-
Exploring 6G Potential for Industrial Digital Twinning and Swarm Intelligence in Obstacle-Rich Environments
Authors:
Siyu Yuan,
Khurshid Alam,
Bin Han,
Dennis Krummacker,
Hans D. Schotten
Abstract:
With the advent of 6G technology, the demand for efficient and intelligent systems in industrial applications has surged, driving the need for advanced solutions in target localization. Utilizing swarm robots to locate unknown targets involves navigating increasingly complex environments. Digital Twinning (DT) offers a robust solution by creating a virtual replica of the physical world, which enha…
▽ More
With the advent of 6G technology, the demand for efficient and intelligent systems in industrial applications has surged, driving the need for advanced solutions in target localization. Utilizing swarm robots to locate unknown targets involves navigating increasingly complex environments. Digital Twinning (DT) offers a robust solution by creating a virtual replica of the physical world, which enhances the swarm's navigation capabilities. Our framework leverages DT and integrates Swarm Intelligence to store physical map information in the cloud, enabling robots to efficiently locate unknown targets. The simulation results demonstrate that the DT framework, augmented by Swarm Intelligence, significantly improves target location efficiency in obstacle-rich environments compared to traditional methods. This research underscores the potential of combining DT and Swarm Intelligence to advance the field of robotic navigation and target localization in complex industrial settings.
△ Less
Submitted 2 July, 2024; v1 submitted 28 June, 2024;
originally announced June 2024.
-
A Comprehensive Overview and Survey of O-RAN: Exploring Slicing-aware Architecture, Deployment Options, and Use Cases
Authors:
Khurshid Alam,
Mohammad Asif Habibi,
Matthias Tammen,
Dennis Krummacker,
Walid Saad,
Marco Di Renzo,
Tommaso Melodia,
Xavier Costa-Pérez,
Mérouane Debbah,
Ashutosh Dutta,
Hans D. Schotten
Abstract:
Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhan…
▽ More
Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhancement promises increased flexibility, performance optimization, service innovation, energy efficiency, and cost efficiency in fifth-generation (5G), sixth-generation (6G), and future networks. One of the key features of the O-RAN architecture is its support for network slicing, which entails interaction with other slicing domains within a mobile network, notably the transport network (TN) domain and the core network (CN) domain, to realize end-to-end (E2E) network slicing. The study of this feature requires exploring the stances and contributions of diverse standards development organizations (SDOs). In this context, we note that despite the ongoing industrial deployments and standardization efforts, the research and standardization communities have yet to comprehensively address network slicing in O-RAN. To address this gap, this survey paper provides a comprehensive exploration of network slicing in O-RAN through an in-depth review of specification documents from O-RAN Alliance and research papers from leading industry and academic institutions. The paper commences with an overview of the ongoing standardization efforts and open-source contributions associated with O-RAN, subsequently delving into the latest O-RAN architecture with an emphasis on its slicing aspects. Further, the paper explores deployment scenarios for network slicing within O-RAN, examining options for the deployment and orchestration of O-RAN and TN network slice subnets...
△ Less
Submitted 8 May, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Comparative Analysis of Shear Strength Prediction Models for Reinforced Concrete Slab-Column Connections
Authors:
Sarmed Wahab,
Nasim Shakouri Mahmoudabadi,
Sarmad Waqas,
Nouman Herl,
Muhammad Iqbal,
Khurshid Alam,
Afaq Ahmad
Abstract:
This research aims at comparative analysis of shear strength prediction at slab-column connection, unifying machine learning, design codes and Finite Element Analysis. Current design codes (CDCs) of ACI 318-19 (ACI), Eurocode 2 (EC2), Compressive Force Path (CFP) method, Feed Forward Neural Network (FNN) based Artificial Neural Network (ANN), PSO-based FNN (PSOFNN), and BAT algorithm-based BATFNN…
▽ More
This research aims at comparative analysis of shear strength prediction at slab-column connection, unifying machine learning, design codes and Finite Element Analysis. Current design codes (CDCs) of ACI 318-19 (ACI), Eurocode 2 (EC2), Compressive Force Path (CFP) method, Feed Forward Neural Network (FNN) based Artificial Neural Network (ANN), PSO-based FNN (PSOFNN), and BAT algorithm-based BATFNN are used. The study is complemented with FEA of slab for validating the experimental results and machine learning predictions.In the case of hybrid models of PSOFNN and BATFNN, mean square error is used as an objective function to obtain the optimized values of the weights, that are used by Feed Forward Neural Network to perform predictions on the slab data. Seven different models of PSOFNN, BATFNN, and FNN are trained on this data and the results exhibited that PSOFNN is the best model overall. PSOFNN has the best results for SCS=1 with highest value of R as 99.37% and lowest of MSE, and MAE values of 0.0275%, and 1.214% respectively which are better than the best FNN model for SCS=4 having the values of R, MSE, and MAE as 97.464%, 0.0492%, and 1.43%, respectively.
