-
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies
Authors:
Zina Chkirbene,
Ala Gouissem,
Ridha Hamila,
Devrim Unal
Abstract:
The advent of Intelligent Reflecting Surfaces (IRS) and Unmanned Aerial Vehicles (UAVs) is setting a new benchmark in the field of wireless communications. IRS, with their groundbreaking ability to manipulate electromagnetic waves, have opened avenues for substantial enhancements in signal quality, network efficiency, and spectral usage. These surfaces dynamically reconfigure the propagation envir…
▽ More
The advent of Intelligent Reflecting Surfaces (IRS) and Unmanned Aerial Vehicles (UAVs) is setting a new benchmark in the field of wireless communications. IRS, with their groundbreaking ability to manipulate electromagnetic waves, have opened avenues for substantial enhancements in signal quality, network efficiency, and spectral usage. These surfaces dynamically reconfigure the propagation environment, leading to optimized signal paths and reduced interference. Concurrently, UAVs have emerged as dynamic, versatile elements within communication networks, offering high mobility and the ability to access and enhance coverage in areas where traditional, fixed infrastructure falls short. This paper presents a comprehensive survey on the synergistic integration of IRS and UAVs in wireless networks, highlighting how this innovative combination substantially boosts network performance, particularly in terms of security, energy efficiency, and reliability. The versatility of UAVs, combined with the signal-manipulating prowess of IRS, creates a potent solution for overcoming the limitations of conventional communication setups, especially in challenging and underserved environments. Furthermore, the survey delves into the cutting-edge realm of Machine Learning (ML), exploring its role in the strategic deployment and operational optimization of UAVs equipped with IRS. The paper also underscores the latest research and practical advancements in this field, providing insights into real-world applications and experimental setups. It concludes by discussing the future prospects and potential directions for this emerging technology, positioning the IRS-UAV integration as a transformative force in the landscape of next-generation wireless
△ Less
Submitted 2 June, 2024;
originally announced July 2024.
-
Multimodal Crowd Counting with Pix2Pix GANs
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Most state-of-the-art crowd counting methods use color (RGB) images to learn the density map of the crowd. However, these methods often struggle to achieve higher accuracy in densely crowded scenes with poor illumination. Recently, some studies have reported improvement in the accuracy of crowd counting models using a combination of RGB and thermal images. Although multimodal data can lead to bett…
▽ More
Most state-of-the-art crowd counting methods use color (RGB) images to learn the density map of the crowd. However, these methods often struggle to achieve higher accuracy in densely crowded scenes with poor illumination. Recently, some studies have reported improvement in the accuracy of crowd counting models using a combination of RGB and thermal images. Although multimodal data can lead to better predictions, multimodal data might not be always available beforehand. In this paper, we propose the use of generative adversarial networks (GANs) to automatically generate thermal infrared (TIR) images from color (RGB) images and use both to train crowd counting models to achieve higher accuracy. We use a Pix2Pix GAN network first to translate RGB images to TIR images. Our experiments on several state-of-the-art crowd counting models and benchmark crowd datasets report significant improvement in accuracy.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
Curriculum for Crowd Counting -- Is it Worthy?
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Recent advances in deep learning techniques have achieved remarkable performance in several computer vision problems. A notably intuitive technique called Curriculum Learning (CL) has been introduced recently for training deep learning models. Surprisingly, curriculum learning achieves significantly improved results in some tasks but marginal or no improvement in others. Hence, there is still a de…
▽ More
Recent advances in deep learning techniques have achieved remarkable performance in several computer vision problems. A notably intuitive technique called Curriculum Learning (CL) has been introduced recently for training deep learning models. Surprisingly, curriculum learning achieves significantly improved results in some tasks but marginal or no improvement in others. Hence, there is still a debate about its adoption as a standard method to train supervised learning models. In this work, we investigate the impact of curriculum learning in crowd counting using the density estimation method. We performed detailed investigations by conducting 112 experiments using six different CL settings using eight different crowd models. Our experiments show that curriculum learning improves the model learning performance and shortens the convergence time.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
A Comprehensive Survey On Client Selections in Federated Learning
Authors:
Ala Gouissem,
Zina Chkirbene,
Ridha Hamila
Abstract:
Federated Learning (FL) is a rapidly growing field in machine learning that allows data to be trained across multiple decentralized devices. The selection of clients to participate in the training process is a critical factor for the performance of the overall system. In this survey, we provide a comprehensive overview of the state-of-the-art client selection techniques in FL, including their stre…
▽ More
Federated Learning (FL) is a rapidly growing field in machine learning that allows data to be trained across multiple decentralized devices. The selection of clients to participate in the training process is a critical factor for the performance of the overall system. In this survey, we provide a comprehensive overview of the state-of-the-art client selection techniques in FL, including their strengths and limitations, as well as the challenges and open issues that need to be addressed. We cover conventional selection techniques such as random selection where all or partial random of clients is used for the trained. We also cover performance-aware selections and as well as resource-aware selections for resource-constrained networks and heterogeneous networks. We also discuss the usage of client selection in model security enhancement. Lastly, we discuss open issues and challenges related to clients selection in dynamic constrained, and heterogeneous networks.
