily mealtime routines for the 4 subjects are found to be matching to have a pattern of 4 periods of blood glucose level changes corresponding to the breakfast around 8 AM, the lunch around 5 PM, the dinner around 8 PM, and finally a within-day snack around 12 PM. The research shows the potential of IoT ecosystem in support for medically related studies.
△ Less
Submitted 27 January, 2024; v1 submitted 28 February, 2023;
originally announced March 2023.
-
Confidence-Nets: A Step Towards better Prediction Intervals for regression Neural Networks on small datasets
Authors:
Mohamedelmujtaba Altayeb,
Abdelrahman M. Elamin,
Hozaifa Ahmed,
Eithar Elfatih Elfadil Ibrahim,
Omer Haydar,
Saba Abdulaziz,
Najlaa H. M. Mohamed
Abstract:
The recent decade has seen an enormous rise in the popularity of deep learning and neural networks. These algorithms have broken many previous records and achieved remarkable results. Their outstanding performance has significantly sped up the progress of AI, and so far various milestones have been achieved earlier than expected. However, in the case of relatively small datasets, the performance o…
▽ More
The recent decade has seen an enormous rise in the popularity of deep learning and neural networks. These algorithms have broken many previous records and achieved remarkable results. Their outstanding performance has significantly sped up the progress of AI, and so far various milestones have been achieved earlier than expected. However, in the case of relatively small datasets, the performance of Deep Neural Networks (DNN) may suffer from reduced accuracy compared to other Machine Learning models. Furthermore, it is difficult to construct prediction intervals or evaluate the uncertainty of predictions when dealing with regression tasks. In this paper, we propose an ensemble method that attempts to estimate the uncertainty of predictions, increase their accuracy and provide an interval for the expected variation. Compared with traditional DNNs that only provide a prediction, our proposed method can output a prediction interval by combining DNNs, extreme gradient boosting (XGBoost) and dissimilarity computation techniques. Albeit the simple design, this approach significantly increases accuracy on small datasets and does not introduce much complexity to the architecture of the neural network. The proposed method is tested on various datasets, and a significant improvement in the performance of the neural network model is seen. The model's prediction interval can include the ground truth value at an average rate of 71% and 78% across training sizes of 90% and 55%, respectively. Finally, we highlight other aspects and applications of the approach in experimental error estimation, and the application of transfer learning.
△ Less
Submitted 31 October, 2022;
originally announced October 2022.
-
Transformer-based Value Function Decomposition for Cooperative Multi-agent Reinforcement Learning in StarCraft
Authors:
Muhammad Junaid Khan,
Syed Hammad Ahmed,
Gita Sukthankar
Abstract:
The StarCraft II Multi-Agent Challenge (SMAC) was created to be a challenging benchmark problem for cooperative multi-agent reinforcement learning (MARL). SMAC focuses exclusively on the problem of StarCraft micromanagement and assumes that each unit is controlled individually by a learning agent that acts independently and only possesses local information; centralized training is assumed to occur…
▽ More
The StarCraft II Multi-Agent Challenge (SMAC) was created to be a challenging benchmark problem for cooperative multi-agent reinforcement learning (MARL). SMAC focuses exclusively on the problem of StarCraft micromanagement and assumes that each unit is controlled individually by a learning agent that acts independently and only possesses local information; centralized training is assumed to occur with decentralized execution (CTDE). To perform well in SMAC, MARL algorithms must handle the dual problems of multi-agent credit assignment and joint action evaluation.
This paper introduces a new architecture TransMix, a transformer-based joint action-value mixing network which we show to be efficient and scalable as compared to the other state-of-the-art cooperative MARL solutions. TransMix leverages the ability of transformers to learn a richer mixing function for combining the agents' individual value functions. It achieves comparable performance to previous work on easy SMAC scenarios and outperforms other techniques on hard scenarios, as well as scenarios that are corrupted with Gaussian noise to simulate fog of war.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Deep Reinforcement Learning for Multi-Agent Interaction
Authors:
Ibrahim H. Ahmed,
Cillian Brewitt,
Ignacio Carlucho,
Filippos Christianos,
Mhairi Dunion,
Elliot Fosong,
Samuel Garcin,
Shangmin Guo,
Balint Gyevnar,
Trevor McInroe,
Georgios Papoudakis,
Arrasy Rahman,
Lukas Schäfer,
Massimiliano Tamborski,
Giuseppe Vecchio,
Cheng Wang,
Stefano V. Albrecht
Abstract:
The development of autonomous agents which can interact with other agents to accomplish a given task is a core area of research in artificial intelligence and machine learning. Towards this goal, the Autonomous Agents Research Group develops novel machine learning algorithms for autonomous systems control, with a specific focus on deep reinforcement learning and multi-agent reinforcement learning.…
▽ More
The development of autonomous agents which can interact with other agents to accomplish a given task is a core area of research in artificial intelligence and machine learning. Towards this goal, the Autonomous Agents Research Group develops novel machine learning algorithms for autonomous systems control, with a specific focus on deep reinforcement learning and multi-agent reinforcement learning. Research problems include scalable learning of coordinated agent policies and inter-agent communication; reasoning about the behaviours, goals, and composition of other agents from limited observations; and sample-efficient learning based on intrinsic motivation, curriculum learning, causal inference, and representation learning. This article provides a broad overview of the ongoing research portfolio of the group and discusses open problems for future directions.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
An Interpretable Joint Nonnegative Matrix Factorization-Based Point Cloud Distance Measure
Authors:
Hannah Friedman,
Amani R. Maina-Kilaas,
Julianna Schalkwyk,
Hina Ahmed,
Jamie Haddock
Abstract:
In this paper, we propose a new method for determining shared features of and measuring the distance between data sets or point clouds. Our approach uses the joint factorization of two data matrices $X_1,X_2$ into non-negative matrices $X_1 = AS_1, X_2 = AS_2$ to derive a similarity measure that determines how well the shared basis $A$ approximates $X_1, X_2$. We also propose a point cloud distanc…
▽ More
In this paper, we propose a new method for determining shared features of and measuring the distance between data sets or point clouds. Our approach uses the joint factorization of two data matrices $X_1,X_2$ into non-negative matrices $X_1 = AS_1, X_2 = AS_2$ to derive a similarity measure that determines how well the shared basis $A$ approximates $X_1, X_2$. We also propose a point cloud distance measure built upon this method and the learned factorization. Our method reveals structural differences in both image and text data. Potential applications include classification, detecting plagiarism or other manipulation, data denoising, and transfer learning.