△ Less
Submitted 28 November, 2023; v1 submitted 29 September, 2023;
originally announced November 2023.
-
Reusability Challenges of Scientific Workflows: A Case Study for Galaxy
Authors:
Khairul Alam,
Banani Roy,
Alexander Serebrenik
Abstract:
Scientific workflow has become essential in software engineering because it provides a structured approach to designing, executing, and analyzing scientific experiments. Software developers and researchers have developed hundreds of scientific workflow management systems so scientists in various domains can benefit from them by automating repetitive tasks, enhancing collaboration, and ensuring the…
▽ More
Scientific workflow has become essential in software engineering because it provides a structured approach to designing, executing, and analyzing scientific experiments. Software developers and researchers have developed hundreds of scientific workflow management systems so scientists in various domains can benefit from them by automating repetitive tasks, enhancing collaboration, and ensuring the reproducibility of their results. However, even for expert users, workflow creation is a complex task due to the dramatic growth of tools and data heterogeneity. Thus, scientists attempt to reuse existing workflows shared in workflow repositories. Unfortunately, several challenges prevent scientists from reusing those workflows. In this study, we thus first attempted to identify those reusability challenges. We also offered an action list and evidence-based guidelines to promote the reusability of scientific workflows. Our intensive manual investigation examined the reusability of existing workflows and exposed several challenges. The challenges preventing reusability include tool upgrading, tool support unavailability, design flaws, incomplete workflows, failure to load a workflow, etc. Such challenges and our action list offered guidelines to future workflow composers to create better workflows with enhanced reusability. In the future, we plan to develop a recommender system using reusable workflows that can assist scientists in creating effective and error-free workflows.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption
Authors:
Md. Ahsan Habib,
Kazi Md. Rokibul Alam,
Yasuhiko Morimoto
Abstract:
Usually, a medical record (MR) contains the patients disease-oriented sensitive information. In addition, the MR needs to be shared among different bodies, e.g., diagnostic centres, hospitals, physicians, etc. Hence, retaining the privacy and integrity of MR is crucial. A blockchain based secure MR sharing system can manage these aspects properly. This paper proposes a blockchain based electronic…
▽ More
Usually, a medical record (MR) contains the patients disease-oriented sensitive information. In addition, the MR needs to be shared among different bodies, e.g., diagnostic centres, hospitals, physicians, etc. Hence, retaining the privacy and integrity of MR is crucial. A blockchain based secure MR sharing system can manage these aspects properly. This paper proposes a blockchain based electronic (e-) MR sharing scheme that (i) considers the medical image and the text as the input, (ii) enriches the data privacy through a two-fold encryption mechanism consisting of an asymmetric cryptosystem and the dynamic DNA encoding, (iii) assures data integrity by storing the encrypted e-MR in the distinct block designated for each user in the blockchain, and (iv) eventually, enables authorized entities to regain the e-MR through decryption. Preliminary evaluations, analyses, comparisons with state-of-the-art works, etc., imply the efficacy of the proposed scheme.
△ Less
Submitted 9 February, 2023;
originally announced April 2023.
