-
Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities
Authors:
Osama Wehbi,
Sarhad Arisdakessian,
Mohsen Guizani,
Omar Abdel Wahab,
Azzam Mourad,
Hadi Otrok,
Hoda Al khzaimi,
Bassem Ouni
Abstract:
Federated learning is a promising collaborative and privacy-preserving machine learning approach in data-rich smart cities. Nevertheless, the inherent heterogeneity of these urban environments presents a significant challenge in selecting trustworthy clients for collaborative model training. The usage of traditional approaches, such as the random client selection technique, poses several threats t…
▽ More
Federated learning is a promising collaborative and privacy-preserving machine learning approach in data-rich smart cities. Nevertheless, the inherent heterogeneity of these urban environments presents a significant challenge in selecting trustworthy clients for collaborative model training. The usage of traditional approaches, such as the random client selection technique, poses several threats to the system's integrity due to the possibility of malicious client selection. Primarily, the existing literature focuses on assessing the trustworthiness of clients, neglecting the crucial aspect of trust in federated servers. To bridge this gap, in this work, we propose a novel framework that addresses the mutual trustworthiness in federated learning by considering the trust needs of both the client and the server. Our approach entails: (1) Creating preference functions for servers and clients, allowing them to rank each other based on trust scores, (2) Establishing a reputation-based recommendation system leveraging multiple clients to assess newly connected servers, (3) Assigning credibility scores to recommending devices for better server trustworthiness measurement, (4) Developing a trust assessment mechanism for smart devices using a statistical Interquartile Range (IQR) method, (5) Designing intelligent matching algorithms considering the preferences of both parties. Based on simulation and experimental results, our approach outperforms baseline methods by increasing trust levels, global model accuracy, and reducing non-trustworthy clients in the system.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Empirical investigation of multi-source cross-validation in clinical machine learning
Authors:
Tuija Leinonen,
David Wong,
Ali Wahab,
Ramesh Nadarajah,
Matti Kaisti,
Antti Airola
Abstract:
Traditionally, machine learning-based clinical prediction models have been trained and evaluated on patient data from a single source, such as a hospital. Cross-validation methods can be used to estimate the accuracy of such models on new patients originating from the same source, by repeated random splitting of the data. However, such estimates tend to be highly overoptimistic when compared to ac…
▽ More
Traditionally, machine learning-based clinical prediction models have been trained and evaluated on patient data from a single source, such as a hospital. Cross-validation methods can be used to estimate the accuracy of such models on new patients originating from the same source, by repeated random splitting of the data. However, such estimates tend to be highly overoptimistic when compared to accuracy obtained from deploying models to sources not represented in the dataset, such as a new hospital. The increasing availability of multi-source medical datasets provides new opportunities for obtaining more comprehensive and realistic evaluations of expected accuracy through source-level cross-validation designs.
In this study, we present a systematic empirical evaluation of standard K-fold cross-validation and leave-source-out cross-validation methods in a multi-source setting. We consider the task of electrocardiogram based cardiovascular disease classification, combining and harmonizing the openly available PhysioNet CinC Challenge 2021 and the Shandong Provincial Hospital datasets for our study.
Our results show that K-fold cross-validation, both on single-source and multi-source data, systemically overestimates prediction performance when the end goal is to generalize to new sources. Leave-source-out cross-validation provides more reliable performance estimates, having close to zero bias though larger variability. The evaluation highlights the dangers of obtaining misleading cross-validation results on medical data and demonstrates how these issues can be mitigated when having access to multi-source data.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
Authors:
Hani Sami,
Ahmad Hammoud,
Mouhamad Arafeh,
Mohamad Wazzeh,
Sarhad Arisdakessian,
Mario Chahoud,
Osama Wehbi,
Mohamad Ajaj,
Azzam Mourad,
Hadi Otrok,
Omar Abdel Wahab,
Rabeb Mizouni,
Jamal Bentahar,
Chamseddine Talhi,
Zbigniew Dziong,
Ernesto Damiani,
Mohsen Guizani
Abstract:
The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the…
▽ More
The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
A Survey on Explainable Artificial Intelligence for Cybersecurity
Authors:
Gaith Rjoub,
Jamal Bentahar,
Omar Abdel Wahab,
Rabeb Mizouni,
Alyssa Song,
Robin Cohen,
Hadi Otrok,
Azzam Mourad
Abstract:
The black-box nature of artificial intelligence (AI) models has been the source of many concerns in their use for critical applications. Explainable Artificial Intelligence (XAI) is a rapidly growing research field that aims to create machine learning models that can provide clear and interpretable explanations for their decisions and actions. In the field of network cybersecurity, XAI has the pot…
▽ More
The black-box nature of artificial intelligence (AI) models has been the source of many concerns in their use for critical applications. Explainable Artificial Intelligence (XAI) is a rapidly growing research field that aims to create machine learning models that can provide clear and interpretable explanations for their decisions and actions. In the field of network cybersecurity, XAI has the potential to revolutionize the way we approach network security by enabling us to better understand the behavior of cyber threats and to design more effective defenses. In this survey, we review the state of the art in XAI for cybersecurity in network systems and explore the various approaches that have been proposed to address this important problem. The review follows a systematic classification of network-driven cybersecurity threats and issues. We discuss the challenges and limitations of current XAI methods in the context of cybersecurity and outline promising directions for future research.
△ Less
Submitted 11 June, 2023; v1 submitted 7 March, 2023;
originally announced March 2023.