△ Less
Submitted 12 November, 2023;
originally announced November 2023.
-
Crowd Counting in Harsh Weather using Image Denoising with Pix2Pix GANs
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Visual crowd counting estimates the density of the crowd using deep learning models such as convolution neural networks (CNNs). The performance of the model heavily relies on the quality of the training data that constitutes crowd images. In harsh weather such as fog, dust, and low light conditions, the inference performance may severely degrade on the noisy and blur images. In this paper, we prop…
▽ More
Visual crowd counting estimates the density of the crowd using deep learning models such as convolution neural networks (CNNs). The performance of the model heavily relies on the quality of the training data that constitutes crowd images. In harsh weather such as fog, dust, and low light conditions, the inference performance may severely degrade on the noisy and blur images. In this paper, we propose the use of Pix2Pix generative adversarial network (GAN) to first denoise the crowd images prior to passing them to the counting model. A Pix2Pix network is trained using synthetic noisy images generated from original crowd images and then the pretrained generator is then used in the inference engine to estimate the crowd density in unseen, noisy crowd images. The performance is tested on JHU-Crowd dataset to validate the significance of the proposed method particularly when high reliability and accuracy are required.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Visual Crowd Analysis: Open Research Problems
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Over the last decade, there has been a remarkable surge in interest in automated crowd monitoring within the computer vision community. Modern deep-learning approaches have made it possible to develop fully-automated vision-based crowd-monitoring applications. However, despite the magnitude of the issue at hand, the significant technological advancements, and the consistent interest of the researc…
▽ More
Over the last decade, there has been a remarkable surge in interest in automated crowd monitoring within the computer vision community. Modern deep-learning approaches have made it possible to develop fully-automated vision-based crowd-monitoring applications. However, despite the magnitude of the issue at hand, the significant technological advancements, and the consistent interest of the research community, there are still numerous challenges that need to be overcome. In this article, we delve into six major areas of visual crowd analysis, emphasizing the key developments in each of these areas. We outline the crucial unresolved issues that must be tackled in future works, in order to ensure that the field of automated crowd monitoring continues to progress and thrive. Several surveys related to this topic have been conducted in the past. Nonetheless, this article thoroughly examines and presents a more intuitive categorization of works, while also depicting the latest breakthroughs within the field, incorporating more recent studies carried out within the last few years in a concise manner. By carefully choosing prominent works with significant contributions in terms of novelty or performance gains, this paper presents a more comprehensive exposition of advancements in the current state-of-the-art.
△ Less
Submitted 24 August, 2023; v1 submitted 21 August, 2023;
originally announced August 2023.
-
LCDnet: A Lightweight Crowd Density Estimation Model for Real-time Video Surveillance
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Automatic crowd counting using density estimation has gained significant attention in computer vision research. As a result, a large number of crowd counting and density estimation models using convolution neural networks (CNN) have been published in the last few years. These models have achieved good accuracy over benchmark datasets. However, attempts to improve the accuracy often lead to higher…
▽ More
Automatic crowd counting using density estimation has gained significant attention in computer vision research. As a result, a large number of crowd counting and density estimation models using convolution neural networks (CNN) have been published in the last few years. These models have achieved good accuracy over benchmark datasets. However, attempts to improve the accuracy often lead to higher complexity in these models. In real-time video surveillance applications using drones with limited computing resources, deep models incur intolerable higher inference delay. In this paper, we propose (i) a Lightweight Crowd Density estimation model (LCDnet) for real-time video surveillance, and (ii) an improved training method using curriculum learning (CL). LCDnet is trained using CL and evaluated over two benchmark datasets i.e., DroneRGBT and CARPK. Results are compared with existing crowd models. Our evaluation shows that the LCDnet achieves a reasonably good accuracy while significantly reducing the inference time and memory requirement and thus can be deployed over edge devices with very limited computing resources.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
CLIP: Train Faster with Less Data
Authors:
Muhammad Asif Khan,
Ridha Hamila,
Hamid Menouar
Abstract:
Deep learning models require an enormous amount of data for training. However, recently there is a shift in machine learning from model-centric to data-centric approaches. In data-centric approaches, the focus is to refine and improve the quality of the data to improve the learning performance of the models rather than redesigning model architectures. In this paper, we propose CLIP i.e., Curriculu…
▽ More
Deep learning models require an enormous amount of data for training. However, recently there is a shift in machine learning from model-centric to data-centric approaches. In data-centric approaches, the focus is to refine and improve the quality of the data to improve the learning performance of the models rather than redesigning model architectures. In this paper, we propose CLIP i.e., Curriculum Learning with Iterative data Pruning. CLIP combines two data-centric approaches i.e., curriculum learning and dataset pruning to improve the model learning accuracy and convergence speed. The proposed scheme applies loss-aware dataset pruning to iteratively remove the least significant samples and progressively reduces the size of the effective dataset in the curriculum learning training. Extensive experiments performed on crowd density estimation models validate the notion behind combining the two approaches by reducing the convergence time and improving generalization. To our knowledge, the idea of data pruning as an embedded process in curriculum learning is novel.
△ Less
Submitted 2 August, 2023; v1 submitted 2 December, 2022;
originally announced December 2022.