△ Less
Submitted 27 November, 2022; v1 submitted 11 July, 2022;
originally announced July 2022.
-
Joint alignment and reconstruction of multislice dynamic MRI using variational manifold learning
Authors:
Qing Zou,
Abdul Haseeb Ahmed,
Prashant Nagpal,
Sarv Priya,
Rolf F Schulte,
Mathews Jacob
Abstract:
Free-breathing cardiac MRI schemes are emerging as competitive alternatives to breath-held cine MRI protocols, enabling applicability to pediatric and other population groups that cannot hold their breath. Because the data from the slices are acquired sequentially, the cardiac/respiratory motion patterns may be different for each slice; current free-breathing approaches perform independent recover…
▽ More
Free-breathing cardiac MRI schemes are emerging as competitive alternatives to breath-held cine MRI protocols, enabling applicability to pediatric and other population groups that cannot hold their breath. Because the data from the slices are acquired sequentially, the cardiac/respiratory motion patterns may be different for each slice; current free-breathing approaches perform independent recovery of each slice. In addition to not being able to exploit the inter-slice redundancies, manual intervention or sophisticated post-processing methods are needed to align the images post-recovery for quantification. To overcome these challenges, we propose an unsupervised variational deep manifold learning scheme for the joint alignment and reconstruction of multislice dynamic MRI. The proposed scheme jointly learns the parameters of the deep network as well as the latent vectors for each slice, which capture the motion-induced dynamic variations, from the k-t space data of the specific subject. The variational framework minimizes the non-uniqueness in the representation, thus offering improved alignment and reconstructions.
△ Less
Submitted 21 November, 2021;
originally announced November 2021.
-
Monitoring Indoor Activity of Daily Living Using Thermal Imaging: A Case Study
Authors:
Hassan M. Ahmed,
Bessam Abdulrazak
Abstract:
Monitoring indoor activities of daily living (ADLs) of a person is neither an easy nor an accurate process. It is subjected to dependency on sensor type, power supply stability, and connectivity stability without mentioning artifacts introduced by the person himself. Multiple challenges have to be overcome in this field, such as; monitoring the precise spatial location of the person, and estimatin…
▽ More
Monitoring indoor activities of daily living (ADLs) of a person is neither an easy nor an accurate process. It is subjected to dependency on sensor type, power supply stability, and connectivity stability without mentioning artifacts introduced by the person himself. Multiple challenges have to be overcome in this field, such as; monitoring the precise spatial location of the person, and estimating vital signs like an individuals average temperature. Privacy is another domain of the problem to be thought of with care. Identifying the persons posture without a camera is another challenge. Posture identification assists in the persons fall detection. Thermal imaging could be a proper solution for most of the mentioned challenges. It provides monitoring both the persons average temperature and spatial location while maintaining privacy. In this research, we propose an IoT system for monitoring an indoor ADL using thermal sensor array (TSA). Three classes of ADLs are introduced, which are daily activity, sleeping activity and no-activity respectively. Estimating person average temperature using TSAs is introduced as well in this paper. Results have shown that the three activity classes can be identified as well as the persons average temperature during day and night. The persons spatial location can be determined while his/her privacy is maintained as well.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Deception Detection in Videos using the Facial Action Coding System
Authors:
Hammad Ud Din Ahmed,
Usama Ijaz Bajwa,
Fan Zhang,
Muhammad Waqas Anwar
Abstract:
Facts are important in decision making in every situation, which is why it is important to catch deceptive information before they are accepted as facts. Deception detection in videos has gained traction in recent times for its various real-life application. In our approach, we extract facial action units using the facial action coding system which we use as parameters for training a deep learning…
▽ More
Facts are important in decision making in every situation, which is why it is important to catch deceptive information before they are accepted as facts. Deception detection in videos has gained traction in recent times for its various real-life application. In our approach, we extract facial action units using the facial action coding system which we use as parameters for training a deep learning model. We specifically use long short-term memory (LSTM) which we trained using the real-life trial dataset and it provided one of the best facial only approaches to deception detection. We also tested cross-dataset validation using the Real-life trial dataset, the Silesian Deception Dataset, and the Bag-of-lies Deception Dataset which has not yet been attempted by anyone else for a deception detection system. We tested and compared all datasets amongst each other individually and collectively using the same deep learning training model. The results show that adding different datasets for training worsen the accuracy of the model. One of the primary reasons is that the nature of these datasets vastly differs from one another.
△ Less
Submitted 28 May, 2021;
originally announced May 2021.