-
IoT-Based Water Quality Assessment System for Industrial Waste WaterHealthcare Perspective
Authors:
Abdur Rab Dhruba,
Kazi Nabiul Alam,
Md. Shakib Khan,
Sananda Saha,
Mohammad Monirujjaman Khan,
Mohammed Baz,
Mehedi Masud,
Mohammed A. AlZain
Abstract:
The environment, especially water, gets polluted due to industrialization and urbanization. Pollution due to industrialization and urbanization has harmful effects on both the environment and the lives on Earth. This polluted water can cause food poisoning, diarrhea, short-term gastrointestinal problems, respiratory diseases, skin problems, and other serious health complications. In a developing c…
▽ More
The environment, especially water, gets polluted due to industrialization and urbanization. Pollution due to industrialization and urbanization has harmful effects on both the environment and the lives on Earth. This polluted water can cause food poisoning, diarrhea, short-term gastrointestinal problems, respiratory diseases, skin problems, and other serious health complications. In a developing country like Bangladesh, where ready-made garments sector is one of the major sources of the total Gross Domestic Product (GDP), most of the wastes released from the garment factories are dumped into the nearest rivers or canals. Hence, the quality of the water of these bodies become very incompatible for the living beings, and so, it has become one of the major threats to the environment and human health. In addition, the amount of fish in the rivers and canals in Bangladesh is decreasing day by day as a result of water pollution. Therefore, to save fish and other water animals and the environment, we need to monitor the quality of the water and find out the reasons for the pollution. Real-time monitoring of the quality of water is vital for controlling water pollution. Most of the approaches for controlling water pollution are mainly biological and lab-based, which takes a lot of time and resources. To address this issue, we developed an Internet of Things (IoT)-based real-time water quality monitoring system, integrated with a mobile application. The proposed system in this research measures some of the most important indexes of water, including the potential of hydrogen (pH), total dissolved solids (TDS), and turbidity, and temperature of water. The proposed system results will be very helpful in saving the environment, and thus, improving the health of living creatures on Earth.
△ Less
Submitted 26 March, 2023;
originally announced April 2023.
-
Improving Segmentation of Breast Ultrasound Images: Semi Automatic Two Pointers Histogram Splitting Technique
Authors:
Rasheed Abid,
S. Kaisar Alam
Abstract:
Automatically segmenting lesion area in breast ultrasound (BUS) images is a challenging one due to its noise, speckle and artifacts. Edge-map of BUS images also does not help because in most cases the edge-map gives no information whatsoever. Almost all segmentation technique takes the edge-map of the image as its first step, though there are a few algorithms that try to avoid edge-maps as well. I…
▽ More
Automatically segmenting lesion area in breast ultrasound (BUS) images is a challenging one due to its noise, speckle and artifacts. Edge-map of BUS images also does not help because in most cases the edge-map gives no information whatsoever. Almost all segmentation technique takes the edge-map of the image as its first step, though there are a few algorithms that try to avoid edge-maps as well. Improving the edge-map of breast ultrasound images theoretically improves the chances of automatic segmentation to be more precise. In this paper, we propose a semi-automatic technique of histogram splitting using two pointers. Here the user only has to select two initially guessed points denoting a circle on the region of interest (ROI). The method will automatically study the internal histogram and split it using two pointers. The output BUS image has improved edge-map and ultimately the segmentation on it is better compared to regular segmentation using same algorithm and same initialization. Also, we further processed the edge-map to have less edge-pixels to area ratio, improving the homogeneity and the chances of easy segmentation in the future.
△ Less
Submitted 19 October, 2022;
originally announced October 2022.