-
Crowd Density Estimation using Imperfect Labels
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Density estimation is one of the most widely used methods for crowd counting in which a deep learning model learns from head-annotated crowd images to estimate crowd density in unseen images. Typically, the learning performance of the model is highly impacted by the accuracy of the annotations and inaccurate annotations may lead to localization and counting errors during prediction. A significant…
▽ More
Density estimation is one of the most widely used methods for crowd counting in which a deep learning model learns from head-annotated crowd images to estimate crowd density in unseen images. Typically, the learning performance of the model is highly impacted by the accuracy of the annotations and inaccurate annotations may lead to localization and counting errors during prediction. A significant amount of works exist on crowd counting using perfectly labelled datasets but none of these explore the impact of annotation errors on the model accuracy. In this paper, we investigate the impact of imperfect labels (both noisy and missing labels) on crowd counting accuracy. We propose a system that automatically generates imperfect labels using a deep learning model (called annotator) which are then used to train a new crowd counting model (target model). Our analysis on two crowd counting models and two benchmark datasets shows that the proposed scheme achieves accuracy closer to that of the model trained with perfect labels showing the robustness of crowd models to annotation errors.
△ Less
Submitted 2 August, 2023; v1 submitted 2 December, 2022;
originally announced December 2022.
-
Drones-aided Asset Maintenance in Hospitals
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
The rapid outbreak of COVID-19 pandemic invoked scientists and researchers to prepare the world for future disasters. During the pandemic, global authorities on healthcare urged the importance of disinfection of objects and surfaces. To implement efficient and safe disinfection services during the pandemic, robots have been utilized for indoor assets. In this paper, we envision the use of drones f…
▽ More
The rapid outbreak of COVID-19 pandemic invoked scientists and researchers to prepare the world for future disasters. During the pandemic, global authorities on healthcare urged the importance of disinfection of objects and surfaces. To implement efficient and safe disinfection services during the pandemic, robots have been utilized for indoor assets. In this paper, we envision the use of drones for disinfection of outdoor assets in hospitals and other facilities. Such heterogeneous assets may have different service demands (e.g., service time, quantity of the disinfectant material etc.), whereas drones have typically limited capacity (i.e., travel time, disinfectant carrying capacity). To serve all the facility assets in an efficient manner, the drone to assets allocation and drone travel routes must be optimized. In this paper, we formulate the capacitated vehicle routing problem (CVRP) to find optimal route for each drone such that the total service time is minimized, while simultaneously the drones meet the demands of each asset allocated to it. The problem is solved using mixed integer programming (MIP). As CVRP is an NP-hard problem, we propose a lightweight heuristic to achieve sub-optimal performance while reducing the time complexity in solving the problem involving a large number of assets.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
DroneNet: Crowd Density Estimation using Self-ONNs for Drones
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Video surveillance using drones is both convenient and efficient due to the ease of deployment and unobstructed movement of drones in many scenarios. An interesting application of drone-based video surveillance is to estimate crowd densities (both pedestrians and vehicles) in public places. Deep learning using convolution neural networks (CNNs) is employed for automatic crowd counting and density…
▽ More
Video surveillance using drones is both convenient and efficient due to the ease of deployment and unobstructed movement of drones in many scenarios. An interesting application of drone-based video surveillance is to estimate crowd densities (both pedestrians and vehicles) in public places. Deep learning using convolution neural networks (CNNs) is employed for automatic crowd counting and density estimation using images and videos. However, the performance and accuracy of such models typically depend upon the model architecture i.e., deeper CNN models improve accuracy at the cost of increased inference time. In this paper, we propose a novel crowd density estimation model for drones (DroneNet) using Self-organized Operational Neural Networks (Self-ONN). Self-ONN provides efficient learning capabilities with lower computational complexity as compared to CNN-based models. We tested our algorithm on two drone-view public datasets. Our evaluation shows that the proposed DroneNet shows superior performance on an equivalent CNN-based model.
△ Less
Submitted 2 August, 2023; v1 submitted 14 November, 2022;
originally announced November 2022.
-
Revisiting Crowd Counting: State-of-the-art, Trends, and Future Perspectives
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Crowd counting is an effective tool for situational awareness in public places. Automated crowd counting using images and videos is an interesting yet challenging problem that has gained significant attention in computer vision. Over the past few years, various deep learning methods have been developed to achieve state-of-the-art performance. The methods evolved over time vary in many aspects such…
▽ More
Crowd counting is an effective tool for situational awareness in public places. Automated crowd counting using images and videos is an interesting yet challenging problem that has gained significant attention in computer vision. Over the past few years, various deep learning methods have been developed to achieve state-of-the-art performance. The methods evolved over time vary in many aspects such as model architecture, input pipeline, learning paradigm, computational complexity, and accuracy gains etc. In this paper, we present a systematic and comprehensive review of the most significant contributions in the area of crowd counting. Although few surveys exist on the topic, our survey is most up-to date and different in several aspects. First, it provides a more meaningful categorization of the most significant contributions by model architectures, learning methods (i.e., loss functions), and evaluation methods (i.e., evaluation metrics). We chose prominent and distinct works and excluded similar works. We also sort the well-known crowd counting models by their performance over benchmark datasets. We believe that this survey can be a good resource for novice researchers to understand the progressive developments and contributions over time and the current state-of-the-art.