-
Ovarian Cancer Detection based on Dimensionality Reduction Techniques and Genetic Algorithm
Authors:
Ahmed Farag Seddik,
Hassan Mostafa Ahmed
Abstract:
In this research, we have two serum SELDI (surface-enhanced laser desorption and ionization) mass spectra (MS) datasets to be used to select features amongst them to identify proteomic cancerous serums from normal serums. Features selection techniques have been applied and classification techniques have been applied as well. Amongst the features selection techniques we have chosen to evaluate the…
▽ More
In this research, we have two serum SELDI (surface-enhanced laser desorption and ionization) mass spectra (MS) datasets to be used to select features amongst them to identify proteomic cancerous serums from normal serums. Features selection techniques have been applied and classification techniques have been applied as well. Amongst the features selection techniques we have chosen to evaluate the performance of PCA (Principal Component Analysis ) and GA (Genetic algorithm), and amongst the classification techniques we have chosen the LDA (Linear Discriminant Analysis) and Neural networks so as to evaluate the ability of the selected features in identifying the cancerous patterns. Results were obtained for two combinations of features selection techniques and classification techniques, the first one was PCA+(t-test) technique for features selection and LDA for accuracy tracking yielded an accuracy of 93.0233 % , the other one was genetic algorithm and neural network yielded an accuracy of 100%. So, we conclude that GA is more efficient for features selection and hence for cancerous patterns detection than PCA technique.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Classification of COVID-19 via Homology of CT-SCAN
Authors:
Sohail Iqbal,
H. Fareed Ahmed,
Talha Qaiser,
Muhammad Imran Qureshi,
Nasir Rajpoot
Abstract:
In this worldwide spread of SARS-CoV-2 (COVID-19) infection, it is of utmost importance to detect the disease at an early stage especially in the hot spots of this epidemic. There are more than 110 Million infected cases on the globe, sofar. Due to its promptness and effective results computed tomography (CT)-scan image is preferred to the reverse-transcription polymerase chain reaction (RT-PCR).…
▽ More
In this worldwide spread of SARS-CoV-2 (COVID-19) infection, it is of utmost importance to detect the disease at an early stage especially in the hot spots of this epidemic. There are more than 110 Million infected cases on the globe, sofar. Due to its promptness and effective results computed tomography (CT)-scan image is preferred to the reverse-transcription polymerase chain reaction (RT-PCR). Early detection and isolation of the patient is the only possible way of controlling the spread of the disease. Automated analysis of CT-Scans can provide enormous support in this process. In this article, We propose a novel approach to detect SARS-CoV-2 using CT-scan images. Our method is based on a very intuitive and natural idea of analyzing shapes, an attempt to mimic a professional medic. We mainly trace SARS-CoV-2 features by quantifying their topological properties. We primarily use a tool called persistent homology, from Topological Data Analysis (TDA), to compute these topological properties. We train and test our model on the "SARS-CoV-2 CT-scan dataset" \citep{soares2020sars}, an open-source dataset, containing 2,481 CT-scans of normal and COVID-19 patients. Our model yielded an overall benchmark F1 score of $99.42\% $, accuracy $99.416\%$, precision $99.41\%$, and recall $99.42\%$. The TDA techniques have great potential that can be utilized for efficient and prompt detection of COVID-19. The immense potential of TDA may be exploited in clinics for rapid and safe detection of COVID-19 globally, in particular in the low and middle-income countries where RT-PCR labs and/or kits are in a serious crisis.
△ Less
Submitted 21 February, 2021;
originally announced February 2021.
-
Model Rectification via Unknown Unknowns Extraction from Deployment Samples
Authors:
Bruno Abrahao,
Zheng Wang,
Haider Ahmed,
Yuchen Zhu
Abstract:
Model deficiency that results from incomplete training data is a form of structural blindness that leads to costly errors, oftentimes with high confidence. During the training of classification tasks, underrepresented class-conditional distributions that a given hypothesis space can recognize results in a mismatch between the model and the target space. To mitigate the consequences of this discrep…
▽ More
Model deficiency that results from incomplete training data is a form of structural blindness that leads to costly errors, oftentimes with high confidence. During the training of classification tasks, underrepresented class-conditional distributions that a given hypothesis space can recognize results in a mismatch between the model and the target space. To mitigate the consequences of this discrepancy, we propose Random Test Sampling and Cross-Validation (RTSCV) as a general algorithmic framework that aims to perform a post-training model rectification at deployment time in a supervised way. RTSCV extracts unknown unknowns (u.u.s), i.e., examples from the class-conditional distributions that a classifier is oblivious to, and works in combination with a diverse family of modern prediction models. RTSCV augments the training set with a sample of the test set (or deployment data) and uses this redefined class layout to discover u.u.s via cross-validation, without relying on active learning or budgeted queries to an oracle. We contribute a theoretical analysis that establishes performance guarantees based on the design bases of modern classifiers. Our experimental evaluation demonstrates RTSCV's effectiveness, using 7 benchmark tabular and computer vision datasets, by reducing a performance gap as large as 41% from the respective pre-rectification models. Last we show that RTSCV consistently outperforms state-of-the-art approaches.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
Federated Learning in the Sky: Aerial-Ground Air Quality Sensing Framework with UAV Swarms
Authors:
Yi Liu,
Jiangtian Nie,
Xuandi Li,
Syed Hassan Ahmed,
Wei Yang Bryan Lim,
Chunyan Miao
Abstract:
Due to air quality significantly affects human health, it is becoming increasingly important to accurately and timely predict the Air Quality Index (AQI). To this end, this paper proposes a new federated learning-based aerial-ground air quality sensing framework for fine-grained 3D air quality monitoring and forecasting. Specifically, in the air, this framework leverages a light-weight Dense-Mobil…
▽ More
Due to air quality significantly affects human health, it is becoming increasingly important to accurately and timely predict the Air Quality Index (AQI). To this end, this paper proposes a new federated learning-based aerial-ground air quality sensing framework for fine-grained 3D air quality monitoring and forecasting. Specifically, in the air, this framework leverages a light-weight Dense-MobileNet model to achieve energy-efficient end-to-end learning from haze features of haze images taken by Unmanned Aerial Vehicles (UAVs) for predicting AQI scale distribution. Furthermore, the Federated Learning Framework not only allows various organizations or institutions to collaboratively learn a well-trained global model to monitor AQI without compromising privacy, but also expands the scope of UAV swarms monitoring. For ground sensing systems, we propose a Graph Convolutional neural network-based Long Short-Term Memory (GC-LSTM) model to achieve accurate, real-time and future AQI inference. The GC-LSTM model utilizes the topological structure of the ground monitoring station to capture the spatio-temporal correlation of historical observation data, which helps the aerial-ground sensing system to achieve accurate AQI inference. Through extensive case studies on a real-world dataset, numerical results show that the proposed framework can achieve accurate and energy-efficient AQI sensing without compromising the privacy of raw data.