-
Multipolar Acoustic Source Reconstruction from Sparse Far-Field Data using ALOHA
Authors:
Yukun Guo,
Abdul Wahab,
Xianchao Wang
Abstract:
The reconstruction of multipolar acoustic or electromagnetic sources from their far-field signature plays a crucial role in numerous applications. Most of the existing techniques require dense multi-frequency data at the Nyquist sampling rate. The availability of a sub-sampled grid contributes to the null space of the inverse source-to-data operator, which causes significant imaging artifacts. For…
▽ More
The reconstruction of multipolar acoustic or electromagnetic sources from their far-field signature plays a crucial role in numerous applications. Most of the existing techniques require dense multi-frequency data at the Nyquist sampling rate. The availability of a sub-sampled grid contributes to the null space of the inverse source-to-data operator, which causes significant imaging artifacts. For this purpose, additional knowledge about the source or regularization is required. In this letter, we propose a novel two-stage strategy for multipolar source reconstruction from sub-sampled sparse data that takes advantage of the sparsity of the sources in the physical domain. The data at the Nyquist sampling rate is recovered from sub-sampled data and then a conventional inversion algorithm is used to reconstruct sources. The data recovery problem is linked to a spectrum recovery problem for the signal with the \textit{finite rate of innovations} (FIR) that is solved using an annihilating filter-based structured Hankel matrix completion approach (ALOHA). For an accurate reconstruction, a Fourier inversion algorithm is used. The suitability of the approach is supported by experiments.
△ Less
Submitted 29 October, 2023; v1 submitted 12 March, 2023;
originally announced March 2023.
-
Keystroke Dynamics: Concepts, Techniques, and Applications
Authors:
Rashik Shadman,
Ahmed Anu Wahab,
Michael Manno,
Matthew Lukaszewski,
Daqing Hou,
Faraz Hussain
Abstract:
Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques such as biometric authentication systems have been devised in recent years. This paper surveys keystroke-based authentication systems and their applications. Keystroke dynamics is a behavioral biometric that is emerging as an important tool for cybersecurity as it promi…
▽ More
Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques such as biometric authentication systems have been devised in recent years. This paper surveys keystroke-based authentication systems and their applications. Keystroke dynamics is a behavioral biometric that is emerging as an important tool for cybersecurity as it promises to be non-intrusive and cost-effective. Also, no additional hardware is required, making it convenient to deploy. This survey covers novel keystroke datasets, state-of-the-art keystroke authentication algorithms, keystroke authentication on touch screen and mobile devices, and various prominent applications of such techniques beyond authentication. The paper covers all the significant aspects of keystroke dynamics and can be considered as a reference for future researchers in this domain. The paper includes a discussion of the latest keystroke datasets, providing researchers with up-to-date resources for analysis and experimentation. Additionally, we review the state-of-the-art algorithms adopted within this domain, offering insights into the cutting-edge techniques utilized for keystroke analysis. Moreover, our paper explains the diverse applications of keystroke dynamics, particularly focusing on security, verification and identification uses. Beyond these crucial areas, we mention other additional applications where keystroke dynamics can be applied, broadening the scope of understanding regarding its potential impact across various domains.
△ Less
Submitted 23 June, 2024; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Anticancer Peptides Classification using Kernel Sparse Representation Classifier
Authors:
Ehtisham Fazal,
Muhammad Sohail Ibrahim,
Seongyong Park,
Imran Naseem,
Abdul Wahab
Abstract:
Cancer is one of the most challenging diseases because of its complexity, variability, and diversity of causes. It has been one of the major research topics over the past decades, yet it is still poorly understood. To this end, multifaceted therapeutic frameworks are indispensable. \emph{Anticancer peptides} (ACPs) are the most promising treatment option, but their large-scale identification and s…
▽ More
Cancer is one of the most challenging diseases because of its complexity, variability, and diversity of causes. It has been one of the major research topics over the past decades, yet it is still poorly understood. To this end, multifaceted therapeutic frameworks are indispensable. \emph{Anticancer peptides} (ACPs) are the most promising treatment option, but their large-scale identification and synthesis require reliable prediction methods, which is still a problem. In this paper, we present an intuitive classification strategy that differs from the traditional \emph{black box} method and is based on the well-known statistical theory of \emph{sparse-representation classification} (SRC). Specifically, we create over-complete dictionary matrices by embedding the \emph{composition of the K-spaced amino acid pairs} (CKSAAP). Unlike the traditional SRC frameworks, we use an efficient \emph{matching pursuit} solver instead of the computationally expensive \emph{basis pursuit} solver in this strategy. Furthermore, the \emph{kernel principal component analysis} (KPCA) is employed to cope with non-linearity and dimension reduction of the feature space whereas the \emph{synthetic minority oversampling technique} (SMOTE) is used to balance the dictionary. The proposed method is evaluated on two benchmark datasets for well-known statistical parameters and is found to outperform the existing methods. The results show the highest sensitivity with the most balanced accuracy, which might be beneficial in understanding structural and chemical aspects and developing new ACPs. The Google-Colab implementation of the proposed method is available at the author's GitHub page (\href{https://github.com/ehtisham-Fazal/ACP-Kernel-SRC}{https://github.com/ehtisham-fazal/ACP-Kernel-SRC}).
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices
Authors:
Osama Wehbi,
Sarhad Arisdakessian,
Omar Abdel Wahab,
Hadi Otrok,
Safa Otoum,
Azzam Mourad,
Mohsen Guizani
Abstract:
Federated Learning (FL) is a novel distributed privacy-preserving learning paradigm, which enables the collaboration among several participants (e.g., Internet of Things devices) for the training of machine learning models. However, selecting the participants that would contribute to this collaborative training is highly challenging. Adopting a random selection strategy would entail substantial pr…
▽ More
Federated Learning (FL) is a novel distributed privacy-preserving learning paradigm, which enables the collaboration among several participants (e.g., Internet of Things devices) for the training of machine learning models. However, selecting the participants that would contribute to this collaborative training is highly challenging. Adopting a random selection strategy would entail substantial problems due to the heterogeneity in terms of data quality, and computational and communication resources across the participants. Although several approaches have been proposed in the literature to overcome the problem of random selection, most of these approaches follow a unilateral selection strategy. In fact, they base their selection strategy on only the federated server's side, while overlooking the interests of the client devices in the process. To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves the design of: (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the newly connected IoT devices. Based on our simulation findings, our strategy surpasses the VanillaFL selection approach in terms of maximizing both the revenues of the client devices and accuracy of the global federated learning model.
△ Less
Submitted 31 October, 2022;
originally announced November 2022.