-
Knowledge Distillation approach towards Melanoma Detection
Authors:
Md. Shakib Khan,
Kazi Nabiul Alam,
Abdur Rab Dhruba,
Hasib Zunair,
Nabeel Mohammed
Abstract:
Melanoma is regarded as the most threatening among all skin cancers. There is a pressing need to build systems which can aid in the early detection of melanoma and enable timely treatment to patients. Recent methods are geared towards machine learning based systems where the task is posed as image recognition, tag dermoscopic images of skin lesions as melanoma or non-melanoma. Even though these me…
▽ More
Melanoma is regarded as the most threatening among all skin cancers. There is a pressing need to build systems which can aid in the early detection of melanoma and enable timely treatment to patients. Recent methods are geared towards machine learning based systems where the task is posed as image recognition, tag dermoscopic images of skin lesions as melanoma or non-melanoma. Even though these methods show promising results in terms of accuracy, they are computationally quite expensive to train, that questions the ability of these models to be deployable in a clinical setting or memory constraint devices. To address this issue, we focus on building simple and performant models having few layers, less than ten compared to hundreds. As well as with fewer learnable parameters, 0.26 million (M) compared to 42.5M using knowledge distillation with the goal to detect melanoma from dermoscopic images. First, we train a teacher model using a ResNet-50 to detect melanoma. Using the teacher model, we train the student model known as Distilled Student Network (DSNet) which has around 0.26M parameters using knowledge distillation achieving an accuracy of 91.7%. We compare against ImageNet pre-trained models such MobileNet, VGG-16, Inception-V3, EfficientNet-B0, ResNet-50 and ResNet-101. We find that our approach works well in terms of inference runtime compared to other pre-trained models, 2.57 seconds compared to 14.55 seconds. We find that DSNet (0.26M parameters), which is 15 times smaller, consistently performs better than EfficientNet-B0 (4M parameters) in both melanoma and non-melanoma detection across Precision, Recall and F1 scores
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Deep Learning-Based Sentiment Analysis of COVID-19 Vaccination Responses from Twitter Data
Authors:
Kazi Nabiul Alam,
Md Shakib Khan,
Abdur Rab Dhruba,
Mohammad Monirujjaman Khan,
Jehad F. Al-Amri,
Mehedi Masud,
Majdi Rawashdeh
Abstract:
This COVID-19 pandemic is so dreadful that it leads to severe anxiety, phobias, and complicated feelings or emotions. Even after vaccination against Coronavirus has been initiated, people feelings have become more diverse and complex, and our goal is to understand and unravel their sentiments in this research using some Deep Learning techniques. Social media is currently the best way to express fe…
▽ More
This COVID-19 pandemic is so dreadful that it leads to severe anxiety, phobias, and complicated feelings or emotions. Even after vaccination against Coronavirus has been initiated, people feelings have become more diverse and complex, and our goal is to understand and unravel their sentiments in this research using some Deep Learning techniques. Social media is currently the best way to express feelings and emotions, and with the help of it, specifically Twitter, one can have a better idea of what is trending and what is going on in people minds. Our motivation for this research is to understand the sentiment of people regarding the vaccination process, and their diverse thoughts regarding this. In this research, the timeline of the collected tweets was from December 21 to July 21, and contained tweets about the most common vaccines available recently from all across the world. The sentiments of people regarding vaccines of all sorts were assessed by using a Natural Language Processing (NLP) tool named Valence Aware Dictionary for sEntiment Reasoner (VADER). By initializing the sentiment polarities into 3 groups (positive, negative and neutral), the overall scenario was visualized here and our findings came out as 33.96% positive, 17.55% negative and 48.49% neutral responses. Recurrent Neural Network (RNN) oriented architecture such as Long Short-Term Memory (LSTM and Bi-LSTM) is used to assess the performance of the predictive models, with LSTM achieving an accuracy of 90.59% and Bi-LSTM achieving an accuracy of 90.83%. Other performance metrics such as Precision, Recall, F-1 score, and Confusion matrix were also shown to validate our models and findings more effectively. This study will help everyone understand public opinion on the COVID-19 vaccines and impact the aim of eradicating the Coronavirus from our beautiful world.
△ Less
Submitted 26 August, 2022;
originally announced September 2022.
-
Development of an IoT-Based Sleep Apnea Monitoring System for Healthcare Applications
Authors:
Abdur Rab Dhruba,
Kazi Nabiul Alam,
Md Shakib Khan,
Sami Bourouis,
Mohammad Monirujjaman Khan
Abstract:
Sleep is an essential and vital element of a person life and health that helps to refresh and recharge the mind and body of a person. The quality of sleep is very important in every person lifestyle, removing various diseases. Bad sleep is a big problem for a lot of people for a very long time. People suffering from various diseases are dealing with various sleeping disorders, commonly known as sl…
▽ More
Sleep is an essential and vital element of a person life and health that helps to refresh and recharge the mind and body of a person. The quality of sleep is very important in every person lifestyle, removing various diseases. Bad sleep is a big problem for a lot of people for a very long time. People suffering from various diseases are dealing with various sleeping disorders, commonly known as sleep apnea. Real-time monitoring of sleep is the key to detecting sleep apnea. To solve this problem, an IoT based real-time sleep apnea monitoring system has been developed. It will allow the user to measure different indexes of sleep and will notify them through a mobile application when anything odd occurs. The system contains various sensors to measure the ECG, Heart Rate, Pulse rate, Skin response, and SpO2 of any person during the entire sleeping period. To analyze and detect sleep apnea in real time, the system monitors several people during the sleeping period. The results are displayed on the monitor of the Arduino boards and in the mobile application. The analysis of the achieved data can detect sleep apnea in some of the people that the system monitored, and it can also display the reason why sleep apnea happens. This paper will help everyone learn about sleep apnea and will help people detect it and take the necessary steps to prevent it.