△ Less
Submitted 23 July, 2020;
originally announced July 2020.
-
Towards Quantum-Secure Authentication and Key Agreement via Abstract Multi-Agent Interaction
Authors:
Ibrahim H. Ahmed,
Josiah P. Hanna,
Elliot Fosong,
Stefano V. Albrecht
Abstract:
Current methods for authentication and key agreement based on public-key cryptography are vulnerable to quantum computing. We propose a novel approach based on artificial intelligence research in which communicating parties are viewed as autonomous agents which interact repeatedly using their private decision models. Authentication and key agreement are decided based on the agents' observed behavi…
▽ More
Current methods for authentication and key agreement based on public-key cryptography are vulnerable to quantum computing. We propose a novel approach based on artificial intelligence research in which communicating parties are viewed as autonomous agents which interact repeatedly using their private decision models. Authentication and key agreement are decided based on the agents' observed behaviors during the interaction. The security of this approach rests upon the difficulty of modeling the decisions of interacting agents from limited observations, a problem which we conjecture is also hard for quantum computing. We release PyAMI, a prototype authentication and key agreement system based on the proposed method. We empirically validate our method for authenticating legitimate users while detecting different types of adversarial attacks. Finally, we show how reinforcement learning techniques can be used to train server models which effectively probe a client's decisions to achieve more sample-efficient authentication.
△ Less
Submitted 9 July, 2021; v1 submitted 18 July, 2020;
originally announced July 2020.
-
Object classification from randomized EEG trials
Authors:
Hamad Ahmed,
Ronnie B Wilbur,
Hari M Bharadwaj,
Jeffrey Mark Siskind
Abstract:
New results suggest strong limits to the feasibility of classifying human brain activity evoked from image stimuli, as measured through EEG. Considerable prior work suffers from a confound between the stimulus class and the time since the start of the experiment. A prior attempt to avoid this confound using randomized trials was unable to achieve results above chance in a statistically significant…
▽ More
New results suggest strong limits to the feasibility of classifying human brain activity evoked from image stimuli, as measured through EEG. Considerable prior work suffers from a confound between the stimulus class and the time since the start of the experiment. A prior attempt to avoid this confound using randomized trials was unable to achieve results above chance in a statistically significant fashion when the data sets were of the same size as the original experiments. Here, we again attempt to replicate these experiments with randomized trials on a far larger (20x) dataset of 1,000 stimulus presentations of each of forty classes, all from a single subject. To our knowledge, this is the largest such EEG data collection effort from a single subject and is at the bounds of feasibility. We obtain classification accuracy that is marginally above chance and above chance in a statistically significant fashion, and further assess how accuracy depends on the classifier used, the amount of training data used, and the number of classes. Reaching the limits of data collection without substantial improvement in classification accuracy suggests limits to the feasibility of this enterprise.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Computation of Jacobi sums of order l^2 and 2l^2 with prime l
Authors:
Md. Helal Ahmed,
Jagmohan Tanti,
Sumant Pushp
Abstract:
In this paper, we present the fast computational algorithms for the Jacobi sums of orders $l^2$ and $2l^{2}$ with odd prime $l$ by formulating them in terms of the minimum number of cyclotomic numbers of the corresponding orders. We also implement two additional algorithms to validate these formulae, which are also useful for the demonstration of the minimality of cyclotomic numbers required.
In this paper, we present the fast computational algorithms for the Jacobi sums of orders $l^2$ and $2l^{2}$ with odd prime $l$ by formulating them in terms of the minimum number of cyclotomic numbers of the corresponding orders. We also implement two additional algorithms to validate these formulae, which are also useful for the demonstration of the minimality of cyclotomic numbers required.
△ Less
Submitted 25 November, 2019; v1 submitted 8 August, 2019;
originally announced August 2019.
-
LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure
Authors:
Sahil Garg,
Kuljeet Kaur,
Georges Kaddoum,
François Gagnon,
Syed Hassan Ahmed,
Dushantha Nalin K. Jayakody
Abstract:
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks.…
▽ More
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks. Therefore, the security of SMI communications raises the need for robust authentication and key agreement primitives that can satisfy the security requirements of the SG. Thus, in order to realize the aforementioned issues, this paper introduces a lightweight and secure authentication protocol, "LiSA", primarily to secure SMIs in SG setups. The protocol employs Elliptic Curve Cryptography at its core to provide various security features such as mutual authentication, anonymity, replay protection, session key security, and resistance against various attacks. Precisely, LiSA exploits the hardness of the Elliptic Curve Qu Vanstone (EVQV) certificate mechanism along with Elliptic Curve Diffie Hellman Problem (ECDHP) and Elliptic Curve Discrete Logarithm Problem (ECDLP). Additionally, LiSA is designed to provide the highest level of security relative to the existing schemes with least computational and communicational overheads. For instance, LiSA incurred barely 11.826 ms and 0.992 ms for executing different passes across the smart meter and the service providers. Further, it required a total of 544 bits for message transmission during each session.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
A Public-Key Cryptosystem Using Cyclotomic Matrices
Authors:
Md. Helal Ahmed,
Jagmohan Tanti,
Sumant Pushp
Abstract:
Confidentiality and Integrity are two paramount objectives in the evaluation of information and communication technology. In this paper, we propose an arithmetic approach for designing asymmetric key cryptography. Our method is based on the formulation of cyclotomic matrices correspond to the diophantine system. The proposed cyclotomic asymmetric cryptosystem (CAC) utilizes the cyclotomic matrices…
▽ More
Confidentiality and Integrity are two paramount objectives in the evaluation of information and communication technology. In this paper, we propose an arithmetic approach for designing asymmetric key cryptography. Our method is based on the formulation of cyclotomic matrices correspond to the diophantine system. The proposed cyclotomic asymmetric cryptosystem (CAC) utilizes the cyclotomic matrices, whose entries are cyclotomic numbers of order $2l^{2}$, $l$ be prime over a finite field $\mathbb{F}_{p}$ of $p$ elements. The method utilize cyclotomic matrices to design a one-way function. The outcome of a one-way function that is efficient to compute however difficult to compute its inverse unless if secret data about the trapdoor is known. We demonstrate that the encryption and decryption can be efficiently performed with asymptotic complexity of $\mathcal{O}(e^{2.373})$. Besides, we study the computational complexity of the CAC.