-
Performance Analysis of Fractional Learning Algorithms
Authors:
Abdul Wahab,
Shujaat Khan,
Imran Naseem,
Jong Chul Ye
Abstract:
Fractional learning algorithms are trending in signal processing and adaptive filtering recently. However, it is unclear whether the proclaimed superiority over conventional algorithms is well-grounded or is a myth as their performance has never been extensively analyzed. In this article, a rigorous analysis of fractional variants of the least mean squares and steepest descent algorithms is perfor…
▽ More
Fractional learning algorithms are trending in signal processing and adaptive filtering recently. However, it is unclear whether the proclaimed superiority over conventional algorithms is well-grounded or is a myth as their performance has never been extensively analyzed. In this article, a rigorous analysis of fractional variants of the least mean squares and steepest descent algorithms is performed. Some critical schematic kinks in fractional learning algorithms are identified. Their origins and consequences on the performance of the learning algorithms are discussed and swift ready-witted remedies are proposed. Apposite numerical experiments are conducted to discuss the convergence and efficiency of the fractional learning algorithms in stochastic environments.
△ Less
Submitted 11 October, 2021;
originally announced October 2021.
-
Evaluating Multiway Multilingual NMT in the Turkic Languages
Authors:
Jamshidbek Mirzakhalov,
Anoop Babu,
Aigiz Kunafin,
Ahsan Wahab,
Behzod Moydinboyev,
Sardana Ivanova,
Mokhiyakhon Uzokova,
Shaxnoza Pulatova,
Duygu Ataman,
Julia Kreutzer,
Francis Tyers,
Orhan Firat,
John Licato,
Sriram Chellappan
Abstract:
Despite the increasing number of large and comprehensive machine translation (MT) systems, evaluation of these methods in various languages has been restrained by the lack of high-quality parallel corpora as well as engagement with the people that speak these languages. In this study, we present an evaluation of state-of-the-art approaches to training and evaluating MT systems in 22 languages from…
▽ More
Despite the increasing number of large and comprehensive machine translation (MT) systems, evaluation of these methods in various languages has been restrained by the lack of high-quality parallel corpora as well as engagement with the people that speak these languages. In this study, we present an evaluation of state-of-the-art approaches to training and evaluating MT systems in 22 languages from the Turkic language family, most of which being extremely under-explored. First, we adopt the TIL Corpus with a few key improvements to the training and the evaluation sets. Then, we train 26 bilingual baselines as well as a multi-way neural MT (MNMT) model using the corpus and perform an extensive analysis using automatic metrics as well as human evaluations. We find that the MNMT model outperforms almost all bilingual baselines in the out-of-domain test sets and finetuning the model on a downstream task of a single pair also results in a huge performance boost in both low- and high-resource scenarios. Our attentive analysis of evaluation criteria for MT models in Turkic languages also points to the necessity for further research in this direction. We release the corpus splits, test sets as well as models to the public.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
A Large-Scale Study of Machine Translation in the Turkic Languages
Authors:
Jamshidbek Mirzakhalov,
Anoop Babu,
Duygu Ataman,
Sherzod Kariev,
Francis Tyers,
Otabek Abduraufov,
Mammad Hajili,
Sardana Ivanova,
Abror Khaytbaev,
Antonio Laverghetta Jr.,
Behzodbek Moydinboyev,
Esra Onal,
Shaxnoza Pulatova,
Ahsan Wahab,
Orhan Firat,
Sriram Chellappan
Abstract:
Recent advances in neural machine translation (NMT) have pushed the quality of machine translation systems to the point where they are becoming widely adopted to build competitive systems. However, there is still a large number of languages that are yet to reap the benefits of NMT. In this paper, we provide the first large-scale case study of the practical application of MT in the Turkic language…
▽ More
Recent advances in neural machine translation (NMT) have pushed the quality of machine translation systems to the point where they are becoming widely adopted to build competitive systems. However, there is still a large number of languages that are yet to reap the benefits of NMT. In this paper, we provide the first large-scale case study of the practical application of MT in the Turkic language family in order to realize the gains of NMT for Turkic languages under high-resource to extremely low-resource scenarios. In addition to presenting an extensive analysis that identifies the bottlenecks towards building competitive systems to ameliorate data scarcity, our study has several key contributions, including, i) a large parallel corpus covering 22 Turkic languages consisting of common public datasets in combination with new datasets of approximately 2 million parallel sentences, ii) bilingual baselines for 26 language pairs, iii) novel high-quality test sets in three different translation domains and iv) human evaluation scores. All models, scripts, and data will be released to the public.
△ Less
Submitted 9 September, 2021;
originally announced September 2021.
-
Trends, Politics, Sentiments, and Misinformation: Understanding People's Reactions to COVID-19 During its Early Stages
Authors:
Omar Abdel Wahab,
Ali Mustafa,
André Bertrand Abisseck Bamatakina
Abstract:
The sudden outbreak of COVID-19 resulted in large volumes of data shared on different social media platforms. Analyzing and visualizing these data is doubtlessly essential to having a deep understanding of the pandemic's impacts on people's lives and their reactions to them. In this work, we conduct a large-scale spatiotemporal data analytic study to understand peoples' reactions to the COVID-19 p…
▽ More
The sudden outbreak of COVID-19 resulted in large volumes of data shared on different social media platforms. Analyzing and visualizing these data is doubtlessly essential to having a deep understanding of the pandemic's impacts on people's lives and their reactions to them. In this work, we conduct a large-scale spatiotemporal data analytic study to understand peoples' reactions to the COVID-19 pandemic during its early stages. In particular, we analyze a JSON-based dataset that is collected from news/messages/boards/blogs in English about COVID-19 over a period of 4 months, for a total of 5.2M posts. The data are collected from December 2019 to March 2020 from several social media platforms such as Facebook, LinkedIn, Pinterest, StumbleUpon and VK. Our study aims mainly to understand which implications of COVID-19 have interested social media users the most and how did they vary over time, the spatiotemporal distribution of misinformation, and the public opinion toward public figures during the pandemic. Our results can be used by many parties (e.g., governments, psychologists, etc.) to make more informative decisions, taking into account the actual interests and opinions of the people.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Cloud computing as a platform for monetizing data services: A two-sided game business model
Authors:
Ahmed Saleh Bataineh,
Jamal Bentahar,
Rabeb Mizouni,
Omar Abdel Wahab,
Gaith Rjoub,
May El Barachi
Abstract:
With the unprecedented reliance on cloud computing as the backbone for storing today's big data, we argue in this paper that the role of the cloud should be reshaped from being a passive virtual market to become an active platform for monetizing the big data through Artificial Intelligence (AI) services. The objective is to enable the cloud to be an active platform that can help big data service p…
▽ More
With the unprecedented reliance on cloud computing as the backbone for storing today's big data, we argue in this paper that the role of the cloud should be reshaped from being a passive virtual market to become an active platform for monetizing the big data through Artificial Intelligence (AI) services. The objective is to enable the cloud to be an active platform that can help big data service providers reach a wider set of customers and cloud users (i.e., data consumers) to be exposed to a larger and richer variety of data to run their data analytic tasks. To achieve this vision, we propose a novel game theoretical model, which consists of a mix of cooperative and competitive strategies. The players of the game are the big data service providers, cloud computing platform, and cloud users. The strategies of the players are modeled using the two-sided market theory that takes into consideration the network effects among involved parties, while integrating the externalities between the cloud resources and consumer demands into the design of the game. Simulations conducted using Amazon and google clustered data show that the proposed model improves the total surplus of all the involved parties in terms of cloud resources provision and monetary profits compared to the current merchant model.