△ Less
Submitted 26 August, 2022;
originally announced September 2022.
-
Leveraging Machine Learning for Industrial Wireless Communications
Authors:
Ilaria Malanchini,
Patrick Agostini,
Khurshid Alam,
Michael Baumgart,
Martin Kasparick,
Qi Liao,
Fabian Lipp,
Nikolaj Marchenko,
Nicola Michailow,
Rastin Pries,
Hans Schotten,
Slawomir Stanczak,
Stanislaw Strzyz
Abstract:
Two main trends characterize today's communication landscape and are finding their way into industrial facilities: the rollout of 5G with its distinct support for vertical industries and the increasing success of machine learning (ML). The combination of those two technologies open the doors to many exciting industrial applications and its impact is expected to rapidly increase in the coming years…
▽ More
Two main trends characterize today's communication landscape and are finding their way into industrial facilities: the rollout of 5G with its distinct support for vertical industries and the increasing success of machine learning (ML). The combination of those two technologies open the doors to many exciting industrial applications and its impact is expected to rapidly increase in the coming years, given the abundant data growth and the availability of powerful edge computers in production facilities. Unlike most previous work that has considered the application of 5G and ML in industrial environment separately, this paper highlights the potential and synergies that result from combining them. The overall vision presented here generates from the KICK project, a collaboration of several partners from the manufacturing and communication industry as well as research institutes. This unprecedented blend of 5G and ML expertise creates a unique perspective on ML-supported industrial communications and their role in facilitating industrial automation. The paper identifies key open industrial challenges that are grouped into four use cases: wireless connectivity and edge-cloud integration, flexibility in network reconfiguration, dynamicity of heterogeneous network services, and mobility of robots and vehicles. Moreover, the paper provides insights into the advantages of ML-based industrial communications and discusses current challenges of data acquisition in real systems.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications
Authors:
A K M Mubashwir Alam,
Sagar Sharma,
Keke Chen
Abstract:
Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. However, the access patterns of SGX-based programs can still be observed by adversaries, which may leak important information for successful attacks. Researchers have been experimenting with Oblivious RAM (ORAM) to address t…
▽ More
Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. However, the access patterns of SGX-based programs can still be observed by adversaries, which may leak important information for successful attacks. Researchers have been experimenting with Oblivious RAM (ORAM) to address the privacy of access patterns. ORAM is a powerful low-level primitive that provides application-agnostic protection for any I/O operations, however, at a high cost. We find that some application-specific access patterns, such as sequential block I/O, do not provide additional information to adversaries. Others, such as sorting, can be replaced with specific oblivious algorithms that are more efficient than ORAM. The challenge is that developers may need to look into all the details of application-specific access patterns to design suitable solutions, which is time-consuming and error-prone. In this paper, we present the lightweight SGX based MapReduce (SGX-MR) approach that regulates the dataflow of data-intensive SGX applications for easier application-level access-pattern analysis and protection. It uses the MapReduce framework to cover a large class of data-intensive applications, and the entire framework can be implemented with a small memory footprint. With this framework, we have examined the stages of data processing, identified the access patterns that need protection, and designed corresponding efficient protection methods. Our experiments show that SGX-MR based applications are much more efficient than ORAM-based implementations.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Controlling the Outbreak of COVID-19: A Noncooperative Game Perspective
Authors:
Anupam Kumar Bairagi,
Mehedi Masud,
Do Hyeon Kim,
Md. Shirajum Munir,
Abdullah Al Nahid,
Sarder Fakhrul Abedin,
Kazi Masudul Alam,
Sujit Biswas,
Sultan S Alshamrani,
Zhu Han,
Choong Seon Hong
Abstract:
COVID-19 is a global epidemic. Till now, there is no remedy for this epidemic. However, isolation and social distancing are seemed to be effective preventive measures to control this pandemic. Therefore, in this paper, an optimization problem is formulated that accommodates both isolation and social distancing features of the individuals. To promote social distancing, we solve the formulated probl…
▽ More