△ Less
Submitted 14 September, 2022;
originally announced September 2022.
-
A Survey on Mobile Edge Computing for Video Streaming: Opportunities and Challenges
Authors:
Muhammad Asif Khan,
Emna Baccour,
Zina Chkirbene,
Aiman Erbad,
Ridha Hamila,
Mounir Hamdi,
Moncef Gabbouj
Abstract:
5G communication brings substantial improvements in the quality of service provided to various applications by achieving higher throughput and lower latency. However, interactive multimedia applications (e.g., ultra high definition video conferencing, 3D and multiview video streaming, crowd-sourced video streaming, cloud gaming, virtual and augmented reality) are becoming more ambitious with high…
▽ More
5G communication brings substantial improvements in the quality of service provided to various applications by achieving higher throughput and lower latency. However, interactive multimedia applications (e.g., ultra high definition video conferencing, 3D and multiview video streaming, crowd-sourced video streaming, cloud gaming, virtual and augmented reality) are becoming more ambitious with high volume and low latency video streams putting strict demands on the already congested networks. Mobile Edge Computing (MEC) is an emerging paradigm that extends cloud computing capabilities to the edge of the network i.e., at the base station level. To meet the latency requirements and avoid the end-to-end communication with remote cloud data centers, MEC allows to store and process video content (e.g., caching, transcoding, pre-processing) at the base stations. Both video on demand and live video streaming can utilize MEC to improve existing services and develop novel use cases, such as video analytics, and targeted advertisements. MEC is expected to reshape the future of video streaming by providing ultra-reliable and low latency streaming (e.g., in augmented reality, virtual reality, and autonomous vehicles), pervasive computing (e.g., in real-time video analytics), and blockchain-enabled architecture for secure live streaming. This paper presents a comprehensive survey of recent developments in MEC-enabled video streaming bringing unprecedented improvement to enable novel use cases. A detailed review of the state-of-the-art is presented covering novel caching schemes, optimal computation offloading, cooperative caching and offloading and the use of artificial intelligence (i.e., machine learning, deep learning, and reinforcement learning) in MEC-assisted video streaming services.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
ML-based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Authors:
Muhammad Asif Khan,
Ridha Hamila,
Adel Gastli,
Serkan Kiranyaz,
Nasser Ahmed Al-Emadi
Abstract:
Device mobility in dense Wi-Fi networks offers several challenges. Two well-known problems related to device mobility are handover prediction and access point selection. Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. Recently, cognitive network architectures using sophistica…
▽ More
Device mobility in dense Wi-Fi networks offers several challenges. Two well-known problems related to device mobility are handover prediction and access point selection. Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. The proposed schemes are evaluated and results are compared with traditional approaches to the aforementioned problems. The results report significant improvement in network performance by applying the proposed schemes. The proposed scheme for handover prediction outperforms traditional methods i.e. received signal strength method and traveling distance method by reducing the number of unnecessary handovers by 60% and 50% respectively. Similarly, in AP selection, the proposed scheme outperforms the strongest signal first and least loaded first algorithms by achieving higher throughput gains up to 9.2% and 8% respectively.
△ Less
Submitted 29 May, 2022; v1 submitted 27 November, 2021;
originally announced November 2021.
-
Federated Learning for UAV Swarms Under Class Imbalance and Power Consumption Constraints
Authors:
Ilyes Mrad,
Lutfi Samara,
Alaa Awad Abdellatif,
Abubakr Al-Abbasi,
Ridha Hamila,
Aiman Erbad
Abstract:
The usage of unmanned aerial vehicles (UAVs) in civil and military applications continues to increase due to the numerous advantages that they provide over conventional approaches. Despite the abundance of such advantages, it is imperative to investigate the performance of UAV utilization while considering their design limitations. This paper investigates the deployment of UAV swarms when each UAV…
▽ More