△ Less
Submitted 26 April, 2021;
originally announced April 2021.
-
Quality at a Glance: An Audit of Web-Crawled Multilingual Datasets
Authors:
Julia Kreutzer,
Isaac Caswell,
Lisa Wang,
Ahsan Wahab,
Daan van Esch,
Nasanbayar Ulzii-Orshikh,
Allahsera Tapo,
Nishant Subramani,
Artem Sokolov,
Claytone Sikasote,
Monang Setyawan,
Supheakmungkol Sarin,
Sokhar Samb,
Benoît Sagot,
Clara Rivera,
Annette Rios,
Isabel Papadimitriou,
Salomey Osei,
Pedro Ortiz Suarez,
Iroro Orife,
Kelechi Ogueji,
Andre Niyongabo Rubungo,
Toan Q. Nguyen,
Mathias Müller,
André Müller
, et al. (27 additional authors not shown)
Abstract:
With the success of large-scale pre-training and multilingual modeling in Natural Language Processing (NLP), recent years have seen a proliferation of large, web-mined text datasets covering hundreds of languages. We manually audit the quality of 205 language-specific corpora released with five major public datasets (CCAligned, ParaCrawl, WikiMatrix, OSCAR, mC4). Lower-resource corpora have system…
▽ More
With the success of large-scale pre-training and multilingual modeling in Natural Language Processing (NLP), recent years have seen a proliferation of large, web-mined text datasets covering hundreds of languages. We manually audit the quality of 205 language-specific corpora released with five major public datasets (CCAligned, ParaCrawl, WikiMatrix, OSCAR, mC4). Lower-resource corpora have systematic issues: At least 15 corpora have no usable text, and a significant fraction contains less than 50% sentences of acceptable quality. In addition, many are mislabeled or use nonstandard/ambiguous language codes. We demonstrate that these issues are easy to detect even for non-proficient speakers, and supplement the human audit with automatic analyses. Finally, we recommend techniques to evaluate and improve multilingual corpora and discuss potential risks that come with low-quality data releases.
△ Less
Submitted 21 February, 2022; v1 submitted 22 March, 2021;
originally announced March 2021.
-
Short-Term Load Forecasting using Bi-directional Sequential Models and Feature Engineering for Small Datasets
Authors:
Abdul Wahab,
Muhammad Anas Tahir,
Naveed Iqbal,
Faisal Shafait,
Syed Muhammad Raza Kazmi
Abstract:
Electricity load forecasting enables the grid operators to optimally implement the smart grid's most essential features such as demand response and energy efficiency. Electricity demand profiles can vary drastically from one region to another on diurnal, seasonal and yearly scale. Hence to devise a load forecasting technique that can yield the best estimates on diverse datasets, specially when the…
▽ More
Electricity load forecasting enables the grid operators to optimally implement the smart grid's most essential features such as demand response and energy efficiency. Electricity demand profiles can vary drastically from one region to another on diurnal, seasonal and yearly scale. Hence to devise a load forecasting technique that can yield the best estimates on diverse datasets, specially when the training data is limited, is a big challenge. This paper presents a deep learning architecture for short-term load forecasting based on bidirectional sequential models in conjunction with feature engineering that extracts the hand-crafted derived features in order to aid the model for better learning and predictions. In the proposed architecture, named as Deep Derived Feature Fusion (DeepDeFF), the raw input and hand-crafted features are trained at separate levels and then their respective outputs are combined to make the final prediction. The efficacy of the proposed methodology is evaluated on datasets from five countries with completely different patterns. The results demonstrate that the proposed technique is superior to the existing state of the art.
△ Less
Submitted 28 November, 2020;
originally announced November 2020.
-
AFP-SRC: Identification of Antifreeze Proteins Using Sparse Representation Classifier
Authors:
Shujaat Khan,
Muhammad Usman,
Abdul Wahab
Abstract:
Species living in the extreme cold environment fight against the harsh conditions using antifreeze proteins (AFPs), that manipulates the freezing mechanism of water in more than one way. This amazing nature of AFP turns out to be extremely useful in several industrial and medical applications. The lack of similarity in their structure and sequence makes their prediction an arduous task and identif…
▽ More
Species living in the extreme cold environment fight against the harsh conditions using antifreeze proteins (AFPs), that manipulates the freezing mechanism of water in more than one way. This amazing nature of AFP turns out to be extremely useful in several industrial and medical applications. The lack of similarity in their structure and sequence makes their prediction an arduous task and identifying them experimentally in the wet-lab is time-consuming and expensive. In this research, we propose a computational framework for the prediction of AFPs which is essentially based on a sample-specific classification method using the sparse reconstruction. A linear model and an over-complete dictionary matrix of known AFPs are used to predict a sparse class-label vector that provides a sample-association score. Delta-rule is applied for the reconstruction of two pseudo-samples using lower and upper parts of the sample-association vector and based on the minimum recovery score, class labels are assigned. We compare our approach with contemporary methods on a standard dataset and the proposed method is found to outperform in terms of Balanced accuracy and Youden's index. The MATLAB implementation of the proposed method is available at the author's GitHub page (\{https://github.com/Shujaat123/AFP-SRC}{https://github.com/Shujaat123/AFP-SRC}).