COVID-19 is a global epidemic. Till now, there is no remedy for this epidemic. However, isolation and social distancing are seemed to be effective preventive measures to control this pandemic. Therefore, in this paper, an optimization problem is formulated that accommodates both isolation and social distancing features of the individuals. To promote social distancing, we solve the formulated problem by applying a noncooperative game that can provide an incentive for maintaining social distancing to prevent the spread of COVID-19. Furthermore, the sustainability of the lockdown policy is interpreted with the help of our proposed game-theoretic incentive model for maintaining social distancing where there exists a Nash equilibrium. Finally, we perform an extensive numerical analysis that shows the effectiveness of the proposed approach in terms of achieving the desired social-distancing to prevent the outbreak of the COVID-19 in a noncooperative environment. Numerical results show that the individual incentive increases more than 85% with an increasing percentage of home isolation from 25% to 100% for all considered scenarios. The numerical results also demonstrate that in a particular percentage of home isolation, the individual incentive decreases with an increasing number of individuals.
△ Less
Submitted 26 November, 2020; v1 submitted 27 July, 2020;
originally announced July 2020.
-
Putting Things in Context: Securing Industrial Authentication with Context Information
Authors:
Simon Duque Anton,
Daniel Fraunholz,
Christoph Lipps,
Khurshid Alam,
Hans Dieter Schotten
Abstract:
The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while pr…
▽ More
The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while providing the possibility to make everyday life more easy and comfortable and industry more efficient and less time-consuming. One of the crucial parts of this interconnected world is sound and secure authentication of entities. Only entities with valid authorisation should be enabled to act on a resource according to an access control scheme. An overview of challenges and practices of authentication is provided in this work, with a special focus on context information as part of security solutions. It can be used for authentication and security solutions in industrial applications. Additional information about events in networks can aid intrusion detection, especially in combination with security information and event management systems. Finally, an authentication and access control approach, based on context information and - depending on the scenario - multiple factors is presented. The combination of multiple factors with context information makes it secure and at the same time case adaptive, so that the effort always matches, but never exceeds, the security demand. This is a common issue of standard cyber security, entities having to obey strict, inflexible and unhandy policies. This approach has been implemented exemplary based on RADIUS. Different scenarios were considered, showing that this approach is capable of providing flexible and scalable security for authentication processes.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
Emotion Recognition from Speech based on Relevant Feature and Majority Voting
Authors:
Md. Kamruzzaman Sarker,
Kazi Md. Rokibul Alam,
Md. Arifuzzaman
Abstract:
This paper proposes an approach to detect emotion from human speech employing majority voting technique over several machine learning techniques. The contribution of this work is in two folds: firstly it selects those features of speech which is most promising for classification and secondly it uses the majority voting technique that selects the exact class of emotion. Here, majority voting techni…
▽ More
This paper proposes an approach to detect emotion from human speech employing majority voting technique over several machine learning techniques. The contribution of this work is in two folds: firstly it selects those features of speech which is most promising for classification and secondly it uses the majority voting technique that selects the exact class of emotion. Here, majority voting technique has been applied over Neural Network (NN), Decision Tree (DT), Support Vector Machine (SVM) and K-Nearest Neighbor (KNN). Input vector of NN, DT, SVM and KNN consists of various acoustic and prosodic features like Pitch, Mel-Frequency Cepstral coefficients etc. From speech signal many feature have been extracted and only promising features have been selected. To consider a feature as promising, Fast Correlation based feature selection (FCBF) and Fisher score algorithms have been used and only those features are selected which are highly ranked by both of them. The proposed approach has been tested on Berlin dataset of emotional speech [3] and Electromagnetic Articulography (EMA) dataset [4]. The experimental result shows that majority voting technique attains better accuracy over individual machine learning techniques. The employment of the proposed approach can effectively recognize the emotion of human beings in case of social robot, intelligent chat client, call-center of a company etc.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
Does Broadband Connectivity and Social networking sites build and maintain social capital in rural communities?