The usage of unmanned aerial vehicles (UAVs) in civil and military applications continues to increase due to the numerous advantages that they provide over conventional approaches. Despite the abundance of such advantages, it is imperative to investigate the performance of UAV utilization while considering their design limitations. This paper investigates the deployment of UAV swarms when each UAV carries a machine learning classification task. To avoid data exchange with ground-based processing nodes, a federated learning approach is adopted between a UAV leader and the swarm members to improve the local learning model while avoiding excessive air-to-ground and ground-to-air communications. Moreover, the proposed deployment framework considers the stringent energy constraints of UAVs and the problem of class imbalance, where we show that considering these design parameters significantly improves the performances of the UAV swarm in terms of classification accuracy, energy consumption and availability of UAVs when compared with several baseline algorithms.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Fully Automated 2D and 3D Convolutional Neural Networks Pipeline for Video Segmentation and Myocardial Infarction Detection in Echocardiography
Authors:
Oumaima Hamila,
Sheela Ramanna,
Christopher J. Henry,
Serkan Kiranyaz,
Ridha Hamila,
Rashid Mazhar,
Tahir Hamid
Abstract:
Cardiac imaging known as echocardiography is a non-invasive tool utilized to produce data including images and videos, which cardiologists use to diagnose cardiac abnormalities in general and myocardial infarction (MI) in particular. Echocardiography machines can deliver abundant amounts of data that need to be quickly analyzed by cardiologists to help them make a diagnosis and treat cardiac condi…
▽ More
Cardiac imaging known as echocardiography is a non-invasive tool utilized to produce data including images and videos, which cardiologists use to diagnose cardiac abnormalities in general and myocardial infarction (MI) in particular. Echocardiography machines can deliver abundant amounts of data that need to be quickly analyzed by cardiologists to help them make a diagnosis and treat cardiac conditions. However, the acquired data quality varies depending on the acquisition conditions and the patient's responsiveness to the setup instructions. These constraints are challenging to doctors especially when patients are facing MI and their lives are at stake. In this paper, we propose an innovative real-time end-to-end fully automated model based on convolutional neural networks (CNN) to detect MI depending on regional wall motion abnormalities (RWMA) of the left ventricle (LV) from videos produced by echocardiography. Our model is implemented as a pipeline consisting of a 2D CNN that performs data preprocessing by segmenting the LV chamber from the apical four-chamber (A4C) view, followed by a 3D CNN that performs a binary classification to detect if the segmented echocardiography shows signs of MI. We trained both CNNs on a dataset composed of 165 echocardiography videos each acquired from a distinct patient. The 2D CNN achieved an accuracy of 97.18% on data segmentation while the 3D CNN achieved 90.9% of accuracy, 100% of precision and 95% of recall on MI detection. Our results demonstrate that creating a fully automated system for MI detection is feasible and propitious.
△ Less
Submitted 3 August, 2022; v1 submitted 26 March, 2021;
originally announced March 2021.
-
Early Detection of Myocardial Infarction in Low-Quality Echocardiography
Authors:
Aysen Degerli,
Morteza Zabihi,
Serkan Kiranyaz,
Tahir Hamid,
Rashid Mazhar,
Ridha Hamila,
Moncef Gabbouj
Abstract:
Myocardial infarction (MI), or commonly known as heart attack, is a life-threatening health problem worldwide from which 32.4 million people suffer each year. Early diagnosis and treatment of MI are crucial to prevent further heart tissue damages or death. The earliest and most reliable sign of ischemia is regional wall motion abnormality (RWMA) of the affected part of the ventricular muscle. Echo…
▽ More
Myocardial infarction (MI), or commonly known as heart attack, is a life-threatening health problem worldwide from which 32.4 million people suffer each year. Early diagnosis and treatment of MI are crucial to prevent further heart tissue damages or death. The earliest and most reliable sign of ischemia is regional wall motion abnormality (RWMA) of the affected part of the ventricular muscle. Echocardiography can easily, inexpensively, and non-invasively exhibit the RWMA. In this article, we introduce a three-phase approach for early MI detection in low-quality echocardiography: 1) segmentation of the entire left ventricle (LV) wall using a state-of-the-art deep learning model, 2) analysis of the segmented LV wall by feature engineering, and 3) early MI detection. The main contributions of this study are highly accurate segmentation of the LV wall from low-quality echocardiography, pseudo labeling approach for ground-truth formation of the unannotated LV wall, and the first public echocardiographic dataset (HMC-QU)* for MI detection. Furthermore, the outputs of the proposed approach can significantly help cardiologists for a better assessment of the LV wall characteristics. The proposed approach has achieved 95.72% sensitivity and 99.58% specificity for the LV wall segmentation, and 85.97% sensitivity, 74.03% specificity, and 86.85% precision for MI detection on the HMC-QU dataset. *The benchmark HMC-QU dataset is publicly shared at the repository https://www.kaggle.com/aysendegerli/hmcqu-dataset
△ Less
Submitted 15 March, 2021; v1 submitted 5 October, 2020;
originally announced October 2020.