△ Less
Submitted 24 September, 2021; v1 submitted 11 September, 2020;
originally announced September 2020.
-
E3-targetPred: Prediction of E3-Target Proteins Using Deep Latent Space Encoding
Authors:
Seongyong Park,
Shujaat Khan,
Abdul Wahab
Abstract:
Understanding E3 ligase and target substrate interactions are important for cell biology and therapeutic development. However, experimental identification of E3 target relationships is not an easy task due to the labor-intensive nature of the experiments. In this article, a sequence-based E3-target prediction model is proposed for the first time. The proposed framework utilizes composition of k-sp…
▽ More
Understanding E3 ligase and target substrate interactions are important for cell biology and therapeutic development. However, experimental identification of E3 target relationships is not an easy task due to the labor-intensive nature of the experiments. In this article, a sequence-based E3-target prediction model is proposed for the first time. The proposed framework utilizes composition of k-spaced amino acid pairs (CKSAAP) to learn the relationship between E3 ligases and their target protein. A class separable latent space encoding scheme is also devised that provides a compressed representation of feature space. A thorough ablation study is performed to identify an optimal gap size for CKSAAP and the number of latent variables that can represent the E3-target relationship successfully. The proposed scheme is evaluated on an independent dataset for a variety of standard quantitative measures. In particular, it achieves an average accuracy of $70.63\%$ on an independent dataset. The source code and datasets used in the study are available at the author's GitHub page (https://github.com/psychemistz/E3targetPred).
△ Less
Submitted 26 June, 2020;
originally announced July 2020.
-
EPiT : A Software Testing Tool for Generation of Test Cases Automatically
Authors:
Rosziati Ibrahim,
Ammar Aminuddin Bani Amin,
Sapiee Jamel,
Jahari Abdul Wahab
Abstract:
Software test cases can be defined as a set of condition where a tester needs to test and determine that the System Under Test (SUT) satisfied with the expected result correctly. This paper discusses the optimization technique in generating cases automatically by using EpiT (Eclipse Plug-in Tool). EpiT is developed to optimize the generation of test cases from source code in order to reduce time u…
▽ More
Software test cases can be defined as a set of condition where a tester needs to test and determine that the System Under Test (SUT) satisfied with the expected result correctly. This paper discusses the optimization technique in generating cases automatically by using EpiT (Eclipse Plug-in Tool). EpiT is developed to optimize the generation of test cases from source code in order to reduce time used for conventional manually creating test cases. By using code smell functionality, EpiT helps to generate test cases automatically from Java programs by checking its line of code (LOC). The implementation of EpiT will also be presented based on several case studies conducted to show the optimization of the test cases generated. Based on the results presented, EpiT is proven to solve the problem for software tester to generate test case manually and check the optimization from the source code using code smell technique.
△ Less
Submitted 22 July, 2020;
originally announced July 2020.
-
A two-level solution to fight against dishonest opinions in recommendation-based trust systems
Authors:
Omar Abdel Wahab,
Jamal Bentahar,
Robin Cohen,
Hadi Otrok,
Azzam Mourad
Abstract:
In this paper, we propose a mechanism to deal with dishonest opinions in recommendation-based trust models, at both the collection and processing levels. We consider a scenario in which an agent requests recommendations from multiple parties to build trust toward another agent. At the collection level, we propose to allow agents to self-assess the accuracy of their recommendations and autonomously…
▽ More
In this paper, we propose a mechanism to deal with dishonest opinions in recommendation-based trust models, at both the collection and processing levels. We consider a scenario in which an agent requests recommendations from multiple parties to build trust toward another agent. At the collection level, we propose to allow agents to self-assess the accuracy of their recommendations and autonomously decide on whether they would participate in the recommendation process or not. At the processing level, we propose a recommendations aggregation technique that is resilient to collusion attacks, followed by a credibility update mechanism for the participating agents. The originality of our work stems from its consideration of dishonest opinions at both the collection and processing levels, which allows for better and more persistent protection against dishonest recommenders. Experiments conducted on the Epinions dataset show that our solution yields better performance in protecting the recommendation process against Sybil attacks, in comparison with a competing model that derives the optimal network of advisors based on the agents' trust values.
△ Less
Submitted 8 June, 2020;
originally announced June 2020.