△ Less
Submitted 15 May, 2020; v1 submitted 17 June, 2019;
originally announced June 2019.
-
Blockchain-based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure
Authors:
Kuljeet Kaur,
Sahil Garg,
Georges Kaddoum,
François Gagnon,
Syed Hassan Ahmed
Abstract:
With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud based models often fall short in applications whe…
▽ More
With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud based models often fall short in applications where latency and mobility are critical. In order to fully realize the potential of vehicular networks, the challenges of efficient communication and computation need to be addressed. In this direction, vehicular fog computing (VFC) has emerged which extends the concept of fog computing to conventional vehicular networks. It is a geographically distributed paradigm that has the potential to conduct time-critical and data-intensive tasks by pushing intelligence (i.e. computing resources, storage, and application services) in the vicinity of end vehicles. However secure and reliable transmission are of significant importance in highly-mobile vehicular networks in order to ensure the optimal Quality of Service (QoS). In this direction, several authentication mechanisms have been proposed in the literature but most of them are found unfit due to absence of decentralization, anonymity, and trust characteristics. Thus, an effective cross-datacenter authentication and key-exchange scheme based on blockchain and elliptic curve cryptography (ECC) is proposed in this paper. Here, the distributed ledger of blockchain is used for maintaining the network information while the highly secure ECC is employed for mutual authentication between vehicles and road side units (RSUs). Additionally, the proposed scheme is lightweight and scalable for the considered VFC setup. The performance evaluation results against the existing state-of-the-art reveal that the proposed scheme accomplishes enhanced security features.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks
Authors:
Kuljeet Kaur,
Sahil Garg,
Georges Kaddoum,
François Gagnon,
Neeraj Kumar,
Syed Hassan Ahmed
Abstract:
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services…
▽ More
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services can be viewed as a series of virtual network functions (VNFs) and their optimal deployment on physical/virtual nodes is considered a challenging task to perform. However, SDNs have evolved from single-domain to multi-domain setups in the recent era. Thus, the complexity of the underlying VNF deployment problem in multi-domain setups has increased manifold. Moreover, the energy utilization aspect is relatively unexplored with respect to an optimal mapping of VNFs across multiple SDN domains. Hence, in this work, the VNF deployment problem in multi-domain SDN setup has been addressed with a primary emphasis on reducing the overall energy consumption for deploying the maximum number of VNFs with guaranteed QoS. The problem in hand is initially formulated as a "Multi-objective Optimization Problem" based on Integer Linear Programming (ILP) to obtain an optimal solution. However, the formulated ILP becomes complex to solve with an increasing number of decision variables and constraints with an increase in the size of the network. Thus, we leverage the benefits of the popular evolutionary optimization algorithms to solve the problem under consideration. In order to deduce the most appropriate evolutionary optimization algorithm to solve the considered problem, it is subjected to different variants of evolutionary algorithms on the widely used MOEA framework (an open source java framework based on multi-objective evolutionary algorithms).
△ Less
Submitted 24 March, 2019;
originally announced March 2019.
-
Dominant Dataset Selection Algorithms for Electricity Consumption Time-Series Data Analysis Based on Affine Transformation
Authors:
Yi Wu,
Yi Liu,
Syed Hassan Ahmed,
Jialiang Peng,
Ahmed A. Abd El-Latif
Abstract:
The explosive growth of time-series data, the scale of time-series data (TSD) suggests that the scale and capability of many Internet of Things (IoT)-based applications has already been exceeded. Moreover, redundancy persists in TSD due to the correlation between information acquired via different sources. In this paper, we propose a cohort of dominant dataset selection algorithms for electricity…
▽ More
The explosive growth of time-series data, the scale of time-series data (TSD) suggests that the scale and capability of many Internet of Things (IoT)-based applications has already been exceeded. Moreover, redundancy persists in TSD due to the correlation between information acquired via different sources. In this paper, we propose a cohort of dominant dataset selection algorithms for electricity consumption time-series data with a focus on discriminating the dominant dataset that is small dataset but capable of representing the kernel information carried by time-series data with an arbitrarily small error rate less than ". Furthermore, we prove that the selection problem of the minimum dominant dataset is an NP-complete problem. The affine transformation model is introduced to define the linear correlation relationship between time-series data objects. Our proposed framework consists of the scanning selection algorithm with O(n3) time complexity and the greedy selection algorithm with O(n4) time complexity, which are respectively proposed to select the dominant dataset based on the linear correlation distance between time-series data objects. The proposed algorithms are evaluated on the real electricity consumption data Harbin city in China. The experimental results show that the proposed algorithms not only reduce the size of the extracted kernel dataset but also ensure the time-series data integrity in terms of accuracy and efficiency.
△ Less
Submitted 10 November, 2019; v1 submitted 1 March, 2019;
originally announced March 2019.