-
Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection
Authors:
Serkan Kiranyaz,
Aysen Degerli,
Tahir Hamid,
Rashid Mazhar,
Rayyan Ahmed,
Rayaan Abouhasera,
Morteza Zabihi,
Junaid Malik,
Ridha Hamila,
Moncef Gabbouj
Abstract:
Echocardiogram (echo) is the earliest and the primary tool for identifying regional wall motion abnormalities (RWMA) in order to diagnose myocardial infarction (MI) or commonly known as heart attack. This paper proposes a novel approach, Active Polynomials, which can accurately and robustly estimate the global motion of the Left Ventricular (LV) wall from any echo in a robust and accurate way. The…
▽ More
Echocardiogram (echo) is the earliest and the primary tool for identifying regional wall motion abnormalities (RWMA) in order to diagnose myocardial infarction (MI) or commonly known as heart attack. This paper proposes a novel approach, Active Polynomials, which can accurately and robustly estimate the global motion of the Left Ventricular (LV) wall from any echo in a robust and accurate way. The proposed algorithm quantifies the true wall motion occurring in LV wall segments so as to assist cardiologists diagnose early signs of an acute MI. It further enables medical experts to gain an enhanced visualization capability of echo images through color-coded segments along with their "maximum motion displacement" plots helping them to better assess wall motion and LV Ejection-Fraction (LVEF). The outputs of the method can further help echo-technicians to assess and improve the quality of the echocardiogram recording. A major contribution of this study is the first public echo database collection composed by physicians at the Hamad Medical Corporation Hospital in Qatar. The so-called HMC-QU database will serve as the benchmark for the forthcoming relevant studies. The results over the HMC-QU dataset show that the proposed approach can achieve high accuracy, sensitivity and precision in MI detection even though the echo quality is quite poor, and the temporal resolution is low.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Colorectal cancer diagnosis from histology images: A comparative study
Authors:
Junaid Malik,
Serkan Kiranyaz,
Suchitra Kunhoth,
Turker Ince,
Somaya Al-Maadeed,
Ridha Hamila,
Moncef Gabbouj
Abstract:
Computer-aided diagnosis (CAD) based on histopathological imaging has progressed rapidly in recent years with the rise of machine learning based methodologies. Traditional approaches consist of training a classification model using features extracted from the images, based on textures or morphological properties. Recently, deep-learning based methods have been applied directly to the raw (unproces…
▽ More
Computer-aided diagnosis (CAD) based on histopathological imaging has progressed rapidly in recent years with the rise of machine learning based methodologies. Traditional approaches consist of training a classification model using features extracted from the images, based on textures or morphological properties. Recently, deep-learning based methods have been applied directly to the raw (unprocessed) data. However, their usability is impacted by the paucity of annotated data in the biomedical sector. In order to leverage the learning capabilities of deep Convolutional Neural Nets (CNNs) within the confines of limited labelled data, in this study we shall investigate the transfer learning approaches that aim to apply the knowledge gained from solving a source (e.g., non-medical) problem, to learn better predictive models for the target (e.g., biomedical) task. As an alternative, we shall further propose a new adaptive and compact CNN based architecture that can be trained from scratch even on scarce and low-resolution data. Moreover, we conduct quantitative comparative evaluations among the traditional methods, transfer learning-based methods and the proposed adaptive approach for the particular task of cancer detection and identification from scarce and low-resolution histology images. Over the largest benchmark dataset formed for this purpose, the proposed adaptive approach achieved a higher cancer detection accuracy with a significant gap, whereas the deep CNNs with transfer learning achieved a superior cancer identification.
△ Less
Submitted 27 March, 2019; v1 submitted 26 March, 2019;
originally announced March 2019.
-
Security-Enhanced SC-FDMA Transmissions Using Temporal Artificial-Noise and Secret-Key Aided Schemes
Authors:
Mohamed F. Marzban,
Ahmed El Shafie,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
We investigate the physical layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data block. We reduce…
▽ More
We investigate the physical layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data block. We reduce the computational and storage requirements at Bob's receiver by assuming simple per-subchannel detectors. We assume that Eve has global channel knowledge of all links in addition to high computational capabilities, where she adopts high-complexity detectors such as single-user maximum likelihood (ML), multiuser minimum-mean-square-error (MMSE), and multiuser ML. We analyze the correlation properties of the time-domain AN signal and illustrate how Eve can exploit them to reduce the AN effects. We prove that the number of useful AN streams that can degrade Eve's signal-to-noise ratio (SNR) is dependent on the channel memories of Alices-Bob and Alices-Eve links. Furthermore, we enhance the system security for the case of partial Alices-Bob channel knowledge at Eve, where Eve only knows the precoding matrices of the data and AN signals instead of knowing the entire Alices-Bob channel matrices, and propose a hybrid scheme that integrates temporal AN with channel-based secret-key extraction.
△ Less
Submitted 12 May, 2018;
originally announced May 2018.
-
On the Monetary Loss Due to Passive and Active Attacks on MIMO Smart Grid Communications
Authors:
Ahmed El Shafie,
Hamadi Chihaoui,
Ridha Hamila,
Naofal Al-Dhahir,
Adel Gastli,
Lazhar Ben-Brahim
Abstract:
We consider multiple source nodes (consumers) communicating wirelessly their energy demands to the meter data-management system (MDMS) over the subarea gateway(s). We quantify the impacts of passive and active security attacks on the wireless communications system's reliability and security as well as the energy-demand estimation-error cost in dollars paid by the utility. We adopt a multiple-input…
▽ More
We consider multiple source nodes (consumers) communicating wirelessly their energy demands to the meter data-management system (MDMS) over the subarea gateway(s). We quantify the impacts of passive and active security attacks on the wireless communications system's reliability and security as well as the energy-demand estimation-error cost in dollars paid by the utility. We adopt a multiple-input multiple-output multi-antenna-eavesdropper (MIMOME) wiretap channel model. To secure the MIMO wireless communication system, the legitimate nodes generate artificial noise (AN) vectors to mitigate the effect of the passive eavesdropping attacks. In addition, we propose a redundant design where multiple gateways are assumed to coexist in each subarea to forward the consumers' energy-demand messages. We quantify the redundant designs impact on the communication reliability between the consumers and the MDMS and on the energy-demand estimation-error cost.
△ Less
Submitted 19 November, 2017; v1 submitted 6 November, 2017;
originally announced November 2017.