-
Smart Parking: IoT and Blockchain
Authors:
Abdul Wahab,
Phil Maguire
Abstract:
Distributed ledger technology and IoT has revolutionized the world by finding its application in all the domains. It promises to transform the digital infrastructure which powers extensive evolutions and impacts a lot of areas. Vehicle parking is a major problem in major cities around the world in both developed and developing countries. The common problems are unavailability or shortage of parkin…
▽ More
Distributed ledger technology and IoT has revolutionized the world by finding its application in all the domains. It promises to transform the digital infrastructure which powers extensive evolutions and impacts a lot of areas. Vehicle parking is a major problem in major cities around the world in both developed and developing countries. The common problems are unavailability or shortage of parking spaces, no information about tariff and no mean of searching availability of parking space online. The struggle doesn't end even if an individual finds a spot, he is required to pay in cash. This traditional and manual process takes a lot of time and causes a lot of hassle. In this paper, we provide a novel solution to the parking problem using IoT and distributed ledger technology. This system is based on pervasive computing and provides auto check-in and check-out. The user can control the system and their profile using the app on their smartphone. The major advantage of the system is an easy and online payment method. Users can pay for their parking tickets using their credit cards from their smartphone app. This decreases their hassle of carrying cash and coins for purchasing parking tickets. Smart Parking will optimize the parking mechanism, save time, reduce traffic and pollution, and provide an enhanced user experience. It is robust, secure, scalable and automated using the combination of cutting-edge technologies.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Generative Adversarial Networks for Mitigating Biases in Machine Learning Systems
Authors:
Adel Abusitta,
Esma Aïmeur,
Omar Abdel Wahab
Abstract:
In this paper, we propose a new framework for mitigating biases in machine learning systems. The problem of the existing mitigation approaches is that they are model-oriented in the sense that they focus on tuning the training algorithms to produce fair results, while overlooking the fact that the training data can itself be the main reason for biased outcomes. Technically speaking, two essential…
▽ More
In this paper, we propose a new framework for mitigating biases in machine learning systems. The problem of the existing mitigation approaches is that they are model-oriented in the sense that they focus on tuning the training algorithms to produce fair results, while overlooking the fact that the training data can itself be the main reason for biased outcomes. Technically speaking, two essential limitations can be found in such model-based approaches: 1) the mitigation cannot be achieved without degrading the accuracy of the machine learning models, and 2) when the data used for training are largely biased, the training time automatically increases so as to find suitable learning parameters that help produce fair results. To address these shortcomings, we propose in this work a new framework that can largely mitigate the biases and discriminations in machine learning systems while at the same time enhancing the prediction accuracy of these systems. The proposed framework is based on conditional Generative Adversarial Networks (cGANs), which are used to generate new synthetic fair data with selective properties from the original data. We also propose a framework for analyzing data biases, which is important for understanding the amount and type of data that need to be synthetically sampled and labeled for each population group. Experimental results show that the proposed solution can efficiently mitigate different types of biases, while at the same time enhancing the prediction accuracy of the underlying machine learning model.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components
Authors:
Muhammad Abdul Wahab,
Pascal Cotret,
Mounir Nasr Allah,
Guillaume Hiet,
Arnab Kumar Biswas,
Vianney Lapôtre,
Guy Gogniat
Abstract:
Most of hardware-assisted solutions for software security, program monitoring, and event-checking approaches require instrumentation of the target software, an operation which can be performed using an SBI (Static Binary Instrumentation) or a DBI (Dynamic Binary Instrumentation) framework. Hardware-assisted instrumentation can use one of these two solutions to instrument data to a memory-mapped re…
▽ More
Most of hardware-assisted solutions for software security, program monitoring, and event-checking approaches require instrumentation of the target software, an operation which can be performed using an SBI (Static Binary Instrumentation) or a DBI (Dynamic Binary Instrumentation) framework. Hardware-assisted instrumentation can use one of these two solutions to instrument data to a memory-mapped register. Both these approaches require an in-depth knowledge of frameworks and an important amount of software modifications in order to instrument a whole application. This work proposes a novel way to instrument an application with minor modifications, at the source code level, taking advantage of underlying hardware debug components such as CS (CoreSight) components available on Xilinx Zynq SoCs. As an example, the instrumentation approach proposed in this work is used to detect a double free security attack. Furthermore, it is evaluated in terms of runtime and area overhead. Results show that the proposed solution takes 30 $μ$s on average to instrument an instruction while the optimized version only takes 0.014 us which is ten times better than usual memory-mapped register solutions used in existing works.
△ Less
Submitted 4 December, 2018;
originally announced December 2018.
-
A small and adaptive coprocessor for information flow tracking in ARM SoCs
Authors:
Muhammad Abdul Wahab,
Pascal Cotret,
Mounir Nasr Allah,
Guillaume Hiet,
Arnab Kumar Biswas,
Vianney Lapôtre,
Guy Gogniat
Abstract:
DIFT (Dynamic Information Flow Tracking) has been a hot topic for more than a decade. Unfortunately, existing hardware DIFT approaches have not been widely used neither by research community nor by hardware vendors. It is due to two major reasons: current hardware DIFT solutions lack support for multi-threaded applications and implementations for hardcore processors. This work addresses both issue…
▽ More
DIFT (Dynamic Information Flow Tracking) has been a hot topic for more than a decade. Unfortunately, existing hardware DIFT approaches have not been widely used neither by research community nor by hardware vendors. It is due to two major reasons: current hardware DIFT solutions lack support for multi-threaded applications and implementations for hardcore processors. This work addresses both issues by introducing an approach with some unique features: DIFT for multi-threaded software, virtual memory protection (rather than physical memory as in related works) and Linux kernel support using an information flow monitor called RFBlare. These goals are accomplished by taking advantage of a notable feature of ARM CoreSight components (context ID) combined with a custom DIFT coprocessor and RFBlare. The communication time overhead, major source of slowdown in total DIFT time overhead, is divided by a factor 3.8 compared to existing solutions with similar software constraints as in this work. The area overhead of this work is lower than 1% and power overhead is 16.2% on a middle-class Xilinx Zynq SoC.
△ Less
Submitted 4 December, 2018;
originally announced December 2018.
-
Towards a hardware-assisted information flow tracking ecosystem for ARM processors
Authors:
Muhammad Abdul Wahab,
Pascal Cotret,
Mounir Nasr Allah,
Guillaume Hiet,
Vianney Lapotre,
Guy Gogniat
Abstract:
This work details a hardware-assisted approach for information flow tracking implemented on reconfigurable chips. Current solutions are either time-consuming or hardly portable (modifications of both sofware/hardware layers). This work takes benefits from debug components included in ARMv7 processors to retrieve details on instructions committed by the CPU. First results in terms of silicon area a…
▽ More
This work details a hardware-assisted approach for information flow tracking implemented on reconfigurable chips. Current solutions are either time-consuming or hardly portable (modifications of both sofware/hardware layers). This work takes benefits from debug components included in ARMv7 processors to retrieve details on instructions committed by the CPU. First results in terms of silicon area and time overheads are also given.
△ Less
Submitted 13 November, 2018;
originally announced November 2018.