-
Training on the test set? An analysis of Spampinato et al. [31]
Authors:
Ren Li,
Jared S. Johansen,
Hamad Ahmed,
Thomas V. Ilyevsky,
Ronnie B Wilbur,
Hari M Bharadwaj,
Jeffrey Mark Siskind
Abstract:
A recent paper [31] claims to classify brain processing evoked in subjects watching ImageNet stimuli as measured with EEG and to use a representation derived from this processing to create a novel object classifier. That paper, together with a series of subsequent papers [8, 15, 17, 20, 21, 30, 35], claims to revolutionize the field by achieving extremely successful results on several computer-vis…
▽ More
A recent paper [31] claims to classify brain processing evoked in subjects watching ImageNet stimuli as measured with EEG and to use a representation derived from this processing to create a novel object classifier. That paper, together with a series of subsequent papers [8, 15, 17, 20, 21, 30, 35], claims to revolutionize the field by achieving extremely successful results on several computer-vision tasks, including object classification, transfer learning, and generation of images depicting human perception and thought using brain-derived representations measured through EEG. Our novel experiments and analyses demonstrate that their results crucially depend on the block design that they use, where all stimuli of a given class are presented together, and fail with a rapid-event design, where stimuli of different classes are randomly intermixed. The block design leads to classification of arbitrary brain states based on block-level temporal correlations that tend to exist in all EEG data, rather than stimulus-related activity. Because every trial in their test sets comes from the same block as many trials in the corresponding training sets, their block design thus leads to surreptitiously training on the test set. This invalidates all subsequent analyses performed on this data in multiple published papers and calls into question all of the purported results. We further show that a novel object classifier constructed with a random codebook performs as well as or better than a novel object classifier constructed with the representation extracted from EEG data, suggesting that the performance of their classifier constructed with a representation extracted from EEG data does not benefit at all from the brain-derived representation. Our results calibrate the underlying difficulty of the tasks involved and caution against sensational and overly optimistic, but false, claims to the contrary.
△ Less
Submitted 18 December, 2018;
originally announced December 2018.
-
Low-Complexity Detection of M-ary PSK Faster-than-Nyquist Signaling
Authors:
Ebrahim Bedeer,
Halim Yanikomeroglu,
Mohamed Hossam Ahmed
Abstract:
Faster-than-Nyquist (FTN) signaling is a promising non-orthogonal physical layer transmission technique to improve the spectral efficiency of future communication systems but at the expense of intersymbol-interference (ISI). In this paper, we investigate the detection problem of FTN signaling and formulate the sequence estimation problem of any $M$-ary phase shift keying (PSK) FTN signaling as an…
▽ More
Faster-than-Nyquist (FTN) signaling is a promising non-orthogonal physical layer transmission technique to improve the spectral efficiency of future communication systems but at the expense of intersymbol-interference (ISI). In this paper, we investigate the detection problem of FTN signaling and formulate the sequence estimation problem of any $M$-ary phase shift keying (PSK) FTN signaling as an optimization problem that turns out to be non-convex and nondeterministic polynomial time (NP)-hard to solve. We propose a novel algorithm, based on concepts from semidefinite relaxation (SDR) and Gaussian randomization, to detect any $M$-ary PSK FTN signaling in polynomial time complexity regardless of the constellation size $M$ or the ISI length. Simulation results show that the proposed algorithm strikes a balance between the achieved performance and the computational complexity. Additionally, results show the merits of the proposed algorithm in improving the spectral efficiency when compared to Nyquist signaling and the state-of-the-art schemes from the literature. In particular, when compared to Nyquist signaling at the same error rate and signal-to-noise ratio, our scheme provides around $17\%$ increase in the spectral efficiency at a roll-off factor of 0.3.
△ Less
Submitted 13 April, 2019; v1 submitted 12 October, 2018;
originally announced October 2018.
-
Joint Inter-flow Network Coding and Opportunistic Routing in Multi-hop Wireless Mesh Networks: A Comprehensive Survey
Authors:
Somayeh Kafaie,
Yuanzhu Chen,
Octavia A. Dobre,
Mohamed Hossam Ahmed
Abstract:
Network coding and opportunistic routing are two recognized innovative ideas to improve the performance of wireless networks by utilizing the broadcast nature of the wireless medium. In the last decade, there has been considerable research on how to synergize inter-flow network coding and opportunistic routing in a single joint protocol outperforming each in any scenario. This paper explains the m…
▽ More
Network coding and opportunistic routing are two recognized innovative ideas to improve the performance of wireless networks by utilizing the broadcast nature of the wireless medium. In the last decade, there has been considerable research on how to synergize inter-flow network coding and opportunistic routing in a single joint protocol outperforming each in any scenario. This paper explains the motivation behind the integration of these two techniques, and highlights certain scenarios in which the joint approach may even degrade the performance, emphasizing the fact that their synergistic effect cannot be accomplished with a naive and perfunctory combination. This survey paper also provides a comprehensive taxonomy of the joint protocols in terms of their fundamental components and associated challenges, and compares existing joint protocols. We also present concluding remarks along with an outline of future research directions.
△ Less
Submitted 1 March, 2018;
originally announced March 2018.
-
Rate-Interference Tradeoff in OFDM-based Cognitive Radio Networks
Authors:
Ebrahim Bedeer,
Octavia A. Dobre,
Mohamed H. Ahmed,
Kareem E. Baddour
Abstract:
In cognitive radio (CR) networks, secondary users (SUs) are allowed to opportunistically access the primary users (PUs) spectrum to improve the spectrum utilization; however, this increases the interference levels at the PUs. In this paper, we consider an orthogonal frequency division multiplexing OFDM-based CR network and investigate the tradeoff between increasing the SU transmission rate (hence…
▽ More
In cognitive radio (CR) networks, secondary users (SUs) are allowed to opportunistically access the primary users (PUs) spectrum to improve the spectrum utilization; however, this increases the interference levels at the PUs. In this paper, we consider an orthogonal frequency division multiplexing OFDM-based CR network and investigate the tradeoff between increasing the SU transmission rate (hence improving the spectrum utilization) and reducing the interference levels at the PUs. We formulate a new multiobjective optimization (MOOP) problem that jointly maximizes the SU transmission rate and minimizes its transmit power, while imposing interference thresholds to the PUs. Further, we propose an algorithm to strike a balance between the SU transmission rate and the interference levels to the PUs. The proposed algorithm considers the practical scenario of knowing partial channel state information (CSI) of the links between the SU transmitter and the PUs receivers. Simulation results illustrate the performance of the proposed algorithm and its superiority when compared to the work in the literature.