-
Sparsity-Aware Joint Frame Synchronization and Channel Estimation: Algorithm and USRP Implementation
Authors:
Ozgur Ozdemir,
Ridha Hamila,
Naofal Al-Dhahir,
Ismail Guvenc
Abstract:
Conventional correlation-based frame synchronization techniques can suffer significant performance degradation over multi-path frequency-selective channels. As a remedy, in this paper we consider joint frame synchronization and channel estimation. This, however, increases the length of the resulting combined channel and its estimation becomes more challenging. On the other hand, since the combined…
▽ More
Conventional correlation-based frame synchronization techniques can suffer significant performance degradation over multi-path frequency-selective channels. As a remedy, in this paper we consider joint frame synchronization and channel estimation. This, however, increases the length of the resulting combined channel and its estimation becomes more challenging. On the other hand, since the combined channel is a sparse vector, sparse channel estimation methods can be applied. We propose a joint frame synchronization and channel estimation method using the orthogonal matching pursuit (OMP) algorithm which exploits the sparsity of the combined channel vector. Subsequently, the channel estimate is used to design the equalizer. Our simulation results and experimental outcomes using software defined radios show that the proposed approach improves the overall system performance in terms of the mean square error (MSE) between the transmitted and the equalized symbols compared to the conventional method.
△ Less
Submitted 5 September, 2017;
originally announced September 2017.
-
Achievable Rates of Buffer-Aided Full-Duplex Gaussian Relay Channels
Authors:
Ahmed El Shafie,
Ahmed Sultan,
Ioannis Krikidis,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
We derive closed-form expressions for the achievable rates of a buffer-aided full-duplex (FD) multiple-input multiple-output (MIMO) Gaussian relay channel. The FD relay still suffers from residual self-interference (RSI) after the application of self-interference mitigation techniques. We investigate both cases of a slow-RSI channel where the RSI is fixed over the entire codeword, and a fast-RSI c…
▽ More
We derive closed-form expressions for the achievable rates of a buffer-aided full-duplex (FD) multiple-input multiple-output (MIMO) Gaussian relay channel. The FD relay still suffers from residual self-interference (RSI) after the application of self-interference mitigation techniques. We investigate both cases of a slow-RSI channel where the RSI is fixed over the entire codeword, and a fast-RSI channel where the RSI changes from one symbol duration to another within the codeword. We show that the RSI can be completely eliminated in the slow-RSI case when the FD relay is equipped with a buffer while the fast RSI cannot be eliminated. For the fixed-rate data transmission scenario, we derive the optimal transmission strategy that should be adopted by the source node and relay node to maximize the system throughput. We verify our analytical findings through simulations.
△ Less
Submitted 1 August, 2017; v1 submitted 9 April, 2017;
originally announced April 2017.
-
Design and Analysis of Sparsifying Dictionaries for FIR MIMO Equalizers
Authors:
Abubakr O. Al-Abbasi,
Ridha Hamila,
Waheed U. Bajwa,
Naofal Al-Dhahir
Abstract:
In this paper, we propose a general framework that transforms the problems of designing sparse finite-impulseresponse linear equalizers and non-linear decision-feedback equalizers, for multiple antenna systems, into the problem of sparsestapproximation of a vector in different dictionaries. In addition, we investigate several choices of the sparsifying dictionaries under this framework. Furthermor…
▽ More
In this paper, we propose a general framework that transforms the problems of designing sparse finite-impulseresponse linear equalizers and non-linear decision-feedback equalizers, for multiple antenna systems, into the problem of sparsestapproximation of a vector in different dictionaries. In addition, we investigate several choices of the sparsifying dictionaries under this framework. Furthermore, the worst-case coherences of these dictionaries, which determine their sparsifying effectiveness, are analytically and/or numerically evaluated. Moreover, we show how to reduce the computational complexity of the designed sparse equalizer filters by exploiting the asymptotic equivalence of Toeplitz and circulant matrices. Finally, the superiority of our proposed framework over conventional methods is demonstrated through numerical experiments.
△ Less
Submitted 5 February, 2017;
originally announced February 2017.
-
Cooperative Access Schemes for Efficient SWIPT Transmissions in Cognitive Radio Networks
Authors:
Ahmed El Shafie,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time sl…
▽ More
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time slot to the secondary nodes to send their data and to power the energy-harvesting primary transmitter from the secondary radio-frequency signals. During the second stage, the primary transmitter sends its data to its destination and to the secondary nodes. During the third stage, the secondary nodes amplify and forward the primary data. We propose five different schemes for secondary access and powering the primary transmitter. We derive closed-form expressions for the primary and secondary rates for all the proposed schemes. Two of the proposed schemes use distributed beamforming to power the primary transmitter. We design a sparsity-aware relay-selection scheme based on the compressive sensing principles. Our numerical results demonstrate the gains of our proposed schemes for both the primary and secondary systems.
△ Less
Submitted 23 December, 2016;
originally announced December 2016.