-
Survey of Consensus Protocols
Authors:
Abdul Wahab,
Waqas Mehmood
Abstract:
Distributed ledger technology has gained wide popularity and adoption since the emergence of bitcoin in 2008 which is based on proof of work (PoW). It is a distributed, transparent and immutable database of records of all the transactions or events that have been shared and executed among the participants. All the transactions are verified and maintained by multiple nodes across a network without…
▽ More
Distributed ledger technology has gained wide popularity and adoption since the emergence of bitcoin in 2008 which is based on proof of work (PoW). It is a distributed, transparent and immutable database of records of all the transactions or events that have been shared and executed among the participants. All the transactions are verified and maintained by multiple nodes across a network without a central authority through a distributed cryptographic mechanism, a consensus protocol. It forms the core of this technology that not only validates the information appended to the ledger but also ensures the order in which it is appended across all the nodes. It is the foundation of its security, accountability and trust. While many researchers are working on improving the current protocol to be quantum resistant, fault-tolerant, and energy-efficient. Others are focused on developing different variants of the protocol, best suited for specific use cases. In this paper, we shall review different consensus protocols of distributed ledger technologies and their implementations. We shall also review their properties, concept and similar-work followed by a brief analysis.
△ Less
Submitted 9 October, 2018; v1 submitted 8 October, 2018;
originally announced October 2018.
-
A Mathematical Framework for Deep Learning in Elastic Source Imaging
Authors:
Jaejun Yoo,
Abdul Wahab,
Jong Chul Ye
Abstract:
An inverse elastic source problem with sparse measurements is of concern. A generic mathematical framework is proposed which incorporates a low- dimensional manifold regularization in the conventional source reconstruction algorithms thereby enhancing their performance with sparse datasets. It is rigorously established that the proposed framework is equivalent to the so-called \emph{deep convoluti…
▽ More
An inverse elastic source problem with sparse measurements is of concern. A generic mathematical framework is proposed which incorporates a low- dimensional manifold regularization in the conventional source reconstruction algorithms thereby enhancing their performance with sparse datasets. It is rigorously established that the proposed framework is equivalent to the so-called \emph{deep convolutional framelet expansion} in machine learning literature for inverse problems. Apposite numerical examples are furnished to substantiate the efficacy of the proposed framework.
△ Less
Submitted 25 May, 2018; v1 submitted 27 February, 2018;
originally announced February 2018.
-
Deep Learning Diffuse Optical Tomography
Authors:
Jaejun Yoo,
Sohail Sabir,
Duchang Heo,
Kee Hyun Kim,
Abdul Wahab,
Yoonseok Choi,
Seul-I Lee,
Eun Young Chae,
Hak Hee Kim,
Young Min Bae,
Young-wook Choi,
Seungryong Cho,
Jong Chul Ye
Abstract:
Diffuse optical tomography (DOT) has been investigated as an alternative imaging modality for breast cancer detection thanks to its excellent contrast to hemoglobin oxidization level. However, due to the complicated non-linear photon scattering physics and ill-posedness, the conventional reconstruction algorithms are sensitive to imaging parameters such as boundary conditions. To address this, her…
▽ More
Diffuse optical tomography (DOT) has been investigated as an alternative imaging modality for breast cancer detection thanks to its excellent contrast to hemoglobin oxidization level. However, due to the complicated non-linear photon scattering physics and ill-posedness, the conventional reconstruction algorithms are sensitive to imaging parameters such as boundary conditions. To address this, here we propose a novel deep learning approach that learns non-linear photon scattering physics and obtains an accurate three dimensional (3D) distribution of optical anomalies. In contrast to the traditional black-box deep learning approaches, our deep network is designed to invert the Lippman-Schwinger integral equation using the recent mathematical theory of deep convolutional framelets. As an example of clinical relevance, we applied the method to our prototype DOT system. We show that our deep neural network, trained with only simulation data, can accurately recover the location of anomalies within biomimetic phantoms and live animals without the use of an exogenous contrast agent.
△ Less
Submitted 8 September, 2019; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Isogeometric approach for nonlinear bending and post-buckling analysis of functionally graded plates under thermal environment
Authors:
Loc V. Tran,
Phuc Phung-Van,
Jaehong Lee,
H. Nguyen-Xuan,
M. Abdel Wahab
Abstract:
In this paper, equilibrium and stability equations of functionally graded material (FGM) plate under thermal environment are formulated based on isogeometric analysis (IGA) in combination with higher-order shear deformation theory (HSDT). The FGM plate is made by a mixture of two distinct components, for which material properties not only vary continuously through thickness according to a power-la…
▽ More
In this paper, equilibrium and stability equations of functionally graded material (FGM) plate under thermal environment are formulated based on isogeometric analysis (IGA) in combination with higher-order shear deformation theory (HSDT). The FGM plate is made by a mixture of two distinct components, for which material properties not only vary continuously through thickness according to a power-law distribution but also are assumed to be a function of temperature. Temperature field is assumed to be constant in any plane and uniform, linear and nonlinear through plate thickness, respectively. The governing equation is in nonlinear form based on von Karman assumption and thermal effect. A NURBS-based isogeometric finite element formulation is utilized to naturally fulfil the rigorous C1-continuity required by the present plate model. Influences of gradient indices, boundary conditions, temperature distributions, material properties, length-to-thickness ratios on the behaviour of FGM plate are discussed in details. Numerical results demonstrate excellent performance of the present approach.
△ Less
Submitted 4 November, 2015;
originally announced November 2015.
-
Geometrically nonlinear isogeometric analysis of laminated composite plates based on higher-order shear deformation theory
Authors:
Loc V. Tran,
Jaehong Lee,
H. Nguyen-Van,
H. Nguyen-Xuan,
M. Abdel Wahab
Abstract:
In this paper, we present an effectively numerical approach based on isogeometric analysis (IGA) and higher-order shear deformation theory (HSDT) for geometrically nonlinear analysis of laminated composite plates. The HSDT allows us to approximate displacement field that ensures by itself the realistic shear strain energy part without shear correction factors. IGA utilizing basis functions namely…
▽ More
In this paper, we present an effectively numerical approach based on isogeometric analysis (IGA) and higher-order shear deformation theory (HSDT) for geometrically nonlinear analysis of laminated composite plates. The HSDT allows us to approximate displacement field that ensures by itself the realistic shear strain energy part without shear correction factors. IGA utilizing basis functions namely B-splines or non-uniform rational B-splines (NURBS) enables to satisfy easily the stringent continuity requirement of the HSDT model without any additional variables. The nonlinearity of the plates is formed in the total Lagrange approach based on the von-Karman strain assumptions. Numerous numerical validations for the isotropic, orthotropic, cross-ply and angle-ply laminated plates are provided to demonstrate the effectiveness of the proposed method.