△ Less
Submitted 8 February, 2019; v1 submitted 10 January, 2018;
originally announced January 2018.
-
Energy-Efficient Power Loading for OFDM-based Cognitive Radio Systems with Channel Uncertainties
Authors:
Ebrahim Bedeer,
Osama Amin,
Octavia A. Dobre,
Mohamed H. Ahmed,
Kareem E. Baddour
Abstract:
In this paper, we propose a novel algorithm to optimize the energy-efficiency (EE) of orthogonal frequency division multiplexing-based cognitive radio systems under channel uncertainties. We formulate an optimization problem that guarantees a minimum required rate and a specified power budget for the secondary user (SU), while restricting the interference to primary users (PUs) in a statistical ma…
▽ More
In this paper, we propose a novel algorithm to optimize the energy-efficiency (EE) of orthogonal frequency division multiplexing-based cognitive radio systems under channel uncertainties. We formulate an optimization problem that guarantees a minimum required rate and a specified power budget for the secondary user (SU), while restricting the interference to primary users (PUs) in a statistical manner. The optimization problem is non-convex and it is transformed to an equivalent problem using the concept of fractional programming. Unlike all related works in the literature, we consider the effect of imperfect channel-stateinformation (CSI) on the links between the SU transmitter and receiver pairs and we additionally consider the effect of limited sensing capabilities of the SU. Since the interference constraints are met statistically, the SU transmitter does not require perfect CSI feedback from the PUs receivers. Simulation results sho w that the EE deteriorates as the channel estimation error increases. Comparisons with relevant works from the literature show that the interference thresholds at the PUs receivers can be severely exceeded and the EE is slightly deteriorated if the SU does no t account for spectrum sensing errors.
△ Less
Submitted 8 February, 2019; v1 submitted 12 January, 2018;
originally announced January 2018.
-
Performance Analysis of Network Coding with IEEE 802.11 DCF in Multi-Hop Wireless Networks
Authors:
Somayeh Kafaie,
Mohamed Hossam Ahmed,
Yuanzhu Chen,
Octavia A. Dobre
Abstract:
Network coding is an effective idea to boost the capacity of wireless networks, and a variety of studies have explored its advantages in different scenarios. However, there is not much analytical study on throughput and end-to-end delay of network coding in multi-hop wireless networks considering the specifications of IEEE 802.11 Distributed Coordination Function. In this paper, we utilize queuing…
▽ More
Network coding is an effective idea to boost the capacity of wireless networks, and a variety of studies have explored its advantages in different scenarios. However, there is not much analytical study on throughput and end-to-end delay of network coding in multi-hop wireless networks considering the specifications of IEEE 802.11 Distributed Coordination Function. In this paper, we utilize queuing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks. We study the throughput and end-to-end delay of inter-flow network coding under the IEEE 802.11 standard with CSMA/CA random access and exponential back-off time considering clock freezing and virtual carrier sensing, and formulate several parameters such as the probability of successful transmission in terms of bit error rate and collision probability, waiting time of packets at nodes, and retransmission mechanism. Our model uses a multi-class queuing network with stable queues, where coded packets have a non-preemptive higher priority over native packets, and forwarding of native packets is not delayed if no coding opportunities are available. Finally, we use computer simulations to verify the accuracy of our analytical model.
△ Less
Submitted 7 January, 2018;
originally announced January 2018.
-
FlexONC: Joint Cooperative Forwarding and Network Coding with Precise Encoding Conditions
Authors:
Somayeh Kafaie,
Yuanzhu Chen,
Mohamed Hossam Ahmed,
Octavia A. Dobre
Abstract:
In recent years, network coding has emerged as an innovative method that helps a wireless network approach its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should trave…
▽ More
In recent years, network coding has emerged as an innovative method that helps a wireless network approach its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should travel through. This assumption not only limits coding opportunities, but can also cause buffer overflow in some specific intermediate nodes. Although some studies considered scattering of the flows dynamically in the network, they still face some limitations. This paper explains pros and cons of some prominent research in network coding and proposes a Flexible and Opportunistic Network Coding scheme (FlexONC) as a solution to such issues. Furthermore, this research discovers that the conditions used in previous studies to combine packets of different flows are overly optimistic and would affect the network performance adversarially. Therefore, we provide a more accurate set of rules for packet encoding. The experimental results show that FlexONC outperforms previous methods especially in networks with high bit error rate, by better utilizing redundant packets spread in the network.
△ Less
Submitted 7 January, 2018;
originally announced January 2018.
-
Network Coding Implementation Details: A Guidance Document
Authors:
Somayeh Kafaie,
Yuanzhu Peter Chen,
Octavia A. Dobre,
Mohamed Hossam Ahmed
Abstract:
In recent years, network coding has become one of the most interesting fields and has attracted considerable attention from both industry and academia. The idea of network coding is based on the concept of allowing intermediate nodes to encode and combine incoming packets instead of only copy and forward them. This approach, by augmenting the multicast and broadcast efficiency of multi-hop wireles…
▽ More
In recent years, network coding has become one of the most interesting fields and has attracted considerable attention from both industry and academia. The idea of network coding is based on the concept of allowing intermediate nodes to encode and combine incoming packets instead of only copy and forward them. This approach, by augmenting the multicast and broadcast efficiency of multi-hop wireless networks, increases the capacity of the network and improves its throughput and robustness. While a wide variety of papers described applications of network coding in different types of networks such as delay tolerant networks, peer to peer networks and wireless sensor networks, the detailed practical implementation of network coding has not been noted in most papers. Since applying network coding in real scenarios requires an acceptable understanding of mathematics and algebra, especially linear equations, reduced row echelon matrices, field and its operations, this paper provides a comprehensive guidance for the implementation of almost all required concepts in network coding. The paper explains the implementation details of network coding in real scenarios and describes the effect of the field size on network coding.