Authors:
Sanjib Tiwari,
Michael Lane,
Khorshed Alam
Abstract:
Broadband internet access is a major enabling technology for building social capital (SC) by better connecting rural and regional communities which are often geographically dispersed both locally nationally and internationally. The main objectives of this paper were determine to what extent Social Networking Sites (SNS) can build SC for households in a rural and regional context of rural household…
▽ More
Broadband internet access is a major enabling technology for building social capital (SC) by better connecting rural and regional communities which are often geographically dispersed both locally nationally and internationally. The main objectives of this paper were determine to what extent Social Networking Sites (SNS) can build SC for households in a rural and regional context of rural household adoption and use of broadband internet. A large scale survey of households was used to collect empirical data regarding household adoption and use of Broadband internet services including SNSs and their contribution to building SC in rural communities. The results of this study confirmed that SNSs would appear to build SC two high level dimensions bonding and bridging for households in rural communities such as Western Downs Region. Moreover SNS users would appear to have significantly higher levels of SC than Non-SNS users in rural communities.
△ Less
Submitted 10 June, 2016;
originally announced June 2016.
-
The challenges and opportunities of delivering wireless high speed broadband services in Rural and Remote Australia: A Case Study of Western Downs Region (WDR)
Authors:
Sanjib Tiwari,
Michael Lane,
Khorshed Alam
Abstract:
This paper critically assesses wireless broadband internet infrastructure, in the rural and remote communities of WDR in terms of supply, demand and utilisation. Only 8 of 20 towns have ADSL/ADSL2+, and only 3 towns have 4G mobile network coverage. Conversely all of the towns have 2G/3G mobile network coverage but have problems with speed, reliability of service and capacity to handle data traffic…
▽ More
This paper critically assesses wireless broadband internet infrastructure, in the rural and remote communities of WDR in terms of supply, demand and utilisation. Only 8 of 20 towns have ADSL/ADSL2+, and only 3 towns have 4G mobile network coverage. Conversely all of the towns have 2G/3G mobile network coverage but have problems with speed, reliability of service and capacity to handle data traffic loads at peak times. Satellite broadband internet for remote areas is also patchy at best. Satisfaction with existing wireless broadband internet services is highly variable across rural and remote communities in WDR. Finally we provide suggestions to improve broadband internet access for rural and remote communities. Public and private investment and sharing of wired and wireless broadband internet infrastructure is needed to provide the backhaul networks and 4G mobile and fixed wireless services to ensure high speed, reliable and affordable broadband services for rural and remote communities.
△ Less
Submitted 10 June, 2016;
originally announced June 2016.
-
An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets
Authors:
Shinsuke Tamura,
Hazim A. Haddad,
Nazmul Islam,
Kazi Md. Rokibul Alam
Abstract:
Simplified verifiable re-encryption mix-net (SVRM) is revised and a scheme for e-voting systems is developed based on it. The developed scheme enables e-voting systems to satisfy all essential requirements of elections. Namely, they satisfy requirements about privacy, verifiability, fairness and robustness. It also successfully protects voters from coercers except cases where the coercers force vo…
▽ More
Simplified verifiable re-encryption mix-net (SVRM) is revised and a scheme for e-voting systems is developed based on it. The developed scheme enables e-voting systems to satisfy all essential requirements of elections. Namely, they satisfy requirements about privacy, verifiability, fairness and robustness. It also successfully protects voters from coercers except cases where the coercers force voters to abstain from elections. In detail, voters can conceal correspondences between them and their votes, anyone can verify the accuracy of election results, and interim election results are concealed from any entity. About incoercibility, provided that erasable-state voting booths which disable voters to memorize complete information exchanged between them and election authorities for constructing votes are available, coercer C cannot know candidates that voters coerced by C had chosen even if the candidates are unique to the voters. In addition, elections can be completed without reelections even when votes were handled illegitimately.
△ Less
Submitted 17 December, 2015;
originally announced December 2015.