△ Less
Submitted 13 November, 2014;
originally announced November 2014.
-
An extended isogeometric analysis for vibration of cracked FGM plates using higher-order shear deformation theory
Authors:
Loc V. Tran,
Vinh Phu Nguyen,
M. Abdel Wahab,
H. Nguyen-Xuan
Abstract:
A novel and effective formulation that combines the eXtended IsoGeometric Approach (XIGA) and Higher-order Shear Deformation Theory (HSDT) is proposed to study the free vibration of cracked Functionally Graded Material (FGM) plates. Herein, the general HSDT model with five unknown variables per node is applied for calculating the stiffness matrix without needing Shear Correction Factor (SCF). In o…
▽ More
A novel and effective formulation that combines the eXtended IsoGeometric Approach (XIGA) and Higher-order Shear Deformation Theory (HSDT) is proposed to study the free vibration of cracked Functionally Graded Material (FGM) plates. Herein, the general HSDT model with five unknown variables per node is applied for calculating the stiffness matrix without needing Shear Correction Factor (SCF). In order to model the discontinuous and singular phenomena in the cracked plates, IsoGeometric Analysis (IGA) utilizing the Non-Uniform Rational B-Spline (NURBS) functions is incorporated with enrichment functions through the partition of unity method. NURBS basis functions with their inherent arbitrary high order smoothness permit the C1 requirement of the HSDT model. The material properties of the FGM plates vary continuously through the plate thickness according to an exponent function. The effects of gradient index, crack length, crack location, length to thickness on the natural frequencies and mode shapes of simply supported and clamped FGM plate are studied. Numerical examples are provided to show excellent performance of the proposed method compared with other published solutions in the literature.
△ Less
Submitted 2 March, 2014;
originally announced March 2014.
-
Perfectly normal type-2 fuzzy interpolation B-spline curve
Authors:
Rozaimi Zakaria,
Abd. Fatah Wahab,
R. U. Gobithaasan
Abstract:
In this paper, we proposed another new form of type-2 fuzzy data points(T2FDPs) that is perfectly normal type-2 data points(PNT2FDPs). These kinds of brand-new data were defined by using the existing type-2 fuzzy set theory(T2FST) and type-2 fuzzy number(T2FN) concept since we dealt with the problem of defining complex uncertainty data. Along with this restructuring, we included the fuzzification(…
▽ More
In this paper, we proposed another new form of type-2 fuzzy data points(T2FDPs) that is perfectly normal type-2 data points(PNT2FDPs). These kinds of brand-new data were defined by using the existing type-2 fuzzy set theory(T2FST) and type-2 fuzzy number(T2FN) concept since we dealt with the problem of defining complex uncertainty data. Along with this restructuring, we included the fuzzification(alpha-cut operation), type-reduction and defuzzification processes against PNT2FDPs. In addition, we used interpolation B-soline curve function to demonstrate the PNT2FDPs.
△ Less
Submitted 30 April, 2013;
originally announced May 2013.
-
Normal type-2 Fuzzy Rational B-Spline Curve
Authors:
Rozaimi Zakaria,
Abd. Fatah Wahab,
R. U. Gobithaasan
Abstract:
In this paper, we proposed a new form of type-2 fuzzy data points(T2FDPs) that is normal type-2 data points(NT2FDPs). These brand-new forms of data were defined by using the definition of normal type-2 triangular fuzzy number(NT2TFN). Then, we applied fuzzification(alpha-cut) and type-reduction processes towards NT2FDPs after they had been redefined based on the situation of NT2FDPs. Furthermore,…
▽ More
In this paper, we proposed a new form of type-2 fuzzy data points(T2FDPs) that is normal type-2 data points(NT2FDPs). These brand-new forms of data were defined by using the definition of normal type-2 triangular fuzzy number(NT2TFN). Then, we applied fuzzification(alpha-cut) and type-reduction processes towards NT2FDPs after they had been redefined based on the situation of NT2FDPs. Furthermore, we redefine the defuzzification definition along with the new definitions of fuzzification process and type-reduction method to obtain crisp type-2 fuzzy solution data points. For all these processes from the defining the NT2FDPs to defuzzification of NT2FDPs, we demonstrate through curve representation by using the rational B-spline curve function as the example form modeling these NT2FDPs.
△ Less
Submitted 30 April, 2013;
originally announced April 2013.
-
Motion Detection Notification System by Short Messaging Service Using Network Camera and Global System for Mobile Modem
Authors:
Mohd Norzali Haji Mohd,
Mohd Helmy Bin Abd Wahab,
Siti Khairulnisa Ariffin
Abstract:
As the technology rapidly grows, the trend is clear that the use of mobile devices is gain an attention nowadays, thus designing a system by integrating it with notification feature is becoming an important aspect especially in tracking and monitoring system. Conventional security surveillance systems require the constant attention from the user, to monitor the location concurrently. In order to r…
▽ More
As the technology rapidly grows, the trend is clear that the use of mobile devices is gain an attention nowadays, thus designing a system by integrating it with notification feature is becoming an important aspect especially in tracking and monitoring system. Conventional security surveillance systems require the constant attention from the user, to monitor the location concurrently. In order to reduce the cost of computing power and advance technology of mobile phone in widespread acceptance of the Internet as a viable communication medium, this paper is aimed to design a low cost web-based system as a platform to view the image captured. When the network camera detects any movement from the intruders, it automatically captures the image and sends it to the database of the web-based directly by the network through File Transfer Protocol (FTP). The camera is attached through an Ethernet connection and power source. Therefore, the camera can be viewed from either standard Web browser or cell phone. Nowadays, when a security camera is installed, user is notified as long as the camera is switched on since any slight movement requires the attention of the supervisor. The utility of the system has proven theoretically. This system will also notify the user by sending a notification through Short Messages Services (SMS).
△ Less
Submitted 14 June, 2010;
originally announced June 2010.