△ Less
Submitted 6 January, 2018;
originally announced January 2018.
-
Throughput Analysis of Network Coding in Multi-Hop Wireless Mesh Networks Using Queueing Theory
Authors:
Somayeh Kafaie,
Mohamed H. Ahmed,
Yuanzhu Chen,
Octavia A. Dobre
Abstract:
In recent years, a significant amount of research has been conducted to explore the benefits of network coding in different scenarios, from both theoretical and simulation perspectives. In this paper, we utilize queueing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks, and study throughput of inter-flow network coding. We analytically d…
▽ More
In recent years, a significant amount of research has been conducted to explore the benefits of network coding in different scenarios, from both theoretical and simulation perspectives. In this paper, we utilize queueing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks, and study throughput of inter-flow network coding. We analytically determine performance metrics such as the probability of successful transmission in terms of collision probability, and feedback mechanism and retransmission. Regarding the coding process, our model uses a multi-class queueing network where coded packets are separated from native packets and have a non-preemptive higher priority over native packets, and both queues are in a stable state. Finally, we use simulations to verify the accuracy of our analytical model.
△ Less
Submitted 6 January, 2018;
originally announced January 2018.
-
Network Coding with Link Layer Cooperation in Wireless Mesh Networks
Authors:
Somayeh Kafaie,
Yuanzhu Chen,
Mohamed Hossam Ahmed,
Octavia A. Dobre
Abstract:
In recent years, network coding has emerged as an innovative method that helps wireless network approaches its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should trave…
▽ More
In recent years, network coding has emerged as an innovative method that helps wireless network approaches its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should travel through. This assumption not only limits coding opportunities, but can also cause buffer overflow in some specific intermediate nodes. Although some studies considered scattering of the flows dynamically in the network, they still face some limitations. This paper explains pros and cons of some prominent research in network coding and proposes FlexONC (Flexible and Opportunistic Network Coding) as a solution to such issues. The performance results show that FlexONC outperforms previous methods especially in worse quality networks, by better utilizing redundant packets spread in the network.
△ Less
Submitted 6 January, 2018;
originally announced January 2018.
-
Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT):The Case of Smart Campus
Authors:
Sobia Arshad,
Muhammad Awais Azam,
Syed Hassan Ahmed,
Prof. Jonathan Loo
Abstract:
Information-Centric Networking (ICN) specifically Name Data Networking (NDN) is the name-base (content-base) networking and takes named-contents as "first class citizen", being considered as the ideal candidate to form the Future Internet basis. NDN striking features like named-data self-secured contents, name-base-forwarding, in-network caching and mobility support suits the Internet of Things (I…
▽ More
Information-Centric Networking (ICN) specifically Name Data Networking (NDN) is the name-base (content-base) networking and takes named-contents as "first class citizen", being considered as the ideal candidate to form the Future Internet basis. NDN striking features like named-data self-secured contents, name-base-forwarding, in-network caching and mobility support suits the Internet of Things (IoT) environment, which aims to enable communication among smart devices and to combine all Internet-based smart applications under the one roof. With these aims, IoT put many research challenges regarding its network architecture as it should support heterogeneous devices and offer scalability. IoT may depend on the names and addresses of billions of the devices and should smartly manage the bulk of data produced every second. IoT application smart campus has gained a lot of attention in both industry and academia due to many reasons. Therefore, to design NDN for IoT, a sophisticated naming scheme is needed to explore and it is the main motivation for this work. In this paper, we study NDN-IoT smart campus (in terms of connected devices and contents) and find that it lacks in a reasonable naming and addressing mechanism; and thus we propose NDN based Hybrid Naming Scheme (NDN-HNS) for IoT based Smart Campus (IoTSC).
△ Less
Submitted 28 November, 2017;
originally announced November 2017.
-
A Two-Phase Power Allocation Scheme for CRNs Employing NOMA
Authors:
Ming Zeng,
Georgios I. Tsiropoulos,
Animesh Yadav,
Octavia A. Dobre,
Mohamed H. Ahmed
Abstract:
In this paper, we consider the power allocation (PA) problem in cognitive radio networks (CRNs) employing nonorthogonal multiple access (NOMA) technique. Specifically, we aim to maximize the number of admitted secondary users (SUs) and their throughput, without violating the interference tolerance threshold of the primary users (PUs). This problem is divided into a two-phase PA process: a) maximiz…
▽ More
In this paper, we consider the power allocation (PA) problem in cognitive radio networks (CRNs) employing nonorthogonal multiple access (NOMA) technique. Specifically, we aim to maximize the number of admitted secondary users (SUs) and their throughput, without violating the interference tolerance threshold of the primary users (PUs). This problem is divided into a two-phase PA process: a) maximizing the number of admitted SUs; b) maximizing the minimum throughput among the admitted SUs. To address the first phase, we apply a sequential and iterative PA algorithm, which fully exploits the characteristics of the NOMA-based system. Following this, the second phase is shown to be quasiconvex and is optimally solved via the bisection method. Furthermore, we prove the existence of a unique solution for the second phase and propose another PA algorithm, which is also optimal and significantly reduces the complexity in contrast with the bisection method. Simulation results verify the effectiveness of the proposed two-phase PA scheme.
△ Less
Submitted 15 September, 2017;
originally announced September 2017.