-
Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks With Node Buffers
Authors:
Ahmed El Shafie,
Naofal Al-Dhahir,
Ridha Hamila
Abstract:
This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. The network is said to be naturally sparse if the number of nonempty-queue transmitters i…
▽ More
This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. The network is said to be naturally sparse if the number of nonempty-queue transmitters in a given frame is much smaller than the number of users, which is the case when the arrival rates to the queues are very small and the number of users is large. If the network is not naturally sparse, we design the user requests to be sparse such that only few requests are sent to the destination. We refer to the detected nonempty-queue transmitters in a given frame as frame owners. Our design goal is to minimize the nodes' total transmit power in a given frame. In the case of unslotted-time data transmission, the optimization problem is shown to be a convex optimization program. We propose an approximate formulation to simplify the problem and obtain a closed-form expression for the assigned time durations to the nodes. The solution of the approximate optimization problem demonstrates that the time duration assigned to a node in the set of frame owners is the ratio of the square-root of the buffer occupancy of that node to the sum of the square-roots of each occupancy of all the frame owners. We then investigate the slotted-time data transmission scenario, where the time durations assigned for data transmission are slotted. In addition, we show that the full-duplex capability of a node increases the data transmission portion of the frame and enables a distributed implementation of the proposed schemes.
△ Less
Submitted 17 December, 2016;
originally announced December 2016.
-
Design and Analysis Framework for Sparse FIR Channel Shortening
Authors:
Abubakr O. Al-Abbasi,
Ridha Hamila,
Waheed U. Bajwa,
Naofal Al-Dhahir
Abstract:
A major performance and complexity limitation in broadband communications is the long channel delay spread which results in a highly-frequency-selective channel frequency response. Channel shortening equalizers (CSEs) are used to ensure that the cascade of a long channel impulse response (CIR) and the CSE is approximately equivalent to a target impulse response (TIR) with much shorter delay spread…
▽ More
A major performance and complexity limitation in broadband communications is the long channel delay spread which results in a highly-frequency-selective channel frequency response. Channel shortening equalizers (CSEs) are used to ensure that the cascade of a long channel impulse response (CIR) and the CSE is approximately equivalent to a target impulse response (TIR) with much shorter delay spread. In this paper, we propose a general framework that transforms the problems of design of sparse CSE and TIR finite impulse response (FIR) filters into the problem of sparsest-approximation of a vector in different dictionaries. In addition, we compare several choices of sparsifying dictionaries under this framework. Furthermore, the worst-case coherence of these dictionaries, which determines their sparsifying effectiveness, are analytically and/or numerically evaluated. Finally, the usefulness of the proposed framework for the design of sparse CSE and TIR filters is validated through numerical experiments.
△ Less
Submitted 1 March, 2016;
originally announced March 2016.
-
A General Framework for the Design and Analysis of Sparse FIR Linear Equalizers
Authors:
Abubakr O. Al-Abbasi,
Ridha Hamila,
Waheed U. Bajwa,
Naofal Al-Dhahir
Abstract:
Complexity of linear finite-impulse-response (FIR) equalizers is proportional to the square of the number of nonzero taps in the filter. This makes equalization of channels with long impulse responses using either zero-forcing or minimum mean square error (MMSE) filters computationally expensive. Sparse equalization is a widely-used technique to solve this problem. In this paper, a general framewo…
▽ More
Complexity of linear finite-impulse-response (FIR) equalizers is proportional to the square of the number of nonzero taps in the filter. This makes equalization of channels with long impulse responses using either zero-forcing or minimum mean square error (MMSE) filters computationally expensive. Sparse equalization is a widely-used technique to solve this problem. In this paper, a general framework is provided that transforms the problem of sparse linear equalizers (LEs) design into the problem of sparsest-approximation of a vector in different dictionaries. In addition, some possible choices of sparsifying dictionaries in this framework are discussed. Furthermore, the worst-case coherence of some of these dictionaries, which determines their sparsifying strength, are analytically and/or numerically evaluated. Finally, the usefulness of the proposed framework for the design of sparse FIR LEs is validated through numerical experiments.
△ Less
Submitted 22 November, 2015;
originally announced November 2015.
-
Joint Secured and Robust Technique for OFDM Systems
Authors:
Al-Dweik,
M. Mirahmadi,
A. Shami,
Z. Ding,
R. Hamila
Abstract:
This work presents a novel technique for joint secured and robust transmission of orthogonal frequency division multiplexing (OFDM) based communication systems. The proposed system is implemented by developing a new OFDM symbol structure based on symmetric key cryptography. At the receiver side, data detection becomes infeasible without the knowledge of the secret key. For an intruder who tries to…
▽ More
This work presents a novel technique for joint secured and robust transmission of orthogonal frequency division multiplexing (OFDM) based communication systems. The proposed system is implemented by developing a new OFDM symbol structure based on symmetric key cryptography. At the receiver side, data detection becomes infeasible without the knowledge of the secret key. For an intruder who tries to detect the data without the knowledge of the key, the signal will be a noise-like signal. In addition to the system security, theoretical and simulation results demonstrated that the proposed system provides time and frequency diversity, which makes the system highly robust against severe frequency-selective fading as well as other impairments such as impulsive noise and multiple access interference. For particular frequency-selective fading channels, the bit error rate (BER) improvements was about 15 dB at BER of 10E-4.
△ Less
Submitted 10 December, 2012;
originally announced December 2012.